Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp3613333ybp; Sun, 6 Oct 2019 16:07:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqxYf17CViOlgJB+kDB2jBG2or6qrctCRHtJLSgN177eqi6qvOOATLFPCxmQiXGs3UrCrCf1 X-Received: by 2002:a17:906:6805:: with SMTP id k5mr21138475ejr.50.1570403250930; Sun, 06 Oct 2019 16:07:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570403250; cv=none; d=google.com; s=arc-20160816; b=k6XVVj3GnVh4t1hTfn1uTSO99WBV/foYUTiHs4mDacf7Ms920jCzhyy497dGxSDfSY dcA0lBEj7M7gwG8zrAXaG59TdXuijakgCZRAK0LxJmPXUulAJ8K2LLxE1zkhSRvR9Sk/ XC9sWHiWULpWRtBOwIOmI3T8MxryiM7Q51sLAZcZGN6HZgCS+p06QKqCBw3FkYqtikQn R9rWAchBj3I4k25r2mEHV3VC3JWRgBWrKXrkD9BFX9oBg7vmQ+bIpHjMACYI7gM8OjhD xkbpdJPSPBx1lPLuhPRMuFdJu/F+EMbv1riRrOu1uqJff/AQuT2U9o8hZdWnmmW5Bro0 5eQw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=XLTnokvqrTEKp/du7ZGxWocwiLdnmjMjOhGQECeegpY=; b=rTNbOPNDyl/QFa1wW+Gd05xL6AHAUa+xtSCUPYyEtZdyDxkp6ON4VOXDcvkkLh3UYT KK7wqVwFokETcgT3knqS4UYuDR6HzBNfCx/NO3KBkhkYc5Mae6/OLfQ0ElTKi98qO4Dp WqzImAslGR+Y+tQd/DOaklpgWySKppcki9jPPq83/LiUAW0XDpLfgHaAab6q6Y8YVOqg r3F+HTDqKJ5pNOqgLCT2ev7BVMDKwt3fkaJXCs8HXgLUJVzwjjKt52cToJnqwnU4G334 wm+CFSPMHWjOa5EG4/r13LRknw2HV5UJTV7C0i5osqc7sttQa3xw/ii+Qopcepa5kfb5 49yg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=google header.b=K6ZqWtno; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y8si8039531edd.355.2019.10.06.16.07.06; Sun, 06 Oct 2019 16:07:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=google header.b=K6ZqWtno; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726661AbfJFXGi (ORCPT + 99 others); Sun, 6 Oct 2019 19:06:38 -0400 Received: from mail-lf1-f68.google.com ([209.85.167.68]:46653 "EHLO mail-lf1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726253AbfJFXGi (ORCPT ); Sun, 6 Oct 2019 19:06:38 -0400 Received: by mail-lf1-f68.google.com with SMTP id t8so7875858lfc.13 for ; Sun, 06 Oct 2019 16:06:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux-foundation.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=XLTnokvqrTEKp/du7ZGxWocwiLdnmjMjOhGQECeegpY=; b=K6ZqWtnobAV2cuFZDrGF+QdsYZcJ5WAzg/GLhEbPt6cRFU2151jIBXEJlbzCk2qJGl SNrsisuVTqPG8hOsunk4CCvoWZJmu70oxOOQ4TwoDpI8xh21WHKtIidRRHjwwa/URxgz OCTqirPBIeK1iusfvpbIbuI7g53wv0JqS3/l8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=XLTnokvqrTEKp/du7ZGxWocwiLdnmjMjOhGQECeegpY=; b=oU9vEyJvQzskC9+nBsgM6VgYBspQ69Mxofpd4Fn60nToyuQ+iv2eABiApEIhp9kimJ 1n3EThRHMwlZfwlSQF7I9OhUU/jTN/dmz7qz96OQrGSSRR15pV+xNzxjJTt9KKmR/10o TcP3f3mSto8xBrmH0j5tvuTlDW7d0G/keSSd5hiy8SVZ4Jp44YMToOTORCd7tqLcFp7t CP+VkjZg4HTbZOqfly2aLd1tJZj7pcQuXROjof3pitY7JraBZbdkYExN6+IRhnOO5ZPA 7WsvAaf6yPu8g0h9Wf/YyykXlxuC4t2R21hV1FFFIk7zOl3Q9+Cvs9d1QtdTDxOC8t+7 iZZA== X-Gm-Message-State: APjAAAVysxfYVHlInHxYaZ6mTlV3HvLGjFz9onsUaorEDGmSdbqRE+UC ciX5yqoBLx+PG7qfMVrpLVOoSBKymCM= X-Received: by 2002:ac2:53a3:: with SMTP id j3mr15196051lfh.155.1570403193942; Sun, 06 Oct 2019 16:06:33 -0700 (PDT) Received: from mail-lj1-f178.google.com (mail-lj1-f178.google.com. [209.85.208.178]) by smtp.gmail.com with ESMTPSA id b10sm2717121lji.48.2019.10.06.16.06.32 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 06 Oct 2019 16:06:33 -0700 (PDT) Received: by mail-lj1-f178.google.com with SMTP id a22so11674580ljd.0 for ; Sun, 06 Oct 2019 16:06:32 -0700 (PDT) X-Received: by 2002:a2e:551:: with SMTP id 78mr16735500ljf.48.1570403192234; Sun, 06 Oct 2019 16:06:32 -0700 (PDT) MIME-Version: 1.0 References: <20191006222046.GA18027@roeck-us.net> In-Reply-To: <20191006222046.GA18027@roeck-us.net> From: Linus Torvalds Date: Sun, 6 Oct 2019 16:06:16 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH] Convert filldir[64]() from __put_user() to unsafe_put_user() To: Guenter Roeck Cc: Linux Kernel Mailing List , Alexander Viro , linux-fsdevel Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Oct 6, 2019 at 3:20 PM Guenter Roeck wrote: > > this patch causes all my sparc64 emulations to stall during boot. It causes > all alpha emulations to crash with [1a] and [1b] when booting from a virtual > disk, and one of the xtensa emulations to crash with [2]. Ho humm. I've run variations of that patch over a few years on x86, but obviously not on alpha/sparc. At least I should still be able to read alpha assembly, even after all these years. Would you mind sending me the result of make fs/readdir.s on alpha with the broken config? I'd hope that the sparc issue is the same. Actually, could you also do make fs/readdir.o and then send me the "objdump --disassemble" of that? That way I get the instruction offsets without having to count by hand. > Unable to handle kernel paging request at virtual address 0000000000000004 > rcS(47): Oops -1 > pc = [<0000000000000004>] ra = [] ps = 0000 Not tainted > pc is at 0x4 That is _funky_. I'm not seeing how it could possibly jump to 0x4, but it clearly does. That said, are you sure it's _that_ commit? Because this pattern: > a0 = fffffc0007dbca56 a1 = 2f2f2f2f2f2f2f2f a2 = 000000000000000a implicates the memchr('/') call in the next one. That's a word full of '/' characters. Of course, it could just be left-over register contents from that memchr(), but it makes me wonder. Particularly since it seems to happen early in filldir64(): > ra is at filldir64+0x64/0x320 which is just a fairly small handful of instructions in, and I wouldn't be shocked if that's the return address for the call to memchr. Linus