BUG: unable to handle kernel paing request at fffffc0000000000
From: chenjiankang
Date: Wed Mar 14 2018 - 04:14:37 EST
hello everyone:
my kernel version is 3.10.0-327.62.59.101.x86_64, and
why this Kasan's shadow memory is lost?
Thanks;
BUG: unable to handle kernel paging request at fffffc0000000000
IP: [<ffffffff8142160b>] kasan_mem_to_shadow include/linux/kasan.h:20 [inline]
IP: [<ffffffff8142160b>] memory_is_poisoned_4 mm/kasan/kasan.c:122 [inline]
IP: [<ffffffff8142160b>] memory_is_poisoned mm/kasan/kasan.c:244 [inline]
IP: [<ffffffff8142160b>] check_memory_region_inline mm/kasan/kasan.c:270 [inline]
IP: [<ffffffff8142160b>] __asan_load4+0x2b/0x80 mm/kasan/kasan.c:524
PGD 0
Oops: 0000 [#1] SMP KASAN
Dumping ftrace buffer:
(ftrace buffer empty)
Modules linked in:
CPU: 1 PID: 21826 Comm: syz-executor0 Tainted: G B ---- ------- T 3.10.0-327.62.59.101.x86_64+ #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.9.3-0-ge2fc41e-prebuilt.qemu-project.org 04/01/2014
task: ffff8802337ae680 ti: ffff880212dc8000 task.ti: ffff880212dc8000
RIP: 0010:[<ffffffff8142160b>] [<ffffffff8142160b>] kasan_mem_to_shadow include/linux/kasan.h:20 [inline]
RIP: 0010:[<ffffffff8142160b>] [<ffffffff8142160b>] memory_is_poisoned_4 mm/kasan/kasan.c:122 [inline]
RIP: 0010:[<ffffffff8142160b>] [<ffffffff8142160b>] memory_is_poisoned mm/kasan/kasan.c:244 [inline]
RIP: 0010:[<ffffffff8142160b>] [<ffffffff8142160b>] check_memory_region_inline mm/kasan/kasan.c:270 [inline]
RIP: 0010:[<ffffffff8142160b>] [<ffffffff8142160b>] __asan_load4+0x2b/0x80 mm/kasan/kasan.c:524
RSP: 0018:ffff880212dcfba0 EFLAGS: 00010286
RAX: fffffbffffffffff RBX: ffff8802286ddd60 RCX: ffffffff8167b601
RDX: dffffc0000000000 RSI: 0000000000000008 RDI: fffffffffffffff8
RBP: ffff880212dcfba0 R08: 0000000000000007 R09: 0000000000000000
R10: ffff880000000000 R11: 0000000000000000 R12: ffff8802286da980
R13: 0000000000000000 R14: fffffffffffffff8 R15: ffffffff81c9b370
FS: 0000000000000000(0000) GS:ffff8800bb100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffc0000000000 CR3: 000000000255a000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Call Trace:
[<ffffffff8167b601>] crypto_ahash_digestsize include/crypto/hash.h:148 [inline]
[<ffffffff8167b601>] hash_sock_destruct+0x81/0x160 crypto/algif_hash.c:270
[<ffffffff81ca20f4>] __sk_free+0x44/0x330 net/core/sock.c:1392
[<ffffffff81ca240d>] sk_free+0x2d/0x40 net/core/sock.c:1422
[<ffffffff816792f5>] sock_put include/net/sock.h:1722 [inline]
[<ffffffff816792f5>] af_alg_release+0x55/0x70 crypto/af_alg.c:123
[<ffffffff81c9b23c>] sock_release+0x5c/0x190 net/socket.c:570
[<ffffffff81c9b38b>] sock_close+0x1b/0x20 net/socket.c:1161
[<ffffffff8146263b>] __fput+0x1bb/0x560 fs/file_table.c:246
[<ffffffff81462caa>] ____fput+0x1a/0x20 fs/file_table.c:283
[<ffffffff811721df>] task_work_run+0x11f/0x1e0 kernel/task_work.c:87
[<ffffffff8112101b>] exit_task_work include/linux/task_work.h:21 [inline]
[<ffffffff8112101b>] do_exit+0x68b/0x1b40 kernel/exit.c:815
[<ffffffff811225d1>] do_group_exit+0x91/0x1f0 kernel/exit.c:948
[<ffffffff81122752>] SYSC_exit_group kernel/exit.c:959 [inline]
[<ffffffff81122752>] SyS_exit_group+0x22/0x30 kernel/exit.c:957
[<ffffffff81fac0bd>] system_call_fastpath+0x16/0x1b
Code: 55 48 b8 ff ff ff ff ff 7f ff ff 48 39 c7 48 89 e5 48 8b 4d 08 76 43 48 89 f8 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 48 01 d0 <66> 83 38 00 75 07 5d c3 0f 1f 44 00 00 48 8d 77 03 49 89 f0 49
RIP [<ffffffff8142160b>] kasan_mem_to_shadow include/linux/kasan.h:20 [inline]
RIP [<ffffffff8142160b>] memory_is_poisoned_4 mm/kasan/kasan.c:122 [inline]
RIP [<ffffffff8142160b>] memory_is_poisoned mm/kasan/kasan.c:244 [inline]
RIP [<ffffffff8142160b>] check_memory_region_inline mm/kasan/kasan.c:270 [inline]
RIP [<ffffffff8142160b>] __asan_load4+0x2b/0x80 mm/kasan/kasan.c:524
RSP <ffff880212dcfba0>
CR2: fffffc0000000000