Revision b4411616c26f26c4017b8fa4d3538b1a02028733 authored by Pavel Begunkov on 13 January 2021, 12:42:24 UTC, committed by Jens Axboe on 13 January 2021, 15:29:17 UTC
general protection fault, probably for non-canonical address 0xdffffc0000000022: 0000 [#1] KASAN: null-ptr-deref in range [0x0000000000000110-0x0000000000000117] RIP: 0010:io_ring_set_wakeup_flag fs/io_uring.c:6929 [inline] RIP: 0010:io_disable_sqo_submit+0xdb/0x130 fs/io_uring.c:8891 Call Trace: io_uring_create fs/io_uring.c:9711 [inline] io_uring_setup+0x12b1/0x38e0 fs/io_uring.c:9739 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 io_disable_sqo_submit() might be called before user rings were allocated, don't do io_ring_set_wakeup_flag() in those cases. Reported-by: syzbot+ab412638aeb652ded540@syzkaller.appspotmail.com Fixes: d9d05217cb69 ("io_uring: stop SQPOLL submit on creator's death") Signed-off-by: Pavel Begunkov <asml.silence@gmail.com> Signed-off-by: Jens Axboe <axboe@kernel.dk>
1 parent 621fadc
File | Mode | Size |
---|---|---|
apparmor | ||
bpf | ||
integrity | ||
keys | ||
loadpin | ||
lockdown | ||
safesetid | ||
selinux | ||
smack | ||
tomoyo | ||
yama | ||
Kconfig | -rw-r--r-- | 10.7 KB |
Kconfig.hardening | -rw-r--r-- | 8.8 KB |
Makefile | -rw-r--r-- | 1.3 KB |
commoncap.c | -rw-r--r-- | 39.0 KB |
device_cgroup.c | -rw-r--r-- | 21.1 KB |
inode.c | -rw-r--r-- | 10.6 KB |
lsm_audit.c | -rw-r--r-- | 10.7 KB |
min_addr.c | -rw-r--r-- | 1.3 KB |
security.c | -rw-r--r-- | 63.9 KB |
Computing file changes ...