From: bugzilla-daemon@bugzilla.kernel.org
To: linuxppc-dev@lists.ozlabs.org
Subject: [Bug 205283] BUG: KASAN: global-out-of-bounds in _copy_to_iter+0x3d4/0x5a8
Date: Sun, 15 Dec 2019 15:49:10 +0000 [thread overview]
Message-ID: <bug-205283-206035-i0ZRTHjXFs@https.bugzilla.kernel.org/> (raw)
In-Reply-To: <bug-205283-206035@https.bugzilla.kernel.org/>
https://bugzilla.kernel.org/show_bug.cgi?id=205283
Erhard F. (erhard_f@mailbox.org) changed:
What |Removed |Added
----------------------------------------------------------------------------
Kernel Version|5.4-rc4 |5.5-rc1
See Also| |https://bugzilla.kernel.org
| |/show_bug.cgi?id=205099
--- Comment #2 from Erhard F. (erhard_f@mailbox.org) ---
Re-tried with kernel 5.5-rc1. This is probably connected with bug #205099.
[...]
[ 69.181890]
==================================================================
[ 69.182220] BUG: KASAN: global-out-of-bounds in _copy_to_iter+0x3c0/0x594
[ 69.182472] Write of size 4096 at addr f15ad000 by task modprobe/233
[ 69.182738] CPU: 0 PID: 233 Comm: modprobe Tainted: G W
5.5.0-rc1-PowerMacG4+ #7
[ 69.183061] Call Trace:
[ 69.183147] [eb7138b8] [c0783b44] dump_stack+0xbc/0x118 (unreliable)
[ 69.183387] [eb7138e8] [c024454c]
print_address_description.isra.0+0x3c/0x420
[ 69.183652] [eb713978] [c0244b0c] __kasan_report+0x138/0x180
[ 69.183858] [eb7139b8] [c024551c] check_memory_region+0x24/0x180
[ 69.184084] [eb7139c8] [c02435e8] memcpy+0x48/0x74
[ 69.184255] [eb7139e8] [c045b5cc] _copy_to_iter+0x3c0/0x594
[ 69.184458] [eb713ad8] [c045b984] copy_page_to_iter+0xac/0x564
[ 69.184675] [eb713b38] [c01c6d84] generic_file_read_iter+0x5c4/0x7c0
[ 69.184914] [eb713ba8] [c025b8dc] __vfs_read+0x1b0/0x1f8
[ 69.185106] [eb713cd8] [c025b9e0] vfs_read+0xbc/0x124
[ 69.185287] [eb713d08] [c025ba9c] kernel_read+0x54/0x70
[ 69.185480] [eb713d38] [c0266514] kernel_read_file+0x23c/0x34c
[ 69.185694] [eb713de8] [c0266710] kernel_read_file_from_fd+0x54/0x74
[ 69.185929] [eb713e18] [c0111b1c] sys_finit_module+0xd8/0x138
[ 69.186139] [eb713f38] [c001a274] ret_from_syscall+0x0/0x34
[ 69.186340] --- interrupt: c01 at 0x56af78
LR = 0x6f8a14
[ 69.186597] Memory state around the buggy address:
[ 69.186766] f15ad500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 69.187001] f15ad580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 69.187235] >f15ad600: 00 00 00 00 00 00 00 00 00 00 00 fa fa fa fa fa
[ 69.187466] ^
[ 69.187656] f15ad680: 00 00 00 03 fa fa fa fa 00 00 00 00 00 00 00 00
[ 69.187890] f15ad700: 00 00 00 00 00 00 04 fa fa fa fa fa 00 00 00 00
[ 69.188121]
==================================================================
[ 69.272710] raid6: altivecx8 gen() 2354 MB/s
[ 69.329383] raid6: altivecx4 gen() 3200 MB/s
[ 69.386055] raid6: altivecx2 gen() 2178 MB/s
[ 69.442705] raid6: altivecx1 gen() 1975 MB/s
[ 69.499549] raid6: int32x8 gen() 336 MB/s
[ 69.556086] raid6: int32x8 xor() 200 MB/s
[ 69.612793] raid6: int32x4 gen() 342 MB/s
[ 69.669421] raid6: int32x4 xor() 224 MB/s
[ 69.732733] raid6: int32x2 gen() 534 MB/s
[ 69.796110] raid6: int32x2 xor() 414 MB/s
[ 69.859399] raid6: int32x1 gen() 401 MB/s
[ 69.922790] raid6: int32x1 xor() 310 MB/s
[ 69.930418] raid6: using algorithm altivecx4 gen() 3200 MB/s
[ 69.938166] raid6: using intx1 recovery algorithm
[ 70.027661] xor: measuring software checksum speed
[ 70.066059] 8regs : 123.600 MB/sec
[ 70.106036] 8regs_prefetch: 122.400 MB/sec
[ 70.146029] 32regs : 126.000 MB/sec
[ 70.186045] 32regs_prefetch: 122.400 MB/sec
[ 70.226030] altivec : 738.000 MB/sec
[ 70.233653] xor: using function: altivec (738.000 MB/sec)
[ 70.713528] Btrfs loaded, crc32c=crc32c-generic, debug=on
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
next prev parent reply other threads:[~2019-12-15 15:51 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-10-22 0:05 [Bug 205283] New: BUG: KASAN: global-out-of-bounds in _copy_to_iter+0x3d4/0x5a8 bugzilla-daemon
2019-10-22 0:06 ` [Bug 205283] " bugzilla-daemon
2019-12-15 15:49 ` bugzilla-daemon [this message]
2019-12-15 15:54 ` bugzilla-daemon
2019-12-20 6:07 ` bugzilla-daemon
2019-12-20 20:44 ` bugzilla-daemon
2019-12-20 20:45 ` bugzilla-daemon
2019-12-20 20:50 ` bugzilla-daemon
2019-12-21 9:13 ` bugzilla-daemon
2019-12-21 15:18 ` bugzilla-daemon
2019-12-21 16:43 ` bugzilla-daemon
2020-01-16 9:23 ` bugzilla-daemon
2020-01-17 20:01 ` bugzilla-daemon
2020-01-17 20:02 ` bugzilla-daemon
2020-01-17 20:03 ` bugzilla-daemon
2020-01-18 8:39 ` bugzilla-daemon
2020-01-18 11:30 ` bugzilla-daemon
2020-02-26 16:37 ` bugzilla-daemon
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=bug-205283-206035-i0ZRTHjXFs@https.bugzilla.kernel.org/ \
--to=bugzilla-daemon@bugzilla.kernel.org \
--cc=linuxppc-dev@lists.ozlabs.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).