On Tue, Jun 19, 2018 at 1:25 AM, Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> wrote: > > (switched to email. Please respond via emailed reply-to-all, not via the > bugzilla web interface). > > Could the KASAN people please help interpret this one? Most of the time this just means a NULL deref. Under KASAN it happens on shadow address for NULL rather than on NULL itself, and so it's diagnosed differently. icytxw, what kernel commit is this? I see a recent ""mm/vmalloc: keep track of free blocks for allocation"" that touches this function. Also, why all frames are questionable? Do you have frame pointers enabled? > On Sun, 17 Jun 2018 03:10:59 +0000 bugzilla-daemon@xxxxxxxxxxxxxxxxxxx wrote: > >> https://bugzilla.kernel.org/show_bug.cgi?id=200095 >> >> Bug ID: 200095 >> Summary: kasan: GPF could be caused by NULL-ptr deref or user >> memory access >> Product: Alternate Trees >> Version: 2.5 >> Kernel Version: v4.17 >> Hardware: All >> OS: Linux >> Status: NEW >> Severity: normal >> Priority: P1 >> Component: mm >> Assignee: akpm@xxxxxxxxxxxxxxxxxxxx >> Reporter: icytxw@xxxxxxxxx >> Regression: No >> >> Created attachment 276605 >> --> https://bugzilla.kernel.org/attachment.cgi?id=276605&action=edit >> log0 >> >> $ cat ../949034f0ecf05fba42df7e5f51a55453eba53e06/report0 >> kasan: CONFIG_KASAN_INLINE enabled >> kasan: GPF could be caused by NULL-ptr deref or user memory access >> general protection fault: 0000 [#1] SMP KASAN PTI >> CPU: 0 PID: 7388 Comm: syz-executor1 Not tainted 4.17.0 #1 >> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS >> rel-1.10.2-0-g5f4c7b1-prebuilt.qemu-project.org 04/01/2014 >> RIP: 0010:__insert_vmap_area+0x8c/0x3c0 mm/vmalloc.c:373 >> Code: 76 e8 78 3f e5 ff 4c 89 e0 48 c1 e8 03 80 3c 28 00 0f 85 c7 02 00 00 4c >> 8d 6b e8 4d 8b 3c 24 49 8d 7d 08 48 89 fa 48 c1 ea 03 <80> 3c 2a 00 0f 85 a0 02 >> 00 00 4c 3b 7b f0 72 9d e8 3f 3f e5 ff 41 >> RSP: 0018:ffff8800550778c0 EFLAGS: 00010207 >> RAX: 1ffff1000d80fd40 RBX: 0000041600000406 RCX: ffffffff8324e1de >> RDX: 00000082c000007e RSI: ffffffff814d6dd8 RDI: 00000416000003f6 >> RBP: dffffc0000000000 R08: 1ffffffff08cf184 R09: fffffbfff08cf184 >> R10: 0000000000000001 R11: fffffbfff08cf184 R12: ffff88006c07ea00 >> R13: 00000416000003ee R14: ffffed000d80fd41 R15: ffffc90000712000 >> FS: 0000000002619940(0000) GS:ffff88006d400000(0000) knlGS:0000000000000000 >> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >> CR2: 0000000002622978 CR3: 0000000055078000 CR4: 00000000000006f0 >> DR0: 0000000020000ac0 DR1: 0000000020000ac0 DR2: 0000000000000000 >> DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 >> Call Trace: >> Modules linked in: >> Dumping ftrace buffer: >> (ftrace buffer empty) >> ---[ end trace 650893cd43a30701 ]--- >> RIP: 0010:__insert_vmap_area+0x8c/0x3c0 mm/vmalloc.c:373 >> Code: 76 e8 78 3f e5 ff 4c 89 e0 48 c1 e8 03 80 3c 28 00 0f 85 c7 02 00 00 4c >> 8d 6b e8 4d 8b 3c 24 49 8d 7d 08 48 89 fa 48 c1 ea 03 <80> 3c 2a 00 0f 85 a0 02 >> 00 00 4c 3b 7b f0 72 9d e8 3f 3f e5 ff 41 >> RSP: 0018:ffff8800550778c0 EFLAGS: 00010207 >> RAX: 1ffff1000d80fd40 RBX: 0000041600000406 RCX: ffffffff8324e1de >> RDX: 00000082c000007e RSI: ffffffff814d6dd8 RDI: 00000416000003f6 >> RBP: dffffc0000000000 R08: 1ffffffff08cf184 R09: fffffbfff08cf184 >> R10: 0000000000000001 R11: fffffbfff08cf184 R12: ffff88006c07ea00 >> R13: 00000416000003ee R14: ffffed000d80fd41 R15: ffffc90000712000 >> FS: 0000000002619940(0000) GS:ffff88006d400000(0000) knlGS:0000000000000000 >> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >> CR2: 0000000002622978 CR3: 0000000055078000 CR4: 00000000000006f0 >> DR0: 0000000020000ac0 DR1: 0000000020000ac0 DR2: 0000000000000000 >> DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 >> >> -- >> You are receiving this mail because: >> You are the assignee for the bug.