Received: by 2002:a05:7412:b995:b0:f9:9502:5bb8 with SMTP id it21csp5455915rdb; Sun, 31 Dec 2023 01:54:35 -0800 (PST) X-Google-Smtp-Source: AGHT+IEGofNLY3a+8P0pMi4mTvSMwPcGheHpdCnLI7DUpMC4L4F67xgAOxJ2ddRii5g5am9ZEzIe X-Received: by 2002:a05:6808:1204:b0:3bb:e0a8:4acd with SMTP id a4-20020a056808120400b003bbe0a84acdmr4989264oil.58.1704016474890; Sun, 31 Dec 2023 01:54:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704016474; cv=none; d=google.com; s=arc-20160816; b=JCOg4ofLGfCMbWqdCyFcOBVsdB6BfAMDEX9Pb9Ad1/Qn8wyd2eQ9hTFiWV2WLjpjDg ylRHCH0XcRjTaRK6sbLHypjSxjsn2cWNJksLrNrpxMRPnaW1bIqHcgcF9WkzSbumQBkA w9L6N79+d/bPsACDc91Dc9vKsvfORvcrsHjHx3dKbG7GWhdc1aDAGVGSqMcldBf1YbmM bgzRBJG2PxnxDWQzNOIgOgrLV8za+fzmkJDS1IOvHiag3SYsffwRdDSlikiGNGBtwY3P HMtUr11dkdPN+0sSHJkJdr7XXBsLpHmhC14h9gYoWqbRXa9eSeWl5PNLd9Ygnv9gnOmW CCvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :dkim-signature; bh=UMSYvbQU54i14Wl8nNwYDolPzMJV8XGJUyQsZje4uBY=; fh=B9v7qeW+IoG2WnAcLK2GodcYoHl2Wsu7H855JL20/HY=; b=OxNzCRnBTJxFDDJ9ZwDzQdiE2mLv+Qs071Rn4YMPPlJnxDoU7SHPst8SxV5SR0f0+q ttKwhtGmo692i5/XPXAn7kHMJJm5mYxtTVvA9W/rgrZZHmsoYsWd0BpzTPySHZ9sKVeB TP/7+Hiz05Usz8U1iDx6Mjzr/BaHgpqUO9Tf6h8oDQLAV9Y7XMXTNil1sll62dP2MXkG 9L0xKp5wzAuZzBtLGcQenAxy/cf4o4qdvTBb48LUxiVoQypUdgqrn32OXTgrlNt2zSCu DZHelysRVUCaecf7wAtCKDV4Te4Az7mbylWjlCS/7H3CHJqQSbGVnLtFJDCeZRhf+MdY RB+A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quora.org header.s=google header.b=mIwyD0GL; spf=pass (google.com: domain of linux-kernel+bounces-13683-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-13683-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id i124-20020a625482000000b006d9a4feb0e9si12887255pfb.158.2023.12.31.01.54.34 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 31 Dec 2023 01:54:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-13683-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@quora.org header.s=google header.b=mIwyD0GL; spf=pass (google.com: domain of linux-kernel+bounces-13683-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-13683-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 827162810BE for ; Sun, 31 Dec 2023 09:54:34 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id C00B92912; Sun, 31 Dec 2023 09:54:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=quora.org header.i=@quora.org header.b="mIwyD0GL" X-Original-To: linux-kernel@vger.kernel.org Received: from mail-ej1-f41.google.com (mail-ej1-f41.google.com [209.85.218.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E4E5823B1 for ; Sun, 31 Dec 2023 09:54:25 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=quora.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=quora.org Received: by mail-ej1-f41.google.com with SMTP id a640c23a62f3a-a2356bb40e3so653547566b.1 for ; Sun, 31 Dec 2023 01:54:25 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quora.org; s=google; t=1704016464; x=1704621264; darn=vger.kernel.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=UMSYvbQU54i14Wl8nNwYDolPzMJV8XGJUyQsZje4uBY=; b=mIwyD0GLQQqdipZ3TUrib+Vdws8pi5kjz6dCN7TL5DIAENfuf8IjWPSeQrZxgDpIdh TKa6j9rmb0g+i28o+HG8tQC07e4cwU+RXVdbQQ1D/x+VIizAAZwd8ev1P/tqnNddynCI oDKK5CluVseZ5Ek7lMZrJ18DScZNSlBySFvA0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704016464; x=1704621264; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=UMSYvbQU54i14Wl8nNwYDolPzMJV8XGJUyQsZje4uBY=; b=umNrSfLwbQh4+Uf3Pcj5WIG9zOpBIZKf+4ZpJFaFBjVaYs4+1NDk/I7x1mwpm5+TO6 +/9qxHrN4fa0+JbtCF+tARG6RXYWYH3B4ZVOtSPjHVdz+MEdaCuk+2CbV0gCNaLBzlC/ TCmm/4jN3VCKiPFjyUu7SB6cBCXWz0cMHRXa3HXzcyMHrjz66v99ZK/YSM5hJ+O7jDaF Kjc5NaWcQKIuL52UoOTm8mbR23HmyYmxVQag1z0XqzJnpflrtI8ulPZ+YFb5ab7Loah7 Q+8UKqf3OFnHa/0zgO6xiVv8CQ5lpV5ZgHVPQDVpQVEPiaUwPflzuY9fL4N82Y6PhSZI j+xw== X-Gm-Message-State: AOJu0YzxN9eFOasbVcsgKG1w5SdY2JxObly1Asq2U9PAmwvWEkYbOpvI ZhAokqMVF3s1DZrNHIkcg9sUHpKvUM28iSUp1fMIz9AB+5DPog== X-Received: by 2002:a17:906:b0d8:b0:9fe:81a:c258 with SMTP id bk24-20020a170906b0d800b009fe081ac258mr8091222ejb.26.1704016463805; Sun, 31 Dec 2023 01:54:23 -0800 (PST) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 References: <2g6gw7ybne5d5u2ewsbfpsoxslw5vie3d6whlhrcmbombkyzqs@dd6tr3se6fu7> In-Reply-To: <2g6gw7ybne5d5u2ewsbfpsoxslw5vie3d6whlhrcmbombkyzqs@dd6tr3se6fu7> From: Daniel J Blueman Date: Sun, 31 Dec 2023 17:54:12 +0800 Message-ID: Subject: Re: Stack corruption in bch2_nocow_write To: Kent Overstreet Cc: linux-bcachefs@vger.kernel.org, Linux Kernel Content-Type: text/plain; charset="UTF-8" On Sun, 31 Dec 2023 at 06:41, Kent Overstreet wrote: > > On Fri, Dec 29, 2023 at 07:43:13PM +0800, Daniel J Blueman wrote: > > Hi Kent et al, > > > > On Linux 6.7-rc7 from bcachefs master SHA f3608cbdfd built with UBSAN > > [1], with a crafted workload [2] I'm able to trigger stack corruption > > in bch2_nocow_write [3]. > > > > Let me know if you can't reproduce it and I'll check reproducibility > > on another platform, and let me know for any patch testing. > > Can you give the bcachefs-testing branch a try? Good fixes! I can't reproduce the issue on SHA 67503f8d4 in bcachefs.git/bcachefs-testing, and no warnings are triggered with CONFIG_PROVE_LOCKING. Tested-by: Daniel J Blueman Thanks, Dan -- Daniel J Blueman