WARNING: can't dereference registers at ADDR for ip common_interrupt

14 views
Skip to first unread message

syzbot

unread,
May 26, 2020, 6:47:13 AM5/26/20
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: a41ba30d Linux 4.14.181
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=113d069a100000
kernel config: https://syzkaller.appspot.com/x/.config?x=c5458e9cda81cf95
dashboard link: https://syzkaller.appspot.com/bug?extid=a36286c38cd8ead29be5
compiler: gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+a36286...@syzkaller.appspotmail.com

WARNING: can't dereference registers at ffff88808bf25928 for ip common_interrupt+0x93/0x93 arch/x86/entry/entry_64.S:576
audit: type=1800 audit(1590490005.805:72): pid=29816 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="bus" dev="sda1" ino=15779 res=0
audit: type=1800 audit(1590490006.065:73): pid=29846 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=15779 res=0
netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'.
hub 9-0:1.0: USB hub found
hub 9-0:1.0: 8 ports detected
netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'.
netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'.
audit: type=1800 audit(1590490006.675:74): pid=29887 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=16408 res=0
audit: type=1800 audit(1590490006.805:75): pid=29898 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=16408 res=0
audit: type=1800 audit(1590490006.885:76): pid=29901 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=16400 res=0
audit: type=1800 audit(1590490007.045:77): pid=29911 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16409 res=0
audit: type=1800 audit(1590490007.465:78): pid=29929 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=16407 res=0
batman_adv: batadv0: Interface deactivated: batadv_slave_0
device batadv_slave_0 entered promiscuous mode
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 30027 Comm: syz-executor.1 Not tainted 4.14.181-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x1b2/0x283 lib/dump_stack.c:58
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10a/0x154 lib/fault-inject.c:149
should_failslab+0xd6/0x130 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:421 [inline]
slab_alloc mm/slab.c:3376 [inline]
kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550
aio_get_req fs/aio.c:1049 [inline]
io_submit_one fs/aio.c:1589 [inline]
do_io_submit+0x2c4/0x1400 fs/aio.c:1709
do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45ca29
RSP: 002b:00007face659ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1
RAX: ffffffffffffffda RBX: 00000000004e0d00 RCX: 000000000045ca29
RDX: 00000000200000c0 RSI: 0000000000000008 RDI: 00007face657a000
RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
R13: 00000000000001fb R14: 00000000004c4446 R15: 00007face659f6d4
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 30039 Comm: syz-executor.1 Not tainted 4.14.181-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x1b2/0x283 lib/dump_stack.c:58
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10a/0x154 lib/fault-inject.c:149
should_failslab+0xd6/0x130 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:421 [inline]
slab_alloc mm/slab.c:3376 [inline]
kmem_cache_alloc+0x40/0x3c0 mm/slab.c:3550
cgroup: cgroup2: unknown option " "
mempool_alloc+0x111/0x2d0 mm/mempool.c:330
bio_alloc_bioset+0x352/0x640 block/bio.c:486
__blkdev_direct_IO fs/block_dev.c:364 [inline]
blkdev_direct_IO+0x2a2/0xe70 fs/block_dev.c:457
generic_file_direct_write+0x1df/0x420 mm/filemap.c:2950
__generic_file_write_iter+0x2a5/0x590 mm/filemap.c:3129
blkdev_write_iter fs/block_dev.c:1914 [inline]
blkdev_write_iter+0x1e8/0x3a0 fs/block_dev.c:1891
cgroup: cgroup2: unknown option " "
call_write_iter include/linux/fs.h:1778 [inline]
aio_write+0x2ba/0x4f0 fs/aio.c:1553
io_submit_one fs/aio.c:1641 [inline]
do_io_submit+0x930/0x1400 fs/aio.c:1709
do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45ca29
RSP: 002b:00007face659ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1
RAX: ffffffffffffffda RBX: 00000000004e0d00 RCX: 000000000045ca29
RDX: 00000000200000c0 RSI: 0000000000000008 RDI: 00007face657a000
RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
R13: 00000000000001fb R14: 00000000004c4446 R15: 00007face659f6d4
audit: type=1800 audit(1590490009.155:79): pid=30044 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16434 res=0
audit: type=1800 audit(1590490009.155:80): pid=30049 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16434 res=0
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 30085 Comm: syz-executor.1 Not tainted 4.14.181-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x1b2/0x283 lib/dump_stack.c:58
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10a/0x154 lib/fault-inject.c:149
should_failslab+0xd6/0x130 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:421 [inline]
slab_alloc mm/slab.c:3376 [inline]
kmem_cache_alloc+0x40/0x3c0 mm/slab.c:3550
mempool_alloc+0x111/0x2d0 mm/mempool.c:330
bvec_alloc+0xcc/0x2d0 block/bio.c:216
bio_alloc_bioset+0x3fa/0x640 block/bio.c:506
__blkdev_direct_IO fs/block_dev.c:364 [inline]
blkdev_direct_IO+0x2a2/0xe70 fs/block_dev.c:457
generic_file_direct_write+0x1df/0x420 mm/filemap.c:2950
__generic_file_write_iter+0x2a5/0x590 mm/filemap.c:3129
blkdev_write_iter fs/block_dev.c:1914 [inline]
blkdev_write_iter+0x1e8/0x3a0 fs/block_dev.c:1891
call_write_iter include/linux/fs.h:1778 [inline]
aio_write+0x2ba/0x4f0 fs/aio.c:1553
io_submit_one fs/aio.c:1641 [inline]
do_io_submit+0x930/0x1400 fs/aio.c:1709
do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45ca29
RSP: 002b:00007face659ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1
RAX: ffffffffffffffda RBX: 00000000004e0d00 RCX: 000000000045ca29
RDX: 00000000200000c0 RSI: 0000000000000008 RDI: 00007face657a000
RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
R13: 00000000000001fb R14: 00000000004c4446 R15: 00007face659f6d4
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 30132 Comm: syz-executor.1 Not tainted 4.14.181-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x1b2/0x283 lib/dump_stack.c:58
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10a/0x154 lib/fault-inject.c:149
should_failslab+0xd6/0x130 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:421 [inline]
slab_alloc_node mm/slab.c:3297 [inline]
kmem_cache_alloc_node+0x54/0x400 mm/slab.c:3640
create_task_io_context+0x2a/0x3c0 block/blk-ioc.c:278
create_io_context block/blk.h:323 [inline]
generic_make_request_checks+0x1605/0x1a20 block/blk-core.c:2125
generic_make_request+0x6b/0x850 block/blk-core.c:2183
submit_bio+0x234/0x390 block/blk-core.c:2301
__blkdev_direct_IO fs/block_dev.c:418 [inline]
blkdev_direct_IO+0x5e0/0xe70 fs/block_dev.c:457
generic_file_direct_write+0x1df/0x420 mm/filemap.c:2950
__generic_file_write_iter+0x2a5/0x590 mm/filemap.c:3129
blkdev_write_iter fs/block_dev.c:1914 [inline]
blkdev_write_iter+0x1e8/0x3a0 fs/block_dev.c:1891
call_write_iter include/linux/fs.h:1778 [inline]
aio_write+0x2ba/0x4f0 fs/aio.c:1553
io_submit_one fs/aio.c:1641 [inline]
do_io_submit+0x930/0x1400 fs/aio.c:1709
do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45ca29
RSP: 002b:00007face659ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1
RAX: ffffffffffffffda RBX: 00000000004e0d00 RCX: 000000000045ca29
RDX: 00000000200000c0 RSI: 0000000000000008 RDI: 00007face657a000
RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
R13: 00000000000001fb R14: 00000000004c4446 R15: 00007face659f6d4
audit: type=1804 audit(1590490011.345:81): pid=30134 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir507100555/syzkaller.2eofDg/2346/file0/bus" dev="sda1" ino=16445 res=1
audit: type=1804 audit(1590490011.345:82): pid=30133 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir507100555/syzkaller.2eofDg/2346/file0/bus" dev="sda1" ino=16445 res=1
audit: type=1804 audit(1590490011.375:83): pid=30133 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir507100555/syzkaller.2eofDg/2346/file0/bus" dev="sda1" ino=16445 res=1
audit: type=1804 audit(1590490011.475:84): pid=30151 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir972608049/syzkaller.8ww3Xc/2839/bus" dev="sda1" ino=16442 res=1
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 30155 Comm: syz-executor.1 Not tainted 4.14.181-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x1b2/0x283 lib/dump_stack.c:58
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10a/0x154 lib/fault-inject.c:149
should_failslab+0xd6/0x130 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:421 [inline]
slab_alloc mm/slab.c:3376 [inline]
kmem_cache_alloc+0x40/0x3c0 mm/slab.c:3550
mempool_alloc+0x111/0x2d0 mm/mempool.c:330
bio_alloc_bioset+0x352/0x640 block/bio.c:486
bio_alloc include/linux/bio.h:422 [inline]
__blkdev_direct_IO fs/block_dev.c:419 [inline]
blkdev_direct_IO+0x609/0xe70 fs/block_dev.c:457
generic_file_direct_write+0x1df/0x420 mm/filemap.c:2950
__generic_file_write_iter+0x2a5/0x590 mm/filemap.c:3129
blkdev_write_iter fs/block_dev.c:1914 [inline]
blkdev_write_iter+0x1e8/0x3a0 fs/block_dev.c:1891
call_write_iter include/linux/fs.h:1778 [inline]
aio_write+0x2ba/0x4f0 fs/aio.c:1553
io_submit_one fs/aio.c:1641 [inline]
do_io_submit+0x930/0x1400 fs/aio.c:1709
do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45ca29
RSP: 002b:00007face659ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1
RAX: ffffffffffffffda RBX: 00000000004e0d00 RCX: 000000000045ca29
RDX: 00000000200000c0 RSI: 0000000000000008 RDI: 00007face657a000
RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
R13: 00000000000001fb R14: 00000000004c4446 R15: 00007face659f6d4
print_req_error: I/O error, dev loop5, sector 0
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 30172 Comm: syz-executor.1 Not tainted 4.14.181-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x1b2/0x283 lib/dump_stack.c:58
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10a/0x154 lib/fault-inject.c:149
should_failslab+0xd6/0x130 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:421 [inline]
slab_alloc mm/slab.c:3376 [inline]
kmem_cache_alloc+0x40/0x3c0 mm/slab.c:3550
mempool_alloc+0x111/0x2d0 mm/mempool.c:330
bvec_alloc+0xcc/0x2d0 block/bio.c:216
bio_alloc_bioset+0x3fa/0x640 block/bio.c:506
bio_alloc include/linux/bio.h:422 [inline]
__blkdev_direct_IO fs/block_dev.c:419 [inline]
blkdev_direct_IO+0x609/0xe70 fs/block_dev.c:457
generic_file_direct_write+0x1df/0x420 mm/filemap.c:2950
__generic_file_write_iter+0x2a5/0x590 mm/filemap.c:3129
blkdev_write_iter fs/block_dev.c:1914 [inline]
blkdev_write_iter+0x1e8/0x3a0 fs/block_dev.c:1891
call_write_iter include/linux/fs.h:1778 [inline]
aio_write+0x2ba/0x4f0 fs/aio.c:1553
io_submit_one fs/aio.c:1641 [inline]
do_io_submit+0x930/0x1400 fs/aio.c:1709
do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45ca29
RSP: 002b:00007face659ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1
RAX: ffffffffffffffda RBX: 00000000004e0d00 RCX: 000000000045ca29
RDX: 00000000200000c0 RSI: 0000000000000008 RDI: 00007face657a000
RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
R13: 00000000000001fb R14: 00000000004c4446 R15: 00007face659f6d4
audit: type=1804 audit(1590490012.405:85): pid=30151 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir972608049/syzkaller.8ww3Xc/2839/bus" dev="sda1" ino=16442 res=1
print_req_error: I/O error, dev loop5, sector 0
print_req_error: I/O error, dev loop5, sector 0
audit: type=1804 audit(1590490013.075:86): pid=30222 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir972608049/syzkaller.8ww3Xc/2840/bus" dev="sda1" ino=16428 res=1
print_req_error: I/O error, dev loop5, sector 0
netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'.
netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'.
tmpfs: Bad mount option fd
tmpfs: Bad mount option fd
x86/PAT: syz-executor.1:30339 map pfn RAM range req write-combining for [mem 0x1ac800000-0x1ac9fffff], got write-back
overlayfs: missing 'workdir'
x86/PAT: syz-executor.1:30339 map pfn RAM range req write-combining for [mem 0x1ae400000-0x1ae5fffff], got write-back
overlayfs: missing 'workdir'
audit: type=1800 audit(1590490014.695:87): pid=30364 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16464 res=0
VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2.
VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2.


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Jun 2, 2020, 6:44:17 AM6/2/20
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: 2d16cf48 Linux 4.19.125
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=161e97ee100000
kernel config: https://syzkaller.appspot.com/x/.config?x=60c13d6e8857c508
dashboard link: https://syzkaller.appspot.com/bug?extid=2c3032a5b34422339414
compiler: gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+2c3032...@syzkaller.appspotmail.com

WARNING: can't dereference registers at 000000002228659e for ip common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:670
attempt to access beyond end of device
(unnamed net_device) (uninitialized): option downdelay: allowed values 0 - 2147483647
loop2: rw=524288, want=2155905312, limit=264192
attempt to access beyond end of device
loop2: rw=0, want=2155905288, limit=264192
(unnamed net_device) (uninitialized): option downdelay: invalid value (18446744073709551615)
audit: type=1800 audit(1591094602.789:77): pid=10953 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.2" name="/" dev="loop2" ino=1025 res=0
attempt to access beyond end of device
loop2: rw=0, want=2155905288, limit=264192
(unnamed net_device) (uninitialized): option downdelay: allowed values 0 - 2147483647
audit: type=1800 audit(1591094602.899:78): pid=10973 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.2" name="/" dev="loop2" ino=1025 res=0
XFS (nullb0): Invalid superblock magic number
audit: type=1804 audit(1591094603.469:79): pid=10960 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir332971494/syzkaller.GKvsnP/65/bus" dev="sda1" ino=16142 res=1
audit: type=1804 audit(1591094603.549:80): pid=10970 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir625121481/syzkaller.teObop/61/bus" dev="sda1" ino=16123 res=1
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'.
loop1: p2 < > p3 p4
loop1: p3 size 1912633224 extends beyond EOD, truncated
loop1: p4 size 3657465856 extends beyond EOD, truncated
IPVS: ftp: loaded support on port[0] = 21
tmpfs: Bad value 'default:4' for mount option 'mpol'
BTRFS error (device loop0): unsupported checksum algorithm 41872
tmpfs: Bad value 'default:4' for mount option 'mpol'
BTRFS error (device loop0): superblock checksum mismatch
BTRFS error (device loop0): open_ctree failed
IPVS: ftp: loaded support on port[0] = 21
bridge0: port 1(bridge_slave_0) entered disabled state
netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'.
netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'.
netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'.
audit: type=1804 audit(1591094607.329:81): pid=11358 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir662849450/syzkaller.e9LZcA/72/file0" dev="sda1" ino=16172 res=1
IPv6: sit1: Disabled Multicast RS
overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off.
overlayfs: filesystem on './file0' not supported as upperdir
*** Guest State ***
CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7
CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871
CR3 = 0x0000000000000000
RSP = 0x0000000000002000 RIP = 0x0000000000000000
RFLAGS=0x00010002 DR7 = 0x0000000000000400
Sysenter RSP=0000000000000f80 CS:RIP=0050:0000000000002810
CS: sel=0x0000, attr=0x00085, limit=0x00000000, base=0x0000000000000000
DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
SS: sel=0x0000, attr=0x00085, limit=0x00000000, base=0x0000000000000000
ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
GDTR: limit=0x00000000, base=0x0000000000000000
LDTR: sel=0x000c, attr=0x10000, limit=0x00000000, base=0x0000000000000000
IDTR: limit=0x00000000, base=0x0000000000000000
TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
EFER = 0x0000000000000000 PAT = 0x0007040600070406
DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000
Interruptibility = 00000000 ActivityState = 00000000
*** Host State ***
RIP = 0xffffffff811a3c48 RSP = 0xffff88803fecf8c0
CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040
FSBase=00007f36d6456700 GSBase=ffff8880ae600000 TRBase=fffffe0000034000
GDTBase=fffffe0000032000 IDTBase=fffffe0000000000
CR0=0000000080050033 CR3=000000008f886000 CR4=00000000001426f0
Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff872013e0
EFER = 0x0000000000000d01 PAT = 0x0407050600070106
*** Control State ***
PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ea
EntryControls=0000d1ff ExitControls=002fefff
ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000
VMEntry: intr_info=8000030d errcode=00000000 ilen=00000000
VMExit: intr_info=00000000 errcode=00000000 ilen=00000001
reason=80000021 qualification=0000000000000000
IDTVectoring: info=00000000 errcode=00000000
TSC Offset = 0xffffff6cfecf0690
EPT pointer = 0x00000000a68f301e
Virtual processor ID = 0x0001
EXT4-fs (sda1): re-mounted. Opts:
EXT4-fs (sda1): Unrecognized mount option "//////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
ptrace attach of "/root/syz-executor.3"[11565] was attempted by "/root/syz-executor.3"[11568]
ISOFS: Unable to identify CD-ROM format.
IPVS: ftp: loaded support on port[0] = 21
netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'.
netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'.
audit: type=1800 audit(1591094612.120:82): pid=11595 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16166 res=0
new mount options do not match the existing superblock, will be ignored
skbuff: bad partial csum: csum=126/60339 headroom=64 headlen=3712
new mount options do not match the existing superblock, will be ignored

syzbot

unread,
Aug 16, 2020, 7:53:22 PM8/16/20
to syzkaller...@googlegroups.com
syzbot has found a reproducer for the following issue on:

HEAD commit: 14b58326 Linux 4.14.193
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=10cb4181900000
kernel config: https://syzkaller.appspot.com/x/.config?x=68ef0287ccbc3b42
dashboard link: https://syzkaller.appspot.com/bug?extid=a36286c38cd8ead29be5
compiler: gcc (GCC) 10.1.0-syz 20200507
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=1429e1a6900000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=125c7b6e900000

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+a36286...@syzkaller.appspotmail.com

WARNING: can't dereference registers at ffffffff86545ee3 for ip common_interrupt+0x93/0x93 arch/x86/entry/entry_64.S:576
random: crng init done
random: 7 urandom warning(s) missed due to ratelimiting

syzbot

unread,
Sep 10, 2020, 9:27:14 PM9/10/20
to syzkaller...@googlegroups.com
syzbot has found a reproducer for the following issue on:

HEAD commit: 67957f12 Linux 4.19.144
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=15ae3d45900000
kernel config: https://syzkaller.appspot.com/x/.config?x=c8f92680d5d45401
dashboard link: https://syzkaller.appspot.com/bug?extid=2c3032a5b34422339414
compiler: gcc (GCC) 10.1.0-syz 20200507
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=11892e43900000

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+2c3032...@syzkaller.appspotmail.com

IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
WARNING: can't dereference registers at 00000000a8515d41 for ip common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:670

syzbot

unread,
Nov 1, 2022, 8:49:40 AM11/1/22
to syzkaller...@googlegroups.com
syzbot has found a reproducer for the following issue on:

HEAD commit: 3f8a27f9e27b Linux 4.19.211
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=11d58612880000
kernel config: https://syzkaller.appspot.com/x/.config?x=9b9277b418617afe
dashboard link: https://syzkaller.appspot.com/bug?extid=2c3032a5b34422339414
compiler: gcc version 10.2.1 20210110 (Debian 10.2.1-6)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=1267675a880000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=16b87046880000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/98c0bdb4abb3/disk-3f8a27f9.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/ea228ff02669/vmlinux-3f8a27f9.xz
mounted in repro: https://storage.googleapis.com/syzbot-assets/dee72cc7da50/mount_1.gz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+2c3032...@syzkaller.appspotmail.com

WARNING: can't dereference registers at 000000005ec9b686 for ip common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:670

Reply all
Reply to author
Forward
0 new messages