[Bug 205283] BUG: KASAN: global-out-of-bounds in _copy_to_iter+0x3d4/0x5a8

2020-01-18 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=205283 --- Comment #15 from Christophe Leroy (christophe.le...@c-s.fr) --- (In reply to Erhard F. from comment #12) > Applied your patch series on top of 5.5-rc6. CONFIG_KASAN_VMALLOC is not > non-selectable but forced on by default. > I can't understa

[Bug 205099] KASAN hit at raid6_pq: BUG: Unable to handle kernel data access at 0x00f0fd0d

2020-01-18 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=205099 --- Comment #15 from Christophe Leroy (christophe.le...@c-s.fr) --- Interesting that stack overflows. Maybe we should increase THREAD_SHIFT by 1 when KASAN is selected. ARM64 does that. Would be interesting to try and see if the VMAP_STACK series

Re: [PATCH v16 00/23] selftests, powerpc, x86: Memory Protection Keys

2020-01-18 Thread Sandipan Das
On 17/01/20 11:32 pm, Dave Hansen wrote: > I also tested the series. The 64-bit binary works fine. But, > > This is failing to build the x86 selftests: > > make: *** No rule to make target 'protection_keys.c', needed by > '/home/daveh/linux/tools/testing/selftests/x86/protection_keys_32'. S

Re: [PATCH v4 1/9] powerpc/mmu_gather: Enable RCU_TABLE_FREE even for !SMP case

2020-01-18 Thread Michael Ellerman
"Aneesh Kumar K.V" writes: > A follow up patch is going to make sure we correctly invalidate page walk > cache > before we free page table pages. In order to keep things simple enable > RCU_TABLE_FREE even for !SMP so that we don't have to fixup the !SMP case > differently in the followup patch >

Re: [PATCH v4 2/9] mm/mmu_gather: Invalidate TLB correctly on batch allocation failure and flush

2020-01-18 Thread Michael Ellerman
"Aneesh Kumar K.V" writes: > From: Peter Zijlstra > > Architectures for which we have hardware walkers of Linux page table should > flush TLB on mmu gather batch allocation failures and batch flush. Some > architectures like POWER supports multiple translation modes (hash and radix) > and in the

[Bug 205283] BUG: KASAN: global-out-of-bounds in _copy_to_iter+0x3d4/0x5a8

2020-01-18 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=205283 --- Comment #16 from Erhard F. (erhar...@mailbox.org) --- (In reply to Christophe Leroy from comment #15) > (In reply to Erhard F. from comment #12) > > Applied your patch series on top of 5.5-rc6. CONFIG_KASAN_VMALLOC is not > > non-selectable bu

Re: [PATCH v5 17/17] powerpc/32s: Enable CONFIG_VMAP_STACK

2020-01-18 Thread Michael Ellerman
Christophe Leroy writes: > diff --git a/arch/powerpc/kernel/head_32.S b/arch/powerpc/kernel/head_32.S > index 90ef355e958b..3be041166db4 100644 > --- a/arch/powerpc/kernel/head_32.S > +++ b/arch/powerpc/kernel/head_32.S > @@ -272,14 +272,20 @@ __secondary_hold_acknowledge: > */ > . = 0x200

[PATCH v2] powerpc: Do not consider weak unresolved symbol relocations as bad

2020-01-18 Thread Alexandre Ghiti
Commit 8580ac9404f6 ("bpf: Process in-kernel BTF") introduced two weak symbols that may be unresolved at link time which result in an absolute relocation to 0. relocs_check.sh emits the following warning: "WARNING: 2 bad relocations c1a41478 R_PPC64_ADDR64_binary__btf_vmlinux_bin_start

[Bug 205099] KASAN hit at raid6_pq: BUG: Unable to handle kernel data access at 0x00f0fd0d

2020-01-18 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=205099 --- Comment #16 from Erhard F. (erhar...@mailbox.org) --- (In reply to Christophe Leroy from comment #15) > Would be interesting to try and see if the VMAP_STACK series detects the > stack overflow. > Series at > https://patchwork.ozlabs.org/proje