Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753444AbdDJOGt (ORCPT ); Mon, 10 Apr 2017 10:06:49 -0400 Received: from outbound-smtp04.blacknight.com ([81.17.249.35]:45189 "EHLO outbound-smtp04.blacknight.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753339AbdDJOGs (ORCPT ); Mon, 10 Apr 2017 10:06:48 -0400 Date: Mon, 10 Apr 2017 15:06:46 +0100 From: Mel Gorman To: zhong jiang Cc: Michal Hocko , Johannes Weiner , vdavydov.dev@gmail.com, Vlastimil Babka , Linux Memory Management List , LKML Subject: Re: NULL pointer dereference in the kernel 3.10 Message-ID: <20170410140646.hyfbzc5367442hty@techsingularity.net> References: <58E8E81E.6090304@huawei.com> <20170410085604.zpenj6ggc3dsbgxw@techsingularity.net> <58EB761E.9040002@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-15 Content-Disposition: inline In-Reply-To: <58EB761E.9040002@huawei.com> User-Agent: Mutt/1.6.2 (2016-07-01) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1614 Lines: 34 On Mon, Apr 10, 2017 at 08:10:06PM +0800, zhong jiang wrote: > On 2017/4/10 16:56, Mel Gorman wrote: > > On Sat, Apr 08, 2017 at 09:39:42PM +0800, zhong jiang wrote: > >> when runing the stabile docker cases in the vm. The following issue will come up. > >> > >> #40 [ffff8801b57ffb30] async_page_fault at ffffffff8165c9f8 > >> [exception RIP: down_read_trylock+5] > >> RIP: ffffffff810aca65 RSP: ffff8801b57ffbe8 RFLAGS: 00010202 > >> RAX: 0000000000000000 RBX: ffff88018ae858c1 RCX: 0000000000000000 > >> RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 > >> RBP: ffff8801b57ffc10 R8: ffffea0006903de0 R9: ffff8800b3c61810 > >> R10: 00000000000022cb R11: 0000000000000000 R12: ffff88018ae858c0 > >> R13: ffffea0006903dc0 R14: 0000000000000008 R15: ffffea0006903dc0 > >> ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0000 > > Post the full report including the kernel version and state whether any > > additional patches to 3.10 are applied. > > > Hi, Mel > > Our kernel from RHEL 7.2, Addtional patches all from upstream -- include Bugfix and CVE. > > Commit 624483f3ea8 ("mm: rmap: fix use-after-free in __put_anon_vma") exclude in > the RHEL 7.2. it looks seems to the issue. but I don't know how it triggered. > or it is not the correct fix. Any suggestion? Thanks > I'm afraid you'll need to bring it up with RHEL support as it contains a number of backported patches from them that cannot be meaningfully evaluated outside of RedHat and they may have additional questions on the patches applied on top. -- Mel Gorman SUSE Labs