Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp502347pxb; Wed, 24 Feb 2021 07:43:17 -0800 (PST) X-Google-Smtp-Source: ABdhPJxMKMfonrbG0ZvHGav+j7PjvRpWlxrI/nqGz9/f6aMZpTaI0bzzy1DpzVlu2fOek94bDSoP X-Received: by 2002:a17:906:dc8e:: with SMTP id cs14mr2029529ejc.66.1614181397455; Wed, 24 Feb 2021 07:43:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614181397; cv=none; d=google.com; s=arc-20160816; b=d+Sjh+Z3xFwym6/Dso2tyxgyGcC7MgV2J/nfP60wTp44E+dQxpafSLwAM/A3k1pyoi cgePGr3JutXXMLanyZAE+HeL4HvLfcqQRpLUbM/KfTLc7acEs3iytvILUI147oVbfnCs c7TtvFsowzQp8QqDWZ3R0ovHzTMWxOktjVZyJWjlUskrpqu6ctByQg7rGix8HMYHn3/v US2GEfEdGOkIjrdCMjUvlGqc30+aqDOd5VLWh5nmZhsfFHz+yguJC62/++Cw7P8SZq1q WnrI5W4KYqECiuEHTpNyaYUuml7ZU4EWoJ85dqwP3HUJmzjuO2xPeQZMiHY8qqzRl34G wRqg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=mYuft9T8+iiS2kPYO3FPRm/5PFCY+Od9P0ROP2gwwq4=; b=FkU09yV/c+koIBTKJYMwHnCIprXd9PysMWQUvQ6mhov7FWPzQlSHzT7PrQpL2oB1Nc oFf/cd1WPgdGa3BIoWotVlv0JsPbV5FC62vXb4s6r+UTEkEwH8PNC7408bmhdM0hSLS3 xQAC+kbnDA3KUIC3dNHlZ40n7PVJheiz2fU2qGatSrX/lp990uUKgNHku+cXw1QNa0cB pNOpGW320yrlmPVjO8BS3PN014jWqNGWGrmVjJvirjFSjz5LTEw3mPRvWh0p8bdBeOKi GlX398qIb8mx2l+1rNPbHX4b0CmvNRQNtwaJGl0xtyz4/cws02oNEVjomS8SC0qR2ntZ Pw9Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=QreuBD6Q; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id hp35si1747215ejc.477.2021.02.24.07.42.52; Wed, 24 Feb 2021 07:43:17 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=QreuBD6Q; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234934AbhBXPjm (ORCPT + 99 others); Wed, 24 Feb 2021 10:39:42 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36634 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235573AbhBXPM1 (ORCPT ); Wed, 24 Feb 2021 10:12:27 -0500 Received: from mail-pg1-x535.google.com (mail-pg1-x535.google.com [IPv6:2607:f8b0:4864:20::535]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 42FACC06174A for ; Wed, 24 Feb 2021 07:11:43 -0800 (PST) Received: by mail-pg1-x535.google.com with SMTP id p21so1615064pgl.12 for ; Wed, 24 Feb 2021 07:11:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=mYuft9T8+iiS2kPYO3FPRm/5PFCY+Od9P0ROP2gwwq4=; b=QreuBD6QEEmntTpXNybVSONpyCYwDsnIqQA1MvlcCSwM7j8GAQjdzTbPzHPqhubByi akb4UvxbTPfarwd87WBU2eDTxeR0IZ3ZX+0pmkLbptmpgu4NikXKzdzIzWHl1jOf08Zj mJWf9zSfLwbjfY30Puc2rceSfDEAmA9Bk21d0TNbG9Cnk6salTiVjEk5e6MxsYUbFT9a YFQjCxfB+ts92GrJeNpJJv0I6+GsmZ009DNX0H/gsRMRQ0vz8Nwhg8A6jkf/VI+0sYXu 8OcguNzYvHFb78o7tNR0C7YwSB9an9uVpakLwrOjes/WMfukJtqMDbeizPP4T2ro8sqB oEZA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=mYuft9T8+iiS2kPYO3FPRm/5PFCY+Od9P0ROP2gwwq4=; b=MTPtsPUIxxkpVCzn4KBE/h6gAr1HUAVEa9MYPanMz+7dqCLMGfhTNpBRVTNYggjKjO JZf8IxLabW3AlzjcseIiUkEJ0rQ1Jdt44kS1VjxsdD5X2Mao3Z5JH0rvljDIyA2e/GEZ uRU8ByE2nzeplJB0zA4xCghYtRtsvwS4F2hS06S5TsUmPelE4CDijUGjHzuU1AgnAvSD mbfSKPfaieRQu8orrLJQAvv3frmOvlIh5VBm3nLPlXqAzf8ja7iaPJqqiDYspuvDxeVD mZa0KKLMebPcihWrmTc0LcXGkROqnB8P/zyYN7PPBskqSBQABXpkqTHnsULeQj8cbwuZ Owfg== X-Gm-Message-State: AOAM532dRGfEmbeD0l/tabCuDiXH0ol0uK8ticH4wPK/vvItQjkHezoE UDUn3tLPeAtqfB+56TRfUrVMgWzN3JvFgdxpgQ+LCw== X-Received: by 2002:aa7:91d2:0:b029:1ed:b10b:5a7 with SMTP id z18-20020aa791d20000b02901edb10b05a7mr7807894pfa.2.1614179502707; Wed, 24 Feb 2021 07:11:42 -0800 (PST) MIME-Version: 1.0 References: <0000000000005ccf1b05b7665adc@google.com> <0000000000002e14c105bc14962e@google.com> In-Reply-To: <0000000000002e14c105bc14962e@google.com> From: Andrey Konovalov Date: Wed, 24 Feb 2021 16:11:31 +0100 Message-ID: Subject: Re: BUG: unable to handle kernel NULL pointer dereference in call_rcu To: syzbot Cc: Alexey Dobriyan , Andrew Morton , Andrey Ryabinin , Dmitry Vyukov , Marco Elver , Alexander Potapenko , gustavoars@kernel.org, LKML , longman@redhat.com, Stephen Rothwell , syzkaller-bugs , Linus Torvalds , Vincenzo Frascino , Vasily Averin , Walter Wu Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Feb 24, 2021 at 1:58 PM syzbot wrote: > > syzbot has bisected this issue to: > > commit 97593cad003c668e2532cb2939a24a031f8de52d > Author: Andrey Konovalov > Date: Tue Dec 22 20:03:28 2020 +0000 > > kasan: sanitize objects when metadata doesn't fit > > bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=106689b6d00000 > start commit: 614cb589 Merge tag 'acpi-5.11-rc1-2' of git://git.kernel.o.. > git tree: upstream > final oops: https://syzkaller.appspot.com/x/report.txt?x=126689b6d00000 > console output: https://syzkaller.appspot.com/x/log.txt?x=146689b6d00000 > kernel config: https://syzkaller.appspot.com/x/.config?x=bf519e1e96191576 > dashboard link: https://syzkaller.appspot.com/bug?extid=9d3ede723bdc58553f13 > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=11830e93500000 > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=13d92057500000 > > Reported-by: syzbot+9d3ede723bdc58553f13@syzkaller.appspotmail.com > Fixes: 97593cad003c ("kasan: sanitize objects when metadata doesn't fit") > > For information about bisection process see: https://goo.gl/tpsmEJ#bisection #syz fix: kasan: fix null pointer dereference in kasan_record_aux_stack