Re: Regression: OOPs on boot due to "wlcore: Add support for optional wakeirq"

2018-10-25 Thread Tony Lindgren
* John Stultz [181025 17:04]: > Hey Tony, > In testing linus/master on my hikey board, I'm hitting the following > OOPS on bootup: > > [1.870279] Unable to handle kernel read from unreadable memory at ... > [1.870485] wl1271_probe+0x210/0x350 > [1.870

Re: Regression: OOPs on boot due to "wlcore: Add support for optional wakeirq"

2018-10-25 Thread John Stultz
On Thu, Oct 25, 2018 at 10:04 AM, John Stultz wrote: > Hey Tony, > In testing linus/master on my hikey board, I'm hitting the following > OOPS on bootup: > > [1.870279] Unable to handle kernel read from unreadable memory at > virtual address 0010 > [

Regression: OOPs on boot due to "wlcore: Add support for optional wakeirq"

2018-10-25 Thread John Stultz
Hey Tony, In testing linus/master on my hikey board, I'm hitting the following OOPS on bootup: [1.870279] Unable to handle kernel read from unreadable memory at virtual address 0010 [1.870283] Mem abort info: [1.870287] ESR = 0x9605 [1.870292] Exception

[PATCH AUTOSEL 4.4 34/65] drm/nouveau/fbcon: fix oops without fbdev emulation

2018-10-25 Thread Sasha Levin
From: Pavel Roskin [ Upstream commit 4813766325374af6ed0b66879ba6a0bbb05c83b6 ] This is similar to an earlier commit 52dfcc5ccfbb ("drm/nouveau: fix for disabled fbdev emulation"), but protects all occurrences of helper.fbdev in the source. I see oops in nouveau_fbcon_accel_sa

[PATCH AUTOSEL 3.18 09/98] usb: gadget: gadgetfs: fix an oops in ep_write()

2018-10-25 Thread Sasha Levin
From: Dan Carpenter [ Upstream commit 42d6cfa0caec4b68a7f17147fbf13a36e94a8bf2 ] We try to free an ERR_PTR on this error path. Fixes: b44be2462dbe ('usb: gadget: gadgetfs: Free memory allocated by memdup_user()') Signed-off-by: Dan Carpenter Signed-off-by: Felipe Balbi Signed-off-by: Sasha L

[PATCH 4.4 44/48] usb: gadget: serial: fix oops when data rxd after close

2018-10-18 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Stephen Warren commit daa35bd95634a2a2d72d1049c93576a02711cb1a upstream. When the gadget serial device has no associated TTY, do not pass any received data into the TTY layer for processing; si

[PATCH 4.9 29/35] usb: gadget: serial: fix oops when data rxd after close

2018-10-18 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Stephen Warren commit daa35bd95634a2a2d72d1049c93576a02711cb1a upstream. When the gadget serial device has no associated TTY, do not pass any received data into the TTY layer for processing; si

Re: [PATCH stable v4.4+] usb: gadget: serial: fix oops when data rx'd after close

2018-10-18 Thread Greg Kroah-Hartman
On Thu, Oct 18, 2018 at 04:28:20PM +0200, Krzysztof Kozlowski wrote: > From: Stephen Warren > > commit daa35bd95634a2a2d72d1049c93576a02711cb1a upstream > > When the gadget serial device has no associated TTY, do not pass any > received data into the TTY layer for processing; simply drop it inst

[PATCH stable v4.4+] usb: gadget: serial: fix oops when data rx'd after close

2018-10-18 Thread Krzysztof Kozlowski
to handle kernel NULL pointer dereference at virtual address 00a8 [ 134.023988] pgd = 80004000 [ 134.026749] [00a8] *pgd= [ 134.030417] Internal error: Oops: 17 [#1] ARM [ 134.034826] Modules linked in: ctr ccm usb_f_acm u_serial ath9k_htc ath9k_common ath9k_hw ath mac80211

[PATCH 4.18 046/135] sfp: fix oops with ethtool -m

2018-10-16 Thread Greg Kroah-Hartman
. This unfortunately leads to an oops: Unable to handle kernel NULL pointer dereference at virtual address 0008 pgd = (ptrval) [0008] *pgd=7c400831, *pte=, *ppte= Internal error: Oops: 17 [#1] SMP ARM Modules linked in: CPU: 0 PID: 1480 Comm: ethtool Not tainted 4.19.0-rc3 #138

[PATCH 3.16 042/366] media: rc: oops in ir_timer_keyup after device unplug

2018-10-14 Thread Ben Hutchings
3.16.60-rc1 review patch. If anyone has any objections, please let me know. -- From: Sean Young commit 8d4068810d9926250dd2435719a080b889eb44c3 upstream. If there is IR in the raw kfifo when ir_raw_event_unregister() is called, then kthread_stop() causes ir_raw_event_thread to

[PATCH 3.16 165/366] x86/mm: Prevent kernel Oops in PTDUMP code with HIGHPTE=y

2018-10-14 Thread Ben Hutchings
3.16.60-rc1 review patch. If anyone has any objections, please let me know. -- From: Joerg Roedel commit d6ef1f194b7569af8b8397876dc9ab07649d63cb upstream. The walk_pte_level() function just uses __va to get the virtual address of the PTE page, but that breaks when the PTE pag

[PATCH 3.16 104/366] media: v4l2-compat-ioctl32: don't oops on overlay

2018-10-14 Thread Ben Hutchings
uld be obtained via get_user(), otherwise it can OOPS: vivid-000: == END STATUS == BUG: unable to handle kernel paging request at fffb18e0 IP: [] __put_v4l2_format32+0x169/0x220 [videodev] PGD 3f5776067 PUD 3f576f067 PMD 3f5769067 PTE 80042548f

[PATCH 3.16 258/366] bdi: Fix oops in wb_workfn()

2018-10-14 Thread Ben Hutchings
3.16.60-rc1 review patch. If anyone has any objections, please let me know. -- From: Jan Kara commit b8b784958eccbf8f51ebeee65282ca3fd59ea391 upstream. Syzbot has reported that it can hit a NULL pointer dereference in wb_workfn() due to wb->bdi->dev being NULL. This indicates

[PATCH 4.18 108/168] drm/nouveau: fix oops in client init failure path

2018-10-08 Thread Greg Kroah-Hartman
4.18-stable review patch. If anyone has any objections, please let me know. -- From: Ben Skeggs [ Upstream commit a43b16dda2d7485f5c5aed075c1dc9785e339515 ] The NV_ERROR macro requires drm->client to be initialised, which it may not be at this stage of the init process. Signe

[PATCH AUTOSEL 4.18 33/58] sfp: fix oops with ethtool -m

2018-10-08 Thread Sasha Levin
From: Russell King [ Upstream commit 126d6848ef13958e1cb959e96c21d19bc498ade9 ] If a network interface is created prior to the SFP socket being available, ethtool can request module information. This unfortunately leads to an oops: Unable to handle kernel NULL pointer dereference at virtual

Re: [PATCH] ACPI/sbshc: Fix rare oops when removing modules.

2018-10-03 Thread Rafael J. Wysocki
On Monday, October 1, 2018 4:53:13 AM CEST Ronald Tschalär wrote: > There was a small race when removing the sbshc module where > smbus_alarm() had queued acpi_smbus_callback() for deferred execution > but it hadn't been run yet, so that when it did run hc had been freed > and the module unloaded,

[PATCH] ACPI/sbshc: Fix rare oops when removing modules.

2018-09-30 Thread Ronald Tschalär
There was a small race when removing the sbshc module where smbus_alarm() had queued acpi_smbus_callback() for deferred execution but it hadn't been run yet, so that when it did run hc had been freed and the module unloaded, resulting in an invalid paging request. A similar race existed when remov

[PATCH AUTOSEL 4.18 30/65] drm/nouveau: fix oops in client init failure path

2018-09-30 Thread Sasha Levin
From: Ben Skeggs [ Upstream commit a43b16dda2d7485f5c5aed075c1dc9785e339515 ] The NV_ERROR macro requires drm->client to be initialised, which it may not be at this stage of the init process. Signed-off-by: Ben Skeggs Signed-off-by: Sasha Levin --- drivers/gpu/drm/nouveau/nouveau_drm.c | 14

[PATCH 4.18 142/235] NFSv4: Fix a tracepoint Oops in initiate_file_draining()

2018-09-24 Thread Greg Kroah-Hartman
4.18-stable review patch. If anyone has any objections, please let me know. -- From: Trond Myklebust commit 2a534a7473bf4e7f1c12805113f80c795fc8e89a upstream. Now that the value of 'ino' can be NULL or an ERR_PTR(), we need to change the test in the tracepoint. Fixes: ce5624f

[PATCH 4.18 036/235] media: tw686x: Fix oops on buffer alloc failure

2018-09-24 Thread Greg Kroah-Hartman
4.18-stable review patch. If anyone has any objections, please let me know. -- From: Krzysztof Ha?asa [ Upstream commit 5a1a2f63d840dc2631505b607e11ff65ac1b7d3c ] The error path currently calls tw686x_video_free() which requires vc->dev to be initialized, causing a NULL derefe

[PATCH 4.14 025/173] media: tw686x: Fix oops on buffer alloc failure

2018-09-24 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Krzysztof Ha?asa [ Upstream commit 5a1a2f63d840dc2631505b607e11ff65ac1b7d3c ] The error path currently calls tw686x_video_free() which requires vc->dev to be initialized, causing a NULL derefe

[PATCH 4.9 013/111] media: tw686x: Fix oops on buffer alloc failure

2018-09-24 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Krzysztof Ha?asa [ Upstream commit 5a1a2f63d840dc2631505b607e11ff65ac1b7d3c ] The error path currently calls tw686x_video_free() which requires vc->dev to be initialized, causing a NULL derefer

[PATCH 4.18 141/158] media: em28xx: Fix DualHD disconnect oops

2018-09-17 Thread Greg Kroah-Hartman
4.18-stable review patch. If anyone has any objections, please let me know. -- From: Brad Love [ Upstream commit 20cdcaf903298d54b834daedf65a2ddef70cae0a ] During the duplication of em28xx state for the second tuner pair a pointer to alt_max_pkt_size_isoc is copied. During tea

Re: 答复: Re: 答复: Re: [PATCH] tty: max3100: Fix oops while 'cat/proc/tty/driver/ttyMAX'

2018-09-16 Thread Jiri Slaby
On 09/15/2018, 04:14 AM, chen.l...@zte.com.cn wrote: > yes, creation and destroy of the workqueue is not locked, I think > maybe there is some > > remainder work to do in destroy-wq, so I cannot sure if there is > any usage about lock destroy-wq. > > > What you worried of the races is about this

Re: 答复: Re: [PATCH] tty: max3100: Fix oops while 'cat/proc/tty/driver/ttyMAX'

2018-09-14 Thread Jiri Slaby
On 09/13/2018, 08:32 AM, chen.l...@zte.com.cn wrote: >         > > but 'get_mctrl' is already protected by  the upper layer by spin lock, > so, will the races happen? > > > for example: in /drivers/tty/serial/serial_core.c  > >               spin_lock_irq(&uport->lock); > >               resul

Re: [PATCH] tty: max3100: Fix oops while 'cat /proc/tty/driver/ttyMAX'

2018-09-12 Thread Jiri Slaby
On 09/13/2018, 04:38 AM, chen.l...@zte.com.cn wrote: > Before wq 's->workqueue' be initialized in function 'max3100_startup', > > 'cat /proc/tty/driver/ttyMAX' will cause oops. > > > Oops: Kernel access of bad area, sig: 11 [#1] > >

[PATCH AUTOSEL 4.18 24/88] media: tw686x: Fix oops on buffer alloc failure

2018-09-06 Thread Sasha Levin
From: Krzysztof Ha?asa [ Upstream commit 5a1a2f63d840dc2631505b607e11ff65ac1b7d3c ] The error path currently calls tw686x_video_free() which requires vc->dev to be initialized, causing a NULL dereference on uninitizalized channels. Fix this by setting the vc->dev fields for all the channels fir

[PATCH AUTOSEL 4.9 10/43] media: tw686x: Fix oops on buffer alloc failure

2018-09-06 Thread Sasha Levin
From: Krzysztof Ha?asa [ Upstream commit 5a1a2f63d840dc2631505b607e11ff65ac1b7d3c ] The error path currently calls tw686x_video_free() which requires vc->dev to be initialized, causing a NULL dereference on uninitizalized channels. Fix this by setting the vc->dev fields for all the channels fir

[PATCH AUTOSEL 4.14 16/67] media: tw686x: Fix oops on buffer alloc failure

2018-09-06 Thread Sasha Levin
From: Krzysztof Ha?asa [ Upstream commit 5a1a2f63d840dc2631505b607e11ff65ac1b7d3c ] The error path currently calls tw686x_video_free() which requires vc->dev to be initialized, causing a NULL dereference on uninitizalized channels. Fix this by setting the vc->dev fields for all the channels fir

[PATCH 4.18 063/123] fuse: Fix oops at process_init_reply()

2018-09-03 Thread Greg Kroah-Hartman
4.18-stable review patch. If anyone has any objections, please let me know. -- From: Miklos Szeredi commit e8f3bd773d22f488724dffb886a1618da85c2966 upstream. syzbot is hitting NULL pointer dereference at process_init_reply(). This is because deactivate_locked_super() is called

[PATCH 4.14 123/165] fuse: Fix oops at process_init_reply()

2018-09-03 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Miklos Szeredi commit e8f3bd773d22f488724dffb886a1618da85c2966 upstream. syzbot is hitting NULL pointer dereference at process_init_reply(). This is because deactivate_locked_super() is called

[PATCH 4.9 078/107] fuse: Fix oops at process_init_reply()

2018-09-03 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Miklos Szeredi commit e8f3bd773d22f488724dffb886a1618da85c2966 upstream. syzbot is hitting NULL pointer dereference at process_init_reply(). This is because deactivate_locked_super() is called

[PATCH 4.4 61/80] fuse: Fix oops at process_init_reply()

2018-09-03 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Miklos Szeredi commit e8f3bd773d22f488724dffb886a1618da85c2966 upstream. syzbot is hitting NULL pointer dereference at process_init_reply(). This is because deactivate_locked_super() is called

[PATCH AUTOSEL 4.9 47/62] media: em28xx: Fix DualHD disconnect oops

2018-09-02 Thread Sasha Levin
From: Brad Love [ Upstream commit 20cdcaf903298d54b834daedf65a2ddef70cae0a ] During the duplication of em28xx state for the second tuner pair a pointer to alt_max_pkt_size_isoc is copied. During tear down the second tuner is destroyed first and kfrees alt_max_pkt_size_isoc, then the first tuner

[PATCH AUTOSEL 4.4 33/47] media: em28xx: Fix DualHD disconnect oops

2018-09-02 Thread Sasha Levin
From: Brad Love [ Upstream commit 20cdcaf903298d54b834daedf65a2ddef70cae0a ] During the duplication of em28xx state for the second tuner pair a pointer to alt_max_pkt_size_isoc is copied. During tear down the second tuner is destroyed first and kfrees alt_max_pkt_size_isoc, then the first tuner

[PATCH AUTOSEL 4.14 73/89] media: em28xx: Fix DualHD disconnect oops

2018-09-02 Thread Sasha Levin
From: Brad Love [ Upstream commit 20cdcaf903298d54b834daedf65a2ddef70cae0a ] During the duplication of em28xx state for the second tuner pair a pointer to alt_max_pkt_size_isoc is copied. During tear down the second tuner is destroyed first and kfrees alt_max_pkt_size_isoc, then the first tuner

[PATCH AUTOSEL 4.18 106/131] media: em28xx: Fix DualHD disconnect oops

2018-09-02 Thread Sasha Levin
From: Brad Love [ Upstream commit 20cdcaf903298d54b834daedf65a2ddef70cae0a ] During the duplication of em28xx state for the second tuner pair a pointer to alt_max_pkt_size_isoc is copied. During tear down the second tuner is destroyed first and kfrees alt_max_pkt_size_isoc, then the first tuner

RE: AW: PROBLEM: Kernel Oops in UDP stack

2018-08-02 Thread David Laight
From: Marcel Hellwig > Sent: 01 August 2018 11:36 > >> [] (udp_recvmsg+0x284/0x33c) from [] > >> (inet_recvmsg+0x38/0x4c): > net/ipv4/udp.c:1234 > > > > sin->sin_addr.s_addr = ip_hdr(skb)->saddr; > > > >Unaligned access trap (virtual address c14fe63a), so either sin or > >ip_hdr(skb)

[PATCH 4.17 075/101] bdi: Fix another oops in wb_workfn()

2018-07-20 Thread Greg Kroah-Hartman
hutdown(wb); ... kfree_rcu(wb, rcu); wb_shutdown(wb); -> oops use-after-free We solve these issues by synchronizing writeback structure shutdown from cgwb_bdi_unregister() with cgwb_release_workfn() using a new mutex. That way we also no longer need synchronization using WB_s

[PATCH 4.17 063/101] rtlwifi: Fix kernel Oops "Fw download fail!!"

2018-07-20 Thread Greg Kroah-Hartman
layed work complete when entering PS, then driver reinit procedure and delay work are running simultaneously. This will cause unpredictable kernel oops or crash like rtl8723be: error H2C cmd because of Fw download fail!!! WARNING: CPU: 3 PID: 159 at drivers/net/wireless/realtek/rtlwifi/ rtl8

[PATCH 4.14 54/92] media: rc: oops in ir_timer_keyup after device unplug

2018-07-20 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Sean Young commit 8d4068810d9926250dd2435719a080b889eb44c3 upstream. If there is IR in the raw kfifo when ir_raw_event_unregister() is called, then kthread_stop() causes ir_raw_event_thread to

[PATCH 4.14 67/92] bdi: Fix another oops in wb_workfn()

2018-07-20 Thread Greg Kroah-Hartman
hutdown(wb); ... kfree_rcu(wb, rcu); wb_shutdown(wb); -> oops use-after-free We solve these issues by synchronizing writeback structure shutdown from cgwb_bdi_unregister() with cgwb_release_workfn() using a new mutex. That way we also no longer need synchronization using WB_s

[PATCH 4.14 50/92] rtlwifi: Fix kernel Oops "Fw download fail!!"

2018-07-20 Thread Greg Kroah-Hartman
layed work complete when entering PS, then driver reinit procedure and delay work are running simultaneously. This will cause unpredictable kernel oops or crash like rtl8723be: error H2C cmd because of Fw download fail!!! WARNING: CPU: 3 PID: 159 at drivers/net/wireless/realtek/rtlwifi/ rtl8

[PATCH 3.18 10/29] PM / hibernate: Fix oops at snapshot_write()

2018-07-20 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Tetsuo Handa commit fc14eebfc20854a38fd9f1d93a42b1783dad4d17 upstream. syzbot is reporting NULL pointer dereference at snapshot_write() [1]. This is because data->handle is zero-cleared by ioc

[PATCH 4.4 41/43] PM / hibernate: Fix oops at snapshot_write()

2018-07-16 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Tetsuo Handa commit fc14eebfc20854a38fd9f1d93a42b1783dad4d17 upstream. syzbot is reporting NULL pointer dereference at snapshot_write() [1]. This is because data->handle is zero-cleared by ioct

[PATCH 4.9 30/32] PM / hibernate: Fix oops at snapshot_write()

2018-07-16 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Tetsuo Handa commit fc14eebfc20854a38fd9f1d93a42b1783dad4d17 upstream. syzbot is reporting NULL pointer dereference at snapshot_write() [1]. This is because data->handle is zero-cleared by ioct

[PATCH 4.14 51/54] PM / hibernate: Fix oops at snapshot_write()

2018-07-16 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Tetsuo Handa commit fc14eebfc20854a38fd9f1d93a42b1783dad4d17 upstream. syzbot is reporting NULL pointer dereference at snapshot_write() [1]. This is because data->handle is zero-cleared by ioc

[PATCH 4.17 59/67] PM / hibernate: Fix oops at snapshot_write()

2018-07-16 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Tetsuo Handa commit fc14eebfc20854a38fd9f1d93a42b1783dad4d17 upstream. syzbot is reporting NULL pointer dereference at snapshot_write() [1]. This is because data->handle is zero-cleared by ioc

[PATCH 4.14 08/61] xhci: Fix kernel oops in trace_xhci_free_virt_device

2018-07-05 Thread Greg Kroah-Hartman
kernel NULL pointer dereference at [ 1092.101694] PGD 0 P4D 0 [ 1092.104601] Oops: [#1] SMP [ 1092.207734] Workqueue: usb_hub_wq hub_event [ 1092.212507] RIP: 0010:trace_event_raw_event_xhci_log_virt_dev+0x6c/0xf0 [ 1092.220050] RSP: 0018:8c252e883d28 EFLAGS: 00010086

[PATCH 4.17 09/46] xhci: Fix kernel oops in trace_xhci_free_virt_device

2018-07-05 Thread Greg Kroah-Hartman
kernel NULL pointer dereference at [ 1092.101694] PGD 0 P4D 0 [ 1092.104601] Oops: [#1] SMP [ 1092.207734] Workqueue: usb_hub_wq hub_event [ 1092.212507] RIP: 0010:trace_event_raw_event_xhci_log_virt_dev+0x6c/0xf0 [ 1092.220050] RSP: 0018:8c252e883d28 EFLAGS: 00010086

[nfsd] page allocation failure -> kernel oops, even local fs hangs.

2018-07-04 Thread Ian Kumlien
Hi, I just had this happen a little while ago, got different weird deadlocks but this one actually generated a oops.. This is basic operation, a machine with 16 gb memory mainly doing NFS traffic. I'm currently playing with RDMA for this, which is why mlx4 is included. When the crash o

RE: iscsi_trx oops in 4.18.0-rc2 and potential patch for percpu_ida.c

2018-07-03 Thread Calciano, Jess
Hello Sebastian, > In Linus' tree: > 4bb6e96ab808 ("lib/percpu_ida.c: don't do alloc from per-CPU list if there is > none") We've tested with 4.18.0-rc3 and we're no longer seeing the kernel oops. Thank you! -- Jess

Re: iscsi_trx oops in 4.18.0-rc2 and potential patch for percpu_ida.c

2018-06-29 Thread bige...@linutronix.de
On 2018-06-28 19:53:21 [+], Calciano, Jess wrote: > So although the problem has already been reported, we're wondering if there > are any updates on the status of the fix, or if it will be available in an > upcoming mainline build. In Linus' tree: 4bb6e96ab808 ("lib/percpu_ida.c: don't do all

iscsi_trx oops in 4.18.0-rc2 and potential patch for percpu_ida.c

2018-06-28 Thread Calciano, Jess
Hello, In 4.18.0-rc1 and rc2, we're seeing a kernel oops on the SCSI target host when an initiator issues an "iscsiadm -m discovery" command. Stack trace is below. It seems to be the same bug discussed on the target-devel list in this thread: https://www.spinics.net/lists/target

[next-20180601][nvme][ppc] Kernel Oops is triggered when creating lvm snapshots on nvme disks

2018-06-26 Thread Abdul Haleem
Greeting's Kernel Oops is seen on 4.17.0-rc7-next-20180601 kernel on a bare-metal machine when running lvm snapshot tests on nvme disks. Machine Type: Power 8 bare-metal kernel : 4.17.0-rc7-next-20180601 test: $ pvcreate -y /dev/nvme0n1 $ vgcreate avocado_vg /dev/nvme0n1 $ lvcreate --size

Re: [PATCH] m68k: fix "bad page state" oops on ColdFire boot

2018-06-18 Thread Greg Ungerer
Hi Geert, On 18/06/18 16:58, Geert Uytterhoeven wrote: Hi Greg, On Mon, Jun 18, 2018 at 8:06 AM Greg Ungerer wrote: Booting a ColdFire m68k core with MMU enabled causes a "bad page state" oops since commit 1d40a5ea01d5 ("mm: mark pages in use for page tables"): BU

[PATCH 4.16 191/279] drm/vc4: Fix oops dereferencing DPIs connector since panel_bridge.

2018-06-18 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Eric Anholt [ Upstream commit 164c2416dd40770aba5814f93da835e8a9f7196d ] In the cleanup, I didn't notice that we needed to dereference the connector for the bus_format. Fix the regression by

[PATCH 4.16 181/279] drm/exynos: mixer: avoid Oops in vp_video_buffer()

2018-06-18 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Tobias Jakobi [ Upstream commit 0ccc1c8f0282e237a0bd6dca7cdac4ed5e318ee7 ] If an interlaced video mode is selected, a IOMMU pagefault is triggered by vp_video_buffer(). Fix the most apparent

Re: [PATCH] m68k: fix "bad page state" oops on ColdFire boot

2018-06-17 Thread Geert Uytterhoeven
Hi Greg, On Mon, Jun 18, 2018 at 8:06 AM Greg Ungerer wrote: > Booting a ColdFire m68k core with MMU enabled causes a "bad page state" > oops since commit 1d40a5ea01d5 ("mm: mark pages in use for page tables"): > > BUG: Bad page state in process sh pfn:01ce2 &

Re: Recall: PROBLEM: JFFS2 Empty summary info causes OOPS

2018-06-16 Thread David Woodhouse
> On Fri, Jun 15, 2018 at 9:13 PM, Veluthakkal, Sreeram > wrote: >> Veluthakkal, Sreeram would like to recall the message, "PROBLEM: JFFS2 >> Empty summary info causes OOPS". > > -ENOMSEXCHANGE Nom sex change? Oh, I see. No, it never works in Exchange eithe

Re: Recall: PROBLEM: JFFS2 Empty summary info causes OOPS

2018-06-16 Thread Richard Weinberger
On Fri, Jun 15, 2018 at 9:13 PM, Veluthakkal, Sreeram wrote: > Veluthakkal, Sreeram would like to recall the message, "PROBLEM: JFFS2 Empty > summary info causes OOPS". -ENOMSEXCHANGE -- Thanks, //richard

Recall: PROBLEM: JFFS2 Empty summary info causes OOPS

2018-06-15 Thread Veluthakkal, Sreeram
Veluthakkal, Sreeram would like to recall the message, "PROBLEM: JFFS2 Empty summary info causes OOPS".

PROBLEM: JFFS2 Empty summary info causes OOPS

2018-06-15 Thread Veluthakkal, Sreeram
Hi, [1.] Summary: JFFS2 Empty summary node info causes OOPS [2.] Description: Under stress situations on the filesystem, OOPs are observed. The OOPs points to empty summary node info bug. Confirmed that the filesystem is not full, not corrupted and is accessible. [3.] Keywords (i.e., modules

v4.18-rc0: ohci-platform on n900 oops-es on reboot

2018-06-14 Thread Pavel Machek
Hi! When I enable CONFIG_USB_OHCI_HCD=y CONFIG_USB_OHCI_HCD_OMAP3=y CONFIG_USB_OHCI_HCD_PLATFORM=y on n900 (I need it on droid4 and want common config), I get oops when attempting to reboot the system. I believe problem is there in v4.17, too. I'll try to build it as a module and debug, b

Re: [PATCH] bdi: Fix another oops in wb_workfn()

2018-06-11 Thread Tejun Heo
wb_shutdown(wb); > ... > kfree_rcu(wb, rcu); > wb_shutdown(wb); -> oops use-after-free > > I'm not 100% sure how to fix this. wb structures can be at various phases of > shutdown (or there may be other external references still existing) when

Re: [PATCH] bdi: Fix another oops in wb_workfn()

2018-06-11 Thread Jan Kara
On Sat 09-06-18 23:00:05, Tetsuo Handa wrote: > From 014c4149f2e24cd26b278b32d5dfda056eecf093 Mon Sep 17 00:00:00 2001 > From: Tetsuo Handa > Date: Sat, 9 Jun 2018 22:47:52 +0900 > Subject: [PATCH] bdi: Fix another oops in wb_workfn() > > syzbot is reporting NULL pointer derefe

[PATCH 3.16 240/410] crypto: s5p-sss - Fix kernel Oops in AES-ECB mode

2018-06-07 Thread Ben Hutchings
3.16.57-rc1 review patch. If anyone has any objections, please let me know. -- From: Kamil Konieczny commit c927b080c67e3e97193c81fc1d27f4251bf4e036 upstream. In AES-ECB mode crypt is done with key only, so any use of IV can cause kernel Oops. Use IV only in AES-CBC and AES

Re: [PATCH] PM / hibernate: Fix oops at snapshot_write().

2018-05-29 Thread Rafael J. Wysocki
On Saturday, May 26, 2018 2:59:36 AM CEST Tetsuo Handa wrote: > syzbot is reporting NULL pointer dereference at snapshot_write() [1]. > This is because data->handle is zero-cleared by ioctl(SNAPSHOT_FREE). > Fix this by checking data_of(data->handle) != NULL before using it. > > [1] > https://syz

[PATCH 4.14 341/496] IB/rxe: Fix for oops in rxe_register_device on ppc64le arch

2018-05-28 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Mikhail Malygin [ Upstream commit efc365e7290d040fbd43f60b0e97653489a739d4 ] On ppc64le arch rxe_add command causes oops in kernel log: [ 92.495140] Oops: Kernel access of bad area, sig

[PATCH 4.16 074/272] IB/rxe: Fix for oops in rxe_register_device on ppc64le arch

2018-05-28 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Mikhail Malygin [ Upstream commit efc365e7290d040fbd43f60b0e97653489a739d4 ] On ppc64le arch rxe_add command causes oops in kernel log: [ 92.495140] Oops: Kernel access of bad area, sig

[PATCH 4.14 078/496] IB/uverbs: Fix possible oops with duplicate ioctl attributes

2018-05-28 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Matan Barak [ Upstream commit 4d39a959bc1f3d164b5a54147fdeb19f84b1ed58 ] If the same attribute is listed twice by the user in the ioctl attribute list then error unwind can cause the kernel to

Re: [PATCH] bdi: Fix another oops in wb_workfn()

2018-05-26 Thread Tejun Heo
On Sun, May 27, 2018 at 11:21:25AM +0900, Tetsuo Handa wrote: > From 8a8222698163d1fe180258566e9a3ff43f54fcd9 Mon Sep 17 00:00:00 2001 > From: Tetsuo Handa > Date: Sun, 27 May 2018 11:08:20 +0900 > Subject: [PATCH] bdi: Fix another oops in wb_workfn() > > syzbot is still hi

[PATCH] bdi: Fix another oops in wb_workfn()

2018-05-26 Thread Tetsuo Handa
>From 8a8222698163d1fe180258566e9a3ff43f54fcd9 Mon Sep 17 00:00:00 2001 From: Tetsuo Handa Date: Sun, 27 May 2018 11:08:20 +0900 Subject: [PATCH] bdi: Fix another oops in wb_workfn() syzbot is still hitting NULL pointer dereference at wb_workfn() [1]. This might be because we overlooked t

[PATCH] PM / hibernate: Fix oops at snapshot_write().

2018-05-25 Thread Tetsuo Handa
syzbot is reporting NULL pointer dereference at snapshot_write() [1]. This is because data->handle is zero-cleared by ioctl(SNAPSHOT_FREE). Fix this by checking data_of(data->handle) != NULL before using it. [1] https://syzkaller.appspot.com/bug?id=828a3c71bd344a6de8b6a31233d51a72099f27fd Signed

Re: [PATCH v2 0/2] uio: Prevent kernel oops on UIO device remove with open fds

2018-05-14 Thread Greg KH
On Mon, May 14, 2018 at 01:32:21PM +1200, Hamish Martin wrote: > If a UIO device is removed while a user space app has an open file > descriptor to that device's /dev/uio* file, a kernel oops can occur when > the file descriptor is ultimately closed. The oops is triggered by &

[PATCH 4.4 41/56] bdi: Fix oops in wb_workfn()

2018-05-14 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Jan Kara commit b8b784958eccbf8f51ebeee65282ca3fd59ea391 upstream. Syzbot has reported that it can hit a NULL pointer dereference in wb_workfn() due to wb->bdi->dev being NULL. This indicates t

[PATCH 4.9 13/36] bdi: Fix oops in wb_workfn()

2018-05-14 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Jan Kara commit b8b784958eccbf8f51ebeee65282ca3fd59ea391 upstream. Syzbot has reported that it can hit a NULL pointer dereference in wb_workfn() due to wb->bdi->dev being NULL. This indicates t

[PATCH 4.14 17/62] bdi: Fix oops in wb_workfn()

2018-05-14 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Jan Kara commit b8b784958eccbf8f51ebeee65282ca3fd59ea391 upstream. Syzbot has reported that it can hit a NULL pointer dereference in wb_workfn() due to wb->bdi->dev being NULL. This indicates

[PATCH 4.16 22/72] bdi: Fix oops in wb_workfn()

2018-05-13 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Jan Kara commit b8b784958eccbf8f51ebeee65282ca3fd59ea391 upstream. Syzbot has reported that it can hit a NULL pointer dereference in wb_workfn() due to wb->bdi->dev being NULL. This indicates

[PATCH v2 0/2] uio: Prevent kernel oops on UIO device remove with open fds

2018-05-13 Thread Hamish Martin
If a UIO device is removed while a user space app has an open file descriptor to that device's /dev/uio* file, a kernel oops can occur when the file descriptor is ultimately closed. The oops is triggered by dereferencing either the uio_listener struct's 'dev' pointer, or at

[PATCH 0/2] Prevent kernel oops on UIO device remove with open fds

2018-05-10 Thread Hamish Martin
If a UIO device is removed while a user space app has an open file descriptor to that device's /dev/uio* file, a kernel oops can occur when the file descriptor is ultimately closed. The oops is triggered by dereferencing either the uio_listener struct's 'dev' pointer, or at

Re: Oops on the system startup in the function part_in_flight()

2018-05-04 Thread Jens Axboe
On 5/4/18 6:35 PM, Ben Greear wrote: > Hello, > > I am trying to bisect a pktgen related performance regression that appears to > be between the 4.13 and 4.14 kernels. But, my system keeps crashing due to > part_in_flight > oops so bisecting is not going well. > > It

Re: Oops on the system startup in the function part_in_flight()

2018-05-04 Thread Ben Greear
Hello, I am trying to bisect a pktgen related performance regression that appears to be between the 4.13 and 4.14 kernels. But, my system keeps crashing due to part_in_flight oops so bisecting is not going well. It looks like this oops was fixed, but the link to the patch in the email is no

Re: [PATCH] drm/vc4: Fix oops dereferencing DPI's connector since panel_bridge.

2018-05-02 Thread Boris Brezillon
On Fri, 9 Mar 2018 15:32:56 -0800 Eric Anholt wrote: > In the cleanup, I didn't notice that we needed to dereference the > connector for the bus_format. Fix the regression by looking up the > first (and only) connector attached to us, and assume that its > bus_format is what we want. Some day

Re: [PATCH] drm/vc4: Fix oops dereferencing DPI's connector since panel_bridge.

2018-05-02 Thread Sean Paul
On Fri, Mar 09, 2018 at 03:32:56PM -0800, Eric Anholt wrote: > In the cleanup, I didn't notice that we needed to dereference the > connector for the bus_format. Fix the regression by looking up the > first (and only) connector attached to us, and assume that its > bus_format is what we want. Some

Re: [PATCH] drm/vc4: Fix oops dereferencing DPI's connector since panel_bridge.

2018-05-02 Thread Eric Anholt
Eric Anholt writes: > In the cleanup, I didn't notice that we needed to dereference the > connector for the bus_format. Fix the regression by looking up the > first (and only) connector attached to us, and assume that its > bus_format is what we want. Some day it would be good to have that > pa

[PATCH 4.16 014/113] xhci: Fix Kernel oops in xhci dbgtty

2018-04-30 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Zhengjun Xing commit 7fc65d4c2ba9e5006c629669146c6876b65aa233 upstream. tty_unregister_driver may be called more than 1 time in some hotplug cases,it will cause the kernel oops. This patch

[PATCH 4.16 57/81] net: aquantia: oops when shutdown on already stopped device

2018-04-27 Thread Greg Kroah-Hartman
case hangs indefinitely. In other case, if device was never opened at all, we get oops because of null pointer access. We should invoke aq_nic_stop conditionally, only if device is running at the moment of shutdown. Reported-by: David Arcari Fixes: 90869ddfefeb ("net: aquantia: Implemen

[PATCH 4.14 044/183] powerpc: System reset avoid interleaving oops using die synchronisation

2018-04-25 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Nicholas Piggin [ Upstream commit 4552d128c26e0f0f27a5bd2fadc24092b8f6c1d7 ] The die() oops path contains a serializing lock to prevent oops messages from being interleaved. In the case of a

[PATCH 4.16 030/196] media: rc: oops in ir_timer_keyup after device unplug

2018-04-22 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Sean Young commit 8d4068810d9926250dd2435719a080b889eb44c3 upstream. If there is IR in the raw kfifo when ir_raw_event_unregister() is called, then kthread_stop() causes ir_raw_event_thread to

[PATCH 4.4 01/97] media: v4l2-compat-ioctl32: dont oops on overlay

2018-04-22 Thread Greg Kroah-Hartman
uld be obtained via get_user(), otherwise it can OOPS: vivid-000: == END STATUS == BUG: unable to handle kernel paging request at fffb18e0 IP: [] __put_v4l2_format32+0x169/0x220 [videodev] PGD 3f5776067 PUD 3f576f067 PMD 3f5769067 PTE 80042548f067 O

[PATCH 3.18 01/52] media: v4l2-compat-ioctl32: dont oops on overlay

2018-04-22 Thread Greg Kroah-Hartman
uld be obtained via get_user(), otherwise it can OOPS: vivid-000: == END STATUS == BUG: unable to handle kernel paging request at fffb18e0 IP: [] __put_v4l2_format32+0x169/0x220 [videodev] PGD 3f5776067 PUD 3f576f067 PMD 3f5769067 PTE 80042548f

[PATCH 4.16 12/68] media: v4l2-compat-ioctl32: dont oops on overlay

2018-04-17 Thread Greg Kroah-Hartman
uld be obtained via get_user(), otherwise it can OOPS: vivid-000: == END STATUS == BUG: unable to handle kernel paging request at fffb18e0 IP: [] __put_v4l2_format32+0x169/0x220 [videodev] PGD 3f5776067 PUD 3f576f067 PMD 3f5769067 PTE 80042548f

[PATCH 4.9 01/66] media: v4l2-compat-ioctl32: dont oops on overlay

2018-04-17 Thread Greg Kroah-Hartman
uld be obtained via get_user(), otherwise it can OOPS: vivid-000: == END STATUS == BUG: unable to handle kernel paging request at fffb18e0 IP: [] __put_v4l2_format32+0x169/0x220 [videodev] PGD 3f5776067 PUD 3f576f067 PMD 3f5769067 PTE 80042548f067 O

[PATCH 4.14 08/49] media: v4l2-compat-ioctl32: dont oops on overlay

2018-04-17 Thread Greg Kroah-Hartman
uld be obtained via get_user(), otherwise it can OOPS: vivid-000: == END STATUS == BUG: unable to handle kernel paging request at fffb18e0 IP: [] __put_v4l2_format32+0x169/0x220 [videodev] PGD 3f5776067 PUD 3f576f067 PMD 3f5769067 PTE 80042548f

[PATCH 4.15 12/53] media: v4l2-compat-ioctl32: dont oops on overlay

2018-04-17 Thread Greg Kroah-Hartman
uld be obtained via get_user(), otherwise it can OOPS: vivid-000: == END STATUS == BUG: unable to handle kernel paging request at fffb18e0 IP: [] __put_v4l2_format32+0x169/0x220 [videodev] PGD 3f5776067 PUD 3f576f067 PMD 3f5769067 PTE 80042548f

[tip:x86/urgent] x86/mm: Prevent kernel Oops in PTDUMP code with HIGHPTE=y

2018-04-17 Thread tip-bot for Joerg Roedel
kernel Oops in PTDUMP code with HIGHPTE=y The walk_pte_level() function just uses __va to get the virtual address of the PTE page, but that breaks when the PTE page is not in the direct mapping with HIGHPTE=y. The result is an unhandled kernel paging request at some random address when accessing the

[PATCH] x86/mm: Fix kernel oops in PTDUMP code with HIGHPTE=y

2018-04-17 Thread Joerg Roedel
current_user file. Use the correct API to access PTE pages nd fix the oops. Fixes: fe770bf0310d ('x86: clean up the page table dumper and add 32-bit support') Signed-off-by: Joerg Roedel --- arch/x86/mm/dump_pagetables.c | 11 ++- 1 file changed, 6 insertions(+), 5 deletion

[PATCH 4.9 262/310] blk-mq: fix kernel oops in blk_mq_tag_idle()

2018-04-11 Thread Greg Kroah-Hartman
blk_mq_tag_idle(), otherwise the following kernel oops can be triggered, so fix it by checking if the hw queue is unmapped since it doesn't make sense to idle the tags any more after hw queues are unmapped. [ 440.771298] Workqueue: nvme-wq nvme_rdma_del_ctrl_work [nvme_rdma] [ 440.779104]

<    5   6   7   8   9   10   11   12   13   14   >