Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp526610pxf; Thu, 18 Mar 2021 06:27:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzmZVjFByTvsYaRldeOK3nvzmOIPa3jhZA7lJa+ZiKM85Sp12jnj70mdYlUgee94eqUcQgu X-Received: by 2002:a17:906:1a4b:: with SMTP id j11mr41237956ejf.55.1616074059714; Thu, 18 Mar 2021 06:27:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616074059; cv=none; d=google.com; s=arc-20160816; b=e6BhY2aF/vtZ1Yc+6Kr6zQLf7fd0QOzUPpkQwiewN4chtwa9YzhRNAg7Uls3EFk4M9 +nef07tKNi1+m0FS8xBUf1pW5YTyyjN5Mrc8JKHk2e1ZDvui6+Fmg+XV3dar0i7itQH7 nQm32kDqjBkqSW0MFiOorWmfzp3QIyssUxsggGnjj2S8qaK6oY2ldWnE5gnPNAfegl2k Kyyc/w4wjQz6RWDLTCLLawa3ui0GwOs8YUYUtqInZx3DxNORRAP4XzJ5DK85mt/XNV8E 89AgHP0Zm0Fht27ryhI4hk0Y8yb4yHMO4Za1wQLKuRjZ9gg5xOMf0slZ1n5YPaY1ievY Bohg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=6EgM8nGImzGHS6yHfomg5bS9MPxjydU7Tsja8j/4MqY=; b=HhIBQ/lW2c+Evzw2BdOs4Q3Ma40YERWxri4VzA9XWf1M6P7Y5LRhylg3xJssKJ2zMD yapgjk/HwF3ttrOiqCvA25/46LkbLRo/76TvkMwD7mUeJQb3S92mrvQDJQ2YdFxZ0WCN PzXqSrG9EPzerrXNJirz6xLXw9Y8O1e7EBYO9o33Xpv83bm5hgy5TBSz2leYjuIbiErB 9pxNWmjEmXONu8WzK/8/1vpUfOVC9QVSwmXFUqFn3AwjRdAPOlp/H5hMMjiiokWrpjR0 Ax3S39ONeE2uvWKJBQAQxd44t/OI0CV74/OIeycr6V1wcSrTe8w0+fi6l0o7XLIvJaIm tofQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Is+8Ae7x; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cw18si1500812edb.142.2021.03.18.06.27.17; Thu, 18 Mar 2021 06:27:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Is+8Ae7x; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231383AbhCRNX6 (ORCPT + 99 others); Thu, 18 Mar 2021 09:23:58 -0400 Received: from mail.kernel.org ([198.145.29.99]:60262 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231380AbhCRNX1 (ORCPT ); Thu, 18 Mar 2021 09:23:27 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 08EEB64F01; Thu, 18 Mar 2021 13:23:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1616073807; bh=azu47gE8dnLQPum0mcL1O3W7dBz1Y3txbYwdvva8Cws=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Is+8Ae7xagv3lP1HQAZHmvPszDS8ClHjJFVBtKew3rEJ4Y3g32dx3zifqvtL9jBQz lUUfP2WxjLqwzPeBFdIVpAZ2T9vr8zchOkfOOJPkhkOb6IbCqeVABrpR6r32vZr9mk b8ZZaUZLIwYiaA0VfZofTELMrcFKj6ZixsKLTC3zZIV/1CN4GtmgCe0Tfol5a4sQto 06afu/sl25D5l7J8R6h0nRPtZzlfzTeJgnAWk5nFoUIhopfplc19klm+/47nBg4HFa KnPQaGalUGYtk3HLkXvZVJDdQNKGOK9J4oIjLiNdE+FhMqUId5iAZ9DetMoIRCXgel sHG6baj9KmXSA== Date: Thu, 18 Mar 2021 13:23:23 +0000 From: Mark Brown To: Amit Kumar Mahapatra Cc: linux-spi@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, git@xilinx.com, Karen Dombroski Subject: Re: [PATCH 2/2] spi: spi-zynq-qspi: Fix stack violation bug Message-ID: <20210318132323.GG5469@sirena.org.uk> References: <20210318102446.25142-1-amit.kumar-mahapatra@xilinx.com> <20210318102446.25142-3-amit.kumar-mahapatra@xilinx.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="nhYGnrYv1PEJ5gA2" Content-Disposition: inline In-Reply-To: <20210318102446.25142-3-amit.kumar-mahapatra@xilinx.com> X-Cookie: You are false data. User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --nhYGnrYv1PEJ5gA2 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Thu, Mar 18, 2021 at 04:24:46AM -0600, Amit Kumar Mahapatra wrote: > When the number of bytes for the op is greater than one, the read could > run off the end of the function stack and cause a crash. > This patch restores the behaviour of safely reading out of the original > opcode location. > Kernel panic - not syncing: stack-protector: Kernel stack is corrupted > in: zynq_qspi_exec_mem_op+0x1c0/0x2e0 > CPU1: stopping Please think hard before including complete backtraces in upstream reports, they are very large and contain almost no useful information relative to their size so often obscure the relevant content in your message. If part of the backtrace is usefully illustrative (it often is for search engines if nothing else) then it's usually better to pull out the relevant sections. --nhYGnrYv1PEJ5gA2 Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAABCgAdFiEEreZoqmdXGLWf4p/qJNaLcl1Uh9AFAmBTVEsACgkQJNaLcl1U h9DsCQf+KMrGalD617RM69Vb+1jNxBl1jynG6zS3+cO+oFdQaB1t5rxVY8V/7ayp +7n+laRNMY2C/OJke3NY0P85le77SKQaai1Tjksl6tg0JH+VKdyoRE89gKmbYT93 DT2m88UXzYNVt28ZcnkKIbrHdKvNYkHBLP9P5hyk5LtTkipv1a1+OqYStbYfKzAk BDn+lvv31mcQh2QySqwFqyhixTPNmQSfj1RR5D1v7KNExk3wTZ3oj0Shj4Biw+UO XELRrtm+rmcz2i7L1BS6mQCTPtIsJJQk6gpJ+BJ7+ZFI7D6b6+oFr9luQf+fp2ts yClnG6i75D3p5NPnyV6bcKFN+mLUVw== =XPjD -----END PGP SIGNATURE----- --nhYGnrYv1PEJ5gA2--