[Bug 204371] BUG kmalloc-4k (Tainted: G W ): Object padding overwritten
bugzilla-daemon at bugzilla.kernel.org
bugzilla-daemon at bugzilla.kernel.org
Wed Jul 31 22:09:54 AEST 2019
https://bugzilla.kernel.org/show_bug.cgi?id=204371
--- Comment #4 from mpe at ellerman.id.au ---
bugzilla-daemon at bugzilla.kernel.org writes:
> https://bugzilla.kernel.org/show_bug.cgi?id=204371
>
> --- Comment #2 from Andrew Morton (akpm at linux-foundation.org) ---
> (switched to email. Please respond via emailed reply-to-all, not via the
> bugzilla web interface).
>
>
> On Mon, 29 Jul 2019 22:35:48 +0000 bugzilla-daemon at bugzilla.kernel.org wrote:
>
>> https://bugzilla.kernel.org/show_bug.cgi?id=204371
>>
>> Bug ID: 204371
>> Summary: BUG kmalloc-4k (Tainted: G W ): Object
>> padding overwritten
>> Product: Memory Management
>> Version: 2.5
>> Kernel Version: 5.3.0-rc2
>> Hardware: PPC-32
>> OS: Linux
>> Tree: Mainline
>> Status: NEW
>> Severity: normal
>> Priority: P1
>> Component: Slab Allocator
>> Assignee: akpm at linux-foundation.org
>> Reporter: erhard_f at mailbox.org
>> Regression: No
>
> cc'ing various people here.
>
> I suspect proc_cgroup_show() is innocent and that perhaps
> bpf_prepare_filter() had a memory scribble. iirc there has been at
> least one recent pretty serious bpf fix applied recently. Can others
> please take a look?
I haven't been able to reproduce this on a 64-bit or 32-bit powerpc
machine here. But I don't run gentoo userspace, so I suspect I'm not
tripping the same path at boot. I did run the seccomp selftest and that
didn't trip it either.
cheers
--
You are receiving this mail because:
You are on the CC list for the bug.
More information about the Linuxppc-dev
mailing list