[syzbot] linux-next boot error: BUG: unable to handle kernel paging request in corrupted

15 views
Skip to first unread message

syzbot

unread,
Nov 1, 2022, 10:31:43 AM11/1/22
to ax...@kernel.dk, linux...@vger.kernel.org, linux-...@vger.kernel.org, linux...@vger.kernel.org, s...@canb.auug.org.au, syzkall...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: e9d267f752f8 Add linux-next specific files for 20221101
git tree: linux-next
console output: https://syzkaller.appspot.com/x/log.txt?x=13c8fdb6880000
kernel config: https://syzkaller.appspot.com/x/.config?x=7d67fcb6fc8245f
dashboard link: https://syzkaller.appspot.com/bug?extid=4d9bcd45d5ca0a476cf7
compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/a6c3145cf385/disk-e9d267f7.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/3f34d7fed0ff/vmlinux-e9d267f7.xz
kernel image: https://storage.googleapis.com/syzbot-assets/279836b50e84/bzImage-e9d267f7.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+4d9bcd...@syzkaller.appspotmail.com

floppy0: no floppy controllers found
work still pending
BUG: unable to handle page fault for address: ffffed1018000000
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 23ffee067 P4D 23ffee067 PUD 13fff5067 PMD 0
Oops: 0002 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 11 Comm: kworker/u4:1 Not tainted 6.1.0-rc3-next-20221101-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022
Workqueue: events_unbound async_run_entry_fn
RIP: 0010:memset_orig-0x7/0xb0
Code: c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 <f3> aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 01
RSP: 0000:ffffc90000107a48 EFLAGS: 00010287
RAX: dffffc0000000000 RBX: ffff88801cd34100 RCX: fffff11014430738
RDX: fffff11028a89f18 RSI: 0000000000000000 RDI: ffffed1018000000
RBP: ffff88814544f8c0 R08: 0000000000000005 R09: ffffed10039a6820
R10: 0000000000000001 R11: 0000000000000000 R12: ffffffff81a702a0
R13: ffff88814544f8c0 R14: 0000000000000007 R15: ffff88801cd34100
FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffed1018000000 CR3: 000000000bc8e000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
kasan_unpoison mm/kasan/shadow.c:138 [inline]
kasan_unpoison+0x40/0x70 mm/kasan/shadow.c:115
kasan_unpoison_range include/linux/kasan.h:112 [inline]
kasan_unpoison_element mm/mempool.c:115 [inline]
remove_element mm/mempool.c:134 [inline]
mempool_exit+0x1c4/0x320 mm/mempool.c:153
bioset_exit+0x2d3/0x640 block/bio.c:1655
disk_release+0x143/0x480 block/genhd.c:1169
device_release+0x9f/0x240 drivers/base/core.c:2330
kobject_cleanup lib/kobject.c:673 [inline]
kobject_release lib/kobject.c:704 [inline]
kref_put include/linux/kref.h:65 [inline]
kobject_put+0x1be/0x4c0 lib/kobject.c:721
put_device+0x1b/0x30 drivers/base/core.c:3624
blk_mark_disk_dead-0xf/0x60
do_floppy_init drivers/block/floppy.c:4756 [inline]
floppy_async_init+0x2169/0x21ca drivers/block/floppy.c:4765
async_run_entry_fn+0x98/0x530 kernel/async.c:127
process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289
worker_thread+0x665/0x1080 kernel/workqueue.c:2436
kthread+0x2e4/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
</TASK>
Modules linked in:
CR2: ffffed1018000000
---[ end trace 0000000000000000 ]---
RIP: 0010:memset_orig-0x7/0xb0
Code: c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 <f3> aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 01
RSP: 0000:ffffc90000107a48 EFLAGS: 00010287
RAX: dffffc0000000000 RBX: ffff88801cd34100 RCX: fffff11014430738
RDX: fffff11028a89f18 RSI: 0000000000000000 RDI: ffffed1018000000
RBP: ffff88814544f8c0 R08: 0000000000000005 R09: ffffed10039a6820
R10: 0000000000000001 R11: 0000000000000000 R12: ffffffff81a702a0
R13: ffff88814544f8c0 R14: 0000000000000007 R15: ffff88801cd34100
FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffed1018000000 CR3: 000000000bc8e000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: c1 e9 03 shr $0x3,%ecx
3: 40 0f b6 f6 movzbl %sil,%esi
7: 48 b8 01 01 01 01 01 movabs $0x101010101010101,%rax
e: 01 01 01
11: 48 0f af c6 imul %rsi,%rax
15: f3 48 ab rep stos %rax,%es:(%rdi)
18: 89 d1 mov %edx,%ecx
1a: f3 aa rep stos %al,%es:(%rdi)
1c: 4c 89 c8 mov %r9,%rax
1f: c3 retq
20: 90 nop
21: 49 89 f9 mov %rdi,%r9
24: 40 88 f0 mov %sil,%al
27: 48 89 d1 mov %rdx,%rcx
* 2a: f3 aa rep stos %al,%es:(%rdi) <-- trapping instruction
2c: 4c 89 c8 mov %r9,%rax
2f: c3 retq
30: 90 nop
31: 49 89 fa mov %rdi,%r10
34: 40 0f b6 ce movzbl %sil,%ecx
38: 48 rex.W
39: b8 01 01 01 01 mov $0x1010101,%eax
3e: 01 01 add %eax,(%rcx)


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

Dmitry Vyukov

unread,
Nov 1, 2022, 10:47:32 AM11/1/22
to syzbot, ax...@kernel.dk, linux...@vger.kernel.org, linux-...@vger.kernel.org, linux...@vger.kernel.org, s...@canb.auug.org.au, syzkall...@googlegroups.com
Besides the crash in bioset_exit() there is some issue with kallsyms

\/\/\/\/\/\/

> RIP: 0010:memset_orig-0x7/0xb0

It gives a negative offset from memset_orig. But that's memset_erms symbol:

$ nm -nS vmlinux-6fbda10e | grep ffffffff895869
ffffffff89586900 000000000000002f T __memset
ffffffff89586930 000000000000000f t memset_erms
ffffffff89586940 00000000000000ac t memset_orig
ffffffff895869f0 000000000000006e T num_digits

$ objdump --disassemble=memset_erms vmlinux-6fbda10e
ffffffff89586930 <memset_erms>:
ffffffff89586930: 49 89 f9 mov %rdi,%r9
ffffffff89586933: 40 88 f0 mov %sil,%al
ffffffff89586936: 48 89 d1 mov %rdx,%rcx
ffffffff89586939: f3 aa rep stos %al,%es:(%rdi)
ffffffff8958693b: 4c 89 c8 mov %r9,%rax
ffffffff8958693e: c3 ret
> --
> You received this message because you are subscribed to the Google Groups "syzkaller-bugs" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to syzkaller-bug...@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/msgid/syzkaller-bugs/0000000000002b83bf05ec699567%40google.com.

syzbot

unread,
Dec 11, 2022, 3:19:36 PM12/11/22
to syzkall...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages