On Wed, May 25, 2016 at 2:37 AM, Al Viro <v...@zeniv.linux.org.uk> wrote:
> On Tue, May 24, 2016 at 04:59:02PM +0100, Al Viro wrote:
>
>> Umm...  Any chance of getting the function names to go with the addresses?
>> I'll try to reproduce it here, but the things would be easier with that
>> information...
>
> See if this fixes your reproducer.
>
> diff --git a/fs/xattr.c b/fs/xattr.c
> index b11945e..49b8eab 100644
> --- a/fs/xattr.c
> +++ b/fs/xattr.c
> @@ -667,6 +667,9 @@ xattr_resolve_name(const struct xattr_handler **handlers, 
> const char **name)
>  {
>         const struct xattr_handler *handler;
>
> +       if (!handlers)
> +               return NULL;
> +
>         if (!*name)
>                 return NULL;
>

Tried, but doesn't work.

Here's dmesg with symbols ...


[   35.565534] BUG: unable to handle kernel NULL pointer dereference
at 0000000000000020
[   35.566200] IP: [<ffffffff811033a1>] generic_getxattr+0x4f/0x5d
[   35.566828] PGD 409992067 PUD 409993067 PMD 0
[   35.567469] Oops: 0000 [#1] SMP
[   35.568082] Modules linked in: usbhid
[   35.568731] CPU: 1 PID: 1873 Comm: bash Not tainted 4.6.0 #5
[   35.569339] Hardware name: LENOVO 20F5000RSG/20F5000RSG, BIOS
R02ET44W (1.17 ) 01/25/2016
[   35.569981] task: ffff88040c3f2580 ti: ffff88040990c000 task.ti:
ffff88040990c000
[   35.570603] RIP: 0010:[<ffffffff811033a1>]  [<ffffffff811033a1>]
generic_getxattr+0x4f/0x5d
[   35.571246] RSP: 0018:ffff88040990fdd8  EFLAGS: 00010207
[   35.571843] RAX: 0000000000000000 RBX: ffff88041043d6c0 RCX: ffffffff819e2917
[   35.572436] RDX: ffff8804104b4310 RSI: ffff88041043d6c0 RDI: 0000000000000000
[   35.573085] RBP: ffff8804104b4310 R08: ffff88040990fe0c R09: 0000000000000014
[   35.573673] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88040990fe0c
[   35.574257] R13: ffff88040e60a6c0 R14: 0000000000000022 R15: 0000000000000000
[   35.574868] FS:  00007f092f53e700(0000) GS:ffff880421440000(0000)
knlGS:0000000000000000
[   35.575446] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   35.576013] CR2: 0000000000000020 CR3: 0000000409991000 CR4: 00000000003406e0
[   35.576621] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   35.577186] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   35.577748] Stack:
[   35.578342]  0000000000000014 ffffffff819e2917 ffff88040990fe3c
0000000000000000
[   35.578960]  ffff8800d25ce600 ffffffff81299993 ffffffff810c75a2
0000000000000000
[   35.579583]  0000000000000000 ffff88040e607000 ffffffff81299bc1
0000000000000000
[   35.580172] Call Trace:
[   35.580749]  [<ffffffff81299993>] ? get_vfs_caps_from_disk+0x51/0xcf
[   35.581365]  [<ffffffff810c75a2>] ? __vma_link_rb+0x58/0x73
[   35.581933]  [<ffffffff81299bc1>] ? cap_bprm_set_creds+0x1b0/0x420
[   35.582504]  [<ffffffff810ecddb>] ? prepare_binprm+0xce/0x107
[   35.583095]  [<ffffffff810ed6ed>] ? do_execveat_common.isra.49+0x3d0/0x5b4
[   35.583657]  [<ffffffff810ed8eb>] ? do_execve+0x1a/0x1c
[   35.584248]  [<ffffffff810edae3>] ? SyS_execve+0x23/0x2a
[   35.584801]  [<ffffffff81001066>] ? do_syscall_64+0x51/0x89
[   35.585345]  [<ffffffff816c1c80>] ? entry_SYSCALL64_slow_path+0x25/0x25
[   35.585882] Code: 8b b8 a0 00 00 00 e8 6c fc ff ff 4c 8b 04 24 48
3d 00 f0 ff ff 77 19 4d 89 c1 48 8b 4c 24 08 4d 89 e0 48 89 ea 48 89
de 48 89 c7 <ff> 50 20 48 98 48 83 c4 10 5b 5d 41 5c c3 41 54 48 c7 c0
18 4e
[   35.587155] RIP  [<ffffffff811033a1>] generic_getxattr+0x4f/0x5d
[   35.587776]  RSP <ffff88040990fdd8>
[   35.588351] CR2: 0000000000000020
[   35.588974] ---[ end trace 1ac6eb2a9a9b2964 ]---

Thanks,
Jeff

Reply via email to