Re: [PATCH RESEND 1/1] um: oops on accessing a non-present page in the vmalloc area

2024-03-21 Thread Petr Tesarik
On 3/21/2024 5:44 AM, David Gow wrote: > On Fri, 23 Feb 2024 at 22:07, Petr Tesarik > wrote: >> >> From: Petr Tesarik >> >> If a segmentation fault is caused by accessing an address in the vmalloc >> area, check that the target page is present. >> >> Currently, if the kernel hits a guard page in

Re: [PATCH RESEND 1/1] um: oops on accessing a non-present page in the vmalloc area

2024-03-20 Thread David Gow
On Fri, 23 Feb 2024 at 22:07, Petr Tesarik wrote: > > From: Petr Tesarik > > If a segmentation fault is caused by accessing an address in the vmalloc > area, check that the target page is present. > > Currently, if the kernel hits a guard page in the vmalloc area, UML blindly > assumes that the f

Re: [PATCH RESEND 1/1] um: oops on accessing a non-present page in the vmalloc area

2024-03-20 Thread Anton Ivanov
On 20/03/2024 14:09, Richard Weinberger wrote: - Ursprüngliche Mail - Von: "Petr Tesarik" Yes. I'm just way behind my maintainer schedule. :-/ Understood. Thank you for your reply. By the way, are you looking for more people to help with the amount of work? Yes, help is always

Re: [PATCH RESEND 1/1] um: oops on accessing a non-present page in the vmalloc area

2024-03-20 Thread Richard Weinberger
- Ursprüngliche Mail - > Von: "Petr Tesarik" >> Yes. I'm just way behind my maintainer schedule. :-/ > > Understood. Thank you for your reply. > > By the way, are you looking for more people to help with the amount of work? Yes, help is always welcome! Johannes and Anton do already a gr

Re: [PATCH RESEND 1/1] um: oops on accessing a non-present page in the vmalloc area

2024-03-20 Thread Petr Tesarik
t;> CC: "Roberto Sassu" , "petr" >> >> Gesendet: Montag, 18. März 2024 14:09:07 >> Betreff: Re: [PATCH RESEND 1/1] um: oops on accessing a non-present page in >> the vmalloc area > >> On 3/12/2024 4:07 PM, Petr Tesarik wrote: >>>

Re: [PATCH RESEND 1/1] um: oops on accessing a non-present page in the vmalloc area

2024-03-19 Thread Richard Weinberger
- Ursprüngliche Mail - > Von: "Petr Tesarik" > An: "richard" , "anton ivanov" > , "Johannes Berg" > , "linux-um" , > "linux-kernel" > CC: "Roberto Sassu" , "petr" > Gesendet: Montag,

Re: [PATCH RESEND 1/1] um: oops on accessing a non-present page in the vmalloc area

2024-03-18 Thread Petr Tesarik
On 3/12/2024 4:07 PM, Petr Tesarik wrote: > On 2/23/2024 3:04 PM, Petr Tesarik wrote: >> From: Petr Tesarik >> >> If a segmentation fault is caused by accessing an address in the vmalloc >> area, check that the target page is present. >> >> Currently, if the kernel hits a guard page in the vmalloc

Re: [PATCH RESEND 1/1] um: oops on accessing a non-present page in the vmalloc area

2024-03-12 Thread Petr Tesarik
On 2/23/2024 3:04 PM, Petr Tesarik wrote: > From: Petr Tesarik > > If a segmentation fault is caused by accessing an address in the vmalloc > area, check that the target page is present. > > Currently, if the kernel hits a guard page in the vmalloc area, UML blindly > assumes that the fault is c

[PATCH RESEND 1/1] um: oops on accessing a non-present page in the vmalloc area

2024-02-23 Thread Petr Tesarik
From: Petr Tesarik If a segmentation fault is caused by accessing an address in the vmalloc area, check that the target page is present. Currently, if the kernel hits a guard page in the vmalloc area, UML blindly assumes that the fault is caused by a stale mapping and will be fixed by flush_tlb_