Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp4222950ybp; Mon, 7 Oct 2019 05:20:42 -0700 (PDT) X-Google-Smtp-Source: APXvYqwrDIjYV42Cgxf8zXA08DkTTWeOW96VsP33P2PK36Fz3ySJYg/1xvwsvSaa8I3zxHxTvDKZ X-Received: by 2002:a05:6402:651:: with SMTP id u17mr29002476edx.104.1570450842713; Mon, 07 Oct 2019 05:20:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570450842; cv=none; d=google.com; s=arc-20160816; b=x6MQjL2MIDQ7qN1KChRgnL6bdLIUy3FFITqqj7qXg3Nd3Uqltzy7U9e2yIIVeur3ZA tIlB62c2se1hEb0DRCxG8eHzhwu9TmqrNcWs8anHTICfhZxDARZ0ArOAOSXL7jaSwuaY eDaK2a31zWFIBHkQb0OvXAf9k/4AoczV5xb1XuNanEjMiq3wcvMjFQFFDl571BmD4ztK q/5BxRnG88OHBxiZVH5r4JILfGTi31aWAR+vG7eh8ItHZShyurAFgtmhStzQgHhTecxH Zav/ftREV8oSGXe/4e+0jUFzb2sNMp6wcPWamWo8d7pbdMxO1yqroBWUU9VZ65tCK+Do MohQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=5on/5THDGr0FTVE93D1DksMY2m/icc8L62Rjb72VT6M=; b=JCVYOqWMSdJxgYbTRR/jISJhd/E045uYa2ae825+Lr3LOQ1XtW+KS7A5lvliGu97hI XuOPbgDHdFkk48IoK02hPCedRgqbYUoq8SHxpQ84RfPRz9LUKvRYY4xOJm0ok2T5uug4 cH4kCdbzTw/eZmpjM7lDJwxe08CkmtUh/CkvhWS3iXMECa98G152Wr8cTi3f6tRMaxZK zPy/zznXV/6t2G8nU4JpMkRMN0lunnUgmRyAX3zNbxv4jrZD962T2YUwtAVxNkTrjnqn Q1ujtpngCvE9Ix6Vcn5dEj2Ls2tp+yo229cARxeaDMAQNBsY4f6sR6/eTIkcvZYBD/RF YGVw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=ZHHtrWMr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 90si9857345edj.72.2019.10.07.05.20.18; Mon, 07 Oct 2019 05:20:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=ZHHtrWMr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727940AbfJGMQ7 (ORCPT + 99 others); Mon, 7 Oct 2019 08:16:59 -0400 Received: from mail-pl1-f193.google.com ([209.85.214.193]:35667 "EHLO mail-pl1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727511AbfJGMQ7 (ORCPT ); Mon, 7 Oct 2019 08:16:59 -0400 Received: by mail-pl1-f193.google.com with SMTP id c3so5314162plo.2; Mon, 07 Oct 2019 05:16:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=5on/5THDGr0FTVE93D1DksMY2m/icc8L62Rjb72VT6M=; b=ZHHtrWMrMw1ZM3ClD+XwTg1ixkQcdoOd24VVzmMIjMZ0iwW7DrW2BTBj8ZlfuFgNDI 65KhfgT00GZWTvwZQmZVZEWePaBc2VGvNh65GNvN0gk/jAEewqx2AQVspN3WZUwRIPtF GQFPBFlSCxfGodFzEaRjgBwWz2ZiP+WkwzREZbqZhS1iyqW/XhwNJ1EM9s5VzB2/EwfE SQAYjaOqWWm95m0kTsRdK8mcEq+6APz2TPBGgQ7ESqo2I6qZNTSdVXkvYoXlPqh8hGeG sLOSoovB5+Y/glJ0nyVxyNWwdK4H6ChhuwjBSgB/vA/cllGDVTYbnKiqgUPNau/YJdK7 BjEg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:subject:to:cc:references:from:message-id :date:user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=5on/5THDGr0FTVE93D1DksMY2m/icc8L62Rjb72VT6M=; b=SqExMujSd+mZeYlfpdgmJUTZ6DnPiSo2IU+x5lc1o14t4yAZEsQzyw/wC6/DkakdMW Dvc1ib4lNM9BcqmVmh7Pud4UlA107xGG0xi09gRN6E8/Jae8kly4goKuPgc6LAanoawn ym2F6PF1SSwM21LTvZLj32HX+HidwfkfO3PxffOC4HW0QqTeJbeA4f2AXVagwBImdRhg 9gYJ8/0P26CYYRY5AWf7LfnVK6kbnvnyC+GSoJLIoxWOueYileBMrCRc3QAH7HfYhb5l 6Ajc8mRt3baOjBj8AbSeoUHbO1m2AQjBWHeVC+YK+gm1okPgHdVt8P0I3KkgHGb2THXB WHmQ== X-Gm-Message-State: APjAAAUwRGdRcNwaeAnTcgn9lbL8Zocg9sIzDVuzsBnJGKx052lHVwqB MiXtfhl9a8+mdcxo2czoAsXWhfTu X-Received: by 2002:a17:902:b94b:: with SMTP id h11mr27691653pls.164.1570450618400; Mon, 07 Oct 2019 05:16:58 -0700 (PDT) Received: from server.roeck-us.net ([2600:1700:e321:62f0:329c:23ff:fee3:9d7c]) by smtp.gmail.com with ESMTPSA id 62sm15774756pfg.164.2019.10.07.05.16.56 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 07 Oct 2019 05:16:57 -0700 (PDT) Subject: Re: [PATCH] Convert filldir[64]() from __put_user() to unsafe_put_user() To: Max Filippov Cc: Linus Torvalds , LKML , Alexander Viro , linux-fsdevel@vger.kernel.org References: <20191006222046.GA18027@roeck-us.net> From: Guenter Roeck Message-ID: Date: Mon, 7 Oct 2019 05:16:55 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Max, On 10/6/19 9:04 PM, Max Filippov wrote: > On Sun, Oct 6, 2019 at 3:25 PM Guenter Roeck wrote: >> this patch causes all my sparc64 emulations to stall during boot. It causes >> all alpha emulations to crash with [1a] and [1b] when booting from a virtual >> disk, and one of the xtensa emulations to crash with [2]. > > [...] > >> [2] >> >> Unable to handle kernel paging request at virtual address 0000000000000004 >> reboot(50): Oops -1 >> pc = [<0000000000000004>] ra = [] ps = 0000 Tainted: G D >> pc is at 0x4 >> ra is at filldir64+0x64/0x320 >> v0 = 0000000000000000 t0 = 0000000067736d6b t1 = 000000012011445b >> t2 = 0000000000000000 t3 = 0000000000000000 t4 = 0000000000007ef8 >> t5 = 0000000120114448 t6 = 0000000000000000 t7 = fffffc0007eec000 >> s0 = fffffc000792b5c3 s1 = 0000000000000004 s2 = 0000000000000018 >> s3 = fffffc0007eefec8 s4 = 0000000000000008 s5 = 00000000f00000a3 >> s6 = 000000000000000b >> a0 = fffffc000792b5c3 a1 = 2f2f2f2f2f2f2f2f a2 = 0000000000000004 >> a3 = 000000000000000b a4 = 00000000f00000a3 a5 = 0000000000000008 >> t8 = 0000000000000018 t9 = 0000000000000000 t10= 0000000022e1d02a >> t11= 000000011fd6f3b8 pv = fffffc0000b9a810 at = 0000000022e1ccf8 >> gp = fffffc0000f03930 sp = (____ptrval____) >> Trace: >> [] proc_readdir_de+0x170/0x300 >> [] filldir64+0x0/0x320 >> [] proc_root_readdir+0x3c/0x80 >> [] iterate_dir+0x198/0x240 >> [] ksys_getdents64+0xa8/0x160 >> [] sys_getdents64+0x20/0x40 >> [] filldir64+0x0/0x320 >> [] entSys+0xa4/0xc0 > > This doesn't look like a dump from xtensa core. > v5.4-rc2 kernel doesn't crash for me on xtensa, but the userspace > doesn't work well, because all directories appear to be empty. > > __put_user/__get_user don't do unaligned access on xtensa, > they check address alignment and return -EFAULT if it's bad. > You are right, sorry; I must have mixed that up. xtensa doesn't crash. The boot stalls, similar to sparc64. This is only seen with my nommu test (de212:kc705-nommu:nommu_kc705_defconfig). xtensa mmu tests are fine, at least for me, but then I only run tests with initrd (which for some reason doesn't crash on alpha either). Guenter