All of lore.kernel.org
 help / color / mirror / Atom feed
From: itaru.kitayama@riken.jp (Itaru Kitayama)
To: linux-arm-kernel@lists.infradead.org
Subject: v4.14-rc3 kernel issue
Date: Fri, 27 Oct 2017 19:16:19 +0900	[thread overview]
Message-ID: <303f6300-ecf4-89fe-0462-349f0dbd5918@riken.jp> (raw)
In-Reply-To: <20171027072435.hqgoacedozwcxs7f@salmiak>

v4.16.0-rc6 boots up fine and no BUG is seen so far.

Itaru
  
On 2017/10/27 16:24, Mark Rutland wrote:
> On Fri, Oct 27, 2017 at 01:12:21PM +0900, Itaru Kitayama wrote:
>> Hi,
> 
> Hi,
> 
>> I've seen this on a guest on KVM. Observed this after system booted, not
>> special commands were issued.
>>
>> [   82.124767] ==================================================================
>> [   82.129867] BUG: KASAN: slab-out-of-bounds in pud_huge+0x24/0x48
>> [   82.133893] Read of size 8 at addr ffff8000c43f79e8 by task kworker/u96:1/373
>> [   82.138675]
>> [   82.139709] CPU: 35 PID: 373 Comm: kworker/u96:1 Not tainted 4.14.0-rc3-dev+ #8
>> [   82.144616] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
>> [   82.149292] usercopy: kernel memory overwrite attempt detected to ffff8000c43f7610 (thread_stack) (8 bytes)
>> [   82.156031] ------------[ cut here ]------------
>> [   82.159139] kernel BUG at mm/usercopy.c:72!
>> [   82.161972] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP
>>   [   82.165650] Modules linked in: ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_raw iptable_security ebtable_filter ebtables ip6table_filter ip6_tables sunrpc vfat fat crc32_ce crct10dif_ce ghash_ce virtio_net button xfs libcrc32c virtio_console virtio_scsi virtio_pci qemu_fw_cfg virtio_mmio virtio_ring virtio
>> [   82.199893] CPU: 35 PID: 373 Comm: kworker/u96:1 Not tainted 4.14.0-rc3-dev+ #8
>> [   82.204806] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
>> [   82.209408] usercopy: kernel memory overwrite attempt detected to ffff8000c43f6d10 (thread_stack) (8 bytes)
>> [   82.215969] ------------[ cut here ]------------
>> [   82.219070] kernel BUG at mm/usercopy.c:72!
> 
> I see that you have both KASAN and HARDENED_USERCOPY enabled. Could you share
> your .config?
> 
> Do you see the same behaviour with v4.14-rc6?
> 
> Thanks,
> Mark
> 

      reply	other threads:[~2017-10-27 10:16 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-10-27  4:12 v4.14-rc3 kernel issue Itaru Kitayama
2017-10-27  7:24 ` Mark Rutland
2017-10-27 10:16   ` Itaru Kitayama [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=303f6300-ecf4-89fe-0462-349f0dbd5918@riken.jp \
    --to=itaru.kitayama@riken.jp \
    --cc=linux-arm-kernel@lists.infradead.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.