From: Chuck Lever via Bugspray Bot <bugbot@kernel.org>
To: trondmy@kernel.org, cel@kernel.org, jlayton@kernel.org,
linux-nfs@vger.kernel.org, anna@kernel.org
Subject: Re: CFI failure at nfsd4_encode_operation+0xa2/0x210 [nfsd]
Date: Fri, 31 Jan 2025 21:00:08 +0000 [thread overview]
Message-ID: <20250131-b217973c4-73c4d9937b47@bugzilla.kernel.org> (raw)
In-Reply-To: <20250131-b217973c3-c25737af37f7@bugzilla.kernel.org>
Chuck Lever writes via Kernel.org Bugzilla:
(In reply to Rin Cat from comment #3)
> I no longer had this issue when I moved to LTS 6.6 kernel from LTS 6.1, so I
> am not sure where it was fixed.
If you want to find the specific commit that resolved the issue, the best you can do is bisect between v6.1 and v6.13, applying the flow integrity check at each step. That shouldn't be more than two dozen steps.
I don't think we would have explicitly fixed a flow integrity bug, our current tooling does not point those out.
> And for Jeff, CFI (Control Flow Integrity) is LLVM/clang supported runtime
> type check.
> If a pointer or function argument is different or incompatible with the
> declared type, a kernel warning or panic will be triggered depending on the
> configuration.
>
> https://clang.llvm.org/docs/ControlFlowIntegrity.html
>
> A CFI failure most likely means some runtime bugs.
If v6.1.127 still triggers a CFI warning, it would help if you could bisect as described above and report the result here.
Are you able to regularly test upstream kernels or even this branch:
https://git.kernel.org/pub/scm/linux/kernel/git/cel/linux.git/log/?h=nfsd-testing
View: https://bugzilla.kernel.org/show_bug.cgi?id=217973#c4
You can reply to this message to join the discussion.
--
Deet-doot-dot, I am a bot.
Kernel.org Bugzilla (bugspray 0.1-dev)
next prev parent reply other threads:[~2025-01-31 20:59 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-01-31 15:15 CFI failure at nfsd4_encode_operation+0xa2/0x210 [nfsd] Rin Cat via Bugspray Bot
2025-01-31 15:15 ` Chuck Lever via Bugspray Bot
2025-01-31 19:00 ` Jeff Layton via Bugspray Bot
2025-01-31 20:15 ` Rin Cat via Bugspray Bot
2025-01-31 21:00 ` Chuck Lever via Bugspray Bot [this message]
2025-01-31 21:05 ` Rin Cat via Bugspray Bot
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250131-b217973c4-73c4d9937b47@bugzilla.kernel.org \
--to=bugbot@kernel.org \
--cc=anna@kernel.org \
--cc=cel@kernel.org \
--cc=jlayton@kernel.org \
--cc=linux-nfs@vger.kernel.org \
--cc=trondmy@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox