[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAAJw_ZvP1Zc7S+jjFF8kOSvyJg+_5zSuYjwfFCs0qXEh_kfCTA@mail.gmail.com>
Date: Wed, 25 May 2016 17:30:22 +0800
From: Jeff Chua <jeff.chua.linux@...il.com>
To: Al Viro <viro@...iv.linux.org.uk>
Cc: lkml <linux-kernel@...r.kernel.org>,
Linus Torvalds <torvalds@...ux-foundation.org>
Subject: Re: can't boot with reiserfs on linux-4.6.0+
On Wed, May 25, 2016 at 2:37 AM, Al Viro <viro@...iv.linux.org.uk> wrote:
> On Tue, May 24, 2016 at 04:59:02PM +0100, Al Viro wrote:
>
>> Umm... Any chance of getting the function names to go with the addresses?
>> I'll try to reproduce it here, but the things would be easier with that
>> information...
>
> See if this fixes your reproducer.
>
> diff --git a/fs/xattr.c b/fs/xattr.c
> index b11945e..49b8eab 100644
> --- a/fs/xattr.c
> +++ b/fs/xattr.c
> @@ -667,6 +667,9 @@ xattr_resolve_name(const struct xattr_handler **handlers, const char **name)
> {
> const struct xattr_handler *handler;
>
> + if (!handlers)
> + return NULL;
> +
> if (!*name)
> return NULL;
>
Tried, but doesn't work.
Here's dmesg with symbols ...
[ 35.565534] BUG: unable to handle kernel NULL pointer dereference
at 0000000000000020
[ 35.566200] IP: [<ffffffff811033a1>] generic_getxattr+0x4f/0x5d
[ 35.566828] PGD 409992067 PUD 409993067 PMD 0
[ 35.567469] Oops: 0000 [#1] SMP
[ 35.568082] Modules linked in: usbhid
[ 35.568731] CPU: 1 PID: 1873 Comm: bash Not tainted 4.6.0 #5
[ 35.569339] Hardware name: LENOVO 20F5000RSG/20F5000RSG, BIOS
R02ET44W (1.17 ) 01/25/2016
[ 35.569981] task: ffff88040c3f2580 ti: ffff88040990c000 task.ti:
ffff88040990c000
[ 35.570603] RIP: 0010:[<ffffffff811033a1>] [<ffffffff811033a1>]
generic_getxattr+0x4f/0x5d
[ 35.571246] RSP: 0018:ffff88040990fdd8 EFLAGS: 00010207
[ 35.571843] RAX: 0000000000000000 RBX: ffff88041043d6c0 RCX: ffffffff819e2917
[ 35.572436] RDX: ffff8804104b4310 RSI: ffff88041043d6c0 RDI: 0000000000000000
[ 35.573085] RBP: ffff8804104b4310 R08: ffff88040990fe0c R09: 0000000000000014
[ 35.573673] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88040990fe0c
[ 35.574257] R13: ffff88040e60a6c0 R14: 0000000000000022 R15: 0000000000000000
[ 35.574868] FS: 00007f092f53e700(0000) GS:ffff880421440000(0000)
knlGS:0000000000000000
[ 35.575446] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 35.576013] CR2: 0000000000000020 CR3: 0000000409991000 CR4: 00000000003406e0
[ 35.576621] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 35.577186] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 35.577748] Stack:
[ 35.578342] 0000000000000014 ffffffff819e2917 ffff88040990fe3c
0000000000000000
[ 35.578960] ffff8800d25ce600 ffffffff81299993 ffffffff810c75a2
0000000000000000
[ 35.579583] 0000000000000000 ffff88040e607000 ffffffff81299bc1
0000000000000000
[ 35.580172] Call Trace:
[ 35.580749] [<ffffffff81299993>] ? get_vfs_caps_from_disk+0x51/0xcf
[ 35.581365] [<ffffffff810c75a2>] ? __vma_link_rb+0x58/0x73
[ 35.581933] [<ffffffff81299bc1>] ? cap_bprm_set_creds+0x1b0/0x420
[ 35.582504] [<ffffffff810ecddb>] ? prepare_binprm+0xce/0x107
[ 35.583095] [<ffffffff810ed6ed>] ? do_execveat_common.isra.49+0x3d0/0x5b4
[ 35.583657] [<ffffffff810ed8eb>] ? do_execve+0x1a/0x1c
[ 35.584248] [<ffffffff810edae3>] ? SyS_execve+0x23/0x2a
[ 35.584801] [<ffffffff81001066>] ? do_syscall_64+0x51/0x89
[ 35.585345] [<ffffffff816c1c80>] ? entry_SYSCALL64_slow_path+0x25/0x25
[ 35.585882] Code: 8b b8 a0 00 00 00 e8 6c fc ff ff 4c 8b 04 24 48
3d 00 f0 ff ff 77 19 4d 89 c1 48 8b 4c 24 08 4d 89 e0 48 89 ea 48 89
de 48 89 c7 <ff> 50 20 48 98 48 83 c4 10 5b 5d 41 5c c3 41 54 48 c7 c0
18 4e
[ 35.587155] RIP [<ffffffff811033a1>] generic_getxattr+0x4f/0x5d
[ 35.587776] RSP <ffff88040990fdd8>
[ 35.588351] CR2: 0000000000000020
[ 35.588974] ---[ end trace 1ac6eb2a9a9b2964 ]---
Thanks,
Jeff
Powered by blists - more mailing lists