lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <564F536F.9080109@c-s.fr>
Date:	Fri, 20 Nov 2015 18:07:59 +0100
From:	Christophe Leroy <christophe.leroy@....fr>
To:	Al Viro <viro@...iv.linux.org.uk>
Cc:	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	LinuxPPC-dev <linuxppc-dev@...ts.ozlabs.org>,
	linux-fsdevel <linux-fsdevel@...r.kernel.org>,
	BOUET Serge <serge.bouet@....fr>,
	BARABAN Luc <luc.baraban@....fr>
Subject: Recurring Oops in link_path_walk()

Al,

We've been running Kernel 3.18 for several monthes on our embedded 
boards, and we have a recurring Oops in link_path_walk()
It doesn't happen very often (approximatly once every month on one board 
among a set of 50 boards, never the same board).

Here below is the last oops I got, with kernel 3.18.22. It crashes at 
address 0xc00b75ac. Here below is the full desassembly of 
link_path_walk() so that you can see exactly the offending line.

The address it fails at is always the same (link_path_walk+0x414) but 
the oopsing data address is each time different. I added all Oops I got 
below after the disassembly (on different sub-versions of 3.18).

Do you have any idea of what this can be ? Is there any recent change 
made since 3.18 that could fix it and could be backported into 3.18 ?

Thanks,
Christophe

[10250.855670] Unable to handle kernel paging request for data at 
address 0x00003879
[10250.867593] Faulting instruction address: 0xc00b75ac
[10250.883695] Oops: Kernel access of bad area, sig: 11 [#1]
[10250.888766] PREEMPT CMPC885
[10250.891564] CPU: 0 PID: 2416 Comm: SUO_ Not tainted 3.18.22 #53
[10250.899123] task: c628e680 ti: c66c8000 task.ti: c66c8000
[10250.904451] NIP: c00b75ac LR: c00b7574 CTR: c00fcdc8
[10250.909364] REGS: c66c9d10 TRAP: 0300   Not tainted  (3.18.22)
[10250.916825] MSR: 00009032 <EE,ME,IR,DR,RI>  CR: 22002482 XER: 00000000
[10250.923374] DAR: 00003879 DSISR: c0000000
[10250.923374] GPR00: c00b7574 c66c9dc0 c628e680 c1088330 c50883b8 
c50883f2 90f9ced3 00000031
[10250.923374] GPR08: 00000000 00003869 c5085560 31c52da7 22002482 
101ccd18 101c0000 1017da60
[10250.923374] GPR16: 1024b884 101758d4 1017d9a8 1014e64c 1051553c 
00000000 00000000 c66c8000
[10250.923374] GPR24: 00100000 c66c9ea0 00300000 00000004 fffff000 
c651b02f 00000000 c66c9e88
[10250.955351] NIP [c00b75ac] link_path_walk+0x414/0x86c
[10250.960326] LR [c00b7574] link_path_walk+0x3dc/0x86c
[10250.965191] Call Trace:
[10250.967640] [c66c9dc0] [c00b7574] link_path_walk+0x3dc/0x86c (unreliable)
[10250.974363] [c66c9e20] [c00b9e30] path_openat+0x90/0x678
[10250.979605] [c66c9e80] [c00ba448] do_filp_open+0x30/0x8c
[10250.984857] [c66c9f00] [c00abc08] do_sys_open+0x14c/0x238
[10250.990196] [c66c9f40] [c000b294] ret_from_syscall+0x0/0x38
[10250.995654] Instruction dump:
[10250.998585] 7f834800 419e000c 48014f81 80610018 8081001c 81410020 
907f0000 909f0004
[10251.006243] 915f0020 3bc00000 8061000c 81230028 <81290010> 81290014 
2f890000 419e0014



c00b7198 <link_path_walk>:
  *
  * Returns 0 and nd will have valid dentry and mnt on success.
  * Returns error and drops reference to input namei data on failure.
  */
static int link_path_walk(const char *name, struct nameidata *nd)
{
c00b7198:    7c 08 02 a6     mflr    r0
c00b719c:    94 21 ff a0     stwu    r1,-96(r1)
c00b71a0:    be a1 00 34     stmw    r21,52(r1)
c00b71a4:    90 01 00 64     stw     r0,100(r1)
c00b71a8:    7c 7d 1b 78     mr      r29,r3
     struct path next;
     int err;

     while (*name=='/')
c00b71ac:    89 23 00 00     lbz     r9,0(r3)
  *
  * Returns 0 and nd will have valid dentry and mnt on success.
  * Returns error and drops reference to input namei data on failure.
  */
static int link_path_walk(const char *name, struct nameidata *nd)
{
c00b71b0:    7c 9f 23 78     mr      r31,r4
     struct path next;
     int err;

     while (*name=='/')
c00b71b4:    2b 89 00 2f     cmplwi  cr7,r9,47
c00b71b8:    40 9e 00 10     bne     cr7,c00b71c8 <link_path_walk+0x30>
c00b71bc:    8d 3d 00 01     lbzu    r9,1(r29)
c00b71c0:    2b 89 00 2f     cmplwi  cr7,r9,47
c00b71c4:    41 9e ff f8     beq     cr7,c00b71bc <link_path_walk+0x24>
         name++;
     if (!*name)
c00b71c8:    2f 89 00 00     cmpwi   cr7,r9,0
c00b71cc:    41 9e 02 48     beq     cr7,c00b7414 <link_path_walk+0x27c>
  * so we keep a cache of "no, this doesn't need follow_link"
  * for the common case.
  */
static inline int should_follow_link(struct dentry *dentry, int follow)
{
     return unlikely(d_is_symlink(dentry)) ? follow : 0;
c00b71d0:    3f 40 00 30     lis     r26,48

     error = security_inode_follow_link(link->dentry, nd);
     if (error)
         goto out_put_nd_path;

     nd->last_type = LAST_BIND;
c00b71d4:    3b 60 00 04     li      r27,4
     *p = dentry->d_inode->i_op->follow_link(dentry, nd);
     error = PTR_ERR(*p);
     if (IS_ERR(*p))
c00b71d8:    3b 80 f0 00     li      r28,-4096
     return status;
}

static __always_inline void set_root(struct nameidata *nd)
{
     get_fs_root(current->fs, &nd->root);
c00b71dc:    3b 3f 00 18     addi    r25,r31,24
c00b71e0:    54 37 00 24     rlwinm  r23,r1,0,0,18
         if (err) {
             err = nested_symlink(&next, nd);
             if (err)
                 return err;
         }
         if (!d_can_lookup(nd->path.dentry)) {
c00b71e4:    3f 00 00 10     lis     r24,16
     return 0;
}

static inline int may_lookup(struct nameidata *nd)
{
     if (nd->flags & LOOKUP_RCU) {
c00b71e8:    81 3f 00 24     lwz     r9,36(r31)
c00b71ec:    71 24 00 40     andi.   r4,r9,64
c00b71f0:    40 82 01 a0     bne     c00b7390 <link_path_walk+0x1f8>
         if (err != -ECHILD)
             return err;
         if (unlazy_walk(nd, NULL))
             return -ECHILD;
     }
     return inode_permission(nd->inode, MAY_EXEC);
c00b71f4:    80 7f 00 20     lwz     r3,32(r31)
c00b71f8:    38 80 00 01     li      r4,1
c00b71fc:    4b ff f2 15     bl      c00b6410 <inode_permission>
c00b7200:    7c 7e 1b 78     mr      r30,r3
     for(;;) {
         u64 hash_len;
         int type;

         err = may_lookup(nd);
          if (err)
c00b7204:    2f 9e 00 00     cmpwi   cr7,r30,0
c00b7208:    40 9e 01 1c     bne     cr7,c00b7324 <link_path_walk+0x18c>
static inline u64 hash_name(const char *name)
{
     unsigned long hash = init_name_hash();
     unsigned long len = 0, c;

     c = (unsigned char)*name;
c00b720c:    88 bd 00 00     lbz     r5,0(r29)
  * one character.
  */
static inline u64 hash_name(const char *name)
{
     unsigned long hash = init_name_hash();
     unsigned long len = 0, c;
c00b7210:    39 40 00 00     li      r10,0

     c = (unsigned char)*name;
c00b7214:    7c a9 2b 78     mr      r9,r5
  * We know there's a real path component here of at least
  * one character.
  */
static inline u64 hash_name(const char *name)
{
     unsigned long hash = init_name_hash();
c00b7218:    39 00 00 00     li      r8,0
c00b721c:    48 00 00 08     b       c00b7224 <link_path_walk+0x8c>
     c = (unsigned char)*name;
     do {
         len++;
         hash = partial_name_hash(c, hash);
         c = (unsigned char)name[len];
     } while (c && c != '/');
c00b7220:    41 9a 00 2c     beq     cr6,c00b724c <link_path_walk+0xb4>
     unsigned long hash = init_name_hash();
     unsigned long len = 0, c;

     c = (unsigned char)*name;
     do {
         len++;
c00b7224:    39 4a 00 01     addi    r10,r10,1

/* partial hash update function. Assume roughly 4 bits per character */
static inline unsigned long
partial_name_hash(unsigned long c, unsigned long prevhash)
{
     return (prevhash + (c << 4) + (c >> 4)) * 11;
c00b7228:    55 26 e1 3e     rlwinm  r6,r9,28,4,31
c00b722c:    55 27 20 36     rlwinm  r7,r9,4,0,27
         hash = partial_name_hash(c, hash);
         c = (unsigned char)name[len];
c00b7230:    7d 3d 50 ae     lbzx    r9,r29,r10
c00b7234:    7c e6 3a 14     add     r7,r6,r7
     } while (c && c != '/');
c00b7238:    2f 89 00 00     cmpwi   cr7,r9,0
c00b723c:    7d 07 42 14     add     r8,r7,r8
c00b7240:    2b 09 00 2f     cmplwi  cr6,r9,47
c00b7244:    1d 08 00 0b     mulli   r8,r8,11
c00b7248:    40 9e ff d8     bne     cr7,c00b7220 <link_path_walk+0x88>
             break;

         hash_len = hash_name(name);

         type = LAST_NORM;
         if (name[0] == '.') switch (hashlen_len(hash_len)) {
c00b724c:    2b 85 00 2e     cmplwi  cr7,r5,46
     do {
         len++;
         hash = partial_name_hash(c, hash);
         c = (unsigned char)name[len];
     } while (c && c != '/');
     return hashlen_create(end_name_hash(hash), len);
c00b7250:    7d 47 53 78     mr      r7,r10
c00b7254:    7d 06 43 78     mr      r6,r8
             break;

         hash_len = hash_name(name);

         type = LAST_NORM;
         if (name[0] == '.') switch (hashlen_len(hash_len)) {
c00b7258:    41 9e 01 70     beq     cr7,c00b73c8 <link_path_walk+0x230>
             case 1:
                 type = LAST_DOT;
         }
         if (likely(type == LAST_NORM)) {
             struct dentry *parent = nd->path.dentry;
             nd->flags &= ~LOOKUP_JUMPED;
c00b725c:    80 bf 00 24     lwz     r5,36(r31)
                 break;
             case 1:
                 type = LAST_DOT;
         }
         if (likely(type == LAST_NORM)) {
             struct dentry *parent = nd->path.dentry;
c00b7260:    81 3f 00 04     lwz     r9,4(r31)
             nd->flags &= ~LOOKUP_JUMPED;
c00b7264:    54 a5 05 24     rlwinm  r5,r5,0,20,18
c00b7268:    90 bf 00 24     stw     r5,36(r31)
             if (unlikely(parent->d_flags & DCACHE_OP_HASH)) {
c00b726c:    80 a9 00 00     lwz     r5,0(r9)
c00b7270:    70 a4 00 01     andi.   r4,r5,1
c00b7274:    40 82 02 30     bne     c00b74a4 <link_path_walk+0x30c>
c00b7278:    7d 45 53 78     mr      r5,r10
c00b727c:    39 20 00 00     li      r9,0
                 hash_len = this.hash_len;
                 name = this.name;
             }
         }

         nd->last.hash_len = hash_len;
c00b7280:    90 ff 00 08     stw     r7,8(r31)
c00b7284:    90 df 00 0c     stw     r6,12(r31)
         nd->last.name = name;
c00b7288:    93 bf 00 10     stw     r29,16(r31)
         nd->last_type = type;
c00b728c:    91 3f 00 30     stw     r9,48(r31)

         name += hashlen_len(hash_len);
         if (!*name)
c00b7290:    7d 5d 28 ee     lbzux   r10,r29,r5
c00b7294:    2f 8a 00 00     cmpwi   cr7,r10,0
c00b7298:    41 9e 01 7c     beq     cr7,c00b7414 <link_path_walk+0x27c>
          * If it wasn't NUL, we know it was '/'. Skip that
          * slash, and continue until no more slashes.
          */
         do {
             name++;
         } while (unlikely(*name == '/'));
c00b729c:    8d 5d 00 01     lbzu    r10,1(r29)
c00b72a0:    2b 8a 00 2f     cmplwi  cr7,r10,47
c00b72a4:    41 be ff f8     beq     cr7,c00b729c <link_path_walk+0x104>
         if (!*name)
c00b72a8:    2f 8a 00 00     cmpwi   cr7,r10,0
c00b72ac:    41 9e 01 68     beq     cr7,c00b7414 <link_path_walk+0x27c>
     /*
      * "." and ".." are special - ".." especially so because it has
      * to be able to know about the current root directory and
      * parent relationships.
      */
     if (unlikely(nd->last_type != LAST_NORM))
c00b72b0:    2f 89 00 00     cmpwi   cr7,r9,0
c00b72b4:    40 9e 01 bc     bne     cr7,c00b7470 <link_path_walk+0x2d8>
         return handle_dots(nd, nd->last_type);
     err = lookup_fast(nd, path, &inode);
c00b72b8:    7f e3 fb 78     mr      r3,r31
c00b72bc:    38 81 00 18     addi    r4,r1,24
c00b72c0:    38 a1 00 08     addi    r5,r1,8
c00b72c4:    4b ff f9 69     bl      c00b6c2c <lookup_fast>
     if (unlikely(err)) {
c00b72c8:    7c 7e 1b 79     mr.     r30,r3
c00b72cc:    40 82 06 f8     bne     c00b79c4 <link_path_walk+0x82c>
c00b72d0:    81 41 00 08     lwz     r10,8(r1)
             goto out_err;

         inode = path->dentry->d_inode;
     }
     err = -ENOENT;
     if (!inode || d_is_negative(path->dentry))
c00b72d4:    2f 8a 00 00     cmpwi   cr7,r10,0
c00b72d8:    41 9e 00 6c     beq     cr7,c00b7344 <link_path_walk+0x1ac>
c00b72dc:    80 81 00 1c     lwz     r4,28(r1)
     spin_unlock(&dentry->d_lock);
}

static inline unsigned __d_entry_type(const struct dentry *dentry)
{
     return dentry->d_flags & DCACHE_ENTRY_TYPE;
c00b72e0:    81 24 00 00     lwz     r9,0(r4)
c00b72e4:    75 28 00 70     andis.  r8,r9,112
c00b72e8:    41 82 00 5c     beq     c00b7344 <link_path_walk+0x1ac>
  * so we keep a cache of "no, this doesn't need follow_link"
  * for the common case.
  */
static inline int should_follow_link(struct dentry *dentry, int follow)
{
     return unlikely(d_is_symlink(dentry)) ? follow : 0;
c00b72ec:    7f 88 d0 00     cmpw    cr7,r8,r26
c00b72f0:    41 9e 02 04     beq     cr7,c00b74f4 <link_path_walk+0x35c>
}

static inline void path_to_nameidata(const struct path *path,
                     struct nameidata *nd)
{
     if (!(nd->flags & LOOKUP_RCU)) {
c00b72f4:    81 3f 00 24     lwz     r9,36(r31)
c00b72f8:    71 28 00 40     andi.   r8,r9,64
c00b72fc:    41 82 01 38     beq     c00b7434 <link_path_walk+0x29c>
c00b7300:    81 21 00 18     lwz     r9,24(r1)
         dput(nd->path.dentry);
         if (nd->path.mnt != path->mnt)
             mntput(nd->path.mnt);
     }
     nd->path.mnt = path->mnt;
c00b7304:    91 3f 00 00     stw     r9,0(r31)
     nd->path.dentry = path->dentry;
c00b7308:    90 9f 00 04     stw     r4,4(r31)
         }
         BUG_ON(inode != path->dentry->d_inode);
         return 1;
     }
     path_to_nameidata(path, nd);
     nd->inode = inode;
c00b730c:    91 5f 00 20     stw     r10,32(r31)
c00b7310:    81 24 00 00     lwz     r9,0(r4)
c00b7314:    55 29 02 56     rlwinm  r9,r9,0,9,11
         if (err) {
             err = nested_symlink(&next, nd);
             if (err)
                 return err;
         }
         if (!d_can_lookup(nd->path.dentry)) {
c00b7318:    7f 89 c0 00     cmpw    cr7,r9,r24
c00b731c:    41 9e fe cc     beq     cr7,c00b71e8 <link_path_walk+0x50>
             err = -ENOTDIR;
c00b7320:    3b c0 ff ec     li      r30,-20
             break;
         }
     }
     terminate_walk(nd);
c00b7324:    7f e3 fb 78     mr      r3,r31
c00b7328:    4b ff eb b9     bl      c00b5ee0 <terminate_walk>
     return err;
c00b732c:    7f c3 f3 78     mr      r3,r30
}
c00b7330:    80 01 00 64     lwz     r0,100(r1)
c00b7334:    ba a1 00 34     lmw     r21,52(r1)
c00b7338:    7c 08 03 a6     mtlr    r0
c00b733c:    38 21 00 60     addi    r1,r1,96
c00b7340:    4e 80 00 20     blr
}

static inline void path_to_nameidata(const struct path *path,
                     struct nameidata *nd)
{
     if (!(nd->flags & LOOKUP_RCU)) {
c00b7344:    81 3f 00 24     lwz     r9,36(r31)
c00b7348:    71 28 00 40     andi.   r8,r9,64
c00b734c:    41 82 00 24     beq     c00b7370 <link_path_walk+0x1d8>
c00b7350:    80 61 00 18     lwz     r3,24(r1)
         dput(nd->path.dentry);
         if (nd->path.mnt != path->mnt)
             mntput(nd->path.mnt);
     }
     nd->path.mnt = path->mnt;
     nd->path.dentry = path->dentry;
c00b7354:    81 21 00 1c     lwz     r9,28(r1)
     if (!(nd->flags & LOOKUP_RCU)) {
         dput(nd->path.dentry);
         if (nd->path.mnt != path->mnt)
             mntput(nd->path.mnt);
     }
     nd->path.mnt = path->mnt;
c00b7358:    90 7f 00 00     stw     r3,0(r31)
     nd->path.dentry = path->dentry;
c00b735c:    91 3f 00 04     stw     r9,4(r31)
         if (!d_can_lookup(nd->path.dentry)) {
             err = -ENOTDIR;
             break;
         }
     }
     terminate_walk(nd);
c00b7360:    7f e3 fb 78     mr      r3,r31
         if (err < 0)
             goto out_err;

         inode = path->dentry->d_inode;
     }
     err = -ENOENT;
c00b7364:    3b c0 ff fe     li      r30,-2
         if (!d_can_lookup(nd->path.dentry)) {
             err = -ENOTDIR;
             break;
         }
     }
     terminate_walk(nd);
c00b7368:    4b ff eb 79     bl      c00b5ee0 <terminate_walk>
c00b736c:    4b ff ff c0     b       c00b732c <link_path_walk+0x194>

static inline void path_to_nameidata(const struct path *path,
                     struct nameidata *nd)
{
     if (!(nd->flags & LOOKUP_RCU)) {
         dput(nd->path.dentry);
c00b7370:    80 7f 00 04     lwz     r3,4(r31)
c00b7374:    48 00 b5 89     bl      c00c28fc <dput>
         if (nd->path.mnt != path->mnt)
c00b7378:    80 7f 00 00     lwz     r3,0(r31)
c00b737c:    81 21 00 18     lwz     r9,24(r1)
c00b7380:    7f 83 48 40     cmplw   cr7,r3,r9
c00b7384:    41 be ff d0     beq     cr7,c00b7354 <link_path_walk+0x1bc>
             mntput(nd->path.mnt);
c00b7388:    48 01 51 7d     bl      c00cc504 <mntput>
c00b738c:    4b ff ff c4     b       c00b7350 <link_path_walk+0x1b8>
}

static inline int may_lookup(struct nameidata *nd)
{
     if (nd->flags & LOOKUP_RCU) {
         int err = inode_permission(nd->inode, MAY_EXEC|MAY_NOT_BLOCK);
c00b7390:    80 7f 00 20     lwz     r3,32(r31)
c00b7394:    38 80 00 81     li      r4,129
c00b7398:    4b ff f0 79     bl      c00b6410 <inode_permission>
         if (err != -ECHILD)
c00b739c:    2f 83 ff f6     cmpwi   cr7,r3,-10
}

static inline int may_lookup(struct nameidata *nd)
{
     if (nd->flags & LOOKUP_RCU) {
         int err = inode_permission(nd->inode, MAY_EXEC|MAY_NOT_BLOCK);
c00b73a0:    7c 7e 1b 78     mr      r30,r3
         if (err != -ECHILD)
c00b73a4:    40 9e fe 60     bne     cr7,c00b7204 <link_path_walk+0x6c>
             return err;
         if (unlazy_walk(nd, NULL))
c00b73a8:    7f e3 fb 78     mr      r3,r31
c00b73ac:    38 80 00 00     li      r4,0
c00b73b0:    4b ff f6 c5     bl      c00b6a74 <unlazy_walk>
c00b73b4:    2f 83 00 00     cmpwi   cr7,r3,0
c00b73b8:    41 be fe 3c     beq     cr7,c00b71f4 <link_path_walk+0x5c>
         if (!d_can_lookup(nd->path.dentry)) {
             err = -ENOTDIR;
             break;
         }
     }
     terminate_walk(nd);
c00b73bc:    7f e3 fb 78     mr      r3,r31
c00b73c0:    4b ff eb 21     bl      c00b5ee0 <terminate_walk>
c00b73c4:    4b ff ff 68     b       c00b732c <link_path_walk+0x194>
             break;

         hash_len = hash_name(name);

         type = LAST_NORM;
         if (name[0] == '.') switch (hashlen_len(hash_len)) {
c00b73c8:    2f 8a 00 01     cmpwi   cr7,r10,1
c00b73cc:    7d 45 53 78     mr      r5,r10
c00b73d0:    41 9e 00 5c     beq     cr7,c00b742c <link_path_walk+0x294>
c00b73d4:    2f 8a 00 02     cmpwi   cr7,r10,2
c00b73d8:    40 be fe 84     bne     cr7,c00b725c <link_path_walk+0xc4>
             case 2:
                 if (name[1] == '.') {
c00b73dc:    89 3d 00 01     lbz     r9,1(r29)
c00b73e0:    2f 89 00 2e     cmpwi   cr7,r9,46
c00b73e4:    40 9e fe 78     bne     cr7,c00b725c <link_path_walk+0xc4>
                     type = LAST_DOTDOT;
                     nd->flags |= LOOKUP_JUMPED;
c00b73e8:    81 5f 00 24     lwz     r10,36(r31)

         type = LAST_NORM;
         if (name[0] == '.') switch (hashlen_len(hash_len)) {
             case 2:
                 if (name[1] == '.') {
                     type = LAST_DOTDOT;
c00b73ec:    39 20 00 03     li      r9,3
                     nd->flags |= LOOKUP_JUMPED;
c00b73f0:    61 4a 10 00     ori     r10,r10,4096
c00b73f4:    91 5f 00 24     stw     r10,36(r31)
                 hash_len = this.hash_len;
                 name = this.name;
             }
         }

         nd->last.hash_len = hash_len;
c00b73f8:    90 ff 00 08     stw     r7,8(r31)
c00b73fc:    90 df 00 0c     stw     r6,12(r31)
         nd->last.name = name;
c00b7400:    93 bf 00 10     stw     r29,16(r31)
         nd->last_type = type;
c00b7404:    91 3f 00 30     stw     r9,48(r31)

         name += hashlen_len(hash_len);
         if (!*name)
c00b7408:    7d 5d 28 ee     lbzux   r10,r29,r5
c00b740c:    2f 8a 00 00     cmpwi   cr7,r10,0
c00b7410:    40 9e fe 8c     bne     cr7,c00b729c <link_path_walk+0x104>
             break;
         }
     }
     terminate_walk(nd);
     return err;
}
c00b7414:    80 01 00 64     lwz     r0,100(r1)
c00b7418:    ba a1 00 34     lmw     r21,52(r1)
c00b741c:    7c 08 03 a6     mtlr    r0
     int err;

     while (*name=='/')
         name++;
     if (!*name)
         return 0;
c00b7420:    38 60 00 00     li      r3,0
             break;
         }
     }
     terminate_walk(nd);
     return err;
}
c00b7424:    38 21 00 60     addi    r1,r1,96
c00b7428:    4e 80 00 20     blr
                     type = LAST_DOTDOT;
                     nd->flags |= LOOKUP_JUMPED;
                 }
                 break;
             case 1:
                 type = LAST_DOT;
c00b742c:    39 20 00 02     li      r9,2
c00b7430:    4b ff fe 50     b       c00b7280 <link_path_walk+0xe8>

static inline void path_to_nameidata(const struct path *path,
                     struct nameidata *nd)
{
     if (!(nd->flags & LOOKUP_RCU)) {
         dput(nd->path.dentry);
c00b7434:    80 7f 00 04     lwz     r3,4(r31)
c00b7438:    48 00 b4 c5     bl      c00c28fc <dput>
         if (nd->path.mnt != path->mnt)
c00b743c:    80 7f 00 00     lwz     r3,0(r31)
c00b7440:    81 21 00 18     lwz     r9,24(r1)
c00b7444:    7f 83 48 00     cmpw    cr7,r3,r9
c00b7448:    41 9e 00 18     beq     cr7,c00b7460 <link_path_walk+0x2c8>
             mntput(nd->path.mnt);
c00b744c:    48 01 50 b9     bl      c00cc504 <mntput>
c00b7450:    81 21 00 18     lwz     r9,24(r1)
c00b7454:    80 81 00 1c     lwz     r4,28(r1)
c00b7458:    81 41 00 08     lwz     r10,8(r1)
c00b745c:    4b ff fe a8     b       c00b7304 <link_path_walk+0x16c>
c00b7460:    80 81 00 1c     lwz     r4,28(r1)
c00b7464:    81 41 00 08     lwz     r10,8(r1)
static inline void path_to_nameidata(const struct path *path,
                     struct nameidata *nd)
{
     if (!(nd->flags & LOOKUP_RCU)) {
         dput(nd->path.dentry);
         if (nd->path.mnt != path->mnt)
c00b7468:    7c 69 1b 78     mr      r9,r3
c00b746c:    4b ff fe 98     b       c00b7304 <link_path_walk+0x16c>
     return inode_permission(nd->inode, MAY_EXEC);
}

static inline int handle_dots(struct nameidata *nd, int type)
{
     if (type == LAST_DOTDOT) {
c00b7470:    2f 89 00 03     cmpwi   cr7,r9,3
c00b7474:    41 9e 00 0c     beq     cr7,c00b7480 <link_path_walk+0x2e8>
c00b7478:    80 9f 00 04     lwz     r4,4(r31)
c00b747c:    4b ff fe 94     b       c00b7310 <link_path_walk+0x178>
         if (nd->flags & LOOKUP_RCU) {
c00b7480:    81 3f 00 24     lwz     r9,36(r31)
             if (follow_dotdot_rcu(nd))
c00b7484:    7f e3 fb 78     mr      r3,r31
}

static inline int handle_dots(struct nameidata *nd, int type)
{
     if (type == LAST_DOTDOT) {
         if (nd->flags & LOOKUP_RCU) {
c00b7488:    71 24 00 40     andi.   r4,r9,64
c00b748c:    41 82 00 5c     beq     c00b74e8 <link_path_walk+0x350>
             if (follow_dotdot_rcu(nd))
c00b7490:    4b ff e3 b1     bl      c00b5840 <follow_dotdot_rcu>
c00b7494:    2f 83 00 00     cmpwi   cr7,r3,0
c00b7498:    41 be ff e0     beq     cr7,c00b7478 <link_path_walk+0x2e0>
                 return -ECHILD;
c00b749c:    38 60 ff f6     li      r3,-10
c00b74a0:    4b ff fe 90     b       c00b7330 <link_path_walk+0x198>
         }
         if (likely(type == LAST_NORM)) {
             struct dentry *parent = nd->path.dentry;
             nd->flags &= ~LOOKUP_JUMPED;
             if (unlikely(parent->d_flags & DCACHE_OP_HASH)) {
                 struct qstr this = { { .hash_len = hash_len }, .name = 
name };
c00b74a4:    91 41 00 08     stw     r10,8(r1)
c00b74a8:    91 01 00 0c     stw     r8,12(r1)
c00b74ac:    93 a1 00 10     stw     r29,16(r1)
                 err = parent->d_op->d_hash(parent, &this);
c00b74b0:    7d 23 4b 78     mr      r3,r9
c00b74b4:    81 29 00 58     lwz     r9,88(r9)
c00b74b8:    38 81 00 08     addi    r4,r1,8
c00b74bc:    81 29 00 08     lwz     r9,8(r9)
c00b74c0:    7d 29 03 a6     mtctr   r9
c00b74c4:    4e 80 04 21     bctrl
                 if (err < 0)
c00b74c8:    7c 7e 1b 79     mr.     r30,r3
c00b74cc:    41 a0 fe 58     blt     c00b7324 <link_path_walk+0x18c>
                     break;
                 hash_len = this.hash_len;
c00b74d0:    80 e1 00 08     lwz     r7,8(r1)
c00b74d4:    80 c1 00 0c     lwz     r6,12(r1)
                 name = this.name;
c00b74d8:    83 a1 00 10     lwz     r29,16(r1)
c00b74dc:    7c e5 3b 78     mr      r5,r7
c00b74e0:    39 20 00 00     li      r9,0
c00b74e4:    4b ff fd 9c     b       c00b7280 <link_path_walk+0xe8>
     if (type == LAST_DOTDOT) {
         if (nd->flags & LOOKUP_RCU) {
             if (follow_dotdot_rcu(nd))
                 return -ECHILD;
         } else
             follow_dotdot(nd);
c00b74e8:    4b ff fb 99     bl      c00b7080 <follow_dotdot>
c00b74ec:    80 9f 00 04     lwz     r4,4(r31)
c00b74f0:    4b ff fe 20     b       c00b7310 <link_path_walk+0x178>
     err = -ENOENT;
     if (!inode || d_is_negative(path->dentry))
         goto out_path_put;

     if (should_follow_link(path->dentry, follow)) {
         if (nd->flags & LOOKUP_RCU) {
c00b74f4:    81 3f 00 24     lwz     r9,36(r31)
c00b74f8:    71 28 00 40     andi.   r8,r9,64
c00b74fc:    40 82 03 10     bne     c00b780c <link_path_walk+0x674>
                      unlazy_walk(nd, path->dentry))) {
                 err = -ECHILD;
                 goto out_err;
             }
         }
         BUG_ON(inode != path->dentry->d_inode);
c00b7500:    81 24 00 28     lwz     r9,40(r4)
c00b7504:    7d 49 4a 78     xor     r9,r10,r9
c00b7508:    7d 29 00 34     cntlzw  r9,r9
c00b750c:    55 29 d9 7e     rlwinm  r9,r9,27,5,31
c00b7510:    69 29 00 01     xori    r9,r9,1
c00b7514:    0f 09 00 00     twnei   r9,0
  */
static inline int nested_symlink(struct path *path, struct nameidata *nd)
{
     int res;

     if (unlikely(current->link_count >= MAX_NESTED_LINKS)) {
c00b7518:    81 22 02 88     lwz     r9,648(r2)
c00b751c:    2f 89 00 07     cmpwi   cr7,r9,7
c00b7520:    41 9d 04 88     bgt     cr7,c00b79a8 <link_path_walk+0x810>
         path_put_conditional(path, nd);
         path_put(&nd->path);
         return -ELOOP;
     }
     BUG_ON(nd->depth >= MAX_NESTED_LINKS);
c00b7524:    81 5f 00 34     lwz     r10,52(r31)
c00b7528:    21 2a 00 07     subfic  r9,r10,7
c00b752c:    7d 29 49 10     subfe   r9,r9,r9
c00b7530:    7d 29 00 d0     neg     r9,r9
c00b7534:    0f 09 00 00     twnei   r9,0

     nd->depth++;
c00b7538:    39 4a 00 01     addi    r10,r10,1
c00b753c:    91 5f 00 34     stw     r10,52(r31)
c00b7540:    3a c0 00 00     li      r22,0
     current->link_count++;
c00b7544:    81 42 02 88     lwz     r10,648(r2)
c00b7548:    39 4a 00 01     addi    r10,r10,1
c00b754c:    91 42 02 88     stw     r10,648(r2)
c00b7550:    48 00 00 8c     b       c00b75dc <link_path_walk+0x444>
  * so we keep a cache of "no, this doesn't need follow_link"
  * for the common case.
  */
static inline int should_follow_link(struct dentry *dentry, int follow)
{
     return unlikely(d_is_symlink(dentry)) ? follow : 0;
c00b7554:    7f 88 d0 00     cmpw    cr7,r8,r26
c00b7558:    41 9e 03 d8     beq     cr7,c00b7930 <link_path_walk+0x798>
}

static inline void path_to_nameidata(const struct path *path,
                     struct nameidata *nd)
{
     if (!(nd->flags & LOOKUP_RCU)) {
c00b755c:    81 3f 00 24     lwz     r9,36(r31)
c00b7560:    80 61 00 18     lwz     r3,24(r1)
c00b7564:    71 28 00 40     andi.   r8,r9,64
c00b7568:    40 82 00 2c     bne     c00b7594 <link_path_walk+0x3fc>
         dput(nd->path.dentry);
c00b756c:    80 7f 00 04     lwz     r3,4(r31)
c00b7570:    48 00 b3 8d     bl      c00c28fc <dput>
         if (nd->path.mnt != path->mnt)
c00b7574:    80 7f 00 00     lwz     r3,0(r31)
c00b7578:    81 21 00 18     lwz     r9,24(r1)
c00b757c:    7f 83 48 00     cmpw    cr7,r3,r9
c00b7580:    41 9e 00 0c     beq     cr7,c00b758c <link_path_walk+0x3f4>
             mntput(nd->path.mnt);
c00b7584:    48 01 4f 81     bl      c00cc504 <mntput>
c00b7588:    80 61 00 18     lwz     r3,24(r1)
c00b758c:    80 81 00 1c     lwz     r4,28(r1)
c00b7590:    81 41 00 20     lwz     r10,32(r1)
     }
     nd->path.mnt = path->mnt;
c00b7594:    90 7f 00 00     stw     r3,0(r31)
     nd->path.dentry = path->dentry;
c00b7598:    90 9f 00 04     stw     r4,4(r31)
         }
         BUG_ON(inode != path->dentry->d_inode);
         return 1;
     }
     path_to_nameidata(path, nd);
     nd->inode = inode;
c00b759c:    91 5f 00 20     stw     r10,32(r31)
     return 0;
c00b75a0:    3b c0 00 00     li      r30,0
     nd->flags |= LOOKUP_JUMPED;
}

static inline void put_link(struct nameidata *nd, struct path *link, 
void *cookie)
{
     struct inode *inode = link->dentry->d_inode;
c00b75a4:    80 61 00 0c     lwz     r3,12(r1)
     if (inode->i_op->put_link)
c00b75a8:    81 23 00 28     lwz     r9,40(r3)
==> c00b75ac:    81 29 00 10     lwz     r9,16(r9)
c00b75b0:    81 29 00 14     lwz     r9,20(r9)
c00b75b4:    2f 89 00 00     cmpwi   cr7,r9,0
c00b75b8:    41 9e 00 14     beq     cr7,c00b75cc <link_path_walk+0x434>
         inode->i_op->put_link(link->dentry, nd, cookie);
c00b75bc:    7f e4 fb 78     mr      r4,r31
c00b75c0:    7e a5 ab 78     mr      r5,r21
c00b75c4:    7d 29 03 a6     mtctr   r9
c00b75c8:    4e 80 04 21     bctrl
     path_put(link);
c00b75cc:    38 61 00 08     addi    r3,r1,8
c00b75d0:    4b ff f9 3d     bl      c00b6f0c <path_put>
         res = follow_link(&link, nd, &cookie);
         if (res)
             break;
         res = walk_component(nd, path, LOOKUP_FOLLOW);
         put_link(nd, &link, cookie);
     } while (res > 0);
c00b75d4:    2f 9e 00 01     cmpwi   cr7,r30,1
c00b75d8:    40 9e 01 bc     bne     cr7,c00b7794 <link_path_walk+0x5fc>

     nd->depth++;
     current->link_count++;

     do {
         struct path link = *path;
c00b75dc:    81 21 00 1c     lwz     r9,28(r1)
{
     struct dentry *dentry = link->dentry;
     int error;
     char *s;

     BUG_ON(nd->flags & LOOKUP_RCU);
c00b75e0:    81 5f 00 24     lwz     r10,36(r31)

     nd->depth++;
     current->link_count++;

     do {
         struct path link = *path;
c00b75e4:    81 01 00 18     lwz     r8,24(r1)
c00b75e8:    7d 3e 4b 78     mr      r30,r9
c00b75ec:    91 01 00 08     stw     r8,8(r1)
c00b75f0:    91 21 00 0c     stw     r9,12(r1)
}

static __always_inline int
follow_link(struct path *link, struct nameidata *nd, void **p)
{
     struct dentry *dentry = link->dentry;
c00b75f4:    7d 35 4b 78     mr      r21,r9
     int error;
     char *s;

     BUG_ON(nd->flags & LOOKUP_RCU);
c00b75f8:    55 4a 06 72     rlwinm  r10,r10,0,25,25
c00b75fc:    0f 0a 00 00     twnei   r10,0

     if (link->mnt == nd->path.mnt)
c00b7600:    80 61 00 08     lwz     r3,8(r1)
c00b7604:    81 5f 00 00     lwz     r10,0(r31)
c00b7608:    7f 83 50 00     cmpw    cr7,r3,r10
c00b760c:    41 9e 01 80     beq     cr7,c00b778c <link_path_walk+0x5f4>
         mntget(link->mnt);

     error = -ELOOP;
     if (unlikely(current->total_link_count >= 40))
c00b7610:    81 22 02 8c     lwz     r9,652(r2)
c00b7614:    2f 89 00 27     cmpwi   cr7,r9,39
c00b7618:    41 9d 02 e0     bgt     cr7,c00b78f8 <link_path_walk+0x760>
         goto out_put_nd_path;

     cond_resched();
c00b761c:    48 2e b4 99     bl      c03a2ab4 <_cond_resched>
     current->total_link_count++;
c00b7620:    81 42 02 8c     lwz     r10,652(r2)

     touch_atime(link);
c00b7624:    38 61 00 08     addi    r3,r1,8
     error = -ELOOP;
     if (unlikely(current->total_link_count >= 40))
         goto out_put_nd_path;

     cond_resched();
     current->total_link_count++;
c00b7628:    39 4a 00 01     addi    r10,r10,1
c00b762c:    91 42 02 8c     stw     r10,652(r2)

     touch_atime(link);
c00b7630:    48 01 03 f9     bl      c00c7a28 <touch_atime>
c00b7634:    81 3f 00 34     lwz     r9,52(r31)
     error = security_inode_follow_link(link->dentry, nd);
     if (error)
         goto out_put_nd_path;

     nd->last_type = LAST_BIND;
     *p = dentry->d_inode->i_op->follow_link(dentry, nd);
c00b7638:    7e a3 ab 78     mr      r3,r21
c00b763c:    39 29 00 0c     addi    r9,r9,12
c00b7640:    55 29 10 3a     rlwinm  r9,r9,2,0,29
c00b7644:    7d 3f 4a 14     add     r9,r31,r9
c00b7648:    92 c9 00 08     stw     r22,8(r9)

     error = security_inode_follow_link(link->dentry, nd);
     if (error)
         goto out_put_nd_path;

     nd->last_type = LAST_BIND;
c00b764c:    93 7f 00 30     stw     r27,48(r31)
     *p = dentry->d_inode->i_op->follow_link(dentry, nd);
c00b7650:    7f e4 fb 78     mr      r4,r31
c00b7654:    81 3e 00 28     lwz     r9,40(r30)
c00b7658:    81 29 00 10     lwz     r9,16(r9)
c00b765c:    81 29 00 04     lwz     r9,4(r9)
c00b7660:    7d 29 03 a6     mtctr   r9
c00b7664:    4e 80 04 21     bctrl
     error = PTR_ERR(*p);
     if (IS_ERR(*p))
c00b7668:    7f 83 e0 40     cmplw   cr7,r3,r28
     error = security_inode_follow_link(link->dentry, nd);
     if (error)
         goto out_put_nd_path;

     nd->last_type = LAST_BIND;
     *p = dentry->d_inode->i_op->follow_link(dentry, nd);
c00b766c:    7c 75 1b 78     mr      r21,r3
     error = PTR_ERR(*p);
     if (IS_ERR(*p))
c00b7670:    41 9d 02 a0     bgt     cr7,c00b7910 <link_path_walk+0x778>
}

static inline char *nd_get_link(struct nameidata *nd)
{
     return nd->saved_names[nd->depth];
c00b7674:    81 3f 00 34     lwz     r9,52(r31)
c00b7678:    39 29 00 0c     addi    r9,r9,12
c00b767c:    55 29 10 3a     rlwinm  r9,r9,2,0,29
c00b7680:    7d 3f 4a 14     add     r9,r31,r9
c00b7684:    83 c9 00 08     lwz     r30,8(r9)
         goto out_put_nd_path;

     error = 0;
     s = nd_get_link(nd);
     if (s) {
c00b7688:    2f 9e 00 00     cmpwi   cr7,r30,0
c00b768c:    41 9e 00 38     beq     cr7,c00b76c4 <link_path_walk+0x52c>
         if (unlikely(IS_ERR(s))) {
c00b7690:    7f 9e e0 40     cmplw   cr7,r30,r28
c00b7694:    41 9d 01 b8     bgt     cr7,c00b784c <link_path_walk+0x6b4>
             path_put(&nd->path);
             put_link(nd, link, *p);
             return PTR_ERR(s);
         }
         if (*s == '/') {
c00b7698:    89 3e 00 00     lbz     r9,0(r30)
c00b769c:    2f 89 00 2f     cmpwi   cr7,r9,47
c00b76a0:    41 9e 00 b0     beq     cr7,c00b7750 <link_path_walk+0x5b8>
             path_put(&nd->path);
             nd->path = nd->root;
             path_get(&nd->root);
             nd->flags |= LOOKUP_JUMPED;
         }
         nd->inode = nd->path.dentry->d_inode;
c00b76a4:    81 3f 00 04     lwz     r9,4(r31)
         error = link_path_walk(s, nd);
c00b76a8:    7f c3 f3 78     mr      r3,r30
             path_put(&nd->path);
             nd->path = nd->root;
             path_get(&nd->root);
             nd->flags |= LOOKUP_JUMPED;
         }
         nd->inode = nd->path.dentry->d_inode;
c00b76ac:    81 29 00 28     lwz     r9,40(r9)
         error = link_path_walk(s, nd);
c00b76b0:    7f e4 fb 78     mr      r4,r31
             path_put(&nd->path);
             nd->path = nd->root;
             path_get(&nd->root);
             nd->flags |= LOOKUP_JUMPED;
         }
         nd->inode = nd->path.dentry->d_inode;
c00b76b4:    91 3f 00 20     stw     r9,32(r31)
         error = link_path_walk(s, nd);
c00b76b8:    4b ff fa e1     bl      c00b7198 <link_path_walk>
         if (unlikely(error))
c00b76bc:    7c 7e 1b 79     mr.     r30,r3
c00b76c0:    40 82 01 94     bne     c00b7854 <link_path_walk+0x6bc>
     /*
      * "." and ".." are special - ".." especially so because it has
      * to be able to know about the current root directory and
      * parent relationships.
      */
     if (unlikely(nd->last_type != LAST_NORM))
c00b76c4:    81 3f 00 30     lwz     r9,48(r31)
c00b76c8:    2f 89 00 00     cmpwi   cr7,r9,0
c00b76cc:    40 9e 01 d4     bne     cr7,c00b78a0 <link_path_walk+0x708>
         return handle_dots(nd, nd->last_type);
     err = lookup_fast(nd, path, &inode);
c00b76d0:    7f e3 fb 78     mr      r3,r31
c00b76d4:    38 81 00 18     addi    r4,r1,24
c00b76d8:    38 a1 00 20     addi    r5,r1,32
c00b76dc:    4b ff f5 51     bl      c00b6c2c <lookup_fast>
     if (unlikely(err)) {
c00b76e0:    7c 7e 1b 79     mr.     r30,r3
c00b76e4:    40 82 01 ec     bne     c00b78d0 <link_path_walk+0x738>
c00b76e8:    81 41 00 20     lwz     r10,32(r1)
             goto out_err;

         inode = path->dentry->d_inode;
     }
     err = -ENOENT;
     if (!inode || d_is_negative(path->dentry))
c00b76ec:    2f 8a 00 00     cmpwi   cr7,r10,0
c00b76f0:    41 9e 00 14     beq     cr7,c00b7704 <link_path_walk+0x56c>
c00b76f4:    80 81 00 1c     lwz     r4,28(r1)
c00b76f8:    81 24 00 00     lwz     r9,0(r4)
c00b76fc:    75 28 00 70     andis.  r8,r9,112
c00b7700:    40 a2 fe 54     bne     c00b7554 <link_path_walk+0x3bc>
}

static inline void path_to_nameidata(const struct path *path,
                     struct nameidata *nd)
{
     if (!(nd->flags & LOOKUP_RCU)) {
c00b7704:    81 3f 00 24     lwz     r9,36(r31)
c00b7708:    71 24 00 40     andi.   r4,r9,64
c00b770c:    41 82 00 24     beq     c00b7730 <link_path_walk+0x598>
c00b7710:    80 61 00 18     lwz     r3,24(r1)
         dput(nd->path.dentry);
         if (nd->path.mnt != path->mnt)
             mntput(nd->path.mnt);
     }
     nd->path.mnt = path->mnt;
     nd->path.dentry = path->dentry;
c00b7714:    81 21 00 1c     lwz     r9,28(r1)
     if (!(nd->flags & LOOKUP_RCU)) {
         dput(nd->path.dentry);
         if (nd->path.mnt != path->mnt)
             mntput(nd->path.mnt);
     }
     nd->path.mnt = path->mnt;
c00b7718:    90 7f 00 00     stw     r3,0(r31)
     nd->path.dentry = path->dentry;
c00b771c:    91 3f 00 04     stw     r9,4(r31)
         if (err < 0)
             goto out_err;

         inode = path->dentry->d_inode;
     }
     err = -ENOENT;
c00b7720:    3b c0 ff fe     li      r30,-2
     return 0;

out_path_put:
     path_to_nameidata(path, nd);
out_err:
     terminate_walk(nd);
c00b7724:    7f e3 fb 78     mr      r3,r31
c00b7728:    4b ff e7 b9     bl      c00b5ee0 <terminate_walk>
c00b772c:    4b ff fe 78     b       c00b75a4 <link_path_walk+0x40c>

static inline void path_to_nameidata(const struct path *path,
                     struct nameidata *nd)
{
     if (!(nd->flags & LOOKUP_RCU)) {
         dput(nd->path.dentry);
c00b7730:    80 7f 00 04     lwz     r3,4(r31)
c00b7734:    48 00 b1 c9     bl      c00c28fc <dput>
         if (nd->path.mnt != path->mnt)
c00b7738:    80 7f 00 00     lwz     r3,0(r31)
c00b773c:    81 21 00 18     lwz     r9,24(r1)
c00b7740:    7f 83 48 40     cmplw   cr7,r3,r9
c00b7744:    41 be ff d0     beq     cr7,c00b7714 <link_path_walk+0x57c>
             mntput(nd->path.mnt);
c00b7748:    48 01 4d bd     bl      c00cc504 <mntput>
c00b774c:    4b ff ff c4     b       c00b7710 <link_path_walk+0x578>
             path_put(&nd->path);
             put_link(nd, link, *p);
             return PTR_ERR(s);
         }
         if (*s == '/') {
             if (!nd->root.mnt)
c00b7750:    81 3f 00 18     lwz     r9,24(r31)
c00b7754:    2f 89 00 00     cmpwi   cr7,r9,0
c00b7758:    41 9e 00 64     beq     cr7,c00b77bc <link_path_walk+0x624>
                 set_root(nd);
             path_put(&nd->path);
c00b775c:    7f e3 fb 78     mr      r3,r31
c00b7760:    4b ff f7 ad     bl      c00b6f0c <path_put>
             nd->path = nd->root;
c00b7764:    81 5f 00 18     lwz     r10,24(r31)
c00b7768:    81 7f 00 1c     lwz     r11,28(r31)
c00b776c:    91 5f 00 00     stw     r10,0(r31)
c00b7770:    91 7f 00 04     stw     r11,4(r31)
             path_get(&nd->root);
c00b7774:    7f 23 cb 78     mr      r3,r25
c00b7778:    4b ff ee 21     bl      c00b6598 <path_get>
             nd->flags |= LOOKUP_JUMPED;
c00b777c:    81 3f 00 24     lwz     r9,36(r31)
c00b7780:    61 29 10 00     ori     r9,r9,4096
c00b7784:    91 3f 00 24     stw     r9,36(r31)
c00b7788:    4b ff ff 1c     b       c00b76a4 <link_path_walk+0x50c>
     char *s;

     BUG_ON(nd->flags & LOOKUP_RCU);

     if (link->mnt == nd->path.mnt)
         mntget(link->mnt);
c00b778c:    48 01 4f 9d     bl      c00cc728 <mntget>
c00b7790:    4b ff fe 80     b       c00b7610 <link_path_walk+0x478>
             break;
         res = walk_component(nd, path, LOOKUP_FOLLOW);
         put_link(nd, &link, cookie);
     } while (res > 0);

     current->link_count--;
c00b7794:    81 42 02 88     lwz     r10,648(r2)
         if (err < 0)
             return err;

         if (err) {
             err = nested_symlink(&next, nd);
             if (err)
c00b7798:    2f 9e 00 00     cmpwi   cr7,r30,0
             break;
         res = walk_component(nd, path, LOOKUP_FOLLOW);
         put_link(nd, &link, cookie);
     } while (res > 0);

     current->link_count--;
c00b779c:    39 4a ff ff     addi    r10,r10,-1
c00b77a0:    91 42 02 88     stw     r10,648(r2)
     nd->depth--;
c00b77a4:    81 3f 00 34     lwz     r9,52(r31)
c00b77a8:    39 29 ff ff     addi    r9,r9,-1
c00b77ac:    91 3f 00 34     stw     r9,52(r31)
         if (err < 0)
             return err;

         if (err) {
             err = nested_symlink(&next, nd);
             if (err)
c00b77b0:    40 be fb 7c     bne     cr7,c00b732c <link_path_walk+0x194>
c00b77b4:    80 9f 00 04     lwz     r4,4(r31)
c00b77b8:    4b ff fb 58     b       c00b7310 <link_path_walk+0x178>
  * The various preempt_count add/sub methods
  */

static __always_inline void __preempt_count_add(int val)
{
     *preempt_count_ptr() += val;
c00b77bc:    81 37 00 0c     lwz     r9,12(r23)
     return status;
}

static __always_inline void set_root(struct nameidata *nd)
{
     get_fs_root(current->fs, &nd->root);
c00b77c0:    81 42 03 f0     lwz     r10,1008(r2)
c00b77c4:    39 29 00 01     addi    r9,r9,1
c00b77c8:    91 37 00 0c     stw     r9,12(r23)
extern int unshare_fs_struct(void);

static inline void get_fs_root(struct fs_struct *fs, struct path *root)
{
     spin_lock(&fs->lock);
     *root = fs->root;
c00b77cc:    81 6a 00 14     lwz     r11,20(r10)
c00b77d0:    81 4a 00 10     lwz     r10,16(r10)
c00b77d4:    91 7f 00 1c     stw     r11,28(r31)
c00b77d8:    91 5f 00 18     stw     r10,24(r31)
     path_get(root);
c00b77dc:    7f 23 cb 78     mr      r3,r25
c00b77e0:    4b ff ed b9     bl      c00b6598 <path_get>
     /*
      * Because of load-store architectures cannot do per-cpu atomic
      * operations; we cannot use PREEMPT_NEED_RESCHED because it might get
      * lost.
      */
     return !--*preempt_count_ptr() && tif_need_resched();
c00b77e4:    81 37 00 0c     lwz     r9,12(r23)
c00b77e8:    39 29 ff ff     addi    r9,r9,-1
c00b77ec:    2f 89 00 00     cmpwi   cr7,r9,0
c00b77f0:    91 37 00 0c     stw     r9,12(r23)
c00b77f4:    40 be ff 68     bne     cr7,c00b775c <link_path_walk+0x5c4>
c00b77f8:    81 37 00 4c     lwz     r9,76(r23)
c00b77fc:    71 24 00 04     andi.   r4,r9,4
c00b7800:    41 a2 ff 5c     beq     c00b775c <link_path_walk+0x5c4>
c00b7804:    48 2e ac b5     bl      c03a24b8 <preempt_schedule>
c00b7808:    4b ff ff 54     b       c00b775c <link_path_walk+0x5c4>
     if (!inode || d_is_negative(path->dentry))
         goto out_path_put;

     if (should_follow_link(path->dentry, follow)) {
         if (nd->flags & LOOKUP_RCU) {
             if (unlikely(nd->path.mnt != path->mnt ||
c00b780c:    81 5f 00 00     lwz     r10,0(r31)
c00b7810:    81 21 00 18     lwz     r9,24(r1)
c00b7814:    7f 8a 48 00     cmpw    cr7,r10,r9
c00b7818:    40 9e 01 d4     bne     cr7,c00b79ec <link_path_walk+0x854>
c00b781c:    7f e3 fb 78     mr      r3,r31
c00b7820:    4b ff f2 55     bl      c00b6a74 <unlazy_walk>
c00b7824:    2f 83 00 00     cmpwi   cr7,r3,0
c00b7828:    40 9e 01 c4     bne     cr7,c00b79ec <link_path_walk+0x854>
                      unlazy_walk(nd, path->dentry))) {
                 err = -ECHILD;
                 goto out_err;
             }
         }
         BUG_ON(inode != path->dentry->d_inode);
c00b782c:    81 21 00 1c     lwz     r9,28(r1)
c00b7830:    81 49 00 28     lwz     r10,40(r9)
c00b7834:    81 21 00 08     lwz     r9,8(r1)
c00b7838:    7d 49 4a 78     xor     r9,r10,r9
c00b783c:    7d 29 00 34     cntlzw  r9,r9
c00b7840:    55 29 d9 7e     rlwinm  r9,r9,27,5,31
c00b7844:    69 29 00 01     xori    r9,r9,1
c00b7848:    4b ff fc cc     b       c00b7514 <link_path_walk+0x37c>

     error = 0;
     s = nd_get_link(nd);
     if (s) {
         if (unlikely(IS_ERR(s))) {
             path_put(&nd->path);
c00b784c:    7f e3 fb 78     mr      r3,r31
c00b7850:    4b ff f6 bd     bl      c00b6f0c <path_put>
     nd->flags |= LOOKUP_JUMPED;
}

static inline void put_link(struct nameidata *nd, struct path *link, 
void *cookie)
{
     struct inode *inode = link->dentry->d_inode;
c00b7854:    80 61 00 0c     lwz     r3,12(r1)
     if (inode->i_op->put_link)
c00b7858:    81 23 00 28     lwz     r9,40(r3)
c00b785c:    81 29 00 10     lwz     r9,16(r9)
c00b7860:    81 29 00 14     lwz     r9,20(r9)
c00b7864:    2f 89 00 00     cmpwi   cr7,r9,0
c00b7868:    41 9e 00 14     beq     cr7,c00b787c <link_path_walk+0x6e4>
         inode->i_op->put_link(link->dentry, nd, cookie);
c00b786c:    7f e4 fb 78     mr      r4,r31
c00b7870:    7e a5 ab 78     mr      r5,r21
c00b7874:    7d 29 03 a6     mtctr   r9
c00b7878:    4e 80 04 21     bctrl
     path_put(link);
c00b787c:    38 61 00 08     addi    r3,r1,8
c00b7880:    4b ff f6 8d     bl      c00b6f0c <path_put>
             break;
         res = walk_component(nd, path, LOOKUP_FOLLOW);
         put_link(nd, &link, cookie);
     } while (res > 0);

     current->link_count--;
c00b7884:    81 42 02 88     lwz     r10,648(r2)
c00b7888:    39 4a ff ff     addi    r10,r10,-1
c00b788c:    91 42 02 88     stw     r10,648(r2)
     nd->depth--;
c00b7890:    81 3f 00 34     lwz     r9,52(r31)
c00b7894:    39 29 ff ff     addi    r9,r9,-1
c00b7898:    91 3f 00 34     stw     r9,52(r31)
c00b789c:    4b ff fa 90     b       c00b732c <link_path_walk+0x194>
     return inode_permission(nd->inode, MAY_EXEC);
}

static inline int handle_dots(struct nameidata *nd, int type)
{
     if (type == LAST_DOTDOT) {
c00b78a0:    2f 89 00 03     cmpwi   cr7,r9,3
c00b78a4:    40 9e 01 50     bne     cr7,c00b79f4 <link_path_walk+0x85c>
         if (nd->flags & LOOKUP_RCU) {
c00b78a8:    81 3f 00 24     lwz     r9,36(r31)
             if (follow_dotdot_rcu(nd))
c00b78ac:    7f e3 fb 78     mr      r3,r31
}

static inline int handle_dots(struct nameidata *nd, int type)
{
     if (type == LAST_DOTDOT) {
         if (nd->flags & LOOKUP_RCU) {
c00b78b0:    71 24 00 40     andi.   r4,r9,64
c00b78b4:    41 82 00 e8     beq     c00b799c <link_path_walk+0x804>
             if (follow_dotdot_rcu(nd))
c00b78b8:    4b ff df 89     bl      c00b5840 <follow_dotdot_rcu>
                 return -ECHILD;
c00b78bc:    30 63 ff ff     addic   r3,r3,-1
c00b78c0:    7c 63 19 10     subfe   r3,r3,r3
c00b78c4:    70 7e 00 0a     andi.   r30,r3,10
c00b78c8:    3b de ff f6     addi    r30,r30,-10
c00b78cc:    4b ff fc d8     b       c00b75a4 <link_path_walk+0x40c>
      */
     if (unlikely(nd->last_type != LAST_NORM))
         return handle_dots(nd, nd->last_type);
     err = lookup_fast(nd, path, &inode);
     if (unlikely(err)) {
         if (err < 0)
c00b78d0:    41 a0 fe 54     blt     c00b7724 <link_path_walk+0x58c>
             goto out_err;

         err = lookup_slow(nd, path);
c00b78d4:    7f e3 fb 78     mr      r3,r31
c00b78d8:    38 81 00 18     addi    r4,r1,24
c00b78dc:    4b ff e5 21     bl      c00b5dfc <lookup_slow>
         if (err < 0)
c00b78e0:    7c 7e 1b 79     mr.     r30,r3
c00b78e4:    41 a0 fe 40     blt     c00b7724 <link_path_walk+0x58c>
             goto out_err;

         inode = path->dentry->d_inode;
c00b78e8:    81 21 00 1c     lwz     r9,28(r1)
c00b78ec:    81 49 00 28     lwz     r10,40(r9)
c00b78f0:    91 41 00 20     stw     r10,32(r1)
c00b78f4:    4b ff fd f8     b       c00b76ec <link_path_walk+0x554>

     return error;

out_put_nd_path:
     *p = NULL;
     path_put(&nd->path);
c00b78f8:    7f e3 fb 78     mr      r3,r31
c00b78fc:    4b ff f6 11     bl      c00b6f0c <path_put>
     path_put(link);
c00b7900:    38 61 00 08     addi    r3,r1,8
c00b7904:    4b ff f6 09     bl      c00b6f0c <path_put>
     BUG_ON(nd->flags & LOOKUP_RCU);

     if (link->mnt == nd->path.mnt)
         mntget(link->mnt);

     error = -ELOOP;
c00b7908:    3b c0 ff d8     li      r30,-40
c00b790c:    4b ff ff 78     b       c00b7884 <link_path_walk+0x6ec>

     return error;

out_put_nd_path:
     *p = NULL;
     path_put(&nd->path);
c00b7910:    7f e3 fb 78     mr      r3,r31
c00b7914:    4b ff f5 f9     bl      c00b6f0c <path_put>
     path_put(link);
c00b7918:    38 61 00 08     addi    r3,r1,8
c00b791c:    4b ff f5 f1     bl      c00b6f0c <path_put>
     do {
         struct path link = *path;
         void *cookie;

         res = follow_link(&link, nd, &cookie);
         if (res)
c00b7920:    2f 95 00 00     cmpwi   cr7,r21,0
}

static inline long __must_check PTR_ERR(__force const void *ptr)
{
     return (long) ptr;
c00b7924:    7e be ab 78     mr      r30,r21
c00b7928:    40 9e ff 5c     bne     cr7,c00b7884 <link_path_walk+0x6ec>
c00b792c:    4b ff fd 98     b       c00b76c4 <link_path_walk+0x52c>
     err = -ENOENT;
     if (!inode || d_is_negative(path->dentry))
         goto out_path_put;

     if (should_follow_link(path->dentry, follow)) {
         if (nd->flags & LOOKUP_RCU) {
c00b7930:    81 3f 00 24     lwz     r9,36(r31)
c00b7934:    71 28 00 40     andi.   r8,r9,64
c00b7938:    40 82 00 24     bne     c00b795c <link_path_walk+0x7c4>
                      unlazy_walk(nd, path->dentry))) {
                 err = -ECHILD;
                 goto out_err;
             }
         }
         BUG_ON(inode != path->dentry->d_inode);
c00b793c:    81 24 00 28     lwz     r9,40(r4)
c00b7940:    7d 49 4a 78     xor     r9,r10,r9
c00b7944:    7d 29 00 34     cntlzw  r9,r9
c00b7948:    55 29 d9 7e     rlwinm  r9,r9,27,5,31
c00b794c:    69 29 00 01     xori    r9,r9,1
c00b7950:    0f 09 00 00     twnei   r9,0
         return 1;
c00b7954:    3b c0 00 01     li      r30,1
c00b7958:    4b ff fc 4c     b       c00b75a4 <link_path_walk+0x40c>
     if (!inode || d_is_negative(path->dentry))
         goto out_path_put;

     if (should_follow_link(path->dentry, follow)) {
         if (nd->flags & LOOKUP_RCU) {
             if (unlikely(nd->path.mnt != path->mnt ||
c00b795c:    81 5f 00 00     lwz     r10,0(r31)
c00b7960:    81 21 00 18     lwz     r9,24(r1)
c00b7964:    7f 8a 48 00     cmpw    cr7,r10,r9
c00b7968:    40 9e 00 94     bne     cr7,c00b79fc <link_path_walk+0x864>
c00b796c:    7f e3 fb 78     mr      r3,r31
c00b7970:    4b ff f1 05     bl      c00b6a74 <unlazy_walk>
c00b7974:    2f 83 00 00     cmpwi   cr7,r3,0
c00b7978:    40 9e 00 84     bne     cr7,c00b79fc <link_path_walk+0x864>
                      unlazy_walk(nd, path->dentry))) {
                 err = -ECHILD;
                 goto out_err;
             }
         }
         BUG_ON(inode != path->dentry->d_inode);
c00b797c:    81 21 00 1c     lwz     r9,28(r1)
c00b7980:    81 49 00 28     lwz     r10,40(r9)
c00b7984:    81 21 00 20     lwz     r9,32(r1)
c00b7988:    7d 49 4a 78     xor     r9,r10,r9
c00b798c:    7d 29 00 34     cntlzw  r9,r9
c00b7990:    55 29 d9 7e     rlwinm  r9,r9,27,5,31
c00b7994:    69 29 00 01     xori    r9,r9,1
c00b7998:    4b ff ff b8     b       c00b7950 <link_path_walk+0x7b8>
     if (type == LAST_DOTDOT) {
         if (nd->flags & LOOKUP_RCU) {
             if (follow_dotdot_rcu(nd))
                 return -ECHILD;
         } else
             follow_dotdot(nd);
c00b799c:    4b ff f6 e5     bl      c00b7080 <follow_dotdot>
     }
     return 0;
c00b79a0:    3b c0 00 00     li      r30,0
c00b79a4:    4b ff fc 00     b       c00b75a4 <link_path_walk+0x40c>
static inline int nested_symlink(struct path *path, struct nameidata *nd)
{
     int res;

     if (unlikely(current->link_count >= MAX_NESTED_LINKS)) {
         path_put_conditional(path, nd);
c00b79a8:    7f e4 fb 78     mr      r4,r31
c00b79ac:    38 61 00 18     addi    r3,r1,24
c00b79b0:    4b ff e3 f5     bl      c00b5da4 <path_put_conditional.isra.50>
         path_put(&nd->path);
c00b79b4:    7f e3 fb 78     mr      r3,r31
c00b79b8:    4b ff f5 55     bl      c00b6f0c <path_put>
         return -ELOOP;
c00b79bc:    38 60 ff d8     li      r3,-40
c00b79c0:    4b ff f9 70     b       c00b7330 <link_path_walk+0x198>
      */
     if (unlikely(nd->last_type != LAST_NORM))
         return handle_dots(nd, nd->last_type);
     err = lookup_fast(nd, path, &inode);
     if (unlikely(err)) {
         if (err < 0)
c00b79c4:    41 a0 f9 60     blt     c00b7324 <link_path_walk+0x18c>
             goto out_err;

         err = lookup_slow(nd, path);
c00b79c8:    7f e3 fb 78     mr      r3,r31
c00b79cc:    38 81 00 18     addi    r4,r1,24
c00b79d0:    4b ff e4 2d     bl      c00b5dfc <lookup_slow>
         if (err < 0)
c00b79d4:    7c 7e 1b 79     mr.     r30,r3
c00b79d8:    41 a0 f9 4c     blt     c00b7324 <link_path_walk+0x18c>
             goto out_err;

         inode = path->dentry->d_inode;
c00b79dc:    81 21 00 1c     lwz     r9,28(r1)
c00b79e0:    81 49 00 28     lwz     r10,40(r9)
c00b79e4:    91 41 00 08     stw     r10,8(r1)
c00b79e8:    4b ff f8 ec     b       c00b72d4 <link_path_walk+0x13c>

     if (should_follow_link(path->dentry, follow)) {
         if (nd->flags & LOOKUP_RCU) {
             if (unlikely(nd->path.mnt != path->mnt ||
                      unlazy_walk(nd, path->dentry))) {
                 err = -ECHILD;
c00b79ec:    3b c0 ff f6     li      r30,-10
c00b79f0:    4b ff f9 34     b       c00b7324 <link_path_walk+0x18c>
             if (follow_dotdot_rcu(nd))
                 return -ECHILD;
         } else
             follow_dotdot(nd);
     }
     return 0;
c00b79f4:    3b c0 00 00     li      r30,0
c00b79f8:    4b ff fb ac     b       c00b75a4 <link_path_walk+0x40c>

     if (should_follow_link(path->dentry, follow)) {
         if (nd->flags & LOOKUP_RCU) {
             if (unlikely(nd->path.mnt != path->mnt ||
                      unlazy_walk(nd, path->dentry))) {
                 err = -ECHILD;
c00b79fc:    3b c0 ff f6     li      r30,-10
c00b7a00:    4b ff fd 24     b       c00b7724 <link_path_walk+0x58c>


[59685.968909] Unable to handle kernel paging request for data at 
address 0x4f5f5079
[59685.981479] Faulting instruction address: 0xc00b74ec
[59685.990902] Oops: Kernel access of bad area, sig: 11 [#1]
[59685.996037] PREEMPT CMPC885
[59685.998833] CPU: 0 PID: 1019 Comm: SUO_ Not tainted 3.18.20 #49
[59686.006392] task: c66789a0 ti: c6456000 task.ti: c6456000
[59686.011719] NIP: c00b74ec LR: c00b74b4 CTR: c00fcc94
[59686.016631] REGS: c6457d10 TRAP: 0300   Not tainted  (3.18.20)
[59686.024098] MSR: 00009032 <EE,ME,IR,DR,RI>  CR: 22002482 XER: 00000000
[59686.030644] DAR: 4f5f5079 DSISR: c0000000
[59686.030644] GPR00: c00b74b4 c6457dc0 c66789a0 c105b410 c505b498 
c505b4d2 90f9ced3 00000031
[59686.030644] GPR08: 00000000 4f5f5069 c50605a0 227406f5 22002482 
101baac0 101b0000 1017b6d8
[59686.030644] GPR16: 1023961c 1017354c 1017b620 1014c608 10503284 
00000000 00000000 c6456000
[59686.030644] GPR24: 00100000 c6457ea0 00300000 00000004 fffff000 
c63fb02f 00000000 c6457e88
[59686.062616] NIP [c00b74ec] link_path_walk+0x414/0x86c
[59686.067595] LR [c00b74b4] link_path_walk+0x3dc/0x86c
[59686.072462] Call Trace:
[59686.074910] [c6457dc0] [c00b74b4] link_path_walk+0x3dc/0x86c (unreliable)
[59686.081627] [c6457e20] [c00b9d70] path_openat+0x90/0x678
[59686.086873] [c6457e80] [c00ba388] do_filp_open+0x30/0x8c
[59686.092128] [c6457f00] [c00abb48] do_sys_open+0x14c/0x238
[59686.097466] [c6457f40] [c000b294] ret_from_syscall+0x0/0x38
[59686.102923] Instruction dump:
[59686.105853] 7f834800 419e000c 48014f75 80610018 8081001c 81410020 
907f0000 909f0004
[59686.113513] 915f0020 3bc00000 8061000c 81230028 <81290010> 81290014 
2f890000 419e0014

[214067.708785] Unable to handle kernel paging request for data at 
address 0x93a10024
[214067.716082] Faulting instruction address: 0xc00b7350
[214067.721082] Oops: Kernel access of bad area, sig: 11 [#1]
[214067.726477] PREEMPT CMPC885
[214067.729360] CPU: 0 PID: 1021 Comm: SUO_ Not tainted 3.18.14 #43
[214067.737006] task: c6600e70 ti: c653e000 task.ti: c653e000
[214067.742420] NIP: c00b7350 LR: c00b7318 CTR: c00fcb04
[214067.747418] REGS: c653fd10 TRAP: 0300   Not tainted  (3.18.14)
[214067.754969] MSR: 00009032 <EE,ME,IR,DR,RI>  CR: 22002482 XER: 00000000
[214067.761608] DAR: 93a10024 DSISR: c0000000
[214067.761608] GPR00: c00b7318 c653fdc0 c6600e70 c105ac18 c505aca0 
c505acda 90f9ced3 00000031
[214067.761608] GPR08: 00000000 93a10014 c5060360 39d5d053 22002482 
101cae54 1017c030 105103ec
[214067.761608] GPR16: 101c0c38 00000003 10510120 1017c248 10239598 
00000000 00000000 c653e000
[214067.761608] GPR24: 00100000 c653fea0 00300000 00000004 fffff000 
c65f302f 00000000 c653fe88
[214067.793667] NIP [c00b7350] link_path_walk+0x414/0x86c
[214067.798730] LR [c00b7318] link_path_walk+0x3dc/0x86c
[214067.803681] Call Trace:
[214067.806219] [c653fdc0] [c00b7318] link_path_walk+0x3dc/0x86c 
(unreliable)
[214067.813017] [c653fe20] [c00b9bd4] path_openat+0x90/0x678
[214067.818352] [c653fe80] [c00ba1ec] do_filp_open+0x30/0x8c
[214067.823694] [c653ff00] [c00ab9ac] do_sys_open+0x14c/0x238
[214067.829120] [c653ff40] [c000b27c] ret_from_syscall+0x0/0x38
[214067.834658] Instruction dump:
[214067.837675] 7f834800 419e000c 48014fb5 80610018 8081001c 81410020 
907f0000 909f0004
[214067.845418] 915f0020 3bc00000 8061000c 81230028 <81290010> 81290014 
2f890000 419e0014
[214067.853353] ---[ end trace 78a545fb58576151 ]---

[205816.678044] Unable to handle kernel paging request for data at 
address 0x20202030
[205816.688395] Faulting instruction address: 0xc00b74ec
[205816.693912] Oops: Kernel access of bad area, sig: 11 [#1]
[205816.699098] PREEMPT CMPC885
[205816.701980] CPU: 0 PID: 1009 Comm: GVC_ Not tainted 3.18.20 #49
[205816.709627] task: c6655810 ti: c66b0000 task.ti: c66b0000
[205816.715038] NIP: c00b74ec LR: c00b74b4 CTR: c00fcc94
[205816.720037] REGS: c66b1d10 TRAP: 0300 Not tainted (3.18.20)
[205816.727589] MSR: 00009032 <EE,ME,IR,DR,RI> CR: 22002482 XER: 00000000
[205816.734221] DAR: 20202030 DSISR: c0000000
[205816.734221] GPR00: c00b74b4 c66b1dc0 c6655810 c105b388 c505b410 
c505b44b 3ac16eed 00000032
[205816.734221] GPR08: 00000000 20202020 c5061680 0e505267 22002482 
101baac0 00000000 1015a584
[205816.734221] GPR16: 1015a4ec 1015a56c 101b0508 101b08a4 10159f88 
00000000 00000000 c66b0000
[205816.734221] GPR24: 00100000 c66b1ea0 00300000 00000004 fffff000 
c6479030 00000000 c66b1e88
[205816.766277] NIP [c00b74ec] link_path_walk+0x414/0x86c
[205816.771343] LR [c00b74b4] link_path_walk+0x3dc/0x86c
[205816.776299] Call Trace:
[205816.778832] [c66b1dc0] [c00b74b4] link_path_walk+0x3dc/0x86c 
(unreliable)
[205816.785636] [c66b1e20] [c00b9d70] path_openat+0x90/0x678
[205816.790967] [c66b1e80] [c00ba388] do_filp_open+0x30/0x8c
[205816.796304] [c66b1f00] [c00abb48] do_sys_open+0x14c/0x238
[205816.801733] [c66b1f40] [c000b294] ret_from_syscall+0x0/0x38
[205816.807275] Instruction dump:
[205816.810292] 7f834800 419e000c 48014f75 80610018 8081001c 81410020 
907f0000 909f0004
[205816.818038] 915f0020 3bc00000 8061000c 81230028 <81290010> 81290014 
2f890000 419e0014

[219713.431174] Unable to handle kernel paging request for data at 
address 0x6e3d227e
[219713.438912] Faulting instruction address: 0xc00b7350
[219713.445717] Oops: Kernel access of bad area, sig: 11 [#1]
[219713.450862] PREEMPT CMPC885
[219713.453744] CPU: 0 PID: 1016 Comm: SUO_ Not tainted 3.18.14 #43
[219713.461390] task: c66b0e70 ti: c66ec000 task.ti: c66ec000
[219713.466803] NIP: c00b7350 LR: c00b7318 CTR: c00fcb04
[219713.471801] REGS: c66edd10 TRAP: 0300   Not tainted  (3.18.14)
[219713.479352] MSR: 00009032 <EE,ME,IR,DR,RI>  CR: 22002482 XER: 00000000
[219713.485989] DAR: 6e3d227e DSISR: c0000000
[219713.485989] GPR00: c00b7318 c66eddc0 c66b0e70 c105ab08 c505ab90 
c505abca 90f9ced3 00000031
[219713.485989] GPR08: 00000000 6e3d226e c5060360 0d2c06ce 22002482 
101cae54 1017c030 105103ec
[219713.485989] GPR16: 101c0c38 00000003 10510120 1017c248 10239598 
00000000 00000000 c66ec000
[219713.485989] GPR24: 00100000 c66edea0 00300000 00000004 fffff000 
c63f802f 00000000 c66ede88
[219713.518053] NIP [c00b7350] link_path_walk+0x414/0x86c
[219713.523116] LR [c00b7318] link_path_walk+0x3dc/0x86c
[219713.528067] Call Trace:
[219713.530601] [c66eddc0] [c00b7318] link_path_walk+0x3dc/0x86c 
(unreliable)
[219713.537401] [c66ede20] [c00b9bd4] path_openat+0x90/0x678
[219713.542735] [c66ede80] [c00ba1ec] do_filp_open+0x30/0x8c
[219713.548078] [c66edf00] [c00ab9ac] do_sys_open+0x14c/0x238
[219713.553503] [c66edf40] [c000b27c] ret_from_syscall+0x0/0x38
[219713.559041] Instruction dump:
[219713.562058] 7f834800 419e000c 48014fb5 80610018 8081001c 81410020 
907f0000 909f0004
[219713.569801] 915f0020 3bc00000 8061000c 81230028 <81290010> 81290014 
2f890000 419e0014


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ