general protection fault in depot_save_stack

12 views
Skip to first unread message

syzbot

unread,
May 3, 2020, 7:55:17 AM5/3/20
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: fdc07232 Linux 4.19.120
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=1099e23fe00000
kernel config: https://syzkaller.appspot.com/x/.config?x=7848de5371b4200c
dashboard link: https://syzkaller.appspot.com/bug?extid=c3bd5eb6d2e9be539e47
compiler: gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+c3bd5e...@syzkaller.appspotmail.com

Process accounting resumed
IPVS: ftp: loaded support on port[0] = 21
IPVS: ftp: loaded support on port[0] = 21
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 3969 Comm: syz-executor.3 Not tainted 4.19.120-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:find_stack lib/stackdepot.c:193 [inline]
RIP: 0010:depot_save_stack+0x112/0x444 lib/stackdepot.c:242
Code: 61 01 00 00 41 89 dd 41 81 e5 ff ff 0f 00 4e 8b 24 ed 80 00 b0 8b 4d 85 e4 74 2c 41 8d 48 ff eb 09 4d 8b 24 24 4d 85 e4 74 1d <41> 39 5c 24 08 75 f0 31 c0 45 3b 44 24 0c 0f 84 ec 00 00 00 4d 8b
RSP: 0018:ffff88803c89f430 EFLAGS: 00010206
RAX: 000000006708c26f RBX: 00000000d6621dea RCX: 0000000000000011
RDX: 000000005a88f3e3 RSI: 0000000000489220 RDI: ffff88803c89f488
RBP: ffff88803c89f470 R08: 0000000000000012 R09: 000000000fdeb6fd
R10: 000000007a91525e R11: ffff8880ae723993 R12: 0202020200000000
R13: 0000000000021dea R14: ffff88812c383dc0 R15: ffff88805e20f177
FS: 00007fe2f6a6f700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005568ee5ae288 CR3: 000000009e061000 CR4: 00000000001426e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
save_stack+0x89/0xa0 mm/kasan/kasan.c:454
Process accounting resumed
Process accounting resumed
set_track mm/kasan/kasan.c:460 [inline]
kasan_kmalloc mm/kasan/kasan.c:553 [inline]
kasan_kmalloc+0xbf/0xe0 mm/kasan/kasan.c:531
slab_post_alloc_hook mm/slab.h:445 [inline]
slab_alloc mm/slab.c:3397 [inline]
kmem_cache_alloc+0x114/0x710 mm/slab.c:3557
kmem_cache_zalloc include/linux/slab.h:699 [inline]
fill_pool lib/debugobjects.c:134 [inline]
__debug_object_init+0x742/0xac0 lib/debugobjects.c:379
debug_timer_init kernel/time/timer.c:704 [inline]
debug_init kernel/time/timer.c:757 [inline]
init_timer_key+0x33/0x360 kernel/time/timer.c:806
sock_init_data+0x68/0xc60 net/core/sock.c:2762
inet6_create net/ipv6/af_inet6.c:187 [inline]
inet6_create+0x37c/0xf70 net/ipv6/af_inet6.c:110
__sock_create+0x3d5/0x740 net/socket.c:1276
inet_ctl_sock_create+0x8b/0x1e0 net/ipv4/af_inet.c:1605
igmp6_net_init+0x31/0x3a0 net/ipv6/mcast.c:2963
ops_init+0xaf/0x410 net/core/net_namespace.c:129
setup_net+0x2c2/0x6f0 net/core/net_namespace.c:315
copy_net_ns+0x1d9/0x331 net/core/net_namespace.c:438
create_new_namespaces+0x3fb/0x7c0 kernel/nsproxy.c:107
copy_namespaces+0x325/0x3c0 kernel/nsproxy.c:165
copy_process.part.0+0x39ad/0x7a50 kernel/fork.c:1900
copy_process kernel/fork.c:1694 [inline]
_do_fork+0x22f/0xf40 kernel/fork.c:2207
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45c829
Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fe2f6a6ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00000000004da8c0 RCX: 000000000045c829
RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000064000103
RBP: 000000000078c0e0 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
R13: 0000000000000076 R14: 00000000004c311e R15: 00007fe2f6a6f6d4
Modules linked in:
---[ end trace 09cdd8a5042c86d0 ]---
RIP: 0010:find_stack lib/stackdepot.c:193 [inline]
RIP: 0010:depot_save_stack+0x112/0x444 lib/stackdepot.c:242
Code: 61 01 00 00 41 89 dd 41 81 e5 ff ff 0f 00 4e 8b 24 ed 80 00 b0 8b 4d 85 e4 74 2c 41 8d 48 ff eb 09 4d 8b 24 24 4d 85 e4 74 1d <41> 39 5c 24 08 75 f0 31 c0 45 3b 44 24 0c 0f 84 ec 00 00 00 4d 8b
RSP: 0018:ffff88803c89f430 EFLAGS: 00010206
RAX: 000000006708c26f RBX: 00000000d6621dea RCX: 0000000000000011
RDX: 000000005a88f3e3 RSI: 0000000000489220 RDI: ffff88803c89f488
RBP: ffff88803c89f470 R08: 0000000000000012 R09: 000000000fdeb6fd
R10: 000000007a91525e R11: ffff8880ae723993 R12: 0202020200000000
R13: 0000000000021dea R14: ffff88812c383dc0 R15: ffff88805e20f177
Process accounting resumed
FS: 00007fe2f6a6f700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000021000000 CR3: 000000009e061000 CR4: 00000000001426e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Process accounting resumed
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Aug 31, 2020, 7:55:10 AM8/31/20
to syzkaller...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages