kernel BUG at ./include/linux/scatterlist.h:LINE!

10 views
Skip to first unread message

syzbot

unread,
Apr 13, 2019, 6:33:10 AM4/13/19
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: 1ec8f1f0 Linux 4.14.111
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=1200e7c3200000
kernel config: https://syzkaller.appspot.com/x/.config?x=fdadf290ea9fc6f9
dashboard link: https://syzkaller.appspot.com/bug?extid=f644e0e3bce7dfd2a857
compiler: gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+f644e0...@syzkaller.appspotmail.com

------------[ cut here ]------------
kernel BUG at ./include/linux/scatterlist.h:124!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 0 PID: 27445 Comm: syz-executor.5 Not tainted 4.14.111 #1
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
task: ffff888204782540 task.stack: ffff888204788000
RIP: 0010:sg_page include/linux/scatterlist.h:124 [inline]
RIP: 0010:gcmaes_decrypt.constprop.0+0x91c/0xd30
arch/x86/crypto/aesni-intel_glue.c:828
RSP: 0018:ffff88820478f7d8 EFLAGS: 00010216
RAX: 0000000000040000 RBX: ffff888099500cc8 RCX: ffffc9000722f000
RDX: 0000000000003fdf RSI: ffffffff812ecd8c RDI: ffff888099500964
RBP: ffff88820478f8b0 R08: ffff88808d42b260 R09: ffffed10408f1f1e
R10: ffffed10408f1f1d R11: ffff88820478f8eb R12: ffffea0002a00202
R13: ffff888099500cfc R14: 0000000000000010 R15: ffff8880a9430800
FS: 00007f684dd0f700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000
kobject: 'input68' (ffff88808eaf3620): kobject_cleanup, parent
(null)
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000940004 CR3: 000000005e31c000 CR4: 00000000001426f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
generic_gcmaes_decrypt+0xf4/0x130 arch/x86/crypto/aesni-intel_glue.c:1126
crypto_aead_decrypt include/crypto/aead.h:362 [inline]
gcmaes_wrapper_decrypt+0x168/0x200 arch/x86/crypto/aesni-intel_glue.c:961
crypto_aead_decrypt include/crypto/aead.h:362 [inline]
_aead_recvmsg crypto/algif_aead.c:316 [inline]
aead_recvmsg+0x827/0x1da0 crypto/algif_aead.c:335
sock_recvmsg_nosec+0x8c/0xb0 net/socket.c:819
___sys_recvmsg+0x221/0x4d0 net/socket.c:2221
kobject: 'input68' (ffff88808eaf3620): calling ktype release
kobject: 'input68': free name
__sys_recvmmsg+0x226/0x6b0 net/socket.c:2329
kobject: 'loop3' (ffff8880a4a2e160): kobject_uevent_env
SYSC_recvmmsg net/socket.c:2410 [inline]
SyS_recvmmsg+0xb0/0x140 net/socket.c:2394
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
kobject: 'loop3' (ffff8880a4a2e160): fill_kobj_path: path
= '/devices/virtual/block/loop3'
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x458c29
RSP: 002b:00007f684dd0ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458c29
RDX: 0000000000000871 RSI: 0000000020002480 RDI: 0000000000000004
RBP: 000000000073bf00 R08: 00000000200001c0 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f684dd0f6d4
R13: 00000000004c5b80 R14: 00000000004da118 R15: 00000000ffffffff
Code: 0f 0b e8 e8 09 2e 00 0f 0b e8 e1 09 2e 00 0f 0b e8 da 09 2e 00 0f 0b
e8 d3 09 2e 00 e8 ea 74 d1 ff e9 63 ff ff ff e8 c4 09 2e 00 <0f> 0b e8 bd
09 2e 00 0f 0b 4c 89 85 58 ff ff ff e8 af 09 2e 00
RIP: sg_page include/linux/scatterlist.h:124 [inline] RSP: ffff88820478f7d8
RIP: gcmaes_decrypt.constprop.0+0x91c/0xd30
arch/x86/crypto/aesni-intel_glue.c:828 RSP: ffff88820478f7d8
net_ratelimit: 18 callbacks suppressed
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
protocol 88fb is buggy, dev hsr_slave_1
---[ end trace 27b2c9574b1e9ac3 ]---


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Apr 18, 2019, 1:17:05 AM4/18/19
to syzkaller...@googlegroups.com
syzbot has found a reproducer for the following crash on:

HEAD commit: 58b454eb Linux 4.14.112
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=1175e787200000
kernel config: https://syzkaller.appspot.com/x/.config?x=8b0e7ab7678533ab
dashboard link: https://syzkaller.appspot.com/bug?extid=f644e0e3bce7dfd2a857
compiler: gcc (GCC) 9.0.0 20181231 (experimental)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=134d9dfd200000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=169f7680a00000

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+f644e0...@syzkaller.appspotmail.com

audit: type=1400 audit(1555564375.790:38): avc: denied { ioctl } for
pid=7128 comm="syz-executor139" path="socket:[26289]" dev="sockfs"
ino=26289 ioctlcmd=0x8990
scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023
tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023
tclass=netlink_netfilter_socket permissive=1
------------[ cut here ]------------
kernel BUG at ./include/linux/scatterlist.h:124!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 0 PID: 7135 Comm: syz-executor139 Not tainted 4.14.112 #2
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
task: ffff888093b02100 task.stack: ffff888099170000
RIP: 0010:sg_page include/linux/scatterlist.h:124 [inline]
RIP: 0010:gcmaes_decrypt.constprop.0+0x91c/0xd30
arch/x86/crypto/aesni-intel_glue.c:828
RSP: 0018:ffff8880991777d8 EFLAGS: 00010297
RAX: ffff888093b02100 RBX: ffff88808cfb9148 RCX: 0000000087654321
RDX: 0000000000000000 RSI: 1ffff110119f71ba RDI: ffff88808cfb8de4
RBP: ffff8880991778b0 R08: ffff88808cfb9720 R09: ffffed101322ef1e
R10: ffffed101322ef1d R11: ffff8880991778eb R12: ffffea00025a0f82
R13: ffff88808cfb917c R14: 0000000000000010 R15: ffff88808ba3f700
FS: 00000000014db880(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000008cdce000 CR4: 00000000001406f0
Call Trace:
generic_gcmaes_decrypt+0xf4/0x130 arch/x86/crypto/aesni-intel_glue.c:1126
crypto_aead_decrypt include/crypto/aead.h:362 [inline]
gcmaes_wrapper_decrypt+0x168/0x200 arch/x86/crypto/aesni-intel_glue.c:961
crypto_aead_decrypt include/crypto/aead.h:362 [inline]
_aead_recvmsg crypto/algif_aead.c:316 [inline]
aead_recvmsg+0x827/0x1da0 crypto/algif_aead.c:335
sock_recvmsg_nosec+0x8c/0xb0 net/socket.c:819
___sys_recvmsg+0x221/0x4d0 net/socket.c:2221
__sys_recvmmsg+0x226/0x6b0 net/socket.c:2329
SYSC_recvmmsg net/socket.c:2410 [inline]
SyS_recvmmsg+0xb0/0x140 net/socket.c:2394
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x446189
RSP: 002b:00007ffe191d14b8 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000446189
RDX: 0000000000000871 RSI: 0000000020002480 RDI: 000000000000000a
RBP: 0000000000006f6c R08: 00000000200001c0 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004033d0
R13: 0000000000403460 R14: 0000000000000000 R15: 0000000000000000
Code: 0f 0b e8 98 09 2e 00 0f 0b e8 91 09 2e 00 0f 0b e8 8a 09 2e 00 0f 0b
e8 83 09 2e 00 e8 ea 74 d1 ff e9 63 ff ff ff e8 74 09 2e 00 <0f> 0b e8 6d
09 2e 00 0f 0b 4c 89 85 58 ff ff ff e8 5f 09 2e 00
RIP: sg_page include/linux/scatterlist.h:124 [inline] RSP: ffff8880991777d8
RIP: gcmaes_decrypt.constprop.0+0x91c/0xd30
arch/x86/crypto/aesni-intel_glue.c:828 RSP: ffff8880991777d8
---[ end trace 6877b8ec83cb57fc ]---

Reply all
Reply to author
Forward
0 new messages