4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Kamil Konieczny <k.koniec...@partner.samsung.com>
commit c927b080c67e3e97193c81fc1d27f4251bf4e036 upstream.
In AES-ECB mode crypt is done with key only, so any use of IV
can cause kerne
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Kamil Konieczny
commit c927b080c67e3e97193c81fc1d27f4251bf4e036 upstream.
In AES-ECB mode crypt is done with key only, so any use of IV
can cause kernel Oops. Use IV only in AES-CBC and AES
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: LEROY Christophe <christophe.le...@c-s.fr>
commit 87a81dce53b1ea61acaeefa5191a0376a2d1d721 upstream.
Performing the hash of an empty file leads to a kernel Oops
[ 44.504600]
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: LEROY Christophe
commit 87a81dce53b1ea61acaeefa5191a0376a2d1d721 upstream.
Performing the hash of an empty file leads to a kernel Oops
[ 44.504600] Unable to handle kernel paging request
4.15-stable review patch. If anyone has any objections, please let me know.
--
From: Kamil Konieczny <k.koniec...@partner.samsung.com>
commit c927b080c67e3e97193c81fc1d27f4251bf4e036 upstream.
In AES-ECB mode crypt is done with key only, so any use of IV
can cause kerne
4.15-stable review patch. If anyone has any objections, please let me know.
--
From: Kamil Konieczny
commit c927b080c67e3e97193c81fc1d27f4251bf4e036 upstream.
In AES-ECB mode crypt is done with key only, so any use of IV
can cause kernel Oops. Use IV only in AES-CBC and AES
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Kamil Konieczny <k.koniec...@partner.samsung.com>
commit c927b080c67e3e97193c81fc1d27f4251bf4e036 upstream.
In AES-ECB mode crypt is done with key only, so any use of IV
can cause kerne
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Kamil Konieczny
commit c927b080c67e3e97193c81fc1d27f4251bf4e036 upstream.
In AES-ECB mode crypt is done with key only, so any use of IV
can cause kernel Oops. Use IV only in AES-CBC and AES
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Ravi Bangoria
[ Upstream commit 5aa04b3eb6fca63d2e9827be656dcadc26d54e11 ]
When user tries to group imc (In-Memory Collections) event with
normal event,
4.4-stable review patch. If anyone has any objections, please let me know.
--
From: Ravi Bangoria
[ Upstream commit 5aa04b3eb6fca63d2e9827be656dcadc26d54e11 ]
When user tries to group imc (In-Memory Collections) event with
normal event, (sometime) kernel crashes with
Le 22/02/2018 à 09:30, Horia Geantă a écrit :
On 2/22/2018 9:08 AM, Christophe Leroy wrote:
Upstream 87a81dce53b1ea61acaeefa5191a0376a2d1d721
Performing the hash of an empty file leads to a kernel Oops
[ 44.504600] Unable to handle kernel paging request for data at address
0x000c
Le 22/02/2018 à 09:30, Horia Geantă a écrit :
On 2/22/2018 9:08 AM, Christophe Leroy wrote:
Upstream 87a81dce53b1ea61acaeefa5191a0376a2d1d721
Performing the hash of an empty file leads to a kernel Oops
[ 44.504600] Unable to handle kernel paging request for data at address
0x000c
On 2/22/2018 9:08 AM, Christophe Leroy wrote:
> Upstream 87a81dce53b1ea61acaeefa5191a0376a2d1d721
>
> Performing the hash of an empty file leads to a kernel Oops
>
> [ 44.504600] Unable to handle kernel paging request for data at address
> 0x000c
> [ 44.512819]
On 2/22/2018 9:08 AM, Christophe Leroy wrote:
> Upstream 87a81dce53b1ea61acaeefa5191a0376a2d1d721
>
> Performing the hash of an empty file leads to a kernel Oops
>
> [ 44.504600] Unable to handle kernel paging request for data at address
> 0x000c
> [ 44.512819]
Upstream 87a81dce53b1ea61acaeefa5191a0376a2d1d721
Performing the hash of an empty file leads to a kernel Oops
[ 44.504600] Unable to handle kernel paging request for data at address
0x000c
[ 44.512819] Faulting instruction address: 0xc02d2be8
[ 44.524088] Oops: Kernel access of bad
Upstream 87a81dce53b1ea61acaeefa5191a0376a2d1d721
Performing the hash of an empty file leads to a kernel Oops
[ 44.504600] Unable to handle kernel paging request for data at address
0x000c
[ 44.512819] Faulting instruction address: 0xc02d2be8
[ 44.524088] Oops: Kernel access of bad
passed, the ev_file pointer will be NULL. Using that pointer
to set the cq_context will result in an OOPs.
Verify that ev_file is not NULL before using.
Cc: <sta...@vger.kernel.org> # 4.14.x
Fixes: 9ee79fce3642 ("IB/core: Add completion queue (cq) object actions")
Reviewed-
will be NULL. Using that pointer
to set the cq_context will result in an OOPs.
Verify that ev_file is not NULL before using.
Cc: # 4.14.x
Fixes: 9ee79fce3642 ("IB/core: Add completion queue (cq) object actions")
Reviewed-by: Dennis Dalessandro
Reviewed-by: Ira Weiny
Signed-off-by: Michael J. Ru
passed, the ev_file pointer will be NULL. Using that pointer
to set the cq_context will result in an OOPs.
Verify that ev_file is not NULL before using.
Cc: <sta...@vger.kernel.org> # 4.14.x
Fixes: 9ee79fce3642 ("IB/core: Add completion queue (cq) object actions")
Reviewed-
will be NULL. Using that pointer
to set the cq_context will result in an OOPs.
Verify that ev_file is not NULL before using.
Cc: # 4.14.x
Fixes: 9ee79fce3642 ("IB/core: Add completion queue (cq) object actions")
Reviewed-by: Dennis Dalessandro
Reviewed-by: Ira Weiny
Signed-off-by: Michael J. Ru
Hi!
> On Mon, Feb 12, 2018 at 09:10:00PM +0100, Pavel Machek wrote:
> > Hi!
> >
> > During tethering, I got oops in ssi_stop_tx(), followed by failure of
> > GPRS. I used GPRS tethering a lot with some older kernel, and it was
> > stable for hours.
> >
Hi!
> On Mon, Feb 12, 2018 at 09:10:00PM +0100, Pavel Machek wrote:
> > Hi!
> >
> > During tethering, I got oops in ssi_stop_tx(), followed by failure of
> > GPRS. I used GPRS tethering a lot with some older kernel, and it was
> > stable for hours.
> >
issue?]
All fixups are in v4.15.
> On Mon 05-02-18 19:54:24, Abdul Haleem wrote:
> >
> > Greetings,
> >
> > Kernel Oops seen when memory hot-unplug on powerpc mainline kernel.
> >
> > Machine: Power6 PowerVM ppc64
> > Kernel: 4.15.0
> > Config:
issue?]
All fixups are in v4.15.
> On Mon 05-02-18 19:54:24, Abdul Haleem wrote:
> >
> > Greetings,
> >
> > Kernel Oops seen when memory hot-unplug on powerpc mainline kernel.
> >
> > Machine: Power6 PowerVM ppc64
> > Kernel: 4.15.0
> > Config:
[CC Kirill - I have a vague recollection that there were some follow ups
for 83e3c48729d9 ("mm/sparsemem: Allocate mem_section at runtime for
CONFIG_SPARSEMEM_EXTREME=y"). Does any of them apply to this issue?]
On Mon 05-02-18 19:54:24, Abdul Haleem wrote:
>
> Greetings,
>
[CC Kirill - I have a vague recollection that there were some follow ups
for 83e3c48729d9 ("mm/sparsemem: Allocate mem_section at runtime for
CONFIG_SPARSEMEM_EXTREME=y"). Does any of them apply to this issue?]
On Mon 05-02-18 19:54:24, Abdul Haleem wrote:
>
> Greetings,
>
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: LEROY Christophe <christophe.le...@c-s.fr>
commit 87a81dce53b1ea61acaeefa5191a0376a2d1d721 upstream.
Performing the hash of an empty file leads to a kernel Oops
[ 44.504600] Unable to
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: LEROY Christophe
commit 87a81dce53b1ea61acaeefa5191a0376a2d1d721 upstream.
Performing the hash of an empty file leads to a kernel Oops
[ 44.504600] Unable to handle kernel paging request
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: LEROY Christophe <christophe.le...@c-s.fr>
commit 87a81dce53b1ea61acaeefa5191a0376a2d1d721 upstream.
Performing the hash of an empty file leads to a kernel Oops
[ 44.504600]
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: LEROY Christophe
commit 87a81dce53b1ea61acaeefa5191a0376a2d1d721 upstream.
Performing the hash of an empty file leads to a kernel Oops
[ 44.504600] Unable to handle kernel paging request
On Wed, Feb 07, 2018 at 04:52:09PM +0100, Kamil Konieczny wrote:
> In AES-ECB mode crypt is done with key only, so any use of IV
> can cause kernel Oops. Use IV only in AES-CBC and AES-CTR.
>
> Signed-off-by: Kamil Konieczny <k.koniec...@partner.samsung.com>
> Reported-by:
On Wed, Feb 07, 2018 at 04:52:09PM +0100, Kamil Konieczny wrote:
> In AES-ECB mode crypt is done with key only, so any use of IV
> can cause kernel Oops. Use IV only in AES-CBC and AES-CTR.
>
> Signed-off-by: Kamil Konieczny
> Reported-by: Anand Moon
> Reviewed-by: Krzysztof K
On Mon, Feb 05, 2018 at 06:40:20PM +0100, Kamil Konieczny wrote:
>
> In AES-ECB mode crypt is done with key only, so any use of IV
> can cause kernel Oops, as reported by Anand Moon.
> Fixed it by using IV only in AES-CBC and AES-CTR.
>
> Signed-off-by: Kamil K
On Mon, Feb 05, 2018 at 06:40:20PM +0100, Kamil Konieczny wrote:
>
> In AES-ECB mode crypt is done with key only, so any use of IV
> can cause kernel Oops, as reported by Anand Moon.
> Fixed it by using IV only in AES-CBC and AES-CTR.
>
> Signed-off-by: Kamil Konieczny
> Re
4.15-stable review patch. If anyone has any objections, please let me know.
--
From: LEROY Christophe <christophe.le...@c-s.fr>
commit 87a81dce53b1ea61acaeefa5191a0376a2d1d721 upstream.
Performing the hash of an empty file leads to a kernel Oops
[ 44.504600]
4.15-stable review patch. If anyone has any objections, please let me know.
--
From: LEROY Christophe
commit 87a81dce53b1ea61acaeefa5191a0376a2d1d721 upstream.
Performing the hash of an empty file leads to a kernel Oops
[ 44.504600] Unable to handle kernel paging request
> Actually this was brought up to me already, there's a fix on the mailing list
> for this I reviewed a little while ago from nvidia that we should pull in:
>
> https://patchwork.freedesktop.org/patch/203205/
>
> Would you guys mind confirming that this patch fixes your issues?
It works on my
> Actually this was brought up to me already, there's a fix on the mailing list
> for this I reviewed a little while ago from nvidia that we should pull in:
>
> https://patchwork.freedesktop.org/patch/203205/
>
> Would you guys mind confirming that this patch fixes your issues?
It works on my
Actually this was brought up to me already, there's a fix on the mailing list
for this I reviewed a little while ago from nvidia that we should pull in:
https://patchwork.freedesktop.org/patch/203205/
Would you guys mind confirming that this patch fixes your issues?
On Wed, 2018-02-14 at 18:41
Actually this was brought up to me already, there's a fix on the mailing list
for this I reviewed a little while ago from nvidia that we should pull in:
https://patchwork.freedesktop.org/patch/203205/
Would you guys mind confirming that this patch fixes your issues?
On Wed, 2018-02-14 at 18:41
On 2018-02-14 — 09:36, Ilia Mirkin wrote:
> On Wed, Feb 14, 2018 at 9:35 AM, Ilia Mirkin wrote:
> > On Wed, Feb 14, 2018 at 9:29 AM, Meelis Roos wrote:
> >>> This is 4.16-rc1+todays git on a lowly P4 with NV5, worked fine in 4.15:
> >>
> >> NV5 in another PC
On 2018-02-14 — 09:36, Ilia Mirkin wrote:
> On Wed, Feb 14, 2018 at 9:35 AM, Ilia Mirkin wrote:
> > On Wed, Feb 14, 2018 at 9:29 AM, Meelis Roos wrote:
> >>> This is 4.16-rc1+todays git on a lowly P4 with NV5, worked fine in 4.15:
> >>
> >> NV5 in another PC (secondary card in x86-64) made the
On Wed, Feb 14, 2018 at 9:35 AM, Ilia Mirkin wrote:
> On Wed, Feb 14, 2018 at 9:29 AM, Meelis Roos wrote:
>>> This is 4.16-rc1+todays git on a lowly P4 with NV5, worked fine in 4.15:
>>
>> NV5 in another PC (secondary card in x86-64) made the systrem crash
On Wed, Feb 14, 2018 at 9:35 AM, Ilia Mirkin wrote:
> On Wed, Feb 14, 2018 at 9:29 AM, Meelis Roos wrote:
>>> This is 4.16-rc1+todays git on a lowly P4 with NV5, worked fine in 4.15:
>>
>> NV5 in another PC (secondary card in x86-64) made the systrem crash on
>> boot, in nvkm_therm_clkgate_fini.
On Wed, Feb 14, 2018 at 9:29 AM, Meelis Roos wrote:
>> This is 4.16-rc1+todays git on a lowly P4 with NV5, worked fine in 4.15:
>
> NV5 in another PC (secondary card in x86-64) made the systrem crash on
> boot, in nvkm_therm_clkgate_fini.
Mind booting with nouveau.debug=trace?
On Wed, Feb 14, 2018 at 9:29 AM, Meelis Roos wrote:
>> This is 4.16-rc1+todays git on a lowly P4 with NV5, worked fine in 4.15:
>
> NV5 in another PC (secondary card in x86-64) made the systrem crash on
> boot, in nvkm_therm_clkgate_fini.
Mind booting with nouveau.debug=trace? That should
> This is 4.16-rc1+todays git on a lowly P4 with NV5, worked fine in 4.15:
NV5 in another PC (secondary card in x86-64) made the systrem crash on
boot, in nvkm_therm_clkgate_fini.
--
Meelis Roos (mr...@linux.ee)
> This is 4.16-rc1+todays git on a lowly P4 with NV5, worked fine in 4.15:
NV5 in another PC (secondary card in x86-64) made the systrem crash on
boot, in nvkm_therm_clkgate_fini.
--
Meelis Roos (mr...@linux.ee)
Hi!
> > During tethering, I got oops in ssi_stop_tx(), followed by failure of
> > GPRS. I used GPRS tethering a lot with some older kernel, and it was
> > stable for hours.
> >
> > It seems v4.12 has the same problem. In v4.15 usb networking does not
> > w
Hi!
> > During tethering, I got oops in ssi_stop_tx(), followed by failure of
> > GPRS. I used GPRS tethering a lot with some older kernel, and it was
> > stable for hours.
> >
> > It seems v4.12 has the same problem. In v4.15 usb networking does not
> > w
Hi Pavel,
On Mon, Feb 12, 2018 at 09:10:00PM +0100, Pavel Machek wrote:
> Hi!
>
> During tethering, I got oops in ssi_stop_tx(), followed by failure of
> GPRS. I used GPRS tethering a lot with some older kernel, and it was
> stable for hours.
>
> It seems v4.12 has the s
Hi Pavel,
On Mon, Feb 12, 2018 at 09:10:00PM +0100, Pavel Machek wrote:
> Hi!
>
> During tethering, I got oops in ssi_stop_tx(), followed by failure of
> GPRS. I used GPRS tethering a lot with some older kernel, and it was
> stable for hours.
>
> It seems v4.12 has the s
]
[7.409344] BUG: unable to handle kernel NULL pointer dereference at (null)
[7.409640] IP: nvkm_therm_clkgate_fini+0x15/0x174 [nouveau]
[7.409738] *pde =
[7.409833] Oops: [#1]
[7.409923] Modules linked in: nouveau(+) evdev wmi video i2c_algo_bit
drm_kms_helper
]
[7.409344] BUG: unable to handle kernel NULL pointer dereference at (null)
[7.409640] IP: nvkm_therm_clkgate_fini+0x15/0x174 [nouveau]
[7.409738] *pde =
[7.409833] Oops: [#1]
[7.409923] Modules linked in: nouveau(+) evdev wmi video i2c_algo_bit
drm_kms_helper
Hi!
During tethering, I got oops in ssi_stop_tx(), followed by failure of
GPRS. I used GPRS tethering a lot with some older kernel, and it was
stable for hours.
It seems v4.12 has the same problem. In v4.15 usb networking does not
work at all, so I can't test... v4.10 seems to have similar
Hi!
During tethering, I got oops in ssi_stop_tx(), followed by failure of
GPRS. I used GPRS tethering a lot with some older kernel, and it was
stable for hours.
It seems v4.12 has the same problem. In v4.15 usb networking does not
work at all, so I can't test... v4.10 seems to have similar
Hi,
On 12-02-18 00:36, Chanwoo Choi wrote:
On 2018년 02월 12일 08:26, Hans de Goede wrote:
Commit 41d600274fbf ("extcon: int3496: process id-pin first so that we
start with the right status") starts the work on the workqueue before
registration to make sure we've a valid cable state directly
Hi,
On 12-02-18 00:36, Chanwoo Choi wrote:
On 2018년 02월 12일 08:26, Hans de Goede wrote:
Commit 41d600274fbf ("extcon: int3496: process id-pin first so that we
start with the right status") starts the work on the workqueue before
registration to make sure we've a valid cable state directly
On 2018년 02월 12일 08:26, Hans de Goede wrote:
> Commit 41d600274fbf ("extcon: int3496: process id-pin first so that we
> start with the right status") starts the work on the workqueue before
> registration to make sure we've a valid cable state directly after
> registration.
>
> But that commit
On 2018년 02월 12일 08:26, Hans de Goede wrote:
> Commit 41d600274fbf ("extcon: int3496: process id-pin first so that we
> start with the right status") starts the work on the workqueue before
> registration to make sure we've a valid cable state directly after
> registration.
>
> But that commit
Commit 41d600274fbf ("extcon: int3496: process id-pin first so that we
start with the right status") starts the work on the workqueue before
registration to make sure we've a valid cable state directly after
registration.
But that commit moves the queuing of the work to before we even alloc the
Commit 41d600274fbf ("extcon: int3496: process id-pin first so that we
start with the right status") starts the work on the workqueue before
registration to make sure we've a valid cable state directly after
registration.
But that commit moves the queuing of the work to before we even alloc the
On Fri, Jan 26, 2018 at 05:09:59PM +0100, Christophe Leroy wrote:
> Performing the hash of an empty file leads to a kernel Oops
>
> [ 44.504600] Unable to handle kernel paging request for data at address
> 0x000c
> [ 44.512819] Faulting instruction address: 0xc02d2be8
On Fri, Jan 26, 2018 at 05:09:59PM +0100, Christophe Leroy wrote:
> Performing the hash of an empty file leads to a kernel Oops
>
> [ 44.504600] Unable to handle kernel paging request for data at address
> 0x000c
> [ 44.512819] Faulting instruction address: 0xc02d2be8
Greetings,
Today's mainline kernel Oops when running stack_grow_into_huge
Machine: Power 8 bare-metal
Kernel: 4.15.0
Config: attached
gcc: 4.8.5
Test: libhugetlbfs
stack_grow_into_huge (16M: 64) resulted in kernel Oops message and the
bad address maps to:
# gdb -batch vmlinux -ex 'list
Greetings,
Today's mainline kernel Oops when running stack_grow_into_huge
Machine: Power 8 bare-metal
Kernel: 4.15.0
Config: attached
gcc: 4.8.5
Test: libhugetlbfs
stack_grow_into_huge (16M: 64) resulted in kernel Oops message and the
bad address maps to:
# gdb -batch vmlinux -ex 'list
Greetings,
Todays mainline kernel has Oops messages for memory hot-unplug
operation.
Machine: Power 8 bare-metal
Kernel: 4.15.0
Config: attached
gcc: 4.8.5
Test: Memory hot-unplug
echo offline > /sys/devices/system/memory/memory/state
the above command triggered 2 kernel Oops messa
Greetings,
Todays mainline kernel has Oops messages for memory hot-unplug
operation.
Machine: Power 8 bare-metal
Kernel: 4.15.0
Config: attached
gcc: 4.8.5
Test: Memory hot-unplug
echo offline > /sys/devices/system/memory/memory/state
the above command triggered 2 kernel Oops messa
In AES-ECB mode crypt is done with key only, so any use of IV
can cause kernel Oops. Use IV only in AES-CBC and AES-CTR.
Signed-off-by: Kamil Konieczny <k.koniec...@partner.samsung.com>
Reported-by: Anand Moon <linux.am...@gmail.com>
Reviewed-by: Krzysztof Kozlowski <k...@ker
In AES-ECB mode crypt is done with key only, so any use of IV
can cause kernel Oops. Use IV only in AES-CBC and AES-CTR.
Signed-off-by: Kamil Konieczny
Reported-by: Anand Moon
Reviewed-by: Krzysztof Kozlowski
Tested-by: Anand Moon
Cc: sta...@vger.kernel.org # can be applied after commit
In AES-ECB mode crypt is done with key only, so any use of IV
can cause kernel Oops. Use IV only in AES-CBC and AES-CTR.
Signed-off-by: Kamil Konieczny <k.koniec...@partner.samsung.com>
Reported-by: Anand Moon <linux.am...@gmail.com>
Reviewed-by: Krzysztof Kozlowski <k...@ker
In AES-ECB mode crypt is done with key only, so any use of IV
can cause kernel Oops. Use IV only in AES-CBC and AES-CTR.
Signed-off-by: Kamil Konieczny
Reported-by: Anand Moon
Reviewed-by: Krzysztof Kozlowski
Tested-by: Anand Moon
Cc: sta...@vger.kernel.org
Fixes: 8f9702aad138 ("crypto
>> <k.koniec...@partner.samsung.com> wrote:
>>>
>>> In AES-ECB mode crypt is done with key only, so any use of IV
>>> can cause kernel Oops, as reported by Anand Moon.
>>
>> If possible could you avoid the name in commit message.
>
> This
> In AES-ECB mode crypt is done with key only, so any use of IV
>>> can cause kernel Oops, as reported by Anand Moon.
>>
>> If possible could you avoid the name in commit message.
>
> This is added after '---' line, so it will not appear in commit message.
>
I kno
On 06.02.2018 17:48, Anand Moon wrote:
> Hi Kamil,
>
> Thanks for providing the fix to this issue.
>
> On 5 February 2018 at 23:10, Kamil Konieczny
> <k.koniec...@partner.samsung.com> wrote:
>>
>> In AES-ECB mode crypt is done with key only, so an
On 06.02.2018 17:48, Anand Moon wrote:
> Hi Kamil,
>
> Thanks for providing the fix to this issue.
>
> On 5 February 2018 at 23:10, Kamil Konieczny
> wrote:
>>
>> In AES-ECB mode crypt is done with key only, so any use of IV
>> can cause kernel Oops, as repo
Hi Kamil,
Thanks for providing the fix to this issue.
On 5 February 2018 at 23:10, Kamil Konieczny
<k.koniec...@partner.samsung.com> wrote:
>
> In AES-ECB mode crypt is done with key only, so any use of IV
> can cause kernel Oops, as reported by Anand Moon.
If possible could you
Hi Kamil,
Thanks for providing the fix to this issue.
On 5 February 2018 at 23:10, Kamil Konieczny
wrote:
>
> In AES-ECB mode crypt is done with key only, so any use of IV
> can cause kernel Oops, as reported by Anand Moon.
If possible could you avoid the name in commit message.
On Mon, Feb 5, 2018 at 6:40 PM, Kamil Konieczny
<k.koniec...@partner.samsung.com> wrote:
>
> In AES-ECB mode crypt is done with key only, so any use of IV
> can cause kernel Oops, as reported by Anand Moon.
> Fixed it by using IV only in AES-CBC and AES-CTR.
>
> Signed
On Mon, Feb 5, 2018 at 6:40 PM, Kamil Konieczny
wrote:
>
> In AES-ECB mode crypt is done with key only, so any use of IV
> can cause kernel Oops, as reported by Anand Moon.
> Fixed it by using IV only in AES-CBC and AES-CTR.
>
> Signed-off-by: Kamil Konieczny
> Re
In AES-ECB mode crypt is done with key only, so any use of IV
can cause kernel Oops, as reported by Anand Moon.
Fixed it by using IV only in AES-CBC and AES-CTR.
Signed-off-by: Kamil Konieczny <k.koniec...@partner.samsung.com>
Reported-by: Anand Moon <linux.am...@gmail.com>
---
Test
In AES-ECB mode crypt is done with key only, so any use of IV
can cause kernel Oops, as reported by Anand Moon.
Fixed it by using IV only in AES-CBC and AES-CTR.
Signed-off-by: Kamil Konieczny
Reported-by: Anand Moon
---
Tested on Odroid XU4/HC1, kernel 4.15 with following command:
fallocate
Greetings,
Kernel Oops seen when memory hot-unplug on powerpc mainline kernel.
Machine: Power6 PowerVM ppc64
Kernel: 4.15.0
Config: attached
gcc: 4.8.2
Test: Memory hot-unplug of a memory block
echo offline > /sys/devices/system/memory/memory/state
The faulty instruction address poi
Greetings,
Kernel Oops seen when memory hot-unplug on powerpc mainline kernel.
Machine: Power6 PowerVM ppc64
Kernel: 4.15.0
Config: attached
gcc: 4.8.2
Test: Memory hot-unplug of a memory block
echo offline > /sys/devices/system/memory/memory/state
The faulty instruction address poi
From: Tommi Rantala <tommi.t.rant...@nokia.com>
[ Upstream commit 642a8439ddd8423b92f2e71960afe21ee1f66bb6 ]
Calling tipc_mon_delete() before the monitor has been created will oops.
This can happen in tipc_enable_bearer() error path if tipc_disc_create()
fails.
[ 48.589074] BUG:
From: Tommi Rantala
[ Upstream commit 642a8439ddd8423b92f2e71960afe21ee1f66bb6 ]
Calling tipc_mon_delete() before the monitor has been created will oops.
This can happen in tipc_enable_bearer() error path if tipc_disc_create()
fails.
[ 48.589074] BUG: unable to handle kernel paging request
From: Tommi Rantala <tommi.t.rant...@nokia.com>
[ Upstream commit 642a8439ddd8423b92f2e71960afe21ee1f66bb6 ]
Calling tipc_mon_delete() before the monitor has been created will oops.
This can happen in tipc_enable_bearer() error path if tipc_disc_create()
fails.
[ 48.589074] BUG:
From: Tommi Rantala
[ Upstream commit 642a8439ddd8423b92f2e71960afe21ee1f66bb6 ]
Calling tipc_mon_delete() before the monitor has been created will oops.
This can happen in tipc_enable_bearer() error path if tipc_disc_create()
fails.
[ 48.589074] BUG: unable to handle kernel paging request
From: Ravi Bangoria
[ Upstream commit 5aa04b3eb6fca63d2e9827be656dcadc26d54e11 ]
When user tries to group imc (In-Memory Collections) event with
normal event, (sometime) kernel crashes with following log:
Faulting instruction address: 0x
[link
From: Ravi Bangoria
[ Upstream commit 5aa04b3eb6fca63d2e9827be656dcadc26d54e11 ]
When user tries to group imc (In-Memory Collections) event with
normal event, (sometime) kernel crashes with following log:
Faulting instruction address: 0x
[link register ] c010ce88
From: Ravi Bangoria
[ Upstream commit 5aa04b3eb6fca63d2e9827be656dcadc26d54e11 ]
When user tries to group imc (In-Memory Collections) event with
normal event, (sometime) kernel crashes with following log:
Faulting instruction address: 0x
[link
From: Ravi Bangoria
[ Upstream commit 5aa04b3eb6fca63d2e9827be656dcadc26d54e11 ]
When user tries to group imc (In-Memory Collections) event with
normal event, (sometime) kernel crashes with following log:
Faulting instruction address: 0x
[link register ] c010ce88
From: Ravi Bangoria
[ Upstream commit 5aa04b3eb6fca63d2e9827be656dcadc26d54e11 ]
When user tries to group imc (In-Memory Collections) event with
normal event, (sometime) kernel crashes with following log:
Faulting instruction address: 0x
[link
From: Ravi Bangoria
[ Upstream commit 5aa04b3eb6fca63d2e9827be656dcadc26d54e11 ]
When user tries to group imc (In-Memory Collections) event with
normal event, (sometime) kernel crashes with following log:
Faulting instruction address: 0x
[link register ] c010ce88
From: Ravi Bangoria
[ Upstream commit 5aa04b3eb6fca63d2e9827be656dcadc26d54e11 ]
When user tries to group imc (In-Memory Collections) event with
normal event, (sometime) kernel crashes with following log:
Faulting instruction address: 0x
[link
From: Ravi Bangoria
[ Upstream commit 5aa04b3eb6fca63d2e9827be656dcadc26d54e11 ]
When user tries to group imc (In-Memory Collections) event with
normal event, (sometime) kernel crashes with following log:
Faulting instruction address: 0x
[link register ] c010ce88
Performing the hash of an empty file leads to a kernel Oops
[ 44.504600] Unable to handle kernel paging request for data at address
0x000c
[ 44.512819] Faulting instruction address: 0xc02d2be8
[ 44.524088] Oops: Kernel access of bad area, sig: 11 [#1]
[ 44.529171] BE PREEMPT CMPC885
Performing the hash of an empty file leads to a kernel Oops
[ 44.504600] Unable to handle kernel paging request for data at address
0x000c
[ 44.512819] Faulting instruction address: 0xc02d2be8
[ 44.524088] Oops: Kernel access of bad area, sig: 11 [#1]
[ 44.529171] BE PREEMPT CMPC885
Signed-off-by: Max Staudt
Reviewed-by: Oliver Neukum
---
drivers/video/fbdev/core/fbcon.c | 10 ++
1 file changed, 10 insertions(+)
diff --git a/drivers/video/fbdev/core/fbcon.c b/drivers/video/fbdev/core/fbcon.c
index 9a39a6fcfe98..8a9c67e1c5d8
Signed-off-by: Max Staudt
Reviewed-by: Oliver Neukum
---
drivers/video/fbdev/core/fbcon.c | 10 ++
1 file changed, 10 insertions(+)
diff --git a/drivers/video/fbdev/core/fbcon.c b/drivers/video/fbdev/core/fbcon.c
index 9a39a6fcfe98..8a9c67e1c5d8 100644
---
1301 - 1400 of 16129 matches
Mail list logo