Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp4995529ybi; Tue, 11 Jun 2019 17:00:21 -0700 (PDT) X-Google-Smtp-Source: APXvYqwNjvPQA4KHC6Hu9o23IZ40o40/KSrbquPCNyWD4qrdP7ROL9AXNNeVsAWcyOfVA5f2E600 X-Received: by 2002:a17:902:28:: with SMTP id 37mr15082700pla.188.1560297621648; Tue, 11 Jun 2019 17:00:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560297621; cv=none; d=google.com; s=arc-20160816; b=knZpo1sXW2Zjcy7mgDHLgtJngkWxaIJ9SP0oi9enKEWxxYMmOXtyFWNco6wM9f7pk5 iNnPdXcexHw3egu2IvL2QE71MJ7JpvP/5YlcZf5fCtt8GjN83FSA1A6iI/jO5ex24Qb/ 0bGY4vaCJYCQWE91z7hUBwOQSLWFqdGlncJ6Wm+ccCnFN6uNypovGtGGj4+qDT84l+1D ozPrp7wGMmxcTdF3xd0Yl96r2EVw+2b9o5ZrbOsnzozZ8W+6+JgzkzqfGh018kNuIxd1 hPghBRJGTln4usvhlfgo6PO6wz0kFbmMvrbn/+6xRGffXnELvIBYHGGJkTvlW71yH9OJ 7FDg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=St/sap2qBv8Hsq63+0Q5syfF0d0aWy8Ds6OuEFtVAXU=; b=iRswCLFJYhUo8A9ltxp5PEJsDETwhOFGu4BajFzwWdQ7+JfnDa/e5aMnWNoOzYrdbv 3mVhCyaQOfutVeMCMkzDc71c9RpvGldZNhJnmYPlCk5e0Ax5n0htBpSgla1sNySVU2sN oxR+D2jfTBfPkveLL2uTyTufSohmeHX2kLXfaJNT4wZ2lwDDHVVD+p0IFH39k9079BBN fELy/CfUwWY79DsF8ihwAG7pquXqU7KB8FgxYTq++GBrST5l8KNdLgSkLot3tH3QkEhT Jvzf9LJio1SEZdbF1SLOKE+HyTE9/FfPwCWEMQaSUYXjjcu9bRwa+BnKniDcx/DbviMw +BAg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=BN7CXuFG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e11si13275547pgs.31.2019.06.11.17.00.05; Tue, 11 Jun 2019 17:00:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=BN7CXuFG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2407458AbfFKTjR (ORCPT + 99 others); Tue, 11 Jun 2019 15:39:17 -0400 Received: from mail-oi1-f194.google.com ([209.85.167.194]:40140 "EHLO mail-oi1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404788AbfFKTjR (ORCPT ); Tue, 11 Jun 2019 15:39:17 -0400 Received: by mail-oi1-f194.google.com with SMTP id w196so9880727oie.7 for ; Tue, 11 Jun 2019 12:39:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ffwll.ch; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=St/sap2qBv8Hsq63+0Q5syfF0d0aWy8Ds6OuEFtVAXU=; b=BN7CXuFGuD00uiYGfneiP10UMR/4kb+NYdIMor783WtxbNUDdhf56ynR61aFXzwEBr P2VSfjHgsSok7ATwjpTgeT7GB7SFC98yaLc1hrQrArVYg8JqIF1q0vPbCpgAFHoTsFMP LJGIM0jkX7Dfqs0o3t8YUP1nQnCZHqGncNP4Y= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=St/sap2qBv8Hsq63+0Q5syfF0d0aWy8Ds6OuEFtVAXU=; b=pmxGHmuuvApSQlTWlg00sL4iXiAZB5n34Kun9gepkBm4F3GGeFoPyyPzsKIqMu1iUf 69OTVb+A2q7hAe8UMuI2EzeIrY7TYbxGJX0tVMoo/vFXiGwd8oPbRNZWbuvMgl9vFJGu Ogv9nH2w5bqG1kyEfDNZa4hiayH/zD45KK40i+twZhg7D+1CQ17JRpJNGGB9nWiVQqYk JEgKy4BkKxnfw5MGGQ1u8TQb6hAIzXdHGOEJ2/aheYKtUHIqGe3EXDYcuNxMGZD6ETy/ cmHWUVnbi5WAWsapSNBix0dVcqAdZqa1UhNaQrfr2hxeUEFY8HzzJjZGUtJP8tJGLgab 5RDQ== X-Gm-Message-State: APjAAAWh5cuxO3ANUk3/LP0tK2vN5ZMfjcudOq4S+qDzUUTLXdnSGNjL t7bQ7xeA8EMMD8xolL2gwsGzR0YPzzsPS2WqCcTYNQ== X-Received: by 2002:aca:62c2:: with SMTP id w185mr17508454oib.110.1560281956544; Tue, 11 Jun 2019 12:39:16 -0700 (PDT) MIME-Version: 1.0 References: <87k1dsjkdo.fsf@turtle.gmx.de> <20190611153656.GA5084@kroah.com> <20190611174006.GB31662@kroah.com> In-Reply-To: <20190611174006.GB31662@kroah.com> From: Daniel Vetter Date: Tue, 11 Jun 2019 21:39:05 +0200 Message-ID: Subject: Re: Linux 5.1.9 build failure with CONFIG_NOUVEAU_LEGACY_CTX_SUPPORT=n To: Greg Kroah-Hartman Cc: Sven Joachim , stable , Linux Kernel Mailing List , Dave Airlie Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jun 11, 2019 at 7:40 PM Greg Kroah-Hartman wrote: > > On Tue, Jun 11, 2019 at 07:33:16PM +0200, Daniel Vetter wrote: > > On Tue, Jun 11, 2019 at 5:37 PM Greg Kroah-Hartman > > wrote: > > > On Tue, Jun 11, 2019 at 03:56:35PM +0200, Sven Joachim wrote: > > > > Commit 1e07d63749 ("drm/nouveau: add kconfig option to turn off nouveau > > > > legacy contexts. (v3)") has caused a build failure for me when I > > > > actually tried that option (CONFIG_NOUVEAU_LEGACY_CTX_SUPPORT=n): > > > > > > > > ,---- > > > > | Kernel: arch/x86/boot/bzImage is ready (#1) > > > > | Building modules, stage 2. > > > > | MODPOST 290 modules > > > > | ERROR: "drm_legacy_mmap" [drivers/gpu/drm/nouveau/nouveau.ko] undefined! > > > > | scripts/Makefile.modpost:91: recipe for target '__modpost' failed > > > > `---- > > > > Calling drm_legacy_mmap is definitely not a great idea. I think either > > we need a custom patch to remove that out on older kernels, or maybe > > even #ifdef if you want to be super paranoid about breaking stuff ... > > > > > > Upstream does not have that problem, as commit bed2dd8421 ("drm/ttm: > > > > Quick-test mmap offset in ttm_bo_mmap()") has removed the use of > > > > drm_legacy_mmap from nouveau_ttm.c. Unfortunately that commit does not > > > > apply in 5.1.9. > > > > > > > > Most likely 4.19.50 and 4.14.125 are also affected, I haven't tested > > > > them yet. > > > > > > They probably are. > > > > > > Should I just revert this patch in the stable tree, or add some other > > > patch (like the one pointed out here, which seems an odd patch for > > > stable...) > > > > ... or backport the above patch, that should be save to do too. Not > > sure what stable folks prefer? > > The above patch does not apply to all of the stable branches, so how > about I just revert this? People can live with this option not able to > turn off for now, and if they really want it, they can use a newer > kernel, right? Lots of people can live with root holes in their kernels, it's still not a great idea :-) Plan B would be to fix all the legacy ioctls and close all the exploits in there, which absolutely no one wants to spend time on. This way the only people who'll suffer are the ones with horribly outdated userspace (and at that point who cares about a few more exploits). We should maybe update the help text to tell people they really shouldn't enable this, the default y is really just to avoid regression reports :-) -Daniel -- Daniel Vetter Software Engineer, Intel Corporation +41 (0) 79 365 57 48 - http://blog.ffwll.ch