[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Yhy4dXi1WxcKYBJH@qian>
Date: Mon, 28 Feb 2022 06:56:37 -0500
From: Qian Cai <quic_qiancai@...cinc.com>
To: Liam Howlett <liam.howlett@...cle.com>
CC: Nathan Chancellor <nathan@...nel.org>,
"maple-tree@...ts.infradead.org" <maple-tree@...ts.infradead.org>,
"linux-mm@...ck.org" <linux-mm@...ck.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
Andrew Morton <akpm@...ux-foundation.org>,
Mark Brown <broonie@...nel.org>
Subject: Re: [PATCH v6 00/71] Introducing the Maple Tree
On Sat, Feb 26, 2022 at 01:58:09AM +0000, Liam Howlett wrote:
> Maybe? I'm trying to figure out why it's having issues.. I've not been
> able to reproduce it with just my maple tree branch. Steven Rostedt
> found a bad commit that has been fixed in either 20220224, I believe
> [1]. It might be best to try next-20220225 and see if you have better
> luck if that's an option.
Same thing for next-20220225. I just need to boot it and it will crash
shortly after.
BUG: KASAN: use-after-free in move_vma.isra.0
Read of size 8 at addr ffff00088f74c7e8 by task apt-check/2331
CPU: 2 PID: 2331 Comm: apt-check Tainted: G W 5.17.0-rc5-next-20220225 #245
Hardware name: MiTAC RAPTOR EV-883832-X3-0001/RAPTOR, BIOS 1.6 06/28/2020
Call trace:
dump_backtrace
show_stack
dump_stack_lvl
print_address_description.constprop.0
kasan_report
__asan_report_load8_noabort
move_vma.isra.0
__do_sys_mremap
__arm64_sys_mremap
invoke_syscall
el0_svc_common.constprop.0
do_el0_svc
el0_svc
el0t_64_sync_handler
el0t_64_sync
Allocated by task 2331:
kasan_save_stack
__kasan_slab_alloc
slab_post_alloc_hook
kmem_cache_alloc
vm_area_dup
__split_vma
do_mas_align_munmap.isra.0
do_mas_munmap
__vm_munmap
__arm64_sys_munmap
invoke_syscall
el0_svc_common.constprop.0
do_el0_svc
el0_svc
el0t_64_sync_handler
el0t_64_sync
Freed by task 2331:
kasan_save_stack
kasan_set_track
kasan_set_free_info
__kasan_slab_free
kmem_cache_free
vm_area_free
remove_vma
do_mas_align_munmap.isra.0
do_mas_munmap
do_munmap
move_vma.isra.0
__do_sys_mremap
__arm64_sys_mremap
invoke_syscall
el0_svc_common.constprop.0
do_el0_svc
el0_svc
el0t_64_sync_handler
el0t_64_sync
The buggy address belongs to the object at ffff00088f74c7c8
which belongs to the cache vm_area_struct of size 144
The buggy address is located 32 bytes inside of
144-byte region [ffff00088f74c7c8, ffff00088f74c858)
The buggy address belongs to the physical page:
page:fffffc00223dd300 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x90f74c
head:fffffc00223dd300 order:2 compound_mapcount:0 compound_pincount:0
memcg:ffff000884a75001
flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
raw: 0bfffc0000010200 fffffc00223dd008 fffffc0021e6bc08 ffff000800f5b380
raw: 0000000000000000 0000000000210021 00000001ffffffff ffff000884a75001
page dumped because: kasan: bad access detected
Memory state around the buggy address:
ffff00088f74c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
ffff00088f74c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
>ffff00088f74c780: fc fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
^
ffff00088f74c800: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
ffff00088f74c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
==================================================================
Disabling lock debugging due to kernel taint
Unable to handle kernel paging request at virtual address dfff800000000004
KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027]
Mem abort info:
ESR = 0x96000004
EC = 0x25: DABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x04: level 0 translation fault
Data abort info:
ISV = 0, ISS = 0x00000004
CM = 0, WnR = 0
[dfff800000000004] address between user and kernel address ranges
Internal error: Oops: 96000004 [#1] PREEMPT SMP
Modules linked in: ipmi_devintf ipmi_msghandler cppc_cpufreq drm ip_tables x_tables ipv6 btrfs blake2b_generic libcrc32c xor xor_neon raid6_pq zstd_compress dm_mod crct10dif_ce nvme mlx5_core mpt3sas nvme_core raid_class
CPU: 2 PID: 2331 Comm: apt-check Tainted: G B W 5.17.0-rc5-next-20220225 #245
Hardware name: MiTAC RAPTOR EV-883832-X3-0001/RAPTOR, BIOS 1.6 06/28/2020
pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : move_vma.isra.0
lr : move_vma.isra.0
sp : ffff800016df7ad0
x29: ffff800016df7ad0 x28: ffff00088c7ba6c8 x27: 0000000000000001
x26: 0000ffffad180000 x25: ffff00088bea1c40 x24: ffff00088bea1dc8
x23: ffff00088c988040 x22: 0000000001800000 x21: 0000ffffab82d000
x20: 0000000000000000 x19: 1ffff00002dbef6c x18: 0000000000000066
x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
x14: 0000000000000000 x13: 0000000000001490 x12: 0000000000000001
x11: 0000000000000009 x10: 0000000000000000 x9 : ffff800008445544
x8 : 000000003fffffff x7 : ffff80000928fbc4 x6 : 00000000f1f1f1f1
x5 : dfff800000000000 x4 : ffff700002dbef18 x3 : 0000000041b58ab3
x2 : 0000000000000004 x1 : dfff800000000000 x0 : 0000000000000020
Call trace:
move_vma.isra.0
__do_sys_mremap
__arm64_sys_mremap
invoke_syscall
el0_svc_common.constprop.0
do_el0_svc
el0_svc
el0t_64_sync_handler
el0t_64_sync
Code: 91008000 d2d00001 f2fbffe1 d343fc02 (38e16841)
---[ end trace 0000000000000000 ]---
Kernel panic - not syncing: Oops: Fatal exception
SMP: stopping secondary CPUs
Kernel Offset: 0x160000 from 0xffff800008000000
PHYS_OFFSET: 0x80000000
CPU features: 0x00,00000942,40000846
Memory Limit: none
---[ end Kernel panic - not syncing: Oops: Fatal exception ]---
Powered by blists - more mailing lists