Re: BUG: corrupted list in process_one_work

13 views
Skip to first unread message

syzbot

unread,
May 9, 2022, 5:50:08 AM5/9/22
to syzkaller-a...@googlegroups.com, tadeus...@linaro.org
Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
general protection fault in process_one_work

general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 1 PID: 386 Comm: kworker/1:3 Not tainted 5.10.101-syzkaller-00002-ga37eec78a6b7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: 0x0
(wg-crypt-wg1)

RIP: 0010:process_one_work+0xbc/0xc10 kernel/workqueue.c:2195
Code: df e8 98 cf 5f 00 4c 89 7d b8 4c 8b 2b 49 8d 5c 24 08 48 89 d9 48 c1 e9 03 48 b8 00 00 00 00 00 fc ff df 48 89 8d 70 ff ff ff <80> 3c 01 00 74 08 48 89 df e8 66 cf 5f 00 41 bf 00 01 00 00 48 89
RSP: 0018:ffffc90000ce7d28 EFLAGS: 00010002

RAX: dffffc0000000000 RBX: 0000000000000008 RCX: 0000000000000001
RDX: ffff888106dacf00 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc90000ce7dc0 R08: ffffffff8146ab5b R09: ffffed102208be8e
R10: ffffed102208be8e R11: 1ffff1102208be8d R12: 0000000000000000
R13: ffff8881f7355700 R14: dffffc0000000000 R15: ffff88810519f800
FS: 0000000000000000(0000) GS:ffff8881f7300000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fffd7fdab28 CR3: 000000011d390000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
worker_thread+0xb27/0x1550 kernel/workqueue.c:2442
kthread+0x349/0x3d0 kernel/kthread.c:313
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296
Modules linked in:

---[ end trace 5e9b032eaaf0793d ]---
RIP: 0010:process_one_work+0xbc/0xc10 kernel/workqueue.c:2195
Code: df e8 98 cf 5f 00 4c 89 7d b8 4c 8b 2b 49 8d 5c 24 08 48 89 d9 48 c1 e9 03 48 b8 00 00 00 00 00 fc ff df 48 89 8d 70 ff ff ff <80> 3c 01 00 74 08 48 89 df e8 66 cf 5f 00 41 bf 00 01 00 00 48 89
RSP: 0018:ffffc90000ce7d28 EFLAGS: 00010002

RAX: dffffc0000000000 RBX: 0000000000000008 RCX: 0000000000000001
RDX: ffff888106dacf00 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc90000ce7dc0 R08: ffffffff8146ab5b R09: ffffed102208be8e
R10: ffffed102208be8e R11: 1ffff1102208be8d R12: 0000000000000000
R13: ffff8881f7355700 R14: dffffc0000000000 R15: ffff88810519f800
FS: 0000000000000000(0000) GS:ffff8881f7300000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fffd7fdab28 CR3: 000000011d390000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: df e8 fucomip %st(0),%st
2: 98 cwtl
3: cf iret
4: 5f pop %rdi
5: 00 4c 89 7d add %cl,0x7d(%rcx,%rcx,4)
9: b8 4c 8b 2b 49 mov $0x492b8b4c,%eax
e: 8d 5c 24 08 lea 0x8(%rsp),%ebx
12: 48 89 d9 mov %rbx,%rcx
15: 48 c1 e9 03 shr $0x3,%rcx
19: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax
20: fc ff df
23: 48 89 8d 70 ff ff ff mov %rcx,-0x90(%rbp)
* 2a: 80 3c 01 00 cmpb $0x0,(%rcx,%rax,1) <-- trapping instruction
2e: 74 08 je 0x38
30: 48 89 df mov %rbx,%rdi
33: e8 66 cf 5f 00 callq 0x5fcf9e
38: 41 bf 00 01 00 00 mov $0x100,%r15d
3e: 48 rex.W
3f: 89 .byte 0x89


Tested on:

commit: a37eec78 UPSTREAM: mm: fix unexpected zeroed page mapp..
git tree: https://android.googlesource.com/kernel/common android12-5.10
console output: https://syzkaller.appspot.com/x/log.txt?x=14ede63ef00000
kernel config: https://syzkaller.appspot.com/x/.config?x=95671325401eb9fb
dashboard link: https://syzkaller.appspot.com/bug?extid=badfd07a93cffefd7317
compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2

Note: no patches were applied.

syzbot

unread,
May 11, 2022, 5:21:08 PM5/11/22
to syzkaller-a...@googlegroups.com, tadeus...@linaro.org
Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
general protection fault in dst_dev_put

general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 0 PID: 491 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:dst_dev_put+0x26/0x1c0 net/core/dst.c:154
Code: 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 49 89 ff 49 bc 00 00 00 00 00 fc ff df e8 41 cd 99 fd 4d 89 fd 49 c1 ed 03 <43> 80 7c 25 00 00 74 08 4c 89 ff e8 aa 8b d8 fd 4d 8b 37 49 8d 7f
RSP: 0018:ffffc90000007b38 EFLAGS: 00010246
RAX: ffffffff83d6aaaf RBX: 0000000000000003 RCX: ffff88810cd14300
RDX: 0000000000000101 RSI: 0000000000000000 RDI: 0000000000000003
RBP: ffffc90000007b60 R08: ffffffff8424068d R09: 000000000000000b
R10: ffffc900000077f0 R11: 1ffff92000000ee0 R12: dffffc0000000000
R13: 0000000000000000 R14: 0000607e08a3f028 R15: 0000000000000003
FS: 00007fe01f7f2700(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f5f6fd6c058 CR3: 0000000112849000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<IRQ>
rt_fibinfo_free_cpus+0xee/0x1c0 net/ipv4/fib_semantics.c:205
fib_nh_common_release+0x8d/0x240 net/ipv4/fib_semantics.c:216
fib_nh_release net/ipv4/fib_semantics.c:228 [inline]
free_fib_info_rcu+0x98/0x190 net/ipv4/fib_semantics.c:240
rcu_do_batch+0x507/0xbc0 kernel/rcu/tree.c:2535
rcu_core+0x4dc/0xef0 kernel/rcu/tree.c:2786
rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2803
__do_softirq+0x24e/0x586 kernel/softirq.c:558
invoke_softirq+0x70/0xd0 kernel/softirq.c:432
__irq_exit_rcu+0x4f/0xb0 kernel/softirq.c:637
irq_exit_rcu+0x9/0x10 kernel/softirq.c:649
sysvec_apic_timer_interrupt+0x9a/0xc0 arch/x86/kernel/apic/apic.c:1097
</IRQ>
<TASK>
asm_sysvec_apic_timer_interrupt+0x12/0x20
RIP: 0010:console_unlock+0xbf9/0x11b0 kernel/printk/printk.c:2779
Code: 00 48 81 e3 00 02 00 00 75 17 e8 02 e9 18 00 45 84 ff 74 1c e9 fe 04 00 00 0f 1f 84 00 00 00 00 00 e8 eb e8 18 00 fb 45 84 ff <0f> 85 e7 04 00 00 48 c7 c7 a0 fb 0d 86 be 04 00 00 00 e8 40 a9 57
RSP: 0018:ffffc90002b77260 EFLAGS: 00000246
RAX: ffffffff81578f05 RBX: 0000000000000200 RCX: ffff88810cd14300
RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000000000000
RBP: ffffc90002b774b0 R08: ffffffff81578ee0 R09: 0000000000000003
R10: fffff5200056ee3d R11: 1ffff9200056ee3c R12: ffffffff863fa0c8
R13: ffffc90002b77420 R14: dffffc0000000000 R15: 0000000000000000
vprintk_emit+0x141/0x440 kernel/printk/printk.c:2272
vprintk_default+0x26/0x30 kernel/printk/printk.c:2283
vprintk+0x86/0x90 kernel/printk/printk_safe.c:50
_printk+0xcf/0x10f kernel/printk/printk.c:2293
fail_dump lib/fault-inject.c:45 [inline]
should_fail+0x398/0x510 lib/fault-inject.c:146
__should_failslab+0x9f/0xe0 mm/failslab.c:33
should_failslab+0x9/0x20 mm/slab_common.c:1313
slab_pre_alloc_hook mm/slab.h:724 [inline]
slab_alloc_node mm/slub.c:3131 [inline]
slab_alloc mm/slub.c:3225 [inline]
kmem_cache_alloc_trace+0x4a/0x320 mm/slub.c:3256
kmalloc include/linux/slab.h:581 [inline]
kzalloc include/linux/slab.h:714 [inline]
percpu_ref_init+0xc9/0x350 lib/percpu-refcount.c:76
css_create kernel/cgroup/cgroup.c:5312 [inline]
cgroup_apply_control_enable+0x383/0x10c0 kernel/cgroup/cgroup.c:3124
cgroup_apply_control+0x93/0x710 kernel/cgroup/cgroup.c:3206
cgroup_subtree_control_write+0xdde/0x1340 kernel/cgroup/cgroup.c:3364
cgroup_file_write+0x28e/0x590 kernel/cgroup/cgroup.c:3882
kernfs_fop_write_iter+0x2cd/0x410 fs/kernfs/file.c:291
call_write_iter include/linux/fs.h:2050 [inline]
new_sync_write fs/read_write.c:504 [inline]
vfs_write+0xbb4/0xf30 fs/read_write.c:591
ksys_write+0x198/0x2c0 fs/read_write.c:644
__do_sys_write fs/read_write.c:656 [inline]
__se_sys_write fs/read_write.c:653 [inline]
__x64_sys_write+0x7b/0x90 fs/read_write.c:653
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x2f/0x50 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fe01e689049
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fe01f7f2168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007fe01e79c030 RCX: 00007fe01e689049
RDX: 0000000000000006 RSI: 0000000020000140 RDI: 0000000000000004
RBP: 00007fe01f7f21d0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 00007ffd6905515f R14: 00007fe01f7f2300 R15: 0000000000022000
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:dst_dev_put+0x26/0x1c0 net/core/dst.c:154
Code: 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 49 89 ff 49 bc 00 00 00 00 00 fc ff df e8 41 cd 99 fd 4d 89 fd 49 c1 ed 03 <43> 80 7c 25 00 00 74 08 4c 89 ff e8 aa 8b d8 fd 4d 8b 37 49 8d 7f
RSP: 0018:ffffc90000007b38 EFLAGS: 00010246
RAX: ffffffff83d6aaaf RBX: 0000000000000003 RCX: ffff88810cd14300
RDX: 0000000000000101 RSI: 0000000000000000 RDI: 0000000000000003
RBP: ffffc90000007b60 R08: ffffffff8424068d R09: 000000000000000b
R10: ffffc900000077f0 R11: 1ffff92000000ee0 R12: dffffc0000000000
R13: 0000000000000000 R14: 0000607e08a3f028 R15: 0000000000000003
FS: 00007fe01f7f2700(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f5f6fd6c058 CR3: 0000000112849000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 55 push %rbp
5: 48 89 e5 mov %rsp,%rbp
8: 41 57 push %r15
a: 41 56 push %r14
c: 41 55 push %r13
e: 41 54 push %r12
10: 53 push %rbx
11: 49 89 ff mov %rdi,%r15
14: 49 bc 00 00 00 00 00 movabs $0xdffffc0000000000,%r12
1b: fc ff df
1e: e8 41 cd 99 fd callq 0xfd99cd64
23: 4d 89 fd mov %r15,%r13
26: 49 c1 ed 03 shr $0x3,%r13
* 2a: 43 80 7c 25 00 00 cmpb $0x0,0x0(%r13,%r12,1) <-- trapping instruction
30: 74 08 je 0x3a
32: 4c 89 ff mov %r15,%rdi
35: e8 aa 8b d8 fd callq 0xfdd88be4
3a: 4d 8b 37 mov (%r15),%r14
3d: 49 rex.WB
3e: 8d .byte 0x8d
3f: 7f .byte 0x7f


Tested on:

commit: feb9c5e1 Merge tag 'for_linus' of git://git.kernel.org..
git tree: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
console output: https://syzkaller.appspot.com/x/log.txt?x=11e83576f00000
kernel config: https://syzkaller.appspot.com/x/.config?x=764578402c280e93

syzbot

unread,
May 11, 2022, 8:39:10 PM5/11/22
to syzkaller-a...@googlegroups.com, tadeus...@linaro.org
Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
BUG: corrupted list in process_one_work

list_del corruption. next->prev should be ffffe8ffffd1f238, but was ffff8881f733cb68. (next=ffff888112784070)
------------[ cut here ]------------
kernel BUG at lib/list_debug.c:56!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 21 Comm: kworker/1:0 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: wg-crypt-wg2 wg_packet_decrypt_worker

RIP: 0010:__list_del_entry_valid+0xff/0x110 lib/list_debug.c:54
Code: 48 c7 c7 20 1a 68 85 4c 89 fe 48 89 d9 31 c0 e8 e7 b1 55 02 0f 0b 48 c7 c7 a0 1a 68 85 4c 89 fe 4c 89 f1 31 c0 e8 d1 b1 55 02 <0f> 0b cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 55 48 89 e5 41
RSP: 0018:ffffc90000167ce0 EFLAGS: 00010046

RAX: 000000000000006d RBX: ffff888112784078 RCX: 924ecfb5ef410200
RDX: 0000000000000000 RSI: 0000000080000001 RDI: 0000000000000000
RBP: ffffc90000167d00 R08: ffffffff81579578 R09: ffffed103ee665d1
R10: ffffed103ee665d1 R11: 1ffff1103ee665d0 R12: dffffc0000000000
R13: dffffc0000000000 R14: ffff888112784070 R15: ffffe8ffffd1f238
FS: 0000000000000000(0000) GS:ffff8881f7300000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f33dfdfeff8 CR3: 000000011ffae000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
__list_del_entry include/linux/list.h:134 [inline]
list_del_init include/linux/list.h:206 [inline]
process_one_work+0x45b/0xbf0 kernel/workqueue.c:2233
worker_thread+0xb3c/0x1390 kernel/workqueue.c:2436
kthread+0x26b/0x300 kernel/kthread.c:376
ret_from_fork+0x1f/0x30
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:__list_del_entry_valid+0xff/0x110 lib/list_debug.c:54
Code: 48 c7 c7 20 1a 68 85 4c 89 fe 48 89 d9 31 c0 e8 e7 b1 55 02 0f 0b 48 c7 c7 a0 1a 68 85 4c 89 fe 4c 89 f1 31 c0 e8 d1 b1 55 02 <0f> 0b cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 55 48 89 e5 41
RSP: 0018:ffffc90000167ce0 EFLAGS: 00010046

RAX: 000000000000006d RBX: ffff888112784078 RCX: 924ecfb5ef410200
RDX: 0000000000000000 RSI: 0000000080000001 RDI: 0000000000000000
RBP: ffffc90000167d00 R08: ffffffff81579578 R09: ffffed103ee665d1
R10: ffffed103ee665d1 R11: 1ffff1103ee665d0 R12: dffffc0000000000
R13: dffffc0000000000 R14: ffff888112784070 R15: ffffe8ffffd1f238
FS: 0000000000000000(0000) GS:ffff8881f7300000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f33dfdfeff8 CR3: 000000011ffae000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400


Tested on:

commit: feb9c5e1 Merge tag 'for_linus' of git://git.kernel.org..
git tree: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
console output: https://syzkaller.appspot.com/x/log.txt?x=11202459f00000

syzbot

unread,
May 12, 2022, 4:39:19 PM5/12/22
to syzkaller-a...@googlegroups.com, tadeus...@linaro.org
Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
BUG: corrupted list in insert_work

list_add corruption. prev->next should be next (ffff8881f723cb68), but was ffff8881126ea870. (prev=ffff8881126ea870).
------------[ cut here ]------------
kernel BUG at lib/list_debug.c:28!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 14 Comm: ksoftirqd/0 Not tainted 5.18.0-rc6-syzkaller-00015-g0ac824f379fb #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__list_add_valid+0xc6/0xd0 lib/list_debug.c:26
Code: 48 c7 c7 c0 1a 68 85 4c 89 e6 4c 89 f1 31 c0 e8 f0 b2 55 02 0f 0b 48 c7 c7 80 1b 68 85 4c 89 f6 4c 89 e1 31 c0 e8 da b2 55 02 <0f> 0b 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 41 54 53 49
RSP: 0018:ffffc900000e7898 EFLAGS: 00010046

RAX: 0000000000000075 RBX: ffff8881f723cb70 RCX: 11a3db236f8a2800
RDX: 0000000080000101 RSI: 0000000080000101 RDI: 0000000000000000
RBP: ffffc900000e78c0 R08: ffffffff81579578 R09: ffffed103ee465d1
R10: ffffed103ee465d1 R11: 1ffff1103ee465d0 R12: ffff8881126ea870
R13: dffffc0000000000 R14: ffff8881f723cb68 R15: ffff8881126ea870
FS: 0000000000000000(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555556885b38 CR3: 000000012533b000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
__list_add include/linux/list.h:69 [inline]
list_add_tail include/linux/list.h:102 [inline]
insert_work+0x104/0x320 kernel/workqueue.c:1362
__queue_work+0x960/0xd20 kernel/workqueue.c:1517
queue_work_on+0xf2/0x170 kernel/workqueue.c:1545
queue_work include/linux/workqueue.h:502 [inline]
css_release+0xae/0xc0 kernel/cgroup/cgroup.c:5214
percpu_ref_put_many include/linux/percpu-refcount.h:335 [inline]
percpu_ref_put include/linux/percpu-refcount.h:351 [inline]
percpu_ref_call_confirm_rcu lib/percpu-refcount.c:163 [inline]
percpu_ref_switch_to_atomic_rcu+0x60d/0x620 lib/percpu-refcount.c:205
rcu_do_batch+0x507/0xbc0 kernel/rcu/tree.c:2535
rcu_core+0x4dc/0xef0 kernel/rcu/tree.c:2786
rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2803
__do_softirq+0x24e/0x586 kernel/softirq.c:558
run_ksoftirqd+0x23/0x30 kernel/softirq.c:921
smpboot_thread_fn+0x4db/0x980 kernel/smpboot.c:164
kthread+0x26b/0x300 kernel/kthread.c:376
ret_from_fork+0x1f/0x30
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:__list_add_valid+0xc6/0xd0 lib/list_debug.c:26
Code: 48 c7 c7 c0 1a 68 85 4c 89 e6 4c 89 f1 31 c0 e8 f0 b2 55 02 0f 0b 48 c7 c7 80 1b 68 85 4c 89 f6 4c 89 e1 31 c0 e8 da b2 55 02 <0f> 0b 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 41 54 53 49
RSP: 0018:ffffc900000e7898 EFLAGS: 00010046

RAX: 0000000000000075 RBX: ffff8881f723cb70 RCX: 11a3db236f8a2800
RDX: 0000000080000101 RSI: 0000000080000101 RDI: 0000000000000000
RBP: ffffc900000e78c0 R08: ffffffff81579578 R09: ffffed103ee465d1
R10: ffffed103ee465d1 R11: 1ffff1103ee465d0 R12: ffff8881126ea870
R13: dffffc0000000000 R14: ffff8881f723cb68 R15: ffff8881126ea870
FS: 0000000000000000(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555556885b38 CR3: 000000012533b000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400


Tested on:

commit: 0ac824f3 Merge branch 'for-5.18-fixes' of git://git.ke..
console output: https://syzkaller.appspot.com/x/log.txt?x=173b88a5f00000

syzbot

unread,
May 16, 2022, 11:40:09 AM5/16/22
to syzkaller-a...@googlegroups.com, tadeus...@linaro.org
Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
general protection fault in ip6_pol_route

general protection fault, probably for non-canonical address 0xdffffc000000000f: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000078-0x000000000000007f]
CPU: 1 PID: 21 Comm: kworker/1:0 Not tainted 5.18.0-rc7-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker

RIP: 0010:rt6_get_pcpu_route net/ipv6/route.c:1396 [inline]
RIP: 0010:ip6_pol_route+0x741/0x1560 net/ipv6/route.c:2251
Code: e8 24 70 6e fd 48 8b 03 65 4c 8b 30 31 ff 4c 89 f6 e8 b3 b6 2f fd 4d 85 f6 0f 84 a7 00 00 00 49 8d 5e 78 48 89 d8 48 c1 e8 03 <42> 8a 04 28 84 c0 0f 85 42 0b 00 00 44 8b 3b 31 ff 44 89 fe e8 d6
RSP: 0018:ffffc9000017ff80 EFLAGS: 00010206

RAX: 000000000000000f RBX: 0000000000000079 RCX: 0000000080000301
RDX: ffff88810026d3c0 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffc90000180118 R08: ffffffff8440c64d R09: ffff88811268a000
R10: ffffc9000017ff00 R11: 1ffff9200003000e R12: ffff8881213dd880
R13: dffffc0000000000 R14: 0000000000000001 R15: ffffc90000180070
FS: 0000000000000000(0000) GS:ffff8881f7300000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7d3cffbff8 CR3: 00000001248ca000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<IRQ>
ip6_pol_route_input+0x54/0x80 net/ipv6/route.c:2275
pol_lookup_func include/net/ip6_fib.h:582 [inline]
fib6_rule_lookup+0x259/0x600 net/ipv6/fib6_rules.c:116
ip6_route_input_lookup net/ipv6/route.c:2287 [inline]
ip6_route_input+0x732/0xbd0 net/ipv6/route.c:2583
ip6_rcv_finish_core net/ipv6/ip6_input.c:63 [inline]
ip6_list_rcv_finish net/ipv6/ip6_input.c:127 [inline]
ip6_sublist_rcv+0x6c5/0xf70 net/ipv6/ip6_input.c:307
ipv6_list_rcv+0x443/0x490 net/ipv6/ip6_input.c:342
__netif_receive_skb_list_ptype net/core/dev.c:5448 [inline]
__netif_receive_skb_list_core+0x71e/0x930 net/core/dev.c:5496
__netif_receive_skb_list+0x4b1/0x580 net/core/dev.c:5548
netif_receive_skb_list_internal+0x4cb/0x790 net/core/dev.c:5639
gro_normal_list include/net/gro.h:430 [inline]
napi_complete_done+0x33f/0x780 net/core/dev.c:5980
wg_packet_rx_poll+0x1bd8/0x1c60 drivers/net/wireguard/receive.c:495
__napi_poll+0xc7/0x5d0 net/core/dev.c:6413
napi_poll net/core/dev.c:6480 [inline]
net_rx_action+0x4a9/0xc70 net/core/dev.c:6567
__do_softirq+0x24e/0x586 kernel/softirq.c:558
do_softirq+0x14b/0x1c0 kernel/softirq.c:459
</IRQ>
<TASK>
__local_bh_enable_ip+0x75/0x80 kernel/softirq.c:383
__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]
_raw_spin_unlock_bh+0x50/0x60 kernel/locking/spinlock.c:210
spin_unlock_bh include/linux/spinlock.h:394 [inline]
ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline]
wg_packet_decrypt_worker+0xd2e/0xdc0 drivers/net/wireguard/receive.c:506
process_one_work+0x6cb/0xbf0 kernel/workqueue.c:2289
worker_thread+0xb3c/0x1390 kernel/workqueue.c:2436
kthread+0x26b/0x300 kernel/kthread.c:376
ret_from_fork+0x1f/0x30
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:rt6_get_pcpu_route net/ipv6/route.c:1396 [inline]
RIP: 0010:ip6_pol_route+0x741/0x1560 net/ipv6/route.c:2251
Code: e8 24 70 6e fd 48 8b 03 65 4c 8b 30 31 ff 4c 89 f6 e8 b3 b6 2f fd 4d 85 f6 0f 84 a7 00 00 00 49 8d 5e 78 48 89 d8 48 c1 e8 03 <42> 8a 04 28 84 c0 0f 85 42 0b 00 00 44 8b 3b 31 ff 44 89 fe e8 d6
RSP: 0018:ffffc9000017ff80 EFLAGS: 00010206

RAX: 000000000000000f RBX: 0000000000000079 RCX: 0000000080000301
RDX: ffff88810026d3c0 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffc90000180118 R08: ffffffff8440c64d R09: ffff88811268a000
R10: ffffc9000017ff00 R11: 1ffff9200003000e R12: ffff8881213dd880
R13: dffffc0000000000 R14: 0000000000000001 R15: ffffc90000180070
FS: 0000000000000000(0000) GS:ffff8881f7300000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7d3cffbff8 CR3: 000000000600f000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: e8 24 70 6e fd callq 0xfd6e7029
5: 48 8b 03 mov (%rbx),%rax
8: 65 4c 8b 30 mov %gs:(%rax),%r14
c: 31 ff xor %edi,%edi
e: 4c 89 f6 mov %r14,%rsi
11: e8 b3 b6 2f fd callq 0xfd2fb6c9
16: 4d 85 f6 test %r14,%r14
19: 0f 84 a7 00 00 00 je 0xc6
1f: 49 8d 5e 78 lea 0x78(%r14),%rbx
23: 48 89 d8 mov %rbx,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 8a 04 28 mov (%rax,%r13,1),%al <-- trapping instruction
2e: 84 c0 test %al,%al
30: 0f 85 42 0b 00 00 jne 0xb78
36: 44 8b 3b mov (%rbx),%r15d
39: 31 ff xor %edi,%edi
3b: 44 89 fe mov %r15d,%esi
3e: e8 .byte 0xe8
3f: d6 (bad)


Tested on:

commit: 42226c98 Linux 5.18-rc7
console output: https://syzkaller.appspot.com/x/log.txt?x=10de9749f00000
kernel config: https://syzkaller.appspot.com/x/.config?x=c1915c1a61cbd0ea

Tadeusz Struk

unread,
May 16, 2022, 11:41:52 AM5/16/22
to syzbot, syzkaller-a...@googlegroups.com

syzbot

unread,
May 16, 2022, 11:51:14 AM5/16/22
to syzkaller-a...@googlegroups.com, tadeus...@linaro.org
Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
BUG: unable to handle kernel paging request in dst_dev_put

BUG: unable to handle page fault for address: ffffffffffffffff
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 6010067 P4D 6010067 PUD 6012067 PMD 0
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 14 Comm: ksoftirqd/0 Not tainted 5.18.0-rc7-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:dst_dev_put+0x36/0x1c0 net/core/dst.c:154
Code: 53 49 89 ff 49 bc 00 00 00 00 00 fc ff df e8 d1 c0 99 fd 4d 89 fd 49 c1 ed 03 43 80 7c 25 00 00 74 08 4c 89 ff e8 3a 7f d8 fd <4d> 8b 37 49 8d 7f 3a 48 89 f8 48 c1 e8 03 42 8a 04 20 84 c0 0f 85
RSP: 0018:ffffc900000e7a18 EFLAGS: 00010246
RAX: ffffffff83d6b70f RBX: ffffffffffffffff RCX: ffff888100252180
RDX: 0000000080000100 RSI: 0000000000000000 RDI: ffffffffffffffff
RBP: ffffc900000e7a40 R08: ffffffff842412bd R09: ffffed103ee46f19
R10: ffffed103ee46f19 R11: 1ffff1103ee46f18 R12: dffffc0000000000
R13: 1fffffffffffffff R14: 0000607e08a40088 R15: ffffffffffffffff
FS: 0000000000000000(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffff CR3: 000000012055d000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
rt_fibinfo_free_cpus+0xee/0x1c0 net/ipv4/fib_semantics.c:205
fib_nh_common_release+0x8d/0x240 net/ipv4/fib_semantics.c:216
fib_nh_release net/ipv4/fib_semantics.c:228 [inline]
free_fib_info_rcu+0x98/0x190 net/ipv4/fib_semantics.c:240
rcu_do_batch+0x507/0xbc0 kernel/rcu/tree.c:2535
rcu_core+0x4dc/0xef0 kernel/rcu/tree.c:2786
rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2803
__do_softirq+0x24e/0x586 kernel/softirq.c:558
run_ksoftirqd+0x23/0x30 kernel/softirq.c:921
smpboot_thread_fn+0x4db/0x980 kernel/smpboot.c:164
kthread+0x26b/0x300 kernel/kthread.c:376
ret_from_fork+0x1f/0x30
</TASK>
Modules linked in:
CR2: ffffffffffffffff
---[ end trace 0000000000000000 ]---
RIP: 0010:dst_dev_put+0x36/0x1c0 net/core/dst.c:154
Code: 53 49 89 ff 49 bc 00 00 00 00 00 fc ff df e8 d1 c0 99 fd 4d 89 fd 49 c1 ed 03 43 80 7c 25 00 00 74 08 4c 89 ff e8 3a 7f d8 fd <4d> 8b 37 49 8d 7f 3a 48 89 f8 48 c1 e8 03 42 8a 04 20 84 c0 0f 85
RSP: 0018:ffffc900000e7a18 EFLAGS: 00010246
RAX: ffffffff83d6b70f RBX: ffffffffffffffff RCX: ffff888100252180
RDX: 0000000080000100 RSI: 0000000000000000 RDI: ffffffffffffffff
RBP: ffffc900000e7a40 R08: ffffffff842412bd R09: ffffed103ee46f19
R10: ffffed103ee46f19 R11: 1ffff1103ee46f18 R12: dffffc0000000000
R13: 1fffffffffffffff R14: 0000607e08a40088 R15: ffffffffffffffff
FS: 0000000000000000(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffff CR3: 000000012055d000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 53 push %rbx
1: 49 89 ff mov %rdi,%r15
4: 49 bc 00 00 00 00 00 movabs $0xdffffc0000000000,%r12
b: fc ff df
e: e8 d1 c0 99 fd callq 0xfd99c0e4
13: 4d 89 fd mov %r15,%r13
16: 49 c1 ed 03 shr $0x3,%r13
1a: 43 80 7c 25 00 00 cmpb $0x0,0x0(%r13,%r12,1)
20: 74 08 je 0x2a
22: 4c 89 ff mov %r15,%rdi
25: e8 3a 7f d8 fd callq 0xfdd87f64
* 2a: 4d 8b 37 mov (%r15),%r14 <-- trapping instruction
2d: 49 8d 7f 3a lea 0x3a(%r15),%rdi
31: 48 89 f8 mov %rdi,%rax
34: 48 c1 e8 03 shr $0x3,%rax
38: 42 8a 04 20 mov (%rax,%r12,1),%al
3c: 84 c0 test %al,%al
3e: 0f .byte 0xf
3f: 85 .byte 0x85


Tested on:

commit: 42226c98 Linux 5.18-rc7
git tree: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
console output: https://syzkaller.appspot.com/x/log.txt?x=1475b766f00000

Tadeusz Struk

unread,
May 16, 2022, 3:50:37 PM5/16/22
to syzbot, syzkaller-a...@googlegroups.com
#syz test: https://android.googlesource.com/kernel/common android12-5.10-lts

syzbot

unread,
May 16, 2022, 3:59:13 PM5/16/22
to syzkaller-a...@googlegroups.com, tadeus...@linaro.org
Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
BUG: corrupted list in insert_work

list_add corruption. prev->next should be next (ffff8881f725c060), but was ffff88811373a870. (prev=ffff88811373a870).
------------[ cut here ]------------
kernel BUG at lib/list_debug.c:28!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 644 Comm: syz-executor.2 Not tainted 5.10.116-syzkaller-986966-g0577ff1c6970 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__list_add_valid+0xc6/0xd0 lib/list_debug.c:26
Code: 48 c7 c7 00 d8 43 85 4c 89 e6 4c 89 f1 31 c0 e8 2d 25 40 02 0f 0b 48 c7 c7 c0 d8 43 85 4c 89 f6 4c 89 e1 31 c0 e8 17 25 40 02 <0f> 0b 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 41 54 53 49
RSP: 0018:ffffc90000007a00 EFLAGS: 00010046
RAX: 0000000000000075 RBX: ffff8881f725c068 RCX: 7da71253f0399400
RDX: 0000000000000102 RSI: 0000000000000102 RDI: 0000000000000000
RBP: ffffc90000007a28 R08: ffffffff8153a998 R09: ffffed103ee4a5d8
R10: ffffed103ee4a5d8 R11: 1ffff1103ee4a5d7 R12: ffff88811373a870
R13: dffffc0000000000 R14: ffff8881f725c060 R15: ffff88811373a870
FS: 00007fa388d49700(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f222c584ff8 CR3: 0000000113d68000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<IRQ>
__list_add include/linux/list.h:67 [inline]
list_add_tail include/linux/list.h:100 [inline]
insert_work+0x107/0x330 kernel/workqueue.c:1352
__queue_work+0x971/0xd30 kernel/workqueue.c:1514
queue_work_on+0xf2/0x150 kernel/workqueue.c:1541
queue_work include/linux/workqueue.h:513 [inline]
css_release+0xae/0xc0 kernel/cgroup/cgroup.c:5161
percpu_ref_put_many include/linux/percpu-refcount.h:322 [inline]
percpu_ref_put include/linux/percpu-refcount.h:338 [inline]
percpu_ref_call_confirm_rcu lib/percpu-refcount.c:162 [inline]
percpu_ref_switch_to_atomic_rcu+0x5a2/0x5b0 lib/percpu-refcount.c:199
rcu_do_batch+0x59e/0xc40 kernel/rcu/tree.c:2485
rcu_core+0x59b/0xe30 kernel/rcu/tree.c:2726
rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2739
__do_softirq+0x27e/0x596 kernel/softirq.c:305
asm_call_irq_on_stack+0xf/0x20
</IRQ>
__run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline]
run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline]
do_softirq_own_stack+0x60/0x80 arch/x86/kernel/irq_64.c:77
invoke_softirq kernel/softirq.c:402 [inline]
__irq_exit_rcu+0x128/0x150 kernel/softirq.c:432
irq_exit_rcu+0x9/0x10 kernel/softirq.c:444
sysvec_apic_timer_interrupt+0xbf/0xe0 arch/x86/kernel/apic/apic.c:1095
asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:635
RIP: 0010:native_restore_fl arch/x86/include/asm/irqflags.h:41 [inline]
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/irqflags.h:84 [inline]
RIP: 0010:console_unlock+0xb5c/0xf20 kernel/printk/printk.c:2555
Code: 85 db 4c 8d b4 24 60 01 00 00 0f 85 82 03 00 00 e8 49 6e 00 00 48 8b 44 24 30 48 89 84 24 90 00 00 00 ff b4 24 90 00 00 00 9d <48> 8b 44 24 38 42 80 3c 38 00 74 08 4c 89 f7 e8 f0 e0 52 00 48 c7
RSP: 0018:ffffc900018f7180 EFLAGS: 00000246
RAX: 0000000000000246 RBX: 0000000000000000 RCX: ffff88811481bb40
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001
RBP: ffffc900018f7410 R08: ffffffff8153a4db R09: 0000000000000003
R10: fffff5200031ee21 R11: 1ffff9200031ee20 R12: ffffc900018f7380
R13: 1ffffffff0c3ad81 R14: ffffc900018f72e0 R15: dffffc0000000000
vprintk_emit+0x44b/0x640 kernel/printk/printk.c:2063
vprintk_default+0x26/0x30 kernel/printk/printk.c:2080
vprintk_func+0x19d/0x1e0 kernel/printk/printk_safe.c:401
printk+0xcf/0x10f kernel/printk/printk.c:2111
fail_dump lib/fault-inject.c:45 [inline]
should_fail+0x398/0x510 lib/fault-inject.c:146
__should_failslab+0x9f/0xe0 mm/failslab.c:33
should_failslab+0x9/0x20 mm/slab_common.c:1229
slab_pre_alloc_hook mm/slab.h:558 [inline]
slab_alloc_node mm/slub.c:2877 [inline]
slab_alloc mm/slub.c:2964 [inline]
kmem_cache_alloc_trace+0x3a/0x330 mm/slub.c:2981
kmalloc include/linux/slab.h:552 [inline]
kzalloc include/linux/slab.h:664 [inline]
percpu_ref_init+0xd0/0x330 lib/percpu-refcount.c:75
css_create kernel/cgroup/cgroup.c:5259 [inline]
cgroup_apply_control_enable+0x3a2/0x12f0 kernel/cgroup/cgroup.c:3110
cgroup_apply_control+0x93/0x710 kernel/cgroup/cgroup.c:3192
cgroup_subtree_control_write+0xd19/0x1310 kernel/cgroup/cgroup.c:3350
cgroup_file_write+0x28e/0x590 kernel/cgroup/cgroup.c:3793
kernfs_fop_write_iter+0x2d0/0x410 fs/kernfs/file.c:296
call_write_iter include/linux/fs.h:1947 [inline]
new_sync_write fs/read_write.c:518 [inline]
vfs_write+0xc1c/0xf40 fs/read_write.c:605
ksys_write+0x198/0x2c0 fs/read_write.c:658
__do_sys_write fs/read_write.c:670 [inline]
__se_sys_write fs/read_write.c:667 [inline]
__x64_sys_write+0x7b/0x90 fs/read_write.c:667
do_syscall_64+0x34/0x70 arch/x86/entry/common.c:46
entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7fa388df4049
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fa388d49168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007fa388f07030 RCX: 00007fa388df4049
RDX: 0000000000000006 RSI: 0000000020000140 RDI: 0000000000000004
RBP: 00007fa388d491d0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 00007ffc6b6af9af R14: 00007fa388d49300 R15: 0000000000022000
Modules linked in:
---[ end trace 00d6773322cde607 ]---
RIP: 0010:__list_add_valid+0xc6/0xd0 lib/list_debug.c:26
Code: 48 c7 c7 00 d8 43 85 4c 89 e6 4c 89 f1 31 c0 e8 2d 25 40 02 0f 0b 48 c7 c7 c0 d8 43 85 4c 89 f6 4c 89 e1 31 c0 e8 17 25 40 02 <0f> 0b 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 41 54 53 49
RSP: 0018:ffffc90000007a00 EFLAGS: 00010046
RAX: 0000000000000075 RBX: ffff8881f725c068 RCX: 7da71253f0399400
RDX: 0000000000000102 RSI: 0000000000000102 RDI: 0000000000000000
RBP: ffffc90000007a28 R08: ffffffff8153a998 R09: ffffed103ee4a5d8
R10: ffffed103ee4a5d8 R11: 1ffff1103ee4a5d7 R12: ffff88811373a870
R13: dffffc0000000000 R14: ffff8881f725c060 R15: ffff88811373a870
FS: 00007fa388d49700(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f222c584ff8 CR3: 0000000113d68000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 85 db test %ebx,%ebx
2: 4c 8d b4 24 60 01 00 lea 0x160(%rsp),%r14
9: 00
a: 0f 85 82 03 00 00 jne 0x392
10: e8 49 6e 00 00 callq 0x6e5e
15: 48 8b 44 24 30 mov 0x30(%rsp),%rax
1a: 48 89 84 24 90 00 00 mov %rax,0x90(%rsp)
21: 00
22: ff b4 24 90 00 00 00 pushq 0x90(%rsp)
29: 9d popfq
* 2a: 48 8b 44 24 38 mov 0x38(%rsp),%rax <-- trapping instruction
2f: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1)
34: 74 08 je 0x3e
36: 4c 89 f7 mov %r14,%rdi
39: e8 f0 e0 52 00 callq 0x52e12e
3e: 48 rex.W
3f: c7 .byte 0xc7


Tested on:

commit: 0577ff1c Merge 5.10.116 into android12-5.10-lts
git tree: android12-5.10-lts
console output: https://syzkaller.appspot.com/x/log.txt?x=102643bef00000
kernel config: https://syzkaller.appspot.com/x/.config?x=d069c16600471585
Reply all
Reply to author
Forward
0 new messages