Opened 6 years ago
Closed 6 years ago
#14204 closed bug (fixed)
[COMPAT MODE] Cannot mount NTFS formatted USB stick
Reported by: | vidrep | Owned by: | korli |
---|---|---|---|
Priority: | normal | Milestone: | Unscheduled |
Component: | System/Kernel | Version: | R1/Development |
Keywords: | Cc: | ||
Blocked By: | Blocking: | #14211 | |
Platform: | All |
Description
hrev52013 x86_64 and x86_gcc2h
Inserting any NTFS formatted USB drive will generate a general system error when mounting.
BFS and FAT formatted drives seem to work OK
Syslogs attached for each.
Attachments (4)
Change History (25)
by , 6 years ago
Attachment: | syslog_NTFS added |
---|
by , 6 years ago
Attachment: | syslog_BFS added |
---|
by , 6 years ago
Attachment: | syslog_FAT added |
---|
by , 6 years ago
comment:1 by , 6 years ago
comment:2 by , 6 years ago
Component: | - General → System/Kernel |
---|---|
Milestone: | Unscheduled → R1/beta1 |
Priority: | normal → blocker |
Looks like korli's compat mode changes broke something.
7:34 PM <Vidrep_gcc2h> hrev52002 is working
comment:3 by , 6 years ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
comment:5 by , 6 years ago
I was under the impression that the compat-mode code is ifdef'd out on 32-bit, but it looks like in some of those commits that's not the case?
comment:7 by , 6 years ago
8:30 PM <Vidrep_gcc2h> hrev52009 shuts down cleanly. hrev52013 hangs every time
Guess that belongs in another ticket, then.
comment:8 by , 6 years ago
comment:10 by , 6 years ago
hrev520010 & hrev520011 reverted in hrev52016, please retest after that.
comment:12 by , 6 years ago
Tested hrev52017 x86_64. NTFS R/W mounts working again. Tested two different vendor NTFS-formatted external USB drives. Confirmed as fixed.
comment:13 by , 6 years ago
Milestone: | R1/beta1 → Unscheduled |
---|---|
Priority: | blocker → normal |
Summary: | Cannot mount NTFS formatted USB stick → [COMPAT MODE] Cannot mount NTFS formatted USB stick |
Good. Moving out of beta1 milestone then.
comment:14 by , 6 years ago
Blocking: | 14211 added |
---|
comment:16 by , 6 years ago
Nice.
At this point, though, @korli -- perhaps we should wait until after beta1 to merge the patchset; seeing as it may uncover more subtle bugs like these.
comment:17 by , 6 years ago
I wonder, though: perhaps we should add an ASSERT to user_memcpy to check if it IS_USER_ADDRESS -- or is there some scenario that it would not be, but that would be legal?
comment:19 by , 6 years ago
user_memcpy() has two parameters, source and destination, to rewrite what you said, you would like to assert than one of both is a user address. You could also add the check to the normal memcpy() but it is actually used by user_memcpy().
comment:20 by , 6 years ago
Yeah, it would trigger a KDL. Essentially this is the reverse of SMAP: SMAP makes sure you don't access user memory through an improper channel. Adding these asserts will prevent using user_memcpyfor copying kernel buffers.
OK, thanks for the tip, I'll try it that way.
I switched to another PC with hrev51986 installed - working
After a pkgman update to hrev52013 - not working