[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <87ft1iwwxq.fsf@jogness.linutronix.de>
Date: Fri, 26 Feb 2021 18:39:13 +0100
From: John Ogness <john.ogness@...utronix.de>
To: Alexander Gordeev <agordeev@...ux.ibm.com>
Cc: Petr Mladek <pmladek@...e.com>,
Sergey Senozhatsky <sergey.senozhatsky.work@...il.com>,
Sergey Senozhatsky <sergey.senozhatsky@...il.com>,
Steven Rostedt <rostedt@...dmis.org>,
Linus Torvalds <torvalds@...ux-foundation.org>,
linux-kernel@...r.kernel.org, Sven Schnelle <svens@...ux.ibm.com>
Subject: Re: [PATCH] printk: fix buffer overflow potential for print_text()
On 2021-02-26, Alexander Gordeev <agordeev@...ux.ibm.com> wrote:
> I am seeing KASAN reporting incorrect 1-byte access in exactly
> same location Sven has identified before. In case there no
> fix for it yet, please see below what happens in case of pretty
> large buffer - WARN_ONCE() invocation in my case.
It looks like you have not applied the fix yet:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=08d60e5999540110576e7c1346d486220751b7f9
John Ogness
Powered by blists - more mailing lists