From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 71FA1C32793 for ; Wed, 18 Jan 2023 12:58:49 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231149AbjARM6r (ORCPT ); Wed, 18 Jan 2023 07:58:47 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34228 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230168AbjARM5d (ORCPT ); Wed, 18 Jan 2023 07:57:33 -0500 Received: from mxhk.zte.com.cn (mxhk.zte.com.cn [63.216.63.40]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 091C64ED19; Wed, 18 Jan 2023 04:18:50 -0800 (PST) Received: from mxct.zte.com.cn (unknown [192.168.251.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mxhk.zte.com.cn (FangMail) with ESMTPS id 4NxlCl4zd6z8RV7D; Wed, 18 Jan 2023 20:18:27 +0800 (CST) Received: from mse-fl1.zte.com.cn (unknown [10.5.228.132]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mxct.zte.com.cn (FangMail) with ESMTPS id 4NxlC943kjz501Rr; Wed, 18 Jan 2023 20:17:57 +0800 (CST) Received: from szxlzmapp04.zte.com.cn ([10.5.231.166]) by mse-fl1.zte.com.cn with SMTP id 30ICHpaE003447; Wed, 18 Jan 2023 20:17:51 +0800 (+08) (envelope-from yang.yang29@zte.com.cn) Received: from mapi (szxlzmapp04[null]) by mapi (Zmail) with MAPI id mid14; Wed, 18 Jan 2023 20:17:54 +0800 (CST) Date: Wed, 18 Jan 2023 20:17:54 +0800 (CST) X-Zmail-TransId: 2b0663c7e372ffffffff8bf081dc X-Mailer: Zmail v1.0 Message-ID: <202301182017545851044@zte.com.cn> In-Reply-To: References: 202301131736452546903@zte.com.cn,Y8Wq3apsJh7keUVA@casper.infradead.org Mime-Version: 1.0 From: To: Cc: , , , , , , , Subject: =?UTF-8?B?UmU6IFtQQVRDSCBsaW51eC1uZXh0IHYzXSBzd2FwX3N0YXRlOiB1cGRhdGUgc2hhZG93X25vZGVzIGZvciBhbm9ueW1vdXMgcGFnZQ==?= Content-Type: text/plain; charset="UTF-8" X-MAIL: mse-fl1.zte.com.cn 30ICHpaE003447 X-Fangmail-Gw-Spam-Type: 0 X-FangMail-Miltered: at cgslv5.04-192.168.250.137.novalocal with ID 63C7E393.000 by FangMail milter! X-FangMail-Envelope: 1674044307/4NxlCl4zd6z8RV7D/63C7E393.000/192.168.251.13/[192.168.251.13]/mxct.zte.com.cn/ X-Fangmail-Anti-Spam-Filtered: true X-Fangmail-MID-QID: 63C7E393.000/4NxlCl4zd6z8RV7D Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > i_lock is at offset 128 of struct inode, so that matches the dump. > I believe that swapper_spaces never have ->host set, so I don't > believe you've tested this patch since 51b8c1fe250d went in > back in 2021. You are totally right. I reproduce the panic in linux-next, and fix it by patch v4. I should be more careful, since I used Linux 5.14 to test the patch which is a mistake. Much apologies for the time wasted. Thanks.