Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp1625631rwi; Mon, 10 Oct 2022 20:18:12 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4FAZ45eEnaWw6uFs7atqDv3xEH2AGVGCS6IbxRLO6a+IKTfPG/7iCpvREA1sOrnC+dQC0V X-Received: by 2002:a17:907:724a:b0:782:3754:ecb3 with SMTP id ds10-20020a170907724a00b007823754ecb3mr17633153ejc.282.1665458292445; Mon, 10 Oct 2022 20:18:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665458292; cv=none; d=google.com; s=arc-20160816; b=v6FY5nRc8CpivHMyXI6xko5KRzuZ8Fzv0PMpZxv+D7blJGzAY0uQMpSRdt1y1o0JGU YnJHImjoXFjSt+fJhxJY76hWIM91s8LF8j8fjKVWvEWg1qWT51Bk2FcReoAWfclPfbKg pTyGKIwsR6oKXMDmRb16La4dgyYfy74EJ2hQw0cIn2xRUJgkJDvE9mlR4VXvuGmVLsGT 1k67IHooxJumWPYz/kDJriDPn1IK4IZYnvKAkZtGleYYXnB1nuS62vKGDad8SFgiOQE4 OlgCEgPvKQUjGxE1lRGoDErDe7BaaO3WE73VLnYM4uBcBein9/N1nMI6BMN6fexOg8bi UNgQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=73QTXH86wVqS4mTfHLXuPq8OUI3FybyEUtGd+DSFkWY=; b=pcWY7wGPBE32OHOKH0X8sGDsubfvMEepiH8yCQGt6u8WkuX9FtxxjsMsomAsShPxo0 cMpc4kVKBNlSxNlsPbFGS3Rz6lZUG7mgQwV+PapbnIT5Lxh4Gd4RJlB2E+VcmkEMId0g rEBPUPubCogYq2wWgerjBNbBkVTwrY6hirFXp1lM0W7EwnMwiN7LD5K80NFfzc8Lr5r6 6NTOkDQr786YTUVcKkyXT1Uezq9qkT69DZYUgXViaCK6XWOJjl4lHSRsZKxq7Wsorhq+ JXrdbvJ2/HzdwFJIVswBIH7IujkaBKL8L6A4EMalcBu5E2ei/oxP0vULdzPVPTqb1cfZ SRkA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@zx2c4.com header.s=20210105 header.b="Nk/CFF0g"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=zx2c4.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id nd11-20020a170907628b00b00774d0f10566si13652970ejc.821.2022.10.10.20.17.46; Mon, 10 Oct 2022 20:18:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@zx2c4.com header.s=20210105 header.b="Nk/CFF0g"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=zx2c4.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229863AbiJKC6H (ORCPT + 99 others); Mon, 10 Oct 2022 22:58:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56464 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229698AbiJKC6G (ORCPT ); Mon, 10 Oct 2022 22:58:06 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 64BA77B284 for ; Mon, 10 Oct 2022 19:58:04 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id ECEA06108E for ; Tue, 11 Oct 2022 02:58:03 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 94110C433C1; Tue, 11 Oct 2022 02:58:00 +0000 (UTC) Authentication-Results: smtp.kernel.org; dkim=pass (1024-bit key) header.d=zx2c4.com header.i=@zx2c4.com header.b="Nk/CFF0g" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=zx2c4.com; s=20210105; t=1665457079; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=73QTXH86wVqS4mTfHLXuPq8OUI3FybyEUtGd+DSFkWY=; b=Nk/CFF0gumwazCzlYKFoLZ6NQirVeH8Ua9aWM1Ha+wPgzv68QWzhIxptKbrxl7e+zo8eYa cS43ggpr5ZI2kXzJVqebHRX2JDqXnI5QkpOmtXSq9JkoBnLXdrLwzCzsccVMNmgU4XD5QE KkGa0OOv/U9z9t+W9GWWWc+TbnN2iMo= Received: by mail.zx2c4.com (ZX2C4 Mail Server) with ESMTPSA id 9ffc15f2 (TLSv1.3:TLS_AES_256_GCM_SHA384:256:NO); Tue, 11 Oct 2022 02:57:58 +0000 (UTC) Date: Mon, 10 Oct 2022 20:57:54 -0600 From: "Jason A. Donenfeld" To: Michael Ellerman Cc: Linus Torvalds , ajd@linux.ibm.com, aneesh.kumar@linux.ibm.com, atrajeev@linux.vnet.ibm.com, christophe.leroy@csgroup.eu, cuigaosheng1@huawei.com, david@redhat.com, farosas@linux.ibm.com, geoff@infradead.org, gustavoars@kernel.org, haren@linux.ibm.com, hbathini@linux.ibm.com, joel@jms.id.au, lihuafei1@huawei.com, linux-kernel@vger.kernel.org, linux@roeck-us.net, linuxppc-dev@lists.ozlabs.org, lukas.bulwahn@gmail.com, mikey@neuling.org, nathan@kernel.org, nathanl@linux.ibm.com, nicholas@linux.ibm.com, npiggin@gmail.com, pali@kernel.org, paul@paul-moore.com, rmclure@linux.ibm.com, ruscur@russell.cc, windhl@126.com, wsa+renesas@sang-engineering.com, ye.xingchen@zte.com.cn, yuanjilin@cdjrlc.com, zhengyongjun3@huawei.com Subject: Re: [GIT PULL] Please pull powerpc/linux.git powerpc-6.1-1 tag Message-ID: References: <87edvhntv0.fsf@mpe.ellerman.id.au> <874jwbnn1u.fsf@mpe.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <874jwbnn1u.fsf@mpe.ellerman.id.au> X-Spam-Status: No, score=-6.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Oct 11, 2022 at 12:53:17PM +1100, Michael Ellerman wrote: > "Jason A. Donenfeld" writes: > > On Mon, Oct 10, 2022 at 01:25:25PM -0600, Jason A. Donenfeld wrote: > >> Hi Michael, > >> > >> On Sun, Oct 09, 2022 at 10:01:39PM +1100, Michael Ellerman wrote: > >> > powerpc updates for 6.1 > >> > > >> > - Remove our now never-true definitions for pgd_huge() and p4d_leaf(). > >> > > >> > - Add pte_needs_flush() and huge_pmd_needs_flush() for 64-bit. > >> > > >> > - Add support for syscall wrappers. > >> > > >> > - Add support for KFENCE on 64-bit. > >> > > >> > - Update 64-bit HV KVM to use the new guest state entry/exit accounting API. > >> > > >> > - Support execute-only memory when using the Radix MMU (P9 or later). > >> > > >> > - Implement CONFIG_PARAVIRT_TIME_ACCOUNTING for pseries guests. > >> > > >> > - Updates to our linker script to move more data into read-only sections. > >> > > >> > - Allow the VDSO to be randomised on 32-bit. > >> > > >> > - Many other small features and fixes. > >> > >> FYI, something in here broke the wireguard test suite, which runs the > >> iperf3 networking utility. The full log is here [1], but the relevant part > >> is: > >> > >> [+] NS1: iperf3 -Z -t 3 -c 192.168.241.2 > >> Connecting to host 192.168.241.2, port 5201 > >> iperf3: error - failed to read /dev/urandom: Bad address > >> > >> I'll see if I can narrow it down a bit more and bisect. But just FYI, in > >> case you have an intuition. > > > > Huh. From iov_iter.c: > > > > static int copyout(void __user *to, const void *from, size_t n) > > { > > size_t before = n; > > if (should_fail_usercopy()) > > return n; > > if (access_ok(to, n)) { > > instrument_copy_to_user(to, from, n); > > n = raw_copy_to_user(to, from, n); > > if (n == before) > > pr_err("SARU n still %zu pointer is %lx\n", n, (unsigned long)to); > > } > > return n; > > } > > > > I added the pr_err() there to catch the failure: > > [ 3.443506] SARU n still 64 pointer is b78db000 > > > > Also I managed to extract the failing portion of iperf3 into something > > smaller: > > > > int temp; > > char *x; > > ssize_t l; > > FILE *f; > > char template[] = "/blah-XXXXXX"; > > > > temp = mkstemp(template); > > if (temp < 0) > > panic("mkstemp"); > > if (unlink(template) < 0) > > panic("unlink"); > > if (ftruncate(temp, 0x20000) < 0) > > panic("ftruncate"); > > x = mmap(NULL, 0x20000, PROT_READ|PROT_WRITE, MAP_PRIVATE, temp, 0); > > if (x == MAP_FAILED) > > panic("mmap"); > > f = fopen("/dev/urandom", "rb"); > > if (!f) > > panic("fopen"); > > setbuf(f, NULL); > > if (fread(x, 1, 0x20000, f) != 0x20000) > > panic("fread"); > > Does that fail for you reliably? > > It succeeds for me running under qemu ppce500, though I'm not using your > kernel config yet. Yes, every time without fail, across two systems and two qemu builds. Jason