BUG: unable to handle kernel paging request in ___cache_free

6 views
Skip to first unread message

syzbot

unread,
Jul 18, 2021, 6:26:21 PM7/18/21
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: fcfbdfe9626e Linux 4.19.197
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=15caa124300000
kernel config: https://syzkaller.appspot.com/x/.config?x=2dedd11d3941c171
dashboard link: https://syzkaller.appspot.com/bug?extid=3cbf6ddbe2ba227a6e73

Unfortunately, I don't have any reproducer for this issue yet.

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+3cbf6d...@syzkaller.appspotmail.com

audit: type=1804 audit(1626647162.706:203): pid=17529 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir161751540/syzkaller.ybG6C2/20/cgroup.controllers" dev="sda1" ino=14684 res=1
EXT4-fs (loop3): warning: checktime reached, running e2fsck is recommended
EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue
BUG: unable to handle kernel paging request at ffffea0003adf1c0
PGD 13bff8067 P4D 13bff8067 PUD 13bff7067 PMD 0
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 1 Comm: systemd Not tainted 4.19.197-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:PagePoisoned include/linux/page-flags.h:162 [inline]
RIP: 0010:page_to_nid include/linux/mm.h:990 [inline]
RIP: 0010:cache_free_alien mm/slab.c:828 [inline]
RIP: 0010:___cache_free+0x167/0x3a0 mm/slab.c:3525
Code: 5d 41 5e 41 5f e9 99 07 00 00 4c 89 e7 e8 21 4c 93 ff 48 c1 e8 0c 48 89 c7 48 b8 00 00 00 00 00 ea ff ff 48 c1 e7 06 48 01 c7 <48> 8b 17 48 83 fa ff 0f 84 87 01 00 00 48 c1 ea 3a 65 8b 05 31 68
RSP: 0018:ffff8880b5a07960 EFLAGS: 00010086
RAX: ffffea0000000000 RBX: 00ff88093ac35746 RCX: ffffffff812b5e90
RDX: 0000000000000000 RSI: ffffffff812b5e9a RDI: ffffea0003adf1c0
RBP: ffff8880b3574699 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000007 R11: 0000000000000000 R12: ffff8880eb7c7cee
R13: ffff8880b5a07a00 R14: ffff8880b3574699 R15: 0000000000000286
FS: 00007fa9418e0500(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffea0003adf1c0 CR3: 00000000a4717000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
qlink_free mm/kasan/quarantine.c:147 [inline]
qlist_free_all+0x79/0x140 mm/kasan/quarantine.c:166
quarantine_reduce+0x1a9/0x230 mm/kasan/quarantine.c:259
kasan_kmalloc+0xa2/0x160 mm/kasan/kasan.c:538
slab_post_alloc_hook mm/slab.h:445 [inline]
slab_alloc mm/slab.c:3397 [inline]
kmem_cache_alloc+0x110/0x370 mm/slab.c:3557
getname_flags+0xce/0x590 fs/namei.c:140
user_path_at_empty+0x2a/0x50 fs/namei.c:2609
user_path_at include/linux/namei.h:57 [inline]
vfs_statx+0x113/0x210 fs/stat.c:185
vfs_lstat include/linux/fs.h:3137 [inline]
__do_sys_newlstat fs/stat.c:350 [inline]
__se_sys_newlstat+0x96/0x120 fs/stat.c:344
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7fa93fea9335
Code: 69 db 2b 00 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 83 ff 01 48 89 f0 77 30 48 89 c7 48 89 d6 b8 06 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 03 f3 c3 90 48 8b 15 31 db 2b 00 f7 d8 64 89
RSP: 002b:00007ffce6743038 EFLAGS: 00000246 ORIG_RAX: 0000000000000006
RAX: ffffffffffffffda RBX: 00005632132e2ef0 RCX: 00007fa93fea9335
RDX: 00007ffce6743070 RSI: 00007ffce6743070 RDI: 00005632132e1ef0
RBP: 00007ffce6743130 R08: 0000000000000003 R09: 0000000000001010
R10: 0000000000000100 R11: 0000000000000246 R12: 00005632132e1ef0
R13: 00005632132e1f03 R14: 00005632132d301d R15: 00005632132d3023
Modules linked in:
CR2: ffffea0003adf1c0
---[ end trace a6789090ef561724 ]---
RIP: 0010:PagePoisoned include/linux/page-flags.h:162 [inline]
RIP: 0010:page_to_nid include/linux/mm.h:990 [inline]
RIP: 0010:cache_free_alien mm/slab.c:828 [inline]
RIP: 0010:___cache_free+0x167/0x3a0 mm/slab.c:3525
Code: 5d 41 5e 41 5f e9 99 07 00 00 4c 89 e7 e8 21 4c 93 ff 48 c1 e8 0c 48 89 c7 48 b8 00 00 00 00 00 ea ff ff 48 c1 e7 06 48 01 c7 <48> 8b 17 48 83 fa ff 0f 84 87 01 00 00 48 c1 ea 3a 65 8b 05 31 68
RSP: 0018:ffff8880b5a07960 EFLAGS: 00010086
RAX: ffffea0000000000 RBX: 00ff88093ac35746 RCX: ffffffff812b5e90
RDX: 0000000000000000 RSI: ffffffff812b5e9a RDI: ffffea0003adf1c0
RBP: ffff8880b3574699 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000007 R11: 0000000000000000 R12: ffff8880eb7c7cee
R13: ffff8880b5a07a00 R14: ffff8880b3574699 R15: 0000000000000286
FS: 00007fa9418e0500(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffea0003adf1c0 CR3: 00000000a4717000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Nov 15, 2021, 5:27:20 PM11/15/21
to syzkaller...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages