Preemptive verification:

root@d05-3:~# cat /proc/version
Linux version 4.10.0-29-generic (buildd@bos01-arm64-012) (gcc version 6.3.0 
20170406 (Ubuntu/Linaro 6.3.0-12ubuntu2) ) #33-Ubuntu SMP Wed Jul 19 13:37:12 
UTC 2017
root@d05-3:~# cat /proc/kcore > /dev/null&
[1] 9206
root@d05-3:~# 

(/proc/kcore is 133T on this system, so it won't complete in any
reasonable time - but normally would've crashed by now).

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1702749

Title:
  arm64: fix crash reading /proc/kcore

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Zesty:
  Fix Committed

Bug description:
  [Impact]
  Reading /proc/kcore can lead to a crash on arm64 systems.
  This was found to cause crashes when, e.g. annotating symbols in a perf top 
session.

  [Test Case]
  # cat /proc/kcore > /dev/null

  [Regression Risk]
  2 upstream patches need to be cherry-picked to fix this. 

  The 1st patch is a simplification to the kcore driver that impacts all
  architectures. Instead of re-checking at read time for vmalloc/module
  addresses, it just checks for a flag that was set during kcore driver
  init. This looks correct to me but could of course have an unnoticed
  bug.

  The second patch is arm64-specific, and regression risk has been
  mitigated by testing on arm64 hardware.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1702749/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to