Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address v2

2013-03-01 Thread Simon Jeons
On 03/01/2013 05:35 PM, Chen Gong wrote: On Fri, Mar 01, 2013 at 05:21:35PM +0800, Simon Jeons wrote: Date: Fri, 01 Mar 2013 17:21:35 +0800 From: Simon Jeons To: Mel Gorman , Ingo Molnar , Andrew Morton , linux-kernel@vger.kernel.org, linux...@kvack.org, r...@redhat.com, mho...@suse.cz,

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address v2

2013-03-01 Thread Chen Gong
On Fri, Mar 01, 2013 at 05:21:35PM +0800, Simon Jeons wrote: > Date: Fri, 01 Mar 2013 17:21:35 +0800 > From: Simon Jeons > To: Mel Gorman , Ingo Molnar , Andrew > Morton , linux-kernel@vger.kernel.org, > linux...@kvack.org, r...@redhat.com, mho...@suse.cz, han...@cmpxchg.org > Subject: Re:

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address v2

2013-03-01 Thread Simon Jeons
On 03/01/2013 05:15 PM, Chen Gong wrote: On Fri, Mar 01, 2013 at 02:43:53PM +0800, Simon Jeons wrote: Date: Fri, 01 Mar 2013 14:43:53 +0800 From: Simon Jeons To: Mel Gorman CC: Ingo Molnar , Andrew Morton , linux-kernel@vger.kernel.org, linux...@kvack.org, r...@redhat.com, mho...@suse.cz,

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address v2

2013-03-01 Thread Chen Gong
On Fri, Mar 01, 2013 at 02:43:53PM +0800, Simon Jeons wrote: > Date: Fri, 01 Mar 2013 14:43:53 +0800 > From: Simon Jeons > To: Mel Gorman > CC: Ingo Molnar , Andrew Morton > , linux-kernel@vger.kernel.org, > linux...@kvack.org, r...@redhat.com, mho...@suse.cz, han...@cmpxchg.org > Subject: Re:

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address v2

2013-03-01 Thread Chen Gong
On Fri, Mar 01, 2013 at 02:43:53PM +0800, Simon Jeons wrote: Date: Fri, 01 Mar 2013 14:43:53 +0800 From: Simon Jeons simon.je...@gmail.com To: Mel Gorman mgor...@suse.de CC: Ingo Molnar mi...@kernel.org, Andrew Morton a...@linux-foundation.org, linux-kernel@vger.kernel.org,

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address v2

2013-03-01 Thread Simon Jeons
On 03/01/2013 05:15 PM, Chen Gong wrote: On Fri, Mar 01, 2013 at 02:43:53PM +0800, Simon Jeons wrote: Date: Fri, 01 Mar 2013 14:43:53 +0800 From: Simon Jeons simon.je...@gmail.com To: Mel Gorman mgor...@suse.de CC: Ingo Molnar mi...@kernel.org, Andrew Morton a...@linux-foundation.org,

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address v2

2013-03-01 Thread Chen Gong
On Fri, Mar 01, 2013 at 05:21:35PM +0800, Simon Jeons wrote: Date: Fri, 01 Mar 2013 17:21:35 +0800 From: Simon Jeons simon.je...@gmail.com To: Mel Gorman mgor...@suse.de, Ingo Molnar mi...@kernel.org, Andrew Morton a...@linux-foundation.org, linux-kernel@vger.kernel.org, linux...@kvack.org,

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address v2

2013-03-01 Thread Simon Jeons
On 03/01/2013 05:35 PM, Chen Gong wrote: On Fri, Mar 01, 2013 at 05:21:35PM +0800, Simon Jeons wrote: Date: Fri, 01 Mar 2013 17:21:35 +0800 From: Simon Jeons simon.je...@gmail.com To: Mel Gorman mgor...@suse.de, Ingo Molnar mi...@kernel.org, Andrew Morton a...@linux-foundation.org,

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address v2

2013-02-28 Thread Simon Jeons
On 02/13/2013 07:02 PM, Mel Gorman wrote: Andrew or Ingo, please pick up. Changelog since v1 o Add reviewed-bys and acked-bys A user reported a bug whereby a backup process accessing /proc/kcore caused an oops. BUG: unable to handle kernel paging request at bb00ff33b000 IP: []

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address v2

2013-02-28 Thread Simon Jeons
On 02/13/2013 07:02 PM, Mel Gorman wrote: Andrew or Ingo, please pick up. Changelog since v1 o Add reviewed-bys and acked-bys A user reported a bug whereby a backup process accessing /proc/kcore caused an oops. BUG: unable to handle kernel paging request at bb00ff33b000 IP:

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address v2

2013-02-13 Thread Mel Gorman
On Wed, Feb 13, 2013 at 12:10:31PM +0100, Ingo Molnar wrote: > > * Mel Gorman wrote: > > > Andrew or Ingo, please pick up. > > Already did - will push it out later today. > Whoops, thanks. Sorry for the noise. -- Mel Gorman SUSE Labs -- To unsubscribe from this list: send the line

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address v2

2013-02-13 Thread Ingo Molnar
* Mel Gorman wrote: > Andrew or Ingo, please pick up. Already did - will push it out later today. Thanks, Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at

[PATCH] x86: mm: Check if PUD is large when validating a kernel address v2

2013-02-13 Thread Mel Gorman
Andrew or Ingo, please pick up. Changelog since v1 o Add reviewed-bys and acked-bys A user reported a bug whereby a backup process accessing /proc/kcore caused an oops. BUG: unable to handle kernel paging request at bb00ff33b000 IP: [] kern_addr_valid+0xbe/0x110 PGD 0 Oops: [#1]

[PATCH] x86: mm: Check if PUD is large when validating a kernel address v2

2013-02-13 Thread Mel Gorman
Andrew or Ingo, please pick up. Changelog since v1 o Add reviewed-bys and acked-bys A user reported a bug whereby a backup process accessing /proc/kcore caused an oops. BUG: unable to handle kernel paging request at bb00ff33b000 IP: [8103157e] kern_addr_valid+0xbe/0x110 PGD 0

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address v2

2013-02-13 Thread Ingo Molnar
* Mel Gorman mgor...@suse.de wrote: Andrew or Ingo, please pick up. Already did - will push it out later today. Thanks, Ingo -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to majord...@vger.kernel.org More majordomo info at

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address v2

2013-02-13 Thread Mel Gorman
On Wed, Feb 13, 2013 at 12:10:31PM +0100, Ingo Molnar wrote: * Mel Gorman mgor...@suse.de wrote: Andrew or Ingo, please pick up. Already did - will push it out later today. Whoops, thanks. Sorry for the noise. -- Mel Gorman SUSE Labs -- To unsubscribe from this list: send the line

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address

2013-02-12 Thread Michal Hocko
On Mon 11-02-13 14:52:36, Mel Gorman wrote: > A user reported the following oops when a backup process read > /proc/kcore. > > BUG: unable to handle kernel paging request at bb00ff33b000 > IP: [] kern_addr_valid+0xbe/0x110 > PGD 0 > Oops: [#1] SMP > CPU 6 > Modules linked in:

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address

2013-02-12 Thread Michal Hocko
On Mon 11-02-13 14:52:36, Mel Gorman wrote: A user reported the following oops when a backup process read /proc/kcore. BUG: unable to handle kernel paging request at bb00ff33b000 IP: [8103157e] kern_addr_valid+0xbe/0x110 PGD 0 Oops: [#1] SMP CPU 6 Modules linked

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address

2013-02-11 Thread Johannes Weiner
On Mon, Feb 11, 2013 at 02:52:36PM +, Mel Gorman wrote: > A user reported the following oops when a backup process read > /proc/kcore. > > BUG: unable to handle kernel paging request at bb00ff33b000 > IP: [] kern_addr_valid+0xbe/0x110 > PGD 0 > Oops: [#1] SMP > CPU 6 > Modules

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address

2013-02-11 Thread Rik van Riel
On 02/11/2013 09:52 AM, Mel Gorman wrote: A user reported the following oops when a backup process read /proc/kcore. BUG: unable to handle kernel paging request at bb00ff33b000 Investigation determined that the bug triggered when reading system RAM at the 4G mark. On this system, that

[PATCH] x86: mm: Check if PUD is large when validating a kernel address

2013-02-11 Thread Mel Gorman
A user reported the following oops when a backup process read /proc/kcore. BUG: unable to handle kernel paging request at bb00ff33b000 IP: [] kern_addr_valid+0xbe/0x110 PGD 0 Oops: [#1] SMP CPU 6 Modules linked in: af_packet nfs lockd fscache auth_rpcgss nfs_acl sunrpc 8021q garp

[PATCH] x86: mm: Check if PUD is large when validating a kernel address

2013-02-11 Thread Mel Gorman
A user reported the following oops when a backup process read /proc/kcore. BUG: unable to handle kernel paging request at bb00ff33b000 IP: [8103157e] kern_addr_valid+0xbe/0x110 PGD 0 Oops: [#1] SMP CPU 6 Modules linked in: af_packet nfs lockd fscache auth_rpcgss nfs_acl

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address

2013-02-11 Thread Rik van Riel
On 02/11/2013 09:52 AM, Mel Gorman wrote: A user reported the following oops when a backup process read /proc/kcore. BUG: unable to handle kernel paging request at bb00ff33b000 Investigation determined that the bug triggered when reading system RAM at the 4G mark. On this system, that

Re: [PATCH] x86: mm: Check if PUD is large when validating a kernel address

2013-02-11 Thread Johannes Weiner
On Mon, Feb 11, 2013 at 02:52:36PM +, Mel Gorman wrote: A user reported the following oops when a backup process read /proc/kcore. BUG: unable to handle kernel paging request at bb00ff33b000 IP: [8103157e] kern_addr_valid+0xbe/0x110 PGD 0 Oops: [#1] SMP CPU 6