[PATCH] module: fix oops on loading module with malformed ELF section header

2023-09-28 Thread Abhishek Sharma
Hi, I encountered the following OOPS when loading a kernel module with insmod. It occurs when loading a kernel module with an invalid ELF section header - the Section name is invalid and out of bounds into the section name table

[PATCH 5.11 030/122] powerpc/signal32: Fix Oops on sigreturn with unmapped VDSO

2021-04-19 Thread Greg Kroah-Hartman
access on read at 0x7fc07ec0 Faulting instruction address: 0xc00111d4 Oops: Kernel access of bad area, sig: 11 [#1] BE PAGE_SIZE=16K PREEMPT CMPC885 CPU: 0 PID: 353 Comm: sigreturn_vdso Not tainted 5.12.0-rc4-s3k-dev-01553-gb30c310ea220 #4814 NIP: c00111d4 LR

[PATCH AUTOSEL 5.11 19/51] powerpc/signal32: Fix Oops on sigreturn with unmapped VDSO

2021-04-12 Thread Sasha Levin
access on read at 0x7fc07ec0 Faulting instruction address: 0xc00111d4 Oops: Kernel access of bad area, sig: 11 [#1] BE PAGE_SIZE=16K PREEMPT CMPC885 CPU: 0 PID: 353 Comm: sigreturn_vdso Not tainted 5.12.0-rc4-s3k-dev-01553-gb30c310ea220 #4814 NIP: c00111d4 LR

[PATCH 5.11 117/210] i40e: Fix kernel oops when i40e driver removes VFs

2021-04-12 Thread Greg Kroah-Hartman
From: Eryk Rybak [ Upstream commit 347b5650cd158d1d953487cc2bec567af5c5bf96 ] Fix the reason of kernel oops when i40e driver removed VFs. Added new __I40E_VFS_RELEASING state to signalize releasing process by PF, that it makes possible to exit of reset VF procedure. Without this patch

[PATCH 5.10 107/188] i40e: Fix kernel oops when i40e driver removes VFs

2021-04-12 Thread Greg Kroah-Hartman
From: Eryk Rybak [ Upstream commit 347b5650cd158d1d953487cc2bec567af5c5bf96 ] Fix the reason of kernel oops when i40e driver removed VFs. Added new __I40E_VFS_RELEASING state to signalize releasing process by PF, that it makes possible to exit of reset VF procedure. Without this patch

[PATCH 5.4 054/111] i40e: Fix kernel oops when i40e driver removes VFs

2021-04-12 Thread Greg Kroah-Hartman
From: Eryk Rybak [ Upstream commit 347b5650cd158d1d953487cc2bec567af5c5bf96 ] Fix the reason of kernel oops when i40e driver removed VFs. Added new __I40E_VFS_RELEASING state to signalize releasing process by PF, that it makes possible to exit of reset VF procedure. Without this patch

[PATCH 4.19 34/66] i40e: Fix kernel oops when i40e driver removes VFs

2021-04-12 Thread Greg Kroah-Hartman
From: Eryk Rybak [ Upstream commit 347b5650cd158d1d953487cc2bec567af5c5bf96 ] Fix the reason of kernel oops when i40e driver removed VFs. Added new __I40E_VFS_RELEASING state to signalize releasing process by PF, that it makes possible to exit of reset VF procedure. Without this patch

Re: [PATCH v2 1/1] kernel.h: Split out panic and oops helpers

2021-04-09 Thread Thomas Bogendoerfer
On Fri, Apr 09, 2021 at 01:02:50PM +0300, Andy Shevchenko wrote: > kernel.h is being used as a dump for all kinds of stuff for a long time. > Here is the attempt to start cleaning it up by splitting out panic and > oops helpers. > > There are several purposes of doing thi

Re: [PATCH v2 1/1] kernel.h: Split out panic and oops helpers

2021-04-09 Thread Helge Deller
On 4/9/21 12:02 PM, Andy Shevchenko wrote: kernel.h is being used as a dump for all kinds of stuff for a long time. Here is the attempt to start cleaning it up by splitting out panic and oops helpers. There are several purposes of doing this: - dropping dependency in bug.h - dropping a loop

Re: [PATCH v2 1/1] kernel.h: Split out panic and oops helpers

2021-04-09 Thread Luis Chamberlain
On Fri, Apr 09, 2021 at 01:02:50PM +0300, Andy Shevchenko wrote: > kernel.h is being used as a dump for all kinds of stuff for a long time. > Here is the attempt to start cleaning it up by splitting out panic and > oops helpers. > > There are several purposes of doing thi

Re: [PATCH v2 1/1] kernel.h: Split out panic and oops helpers

2021-04-09 Thread Sebastian Reichel
Hi, On Fri, Apr 09, 2021 at 01:02:50PM +0300, Andy Shevchenko wrote: > kernel.h is being used as a dump for all kinds of stuff for a long time. > Here is the attempt to start cleaning it up by splitting out panic and > oops helpers. > > There are several purposes of doing thi

[PATCH v2 1/1] kernel.h: Split out panic and oops helpers

2021-04-09 Thread Andy Shevchenko
kernel.h is being used as a dump for all kinds of stuff for a long time. Here is the attempt to start cleaning it up by splitting out panic and oops helpers. There are several purposes of doing this: - dropping dependency in bug.h - dropping a loop by moving out panic_notifier.h - unload kernel.h

Re: [PATCH v1 1/1] kernel.h: Split out panic and oops helpers

2021-04-09 Thread Andy Shevchenko
e: > > > > kernel.h is being used as a dump for all kinds of stuff for a long time. > > > > Here is the attempt to start cleaning it up by splitting out panic and > > > > oops helpers. > > > > > > > > At the same time convert users in header and

Re: [PATCH v1 1/1] kernel.h: Split out panic and oops helpers

2021-04-09 Thread Andrew Morton
> Here is the attempt to start cleaning it up by splitting out panic and > > > oops helpers. > > > > > > At the same time convert users in header and lib folder to use new header. > > > Though for time being include new header back to kernel.h to avoid twisted

Re: [PATCH v1 1/1] kernel.h: Split out panic and oops helpers

2021-04-08 Thread Andy Shevchenko
On Thu, Apr 08, 2021 at 02:45:12PM +0200, Rasmus Villemoes wrote: > On 06/04/2021 15.31, Andy Shevchenko wrote: > > kernel.h is being used as a dump for all kinds of stuff for a long time. > > Here is the attempt to start cleaning it up by splitting out panic and > > o

Re: [PATCH v1 1/1] kernel.h: Split out panic and oops helpers

2021-04-08 Thread Rasmus Villemoes
On 06/04/2021 15.31, Andy Shevchenko wrote: > kernel.h is being used as a dump for all kinds of stuff for a long time. > Here is the attempt to start cleaning it up by splitting out panic and > oops helpers. Yay. Acked-by: Rasmus Villemoes > At the same time convert users in he

Re: [PATCH v1 1/1] kernel.h: Split out panic and oops helpers

2021-04-07 Thread Luis Chamberlain
On Wed, Apr 07, 2021 at 05:59:19PM +0300, Andy Shevchenko wrote: > On Wed, Apr 7, 2021 at 5:30 PM Luis Chamberlain wrote: > > On Wed, Apr 07, 2021 at 10:33:44AM +0300, Andy Shevchenko wrote: > > > On Wed, Apr 7, 2021 at 10:25 AM Luis Chamberlain > > > wrote: > > > > On Tue, Apr 06, 2021 at

Re: [PATCH v1 1/1] kernel.h: Split out panic and oops helpers

2021-04-07 Thread Andy Shevchenko
On Wed, Apr 7, 2021 at 5:30 PM Luis Chamberlain wrote: > On Wed, Apr 07, 2021 at 10:33:44AM +0300, Andy Shevchenko wrote: > > On Wed, Apr 7, 2021 at 10:25 AM Luis Chamberlain wrote: > > > On Tue, Apr 06, 2021 at 04:31:58PM +0300, Andy Shevchenko wrote: ... > > > Why is it worth it to add

Re: [PATCH v1 1/1] kernel.h: Split out panic and oops helpers

2021-04-07 Thread Luis Chamberlain
On Wed, Apr 07, 2021 at 10:33:44AM +0300, Andy Shevchenko wrote: > On Wed, Apr 7, 2021 at 10:25 AM Luis Chamberlain wrote: > > > > On Tue, Apr 06, 2021 at 04:31:58PM +0300, Andy Shevchenko wrote: > > > diff --git a/include/linux/panic_notifier.h > > > b/include/linux/panic_notifier.h > > > new

Re: [PATCH v1 1/1] kernel.h: Split out panic and oops helpers

2021-04-07 Thread Andy Shevchenko
On Wed, Apr 7, 2021 at 11:17 AM Kees Cook wrote: > > On Tue, Apr 06, 2021 at 04:31:58PM +0300, Andy Shevchenko wrote: > > kernel.h is being used as a dump for all kinds of stuff for a long time. > > Here is the attempt to start cleaning it up by splitting out panic an

Re: [PATCH v1 1/1] kernel.h: Split out panic and oops helpers

2021-04-07 Thread Andy Shevchenko
On Wed, Apr 7, 2021 at 10:25 AM Luis Chamberlain wrote: > > On Tue, Apr 06, 2021 at 04:31:58PM +0300, Andy Shevchenko wrote: > > diff --git a/include/linux/panic_notifier.h b/include/linux/panic_notifier.h > > new file mode 100644 > > index ..41e32483d7a7 > > --- /dev/null > > +++

Re: [PATCH v1 1/1] kernel.h: Split out panic and oops helpers

2021-04-06 Thread Wei Liu
On Tue, Apr 06, 2021 at 04:31:58PM +0300, Andy Shevchenko wrote: > kernel.h is being used as a dump for all kinds of stuff for a long time. > Here is the attempt to start cleaning it up by splitting out panic and > oops helpers. > > At the same time convert users in header and li

Re: [PATCH v1 1/1] kernel.h: Split out panic and oops helpers

2021-04-06 Thread Kees Cook
On Tue, Apr 06, 2021 at 04:31:58PM +0300, Andy Shevchenko wrote: > kernel.h is being used as a dump for all kinds of stuff for a long time. > Here is the attempt to start cleaning it up by splitting out panic and > oops helpers. > > At the same time convert users in header and li

Re: [PATCH v1 1/1] kernel.h: Split out panic and oops helpers

2021-04-06 Thread Luis Chamberlain
On Tue, Apr 06, 2021 at 04:31:58PM +0300, Andy Shevchenko wrote: > diff --git a/include/linux/panic_notifier.h b/include/linux/panic_notifier.h > new file mode 100644 > index ..41e32483d7a7 > --- /dev/null > +++ b/include/linux/panic_notifier.h > @@ -0,0 +1,12 @@ > +/*

Re: [PATCH v1 1/1] kernel.h: Split out panic and oops helpers

2021-04-06 Thread Arnd Bergmann
On Tue, Apr 6, 2021 at 3:31 PM Andy Shevchenko wrote: > > kernel.h is being used as a dump for all kinds of stuff for a long time. > Here is the attempt to start cleaning it up by splitting out panic and > oops helpers. > > At the same time convert users in header and lib folder

Re: [PATCH v1 1/1] kernel.h: Split out panic and oops helpers

2021-04-06 Thread Christian Brauner
On Tue, Apr 06, 2021 at 04:31:58PM +0300, Andy Shevchenko wrote: > kernel.h is being used as a dump for all kinds of stuff for a long time. > Here is the attempt to start cleaning it up by splitting out panic and > oops helpers. > > At the same time convert users in header and li

Re: [PATCH v1 1/1] kernel.h: Split out panic and oops helpers

2021-04-06 Thread Mike Rapoport
On Tue, Apr 06, 2021 at 04:31:58PM +0300, Andy Shevchenko wrote: > kernel.h is being used as a dump for all kinds of stuff for a long time. > Here is the attempt to start cleaning it up by splitting out panic and > oops helpers. > > At the same time convert users in header and li

Re: [PATCH v1 1/1] kernel.h: Split out panic and oops helpers

2021-04-06 Thread Corey Minyard
On Tue, Apr 06, 2021 at 04:31:58PM +0300, Andy Shevchenko wrote: > kernel.h is being used as a dump for all kinds of stuff for a long time. > Here is the attempt to start cleaning it up by splitting out panic and > oops helpers. > > At the same time convert users in header and li

Re: [PATCH v1 1/1] kernel.h: Split out panic and oops helpers

2021-04-06 Thread Bjorn Andersson
On Tue 06 Apr 08:31 CDT 2021, Andy Shevchenko wrote: > kernel.h is being used as a dump for all kinds of stuff for a long time. > Here is the attempt to start cleaning it up by splitting out panic and > oops helpers. > > At the same time convert users in header and lib folder to

[PATCH v1 1/1] kernel.h: Split out panic and oops helpers

2021-04-06 Thread Andy Shevchenko
kernel.h is being used as a dump for all kinds of stuff for a long time. Here is the attempt to start cleaning it up by splitting out panic and oops helpers. At the same time convert users in header and lib folder to use new header. Though for time being include new header back to kernel.h

Re: [BUG] Oops in sidtab_context_to_sid

2021-04-05 Thread Vijay Balakrishna
On 4/3/2021 8:21 AM, Ondrej Mosnacek wrote: On Sat, Apr 3, 2021 at 4:33 PM Paul Moore wrote: On Fri, Apr 2, 2021 at 6:35 PM Vijay Balakrishna wrote: Seeing oops in 5.4.83 sidtab_context_to_sid(). I checked with Tyler (copied), he said it might be https://lore.kernel.org/selinux

Re: [BUG] Oops in sidtab_context_to_sid

2021-04-03 Thread Paul Moore
On Sat, Apr 3, 2021 at 11:21 AM Ondrej Mosnacek wrote: > On Sat, Apr 3, 2021 at 4:33 PM Paul Moore wrote: > > On Fri, Apr 2, 2021 at 6:35 PM Vijay Balakrishna > > wrote: > > > > > > Seeing oops in 5.4.83 sidtab_context_to_sid(). I checked with Tyler

Re: [BUG] Oops in sidtab_context_to_sid

2021-04-03 Thread Ondrej Mosnacek
On Sat, Apr 3, 2021 at 4:33 PM Paul Moore wrote: > On Fri, Apr 2, 2021 at 6:35 PM Vijay Balakrishna > wrote: > > > > Seeing oops in 5.4.83 sidtab_context_to_sid(). I checked with Tyler > > (copied), he said it might be > > >

Re: [BUG] Oops in sidtab_context_to_sid

2021-04-03 Thread Paul Moore
On Fri, Apr 2, 2021 at 6:35 PM Vijay Balakrishna wrote: > > Seeing oops in 5.4.83 sidtab_context_to_sid(). I checked with Tyler > (copied), he said it might be > > https://lore.kernel.org/selinux/CAFqZXNu8s5edDbSZuSutetTsy58i08vPuP2h-n9=kt34hcp...@mail.gmail.com/ > > On

Re: [PATCH v2] powerpc/signal32: Fix Oops on sigreturn with unmapped VDSO

2021-04-03 Thread Michael Ellerman
ata access on read at 0x7fc07ec0 > Faulting instruction address: 0xc00111d4 > Oops: Kernel access of bad area, sig: 11 [#1] > BE PAGE_SIZE=16K PREEMPT CMPC885 > CPU: 0 PID: 353 Comm: sigreturn_vdso Not tainted > 5.12.0-rc4-s3k-dev-01553-gb30c310ea220 #4814 >

[PATCH v2] powerpc/signal32: Fix Oops on sigreturn with unmapped VDSO

2021-03-31 Thread Christophe Leroy
PPC32 encounters a KUAP fault when trying to handle a signal with VDSO unmapped. Kernel attempted to read user page (7fc07ec0) - exploit attempt? (uid: 0) BUG: Unable to handle kernel data access on read at 0x7fc07ec0 Faulting instruction address: 0xc00111d4 Oops

Re: [PATCH] powerpc/signal32: Fix Oops on sigreturn with unmapped VDSO

2021-03-31 Thread Michael Ellerman
Faulting instruction address: 0xc00111d4 > Oops: Kernel access of bad area, sig: 11 [#1] > BE PAGE_SIZE=16K PREEMPT CMPC885 > CPU: 0 PID: 353 Comm: sigreturn_vdso Not tainted > 5.12.0-rc4-s3k-dev-01553-gb30c310ea220 #4814 > NIP: c00111d4 LR: c0005a28 CTR:

[PATCH next 2/2] usb: xhci-mtk: fix oops when unbind driver

2021-03-31 Thread Chunfeng Yun
The oops happens when unbind driver through sysfs as following, because xhci_mtk_drop_ep() try to drop the endpoint of root hub which is not added by xhci_add_endpoint() and the virtual device is not allocated, in fact also needn't drop it, so should skip it. Call trace: xhci_mtk_drop_ep+0x1b8

Re: [PATCH 2/2] mtd: rawnand: brcmnand: move to polling in pio mode on oops write

2021-03-28 Thread Miquel Raynal
On Thu, 2021-03-11 at 17:09:09 UTC, Kamal Dasu wrote: > This change makes sure that Broadcom NAND driver moves to interrupt > polling on the first brcmnand_write() call. > > Signed-off-by: Kamal Dasu Applied to https://git.kernel.org/pub/scm/linux/kernel/git/mtd/linux.git nand/next, thanks.

[PATCH] powerpc/signal32: Fix Oops on sigreturn with unmapped VDSO

2021-03-28 Thread Christophe Leroy
PPC32 encounters a KUAP fault when trying to handle a signal with VDSO unmapped. Kernel attempted to read user page (7fc07ec0) - exploit attempt? (uid: 0) BUG: Unable to handle kernel data access on read at 0x7fc07ec0 Faulting instruction address: 0xc00111d4 Oops

Re: [GIT PULL] afs: Fix oops and confusion from metadata xattrs

2021-03-15 Thread pr-tracker-bot
The pull request you sent on Mon, 15 Mar 2021 17:24:53 +: > git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git > tags/afs-fixes-20210315 has been merged into torvalds/linux.git: https://git.kernel.org/torvalds/c/1a4431a5db2bf800c647ee0ed87f2727b8d6c29c Thank you! --

[GIT PULL] afs: Fix oops and confusion from metadata xattrs

2021-03-15 Thread David Howells
Hi Linus, Can you pull these two fixes to the afs filesystem please? (1) Fix an oops in AFS that can be triggered by accessing one of the afs.yfs.* xattrs against an OpenAFS server - for instance by "cp -a"[1], "rsync -X" or getfattr[2]. These try and copy al

[PATCH 2/2] mtd: rawnand: brcmnand: move to polling in pio mode on oops write

2021-03-11 Thread Kamal Dasu
This change makes sure that Broadcom NAND driver moves to interrupt polling on the first brcmnand_write() call. Signed-off-by: Kamal Dasu --- drivers/mtd/nand/raw/brcmnand/brcmnand.c | 4 1 file changed, 4 insertions(+) diff --git a/drivers/mtd/nand/raw/brcmnand/brcmnand.c

[PATCH 5.11 745/775] sparc32: fix a user-triggerable oops in clear_user()

2021-03-01 Thread Greg Kroah-Hartman
() starting at 128*n bytes before the end of page and spanning between 8 and 127 bytes into the next page would oops when the second page is unmapped. It's trivial to reproduce - all it takes is main() { int fd = open("/dev/zero", O_RDONLY); char *p = mmap(NULL, 16384, PROT_READ|

[PATCH 5.4 318/340] sparc32: fix a user-triggerable oops in clear_user()

2021-03-01 Thread Greg Kroah-Hartman
() starting at 128*n bytes before the end of page and spanning between 8 and 127 bytes into the next page would oops when the second page is unmapped. It's trivial to reproduce - all it takes is main() { int fd = open("/dev/zero", O_RDONLY); char *p = mmap(NULL, 16384, PROT_READ|

[PATCH 5.10 634/663] sparc32: fix a user-triggerable oops in clear_user()

2021-03-01 Thread Greg Kroah-Hartman
() starting at 128*n bytes before the end of page and spanning between 8 and 127 bytes into the next page would oops when the second page is unmapped. It's trivial to reproduce - all it takes is main() { int fd = open("/dev/zero", O_RDONLY); char *p = mmap(NULL, 16384, PROT_READ|

[PATCH 4.19 230/247] sparc32: fix a user-triggerable oops in clear_user()

2021-03-01 Thread Greg Kroah-Hartman
() starting at 128*n bytes before the end of page and spanning between 8 and 127 bytes into the next page would oops when the second page is unmapped. It's trivial to reproduce - all it takes is main() { int fd = open("/dev/zero", O_RDONLY); char *p = mmap(NULL, 16384, PROT_READ|

[PATCH 4.14 162/176] sparc32: fix a user-triggerable oops in clear_user()

2021-03-01 Thread Greg Kroah-Hartman
() starting at 128*n bytes before the end of page and spanning between 8 and 127 bytes into the next page would oops when the second page is unmapped. It's trivial to reproduce - all it takes is main() { int fd = open("/dev/zero", O_RDONLY); char *p = mmap(NULL, 16384, PROT_READ|

[PATCH 4.9 118/134] sparc32: fix a user-triggerable oops in clear_user()

2021-03-01 Thread Greg Kroah-Hartman
() starting at 128*n bytes before the end of page and spanning between 8 and 127 bytes into the next page would oops when the second page is unmapped. It's trivial to reproduce - all it takes is main() { int fd = open("/dev/zero", O_RDONLY); char *p = mmap(NULL, 16384, PROT_READ|

[PATCH 4.4 84/93] sparc32: fix a user-triggerable oops in clear_user()

2021-03-01 Thread Greg Kroah-Hartman
() starting at 128*n bytes before the end of page and spanning between 8 and 127 bytes into the next page would oops when the second page is unmapped. It's trivial to reproduce - all it takes is main() { int fd = open("/dev/zero", O_RDONLY); char *p = mmap(NULL, 16384, PROT_READ|

[PATCH 4.19 15/50] ARM: kexec: fix oops after TLB are invalidated

2021-02-22 Thread Greg Kroah-Hartman
From: Russell King [ Upstream commit 4d62e81b60d4025e2dfcd5ea531cc1394ce9226f ] Giancarlo Ferrari reports the following oops while trying to use kexec: Unable to handle kernel paging request at virtual address 80112f38 pgd = fd7ef03e [80112f38] *pgd=0001141e(bad) Internal error: Oops: 80d

Re: [PATCH] iio: chemical: scd30: fix Oops due to missing parent device

2021-02-19 Thread Petr Štetiar
Jonathan Cameron [2021-02-12 19:12:19]: Hi Jonathan, > > CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.4.96+ #473 > > So, we moved this into the core a while back (to avoid exactly this sort of > issue). > That change predates this introduction of this driver as it went in > in v5.8 sorry for

[PATCH 5.10 042/104] ARM: kexec: fix oops after TLB are invalidated

2021-02-15 Thread Greg Kroah-Hartman
From: Russell King [ Upstream commit 4d62e81b60d4025e2dfcd5ea531cc1394ce9226f ] Giancarlo Ferrari reports the following oops while trying to use kexec: Unable to handle kernel paging request at virtual address 80112f38 pgd = fd7ef03e [80112f38] *pgd=0001141e(bad) Internal error: Oops: 80d

[PATCH 5.10 028/104] scsi: lpfc: Fix EEH encountering oops with NVMe traffic

2021-02-15 Thread Greg Kroah-Hartman
From: James Smart [ Upstream commit 8c65830ae1629b03e5d65e9aafae7e2cf5f8b743 ] In testing, in a configuration with Redfish and native NVMe multipath when an EEH is injected, a kernel oops is being encountered: (unreliable) lpfc_nvme_ls_req+0x328/0x720 [lpfc] __nvme_fc_send_ls_req.constprop.13

[PATCH 5.4 23/60] ARM: kexec: fix oops after TLB are invalidated

2021-02-15 Thread Greg Kroah-Hartman
From: Russell King [ Upstream commit 4d62e81b60d4025e2dfcd5ea531cc1394ce9226f ] Giancarlo Ferrari reports the following oops while trying to use kexec: Unable to handle kernel paging request at virtual address 80112f38 pgd = fd7ef03e [80112f38] *pgd=0001141e(bad) Internal error: Oops: 80d

Re: [PATCH] iio: chemical: scd30: fix Oops due to missing parent device

2021-02-12 Thread Jonathan Cameron
On Mon, 8 Feb 2021 23:39:47 +0100 Petr Štetiar wrote: > My machine Oopsed while testing SCD30 sensor in interrupt driven mode: > > Unable to handle kernel NULL pointer dereference at virtual address 0188 > pgd = (ptrval) > [0188] *pgd= > Internal error: Oo

[tip: x86/mm] x86/fault: Split the OOPS code out from no_context()

2021-02-10 Thread tip-bot2 for Andy Lutomirski
: Borislav Petkov CommitterDate: Wed, 10 Feb 2021 14:33:36 +01:00 x86/fault: Split the OOPS code out from no_context() Not all callers of no_context() want to run exception fixups. Separate the OOPS code out from the fixup code in no_context(). Signed-off-by: Andy Lutomirski Signed-off

[PATCH v2 09/14] x86/fault: Split the OOPS code out from no_context()

2021-02-09 Thread Andy Lutomirski
Not all callers of no_context() want to run exception fixups. Separate the OOPS code out from the fixup code in no_context(). Cc: Dave Hansen Cc: Peter Zijlstra Signed-off-by: Andy Lutomirski --- arch/x86/mm/fault.c | 116 +++- 1 file changed, 62

Re: [PATCH 07/11] x86/fault: Split the OOPS code out from no_context()

2021-02-09 Thread Andy Lutomirski
On Wed, Feb 3, 2021 at 10:56 AM Borislav Petkov wrote: > > On Sun, Jan 31, 2021 at 09:24:38AM -0800, Andy Lutomirski wrote: > > Not all callers of no_context() want to run exception fixups. > > Separate the OOPS code out from the fixup code in no_context(). > > > >

[PATCH] iio: chemical: scd30: fix Oops due to missing parent device

2021-02-08 Thread Petr Štetiar
My machine Oopsed while testing SCD30 sensor in interrupt driven mode: Unable to handle kernel NULL pointer dereference at virtual address 0188 pgd = (ptrval) [0188] *pgd= Internal error: Oops: 5 [#1] SMP ARM Modules linked in: CPU: 0 PID: 1 Comm: swapper/0 Not tainted

[PATCH AUTOSEL 4.19 13/14] ARM: kexec: fix oops after TLB are invalidated

2021-02-08 Thread Sasha Levin
From: Russell King [ Upstream commit 4d62e81b60d4025e2dfcd5ea531cc1394ce9226f ] Giancarlo Ferrari reports the following oops while trying to use kexec: Unable to handle kernel paging request at virtual address 80112f38 pgd = fd7ef03e [80112f38] *pgd=0001141e(bad) Internal error: Oops: 80d

[PATCH AUTOSEL 5.4 18/19] ARM: kexec: fix oops after TLB are invalidated

2021-02-08 Thread Sasha Levin
From: Russell King [ Upstream commit 4d62e81b60d4025e2dfcd5ea531cc1394ce9226f ] Giancarlo Ferrari reports the following oops while trying to use kexec: Unable to handle kernel paging request at virtual address 80112f38 pgd = fd7ef03e [80112f38] *pgd=0001141e(bad) Internal error: Oops: 80d

[PATCH AUTOSEL 5.10 31/36] ARM: kexec: fix oops after TLB are invalidated

2021-02-08 Thread Sasha Levin
From: Russell King [ Upstream commit 4d62e81b60d4025e2dfcd5ea531cc1394ce9226f ] Giancarlo Ferrari reports the following oops while trying to use kexec: Unable to handle kernel paging request at virtual address 80112f38 pgd = fd7ef03e [80112f38] *pgd=0001141e(bad) Internal error: Oops: 80d

[PATCH AUTOSEL 5.10 17/36] scsi: lpfc: Fix EEH encountering oops with NVMe traffic

2021-02-08 Thread Sasha Levin
From: James Smart [ Upstream commit 8c65830ae1629b03e5d65e9aafae7e2cf5f8b743 ] In testing, in a configuration with Redfish and native NVMe multipath when an EEH is injected, a kernel oops is being encountered: (unreliable) lpfc_nvme_ls_req+0x328/0x720 [lpfc] __nvme_fc_send_ls_req.constprop.13

Re: [PATCH 07/11] x86/fault: Split the OOPS code out from no_context()

2021-02-03 Thread Borislav Petkov
going to oops anyway... -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette

Re: [PATCH 07/11] x86/fault: Split the OOPS code out from no_context()

2021-02-03 Thread Andy Lutomirski
> On Feb 3, 2021, at 10:56 AM, Borislav Petkov wrote: > > On Sun, Jan 31, 2021 at 09:24:38AM -0800, Andy Lutomirski wrote: >> Not all callers of no_context() want to run exception fixups. >> Separate the OOPS code out from the fixup code in no_context(). >> >&

Re: [PATCH 07/11] x86/fault: Split the OOPS code out from no_context()

2021-02-03 Thread Borislav Petkov
On Sun, Jan 31, 2021 at 09:24:38AM -0800, Andy Lutomirski wrote: > Not all callers of no_context() want to run exception fixups. > Separate the OOPS code out from the fixup code in no_context(). > > Cc: Dave Hansen > Cc: Peter Zijlstra > Signed-off-by: Andy Lutomirski &g

[PATCH 5.10 094/142] ASoC: Intel: Skylake: skl-topology: Fix OOPs ib skl_tplg_complete

2021-02-02 Thread Greg Kroah-Hartman
From: Ricardo Ribalda [ Upstream commit c1c3ba1f78354a20222d291ed6fedd17b7a74fd7 ] If dobj->control is not initialized we end up in an OOPs during skl_tplg_complete: [ 26.553358] BUG: kernel NULL pointer dereference, address: 0078 [ 26.561151] #PF: supervisor read acc

[PATCH 5.10 078/142] xfrm: Fix oops in xfrm_replay_advance_bmp

2021-02-02 Thread Greg Kroah-Hartman
in kernel mode #PF: error_code(0x0002) - not-present page PGD ad001067 P4D ad001067 PUD 0 Oops: 0002 [#1] SMP PTI CPU: 3 PID: 30 Comm: ksoftirqd/3 Kdump: loaded Not tainted 5.4.52-050452-generic #202007160732 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014

[PATCH 5.4 33/61] xfrm: Fix oops in xfrm_replay_advance_bmp

2021-02-02 Thread Greg Kroah-Hartman
in kernel mode #PF: error_code(0x0002) - not-present page PGD ad001067 P4D ad001067 PUD 0 Oops: 0002 [#1] SMP PTI CPU: 3 PID: 30 Comm: ksoftirqd/3 Kdump: loaded Not tainted 5.4.52-050452-generic #202007160732 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014

[PATCH 4.4 21/28] xfrm: Fix oops in xfrm_replay_advance_bmp

2021-02-02 Thread Greg Kroah-Hartman
in kernel mode #PF: error_code(0x0002) - not-present page PGD ad001067 P4D ad001067 PUD 0 Oops: 0002 [#1] SMP PTI CPU: 3 PID: 30 Comm: ksoftirqd/3 Kdump: loaded Not tainted 5.4.52-050452-generic #202007160732 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014

[PATCH 4.9 23/32] xfrm: Fix oops in xfrm_replay_advance_bmp

2021-02-02 Thread Greg Kroah-Hartman
in kernel mode #PF: error_code(0x0002) - not-present page PGD ad001067 P4D ad001067 PUD 0 Oops: 0002 [#1] SMP PTI CPU: 3 PID: 30 Comm: ksoftirqd/3 Kdump: loaded Not tainted 5.4.52-050452-generic #202007160732 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014

[PATCH 4.14 17/30] xfrm: Fix oops in xfrm_replay_advance_bmp

2021-02-02 Thread Greg Kroah-Hartman
in kernel mode #PF: error_code(0x0002) - not-present page PGD ad001067 P4D ad001067 PUD 0 Oops: 0002 [#1] SMP PTI CPU: 3 PID: 30 Comm: ksoftirqd/3 Kdump: loaded Not tainted 5.4.52-050452-generic #202007160732 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014

[PATCH 4.19 22/37] xfrm: Fix oops in xfrm_replay_advance_bmp

2021-02-02 Thread Greg Kroah-Hartman
in kernel mode #PF: error_code(0x0002) - not-present page PGD ad001067 P4D ad001067 PUD 0 Oops: 0002 [#1] SMP PTI CPU: 3 PID: 30 Comm: ksoftirqd/3 Kdump: loaded Not tainted 5.4.52-050452-generic #202007160732 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014

Re: [PATCH] ceph: Fix an Oops in error handling

2021-02-02 Thread Dan Carpenter
On Tue, Feb 02, 2021 at 07:37:57AM -0500, Jeff Layton wrote: > On Tue, 2021-02-02 at 08:47 +0300, Dan Carpenter wrote: > > The "req" pointer is an error pointer and not NULL so this check needs > > to be fixed. > > > > Fixes: 1cf7fdf52d5a ("ceph: convert readpage to fscache read helper") > >

Re: [PATCH] ceph: fix an oops in error handling in ceph_netfs_issue_op

2021-02-02 Thread Dan Carpenter
On Tue, Feb 02, 2021 at 08:10:41AM -0500, Jeff Layton wrote: > Dan reported a potential oops in the cleanup if ceph_osdc_new_request > returns an error. Eliminate the unneeded initialization of "req" and > then just set it to NULL in the case where it holds an ERR_PTR. > >

[PATCH 5.4 41/61] ASoC: Intel: Skylake: skl-topology: Fix OOPs ib skl_tplg_complete

2021-02-02 Thread Greg Kroah-Hartman
From: Ricardo Ribalda [ Upstream commit c1c3ba1f78354a20222d291ed6fedd17b7a74fd7 ] If dobj->control is not initialized we end up in an OOPs during skl_tplg_complete: [ 26.553358] BUG: kernel NULL pointer dereference, address: 0078 [ 26.561151] #PF: supervisor read acc

[PATCH] ceph: fix an oops in error handling in ceph_netfs_issue_op

2021-02-02 Thread Jeff Layton
Dan reported a potential oops in the cleanup if ceph_osdc_new_request returns an error. Eliminate the unneeded initialization of "req" and then just set it to NULL in the case where it holds an ERR_PTR. Also, drop the unneeded NULL check before calling ceph_osdc_put_request. Fixes: 1c

Re: [PATCH] ceph: Fix an Oops in error handling

2021-02-02 Thread Jeff Layton
On Tue, 2021-02-02 at 08:47 +0300, Dan Carpenter wrote: > The "req" pointer is an error pointer and not NULL so this check needs > to be fixed. > > Fixes: 1cf7fdf52d5a ("ceph: convert readpage to fscache read helper") > Signed-off-by: Dan Carpenter > --- >  fs/ceph/addr.c | 2 +- >  1 file

Re: [PATCH] ceph: Fix an Oops in error handling

2021-02-02 Thread Ilya Dryomov
On Tue, Feb 2, 2021 at 6:47 AM Dan Carpenter wrote: > > The "req" pointer is an error pointer and not NULL so this check needs > to be fixed. > > Fixes: 1cf7fdf52d5a ("ceph: convert readpage to fscache read helper") > Signed-off-by: Dan Carpenter > --- > fs/ceph/addr.c | 2 +- > 1 file changed,

[PATCH] ceph: Fix an Oops in error handling

2021-02-01 Thread Dan Carpenter
The "req" pointer is an error pointer and not NULL so this check needs to be fixed. Fixes: 1cf7fdf52d5a ("ceph: convert readpage to fscache read helper") Signed-off-by: Dan Carpenter --- fs/ceph/addr.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/ceph/addr.c

[PATCH 07/11] x86/fault: Split the OOPS code out from no_context()

2021-01-31 Thread Andy Lutomirski
Not all callers of no_context() want to run exception fixups. Separate the OOPS code out from the fixup code in no_context(). Cc: Dave Hansen Cc: Peter Zijlstra Signed-off-by: Andy Lutomirski --- arch/x86/mm/fault.c | 116 +++- 1 file changed, 62

[PATCH 5.10 121/199] proc_sysctl: fix oops caused by incorrect command parameters

2021-01-25 Thread Greg Kroah-Hartman
From: Xiaoming Ni commit 697edcb0e4eadc41645fe88c991fe6a206b1a08d upstream. The process_sysctl_arg() does not check whether val is empty before invoking strlen(val). If the command line parameter () is incorrectly configured and val is empty, oops is triggered. For example: "hung_task_

Re: rcu-torture: Internal error: Oops: 96000006

2021-01-22 Thread Paul E. McKenney
On Fri, Jan 22, 2021 at 09:16:38PM +0530, Naresh Kamboju wrote: > On Fri, 22 Jan 2021 at 21:07, Paul E. McKenney wrote: > > > > On Fri, Jan 22, 2021 at 03:21:07PM +0530, Naresh Kamboju wrote: > > > On Fri, 22 Jan 2021 at 03:13, Paul E. McKenney wrote: > > > > > > > > On Thu, Jan 21, 2021 at

Re: rcu-torture: Internal error: Oops: 96000006

2021-01-22 Thread Naresh Kamboju
On Fri, 22 Jan 2021 at 21:07, Paul E. McKenney wrote: > > On Fri, Jan 22, 2021 at 03:21:07PM +0530, Naresh Kamboju wrote: > > On Fri, 22 Jan 2021 at 03:13, Paul E. McKenney wrote: > > > > > > On Thu, Jan 21, 2021 at 09:31:10PM +, Will Deacon wrote: > > > > On Thu, Jan 21, 2021 at 10:55:21AM

Re: rcu-torture: Internal error: Oops: 96000006

2021-01-22 Thread Paul E. McKenney
On Fri, Jan 22, 2021 at 03:21:07PM +0530, Naresh Kamboju wrote: > On Fri, 22 Jan 2021 at 03:13, Paul E. McKenney wrote: > > > > On Thu, Jan 21, 2021 at 09:31:10PM +, Will Deacon wrote: > > > On Thu, Jan 21, 2021 at 10:55:21AM -0800, Paul E. McKenney wrote: > > > > On Thu, Jan 21, 2021 at

Re: rcu-torture: Internal error: Oops: 96000006

2021-01-22 Thread Vincenzo Frascino
On 1/22/21 10:02 AM, Mark Rutland wrote: > On Thu, Jan 21, 2021 at 01:43:14PM -0800, Paul E. McKenney wrote: >> On Thu, Jan 21, 2021 at 09:31:10PM +, Will Deacon wrote: >>> On Thu, Jan 21, 2021 at 10:55:21AM -0800, Paul E. McKenney wrote: On Thu, Jan 21, 2021 at 10:37:21PM +0530,

Re: rcu-torture: Internal error: Oops: 96000006

2021-01-22 Thread Mark Rutland
On Thu, Jan 21, 2021 at 01:43:14PM -0800, Paul E. McKenney wrote: > On Thu, Jan 21, 2021 at 09:31:10PM +, Will Deacon wrote: > > On Thu, Jan 21, 2021 at 10:55:21AM -0800, Paul E. McKenney wrote: > > > On Thu, Jan 21, 2021 at 10:37:21PM +0530, Naresh Kamboju wrote: > > > > While running

Re: rcu-torture: Internal error: Oops: 96000006

2021-01-22 Thread Naresh Kamboju
On Fri, 22 Jan 2021 at 03:13, Paul E. McKenney wrote: > > On Thu, Jan 21, 2021 at 09:31:10PM +, Will Deacon wrote: > > On Thu, Jan 21, 2021 at 10:55:21AM -0800, Paul E. McKenney wrote: > > > On Thu, Jan 21, 2021 at 10:37:21PM +0530, Naresh Kamboju wrote: > > > > While running rcu-torture test

Re: rcu-torture: Internal error: Oops: 96000006

2021-01-21 Thread Paul E. McKenney
On Thu, Jan 21, 2021 at 09:31:10PM +, Will Deacon wrote: > On Thu, Jan 21, 2021 at 10:55:21AM -0800, Paul E. McKenney wrote: > > On Thu, Jan 21, 2021 at 10:37:21PM +0530, Naresh Kamboju wrote: > > > While running rcu-torture test on qemu_arm64 and arm64 Juno-r2 device > > > the following

Re: rcu-torture: Internal error: Oops: 96000006

2021-01-21 Thread Will Deacon
On Thu, Jan 21, 2021 at 10:55:21AM -0800, Paul E. McKenney wrote: > On Thu, Jan 21, 2021 at 10:37:21PM +0530, Naresh Kamboju wrote: > > While running rcu-torture test on qemu_arm64 and arm64 Juno-r2 device > > the following kernel crash noticed. This started happening from Linux next > >

Re: [PATCH v2 1/2] ASoC: Intel: Skylake: skl-topology: Fix OOPs ib skl_tplg_complete

2021-01-21 Thread Mark Brown
On Thu, 21 Jan 2021 18:16:43 +0100, Ricardo Ribalda wrote: > If dobj->control is not initialized we end up in an OOPs during > skl_tplg_complete: > > [ 26.553358] BUG: kernel NULL pointer dereference, address: > 0078 > [ 26.561151] #PF: supervisor read

Re: rcu-torture: Internal error: Oops: 96000006

2021-01-21 Thread Paul E. McKenney
nR = 0 > [ 621.569571] user pgtable: 4k pages, 48-bit VAs, pgdp=000101ef > [ 621.572446] [0008] pgd=000102ee1003, > p4d=000102ee1003, pud=000100b25003, pmd= > [ 621.577007] Internal error: Oops: 9606 [#1] PREEMPT SMP > [ 621.579359] Modul

[PATCH v3 1/2] ASoC: Intel: Skylake: skl-topology: Fix OOPs ib skl_tplg_complete

2021-01-21 Thread Ricardo Ribalda
If dobj->control is not initialized we end up in an OOPs during skl_tplg_complete: [ 26.553358] BUG: kernel NULL pointer dereference, address: 0078 [ 26.561151] #PF: supervisor read access in kernel mode [ 26.566897] #PF: error_code(0x) - not-present page [ 26.572642]

Re: [PATCH v2 1/2] ASoC: Intel: Skylake: skl-topology: Fix OOPs ib skl_tplg_complete

2021-01-21 Thread Andy Shevchenko
On Thu, Jan 21, 2021 at 06:16:43PM +0100, Ricardo Ribalda wrote: > If dobj->control is not initialized we end up in an OOPs during > skl_tplg_complete: > > [ 26.553358] BUG: kernel NULL pointer dereference, address: > 0078 > [ 26.561151] #PF: supervisor read

Re: [PATCH v2 1/2] ASoC: Intel: Skylake: skl-topology: Fix OOPs ib skl_tplg_complete

2021-01-21 Thread Łukasz Majczak
Thanks Ricardo - I have checked it on Eve/Google Pixelbook Tested-by: Lukasz Majczak czw., 21 sty 2021 o 18:33 Rojewski, Cezary napisał(a): > > On 2021-01-21 6:16 PM, Ricardo Ribalda wrote: > > If dobj->control is not initialized we end up in an OOPs during > &

RE: [PATCH v2 1/2] ASoC: Intel: Skylake: skl-topology: Fix OOPs ib skl_tplg_complete

2021-01-21 Thread Rojewski, Cezary
On 2021-01-21 6:16 PM, Ricardo Ribalda wrote: > If dobj->control is not initialized we end up in an OOPs during > skl_tplg_complete: > > [ 26.553358] BUG: kernel NULL pointer dereference, address: > 0078 > [ 26.561151] #PF: supervisor read access in kernel

Re: [PATCH v2 1/2] ASoC: Intel: Skylake: skl-topology: Fix OOPs ib skl_tplg_complete

2021-01-21 Thread Ricardo Ribalda
Hi, This is just a v2 from my patch from December with the ={}: in a second patch. Best regards! On Thu, Jan 21, 2021 at 6:16 PM Ricardo Ribalda wrote: > > If dobj->control is not initialized we end up in an OOPs during > skl_tplg_complete: > > [ 26.553358] BUG: k

[PATCH v2 1/2] ASoC: Intel: Skylake: skl-topology: Fix OOPs ib skl_tplg_complete

2021-01-21 Thread Ricardo Ribalda
If dobj->control is not initialized we end up in an OOPs during skl_tplg_complete: [ 26.553358] BUG: kernel NULL pointer dereference, address: 0078 [ 26.561151] #PF: supervisor read access in kernel mode [ 26.566897] #PF: error_code(0x) - not-present page [ 26.572642]

rcu-torture: Internal error: Oops: 96000006

2021-01-21 Thread Naresh Kamboju
[ 621.577007] Internal error: Oops: 9606 [#1] PREEMPT SMP [ 621.579359] Modules linked in: rcutorture(-) torture rfkill crct10dif_ce fuse [ 621.582549] CPU: 2 PID: 422 Comm: rcu_torture_sta Not tainted 5.11.0-rc2-next-20210111 #2 [ 621.585294] Hardware name: linux,dummy-virt (DT) [ 621.586671] pstate

  1   2   3   4   5   6   7   8   9   10   >