kernel BUG at arch/x86/mm/physaddr.c:LINE! (2)

26 views
Skip to first unread message

syzbot

unread,
Nov 16, 2018, 6:32:04 PM11/16/18
to hver...@xs4all.nl, linux-...@vger.kernel.org, linux...@vger.kernel.org, mch...@kernel.org, syzkall...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: 5929a1f0ff30 Merge tag 'riscv-for-linus-4.20-rc2' of git:/..
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=137766a3400000
kernel config: https://syzkaller.appspot.com/x/.config?x=4a0a89f12ca9b0f5
dashboard link: https://syzkaller.appspot.com/bug?extid=6c0effb5877f6b0344e2
compiler: gcc (GCC) 8.0.1 20180413 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+6c0eff...@syzkaller.appspotmail.com

------------[ cut here ]------------
kernel BUG at arch/x86/mm/physaddr.c:27!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 8479 Comm: syz-executor1 Not tainted 4.20.0-rc2+ #113
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
RIP: 0010:__phys_addr+0xb5/0x120 arch/x86/mm/physaddr.c:27
Code: 08 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 b4 bb 45 00 48 85 db 75 0f e8
7a ba 45 00 4c 89 e0 5b 41 5c 41 5d 5d c3 e8 6b ba 45 00 <0f> 0b e8 64 ba
45 00 48 c7 c7 10 20 47 89 48 b8 00 00 00 00 00 fc
RSP: 0018:ffff88815771f410 EFLAGS: 00010016
RAX: 0000000000040000 RBX: 0000000000000001 RCX: ffffc9000fc04000
RDX: 0000000000000119 RSI: ffffffff8139cd75 RDI: 0000000000000007
RBP: ffff88815771f428 R08: ffff888157a101c0 R09: ffffed103b5c5b67
R10: ffffed103b5c5b67 R11: ffff8881dae2db3b R12: 000040801396c000
R13: 0000000000000000 R14: 0000000000000010 R15: ffff88815771fab8
FS: 00007f52131d8700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000720f9c CR3: 00000001b5073000 CR4: 00000000001406f0
DR0: 0000000020000000 DR1: 0000000020000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
virt_to_head_page include/linux/mm.h:658 [inline]
virt_to_cache mm/slab.c:399 [inline]
kfree+0x7b/0x230 mm/slab.c:3813
vivid_vid_cap_s_selection+0x2c31/0x38e0
drivers/media/platform/vivid/vivid-vid-cap.c:1006
vidioc_s_selection+0xa4/0xc0 drivers/media/platform/vivid/vivid-core.c:352
v4l_s_selection+0xba/0x140 drivers/media/v4l2-core/v4l2-ioctl.c:2197
__video_do_ioctl+0x8b1/0x1050 drivers/media/v4l2-core/v4l2-ioctl.c:2853
video_usercopy+0x5c1/0x1760 drivers/media/v4l2-core/v4l2-ioctl.c:3035
video_ioctl2+0x2c/0x33 drivers/media/v4l2-core/v4l2-ioctl.c:3079
v4l2_ioctl+0x154/0x1b0 drivers/media/v4l2-core/v4l2-dev.c:364
vfs_ioctl fs/ioctl.c:46 [inline]
file_ioctl fs/ioctl.c:509 [inline]
do_vfs_ioctl+0x1de/0x1790 fs/ioctl.c:696
ksys_ioctl+0xa9/0xd0 fs/ioctl.c:713
__do_sys_ioctl fs/ioctl.c:720 [inline]
__se_sys_ioctl fs/ioctl.c:718 [inline]
__x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:718
do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x457569
Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7
48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff
ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007f52131d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569
RDX: 0000000020000000 RSI: 00000000c040565f RDI: 0000000000000003
RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52131d86d4
R13: 00000000004c1f77 R14: 00000000004d3090 R15: 00000000ffffffff
Modules linked in:
---[ end trace df884aa85ab852c0 ]---
RIP: 0010:__phys_addr+0xb5/0x120 arch/x86/mm/physaddr.c:27
Code: 08 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 b4 bb 45 00 48 85 db 75 0f e8
7a ba 45 00 4c 89 e0 5b 41 5c 41 5d 5d c3 e8 6b ba 45 00 <0f> 0b e8 64 ba
45 00 48 c7 c7 10 20 47 89 48 b8 00 00 00 00 00 fc
RSP: 0018:ffff88815771f410 EFLAGS: 00010016
RAX: 0000000000040000 RBX: 0000000000000001 RCX: ffffc9000fc04000
RDX: 0000000000000119 RSI: ffffffff8139cd75 RDI: 0000000000000007
RBP: ffff88815771f428 R08: ffff888157a101c0 R09: ffffed103b5c5b67
R10: ffffed103b5c5b67 R11: ffff8881dae2db3b R12: 000040801396c000
R13: 0000000000000000 R14: 0000000000000010 R15: ffff88815771fab8
FS: 00007f52131d8700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000720f9c CR3: 00000001b5073000 CR4: 00000000001406f0
DR0: 0000000020000000 DR1: 0000000020000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#bug-status-tracking for how to communicate with
syzbot.

syzbot

unread,
Nov 18, 2018, 3:09:03 PM11/18/18
to hver...@xs4all.nl, linux-...@vger.kernel.org, linux...@vger.kernel.org, mch...@kernel.org, syzkall...@googlegroups.com
syzbot has found a reproducer for the following crash on:

HEAD commit: 1ce80e0fe98e Merge tag 'fsnotify_for_v4.20-rc3' of git://g..
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=10fd0893400000
kernel config: https://syzkaller.appspot.com/x/.config?x=d86f24333880b605
dashboard link: https://syzkaller.appspot.com/bug?extid=6c0effb5877f6b0344e2
compiler: gcc (GCC) 8.0.1 20180413 (experimental)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=1312062b400000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=131bd093400000

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+6c0eff...@syzkaller.appspotmail.com

audit: type=1800 audit(1542571519.564:30): pid=5852 uid=0 auid=4294967295
ses=4294967295 subj==unconfined op=collect_data cause=failed(directio)
comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0
------------[ cut here ]------------
kernel BUG at arch/x86/mm/physaddr.c:27!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 6007 Comm: syz-executor386 Not tainted 4.20.0-rc2+ #338
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
RIP: 0010:__phys_addr+0xb5/0x120 arch/x86/mm/physaddr.c:27
Code: 08 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 b4 bb 45 00 48 85 db 75 0f e8
7a ba 45 00 4c 89 e0 5b 41 5c 41 5d 5d c3 e8 6b ba 45 00 <0f> 0b e8 64 ba
45 00 48 c7 c7 10 20 47 89 48 b8 00 00 00 00 00 fc
RSP: 0018:ffff8881c3567410 EFLAGS: 00010093
RAX: ffff8881d32b4080 RBX: 0000000000000001 RCX: ffffffff8139cd5c
RDX: 0000000000000000 RSI: ffffffff8139cd75 RDI: 0000000000000007
RBP: ffff8881c3567428 R08: ffff8881d32b4080 R09: ffffed103b5c5b67
R10: ffffed103b5c5b67 R11: ffff8881dae2db3b R12: 0000408005dd6000
R13: 0000000000000000 R14: 0000000000000010 R15: ffff8881c3567ab8
FS: 0000000001f9e880(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000203e8008 CR3: 00000001c24cd000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
virt_to_head_page include/linux/mm.h:658 [inline]
virt_to_cache mm/slab.c:399 [inline]
kfree+0x7b/0x230 mm/slab.c:3813
vivid_vid_cap_s_selection+0x2c31/0x38e0
drivers/media/platform/vivid/vivid-vid-cap.c:1006
vidioc_s_selection+0xa4/0xc0 drivers/media/platform/vivid/vivid-core.c:352
v4l_s_selection+0xba/0x140 drivers/media/v4l2-core/v4l2-ioctl.c:2197
__video_do_ioctl+0x8b1/0x1050 drivers/media/v4l2-core/v4l2-ioctl.c:2853
video_usercopy+0x5c1/0x1760 drivers/media/v4l2-core/v4l2-ioctl.c:3035
video_ioctl2+0x2c/0x33 drivers/media/v4l2-core/v4l2-ioctl.c:3079
v4l2_ioctl+0x154/0x1b0 drivers/media/v4l2-core/v4l2-dev.c:364
vfs_ioctl fs/ioctl.c:46 [inline]
file_ioctl fs/ioctl.c:509 [inline]
do_vfs_ioctl+0x1de/0x1790 fs/ioctl.c:696
ksys_ioctl+0xa9/0xd0 fs/ioctl.c:713
__do_sys_ioctl fs/ioctl.c:720 [inline]
__se_sys_ioctl fs/ioctl.c:718 [inline]
__x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:718
do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x4442c9
Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7
48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff
ff 0f 83 7b d8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fff0d831768 EFLAGS: 00000207 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00000000004002e0 RCX: 00000000004442c9
RDX: 0000000020000000 RSI: 00000000c040565f RDI: 0000000000000005
RBP: 00000000006ce018 R08: 00000000004002e0 R09: 00000000004002e0
R10: 0000000000000000 R11: 0000000000000207 R12: 0000000000401fd0
R13: 0000000000402060 R14: 0000000000000000 R15: 0000000000000000
Modules linked in:
---[ end trace 57f6f02b74dd3e8e ]---
RIP: 0010:__phys_addr+0xb5/0x120 arch/x86/mm/physaddr.c:27
Code: 08 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 b4 bb 45 00 48 85 db 75 0f e8
7a ba 45 00 4c 89 e0 5b 41 5c 41 5d 5d c3 e8 6b ba 45 00 <0f> 0b e8 64 ba
45 00 48 c7 c7 10 20 47 89 48 b8 00 00 00 00 00 fc
RSP: 0018:ffff8881c3567410 EFLAGS: 00010093
RAX: ffff8881d32b4080 RBX: 0000000000000001 RCX: ffffffff8139cd5c
RDX: 0000000000000000 RSI: ffffffff8139cd75 RDI: 0000000000000007
RBP: ffff8881c3567428 R08: ffff8881d32b4080 R09: ffffed103b5c5b67
R10: ffffed103b5c5b67 R11: ffff8881dae2db3b R12: 0000408005dd6000
R13: 0000000000000000 R14: 0000000000000010 R15: ffff8881c3567ab8
FS: 0000000001f9e880(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000203e8008 CR3: 00000001c24cd000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400

syzbot

unread,
Mar 20, 2019, 4:35:01 PM3/20/19
to da...@davemloft.net, hver...@xs4all.nl, linu...@vger.kernel.org, linux-...@vger.kernel.org, linux...@vger.kernel.org, mch...@kernel.org, mch...@s-opensource.com, m...@pengutronix.de, net...@vger.kernel.org, sock...@hartkopp.net, syzkall...@googlegroups.com
syzbot has bisected this bug to:

commit 6d469a202ee73196d0df76025af80bd6a379e658
Author: Mauro Carvalho Chehab <mch...@s-opensource.com>
Date: Sun May 14 17:07:21 2017 +0000

Merge tag 'v4.12-rc1' into patchwork

bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=12639fd7200000
start commit: 6d469a20 Merge tag 'v4.12-rc1' into patchwork
git tree: upstream
final crash: https://syzkaller.appspot.com/x/report.txt?x=15639fd7200000
console output: https://syzkaller.appspot.com/x/log.txt?x=11639fd7200000
Reported-by: syzbot+6c0eff...@syzkaller.appspotmail.com
Fixes: 6d469a20 ("Merge tag 'v4.12-rc1' into patchwork")

Alexander Potapenko

unread,
Apr 4, 2019, 10:47:13 AM4/4/19
to syzbot, David Miller, hver...@xs4all.nl, linu...@vger.kernel.org, LKML, linux...@vger.kernel.org, mch...@kernel.org, mch...@s-opensource.com, m...@pengutronix.de, Networking, sock...@hartkopp.net, syzkaller-bugs
> --
> You received this message because you are subscribed to the Google Groups "syzkaller-bugs" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to syzkaller-bug...@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/msgid/syzkaller-bugs/000000000000462a4105848c8e12%40google.com.
> For more options, visit https://groups.google.com/d/optout.

I believe this bug is caused by vivid_vid_cap_s_selection() calling
kfree(dev->bitmap_cap).
This makes little sense, as dev->bitmap_cap seems to be allocated
using vzalloc().

--
Alexander Potapenko
Software Engineer

Google Germany GmbH
Erika-Mann-Straße, 33
80636 München

Geschäftsführer: Paul Manicle, Halimah DeLaine Prado
Registergericht und -nummer: Hamburg, HRB 86891
Sitz der Gesellschaft: Hamburg

Hans Verkuil

unread,
Apr 4, 2019, 10:51:42 AM4/4/19
to Alexander Potapenko, syzbot, David Miller, linu...@vger.kernel.org, LKML, linux...@vger.kernel.org, mch...@kernel.org, mch...@s-opensource.com, m...@pengutronix.de, Networking, sock...@hartkopp.net, syzkaller-bugs
Yup, that should be vfree. There was a similar problem with bitmap_out that
I fixed, but it looks I missed this one. Can you make a patch?

Thanks,

Hans

Alexander Potapenko

unread,
Apr 4, 2019, 10:54:55 AM4/4/19
to Hans Verkuil, syzbot, David Miller, linu...@vger.kernel.org, LKML, linux...@vger.kernel.org, mch...@kernel.org, mch...@s-opensource.com, m...@pengutronix.de, Networking, sock...@hartkopp.net, syzkaller-bugs
Yes, I've almost hit the send button :)
> Thanks,
>
> Hans
Reply all
Reply to author
Forward
0 new messages