general protection fault in handle_mm_fault

6 views
Skip to first unread message

syzbot

unread,
Jan 19, 2021, 3:47:16 AM1/19/21
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 2762b48e Linux 4.14.216
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=163176a4d00000
kernel config: https://syzkaller.appspot.com/x/.config?x=e8574522d7c28056
dashboard link: https://syzkaller.appspot.com/bug?extid=972875261e805e5ef3bf
compiler: gcc (GCC) 10.1.0-syz 20200507

Unfortunately, I don't have any reproducer for this issue yet.

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+972875...@syzkaller.appspotmail.com

__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x1b2/0x281 lib/dump_stack.c:58
kasan: GPF could be caused by NULL-ptr deref or user memory access
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold+0x10a/0x149 lib/fault-inject.c:149
should_fail_alloc_page mm/page_alloc.c:2898 [inline]
prepare_alloc_pages mm/page_alloc.c:4131 [inline]
__alloc_pages_nodemask+0x22c/0x2720 mm/page_alloc.c:4179
general protection fault: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 1 PID: 12137 Comm: syz-executor.1 Not tainted 4.14.216-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff88809c894180 task.stack: ffff888051490000
RIP: 0010:__rb_erase_augmented include/linux/rbtree_augmented.h:167 [inline]
RIP: 0010:rb_erase+0x29/0x1290 lib/rbtree.c:459
RSP: 0018:ffff888051497a68 EFLAGS: 00010292
RAX: dffffc0000000000 RBX: ffff88804f3df970 RCX: ffffc9000bdfc000
RDX: 0000000000000001 RSI: ffffffff8bf93da0 RDI: 0000000000000008
RBP: 0000000000000000 R08: ffffffff8b9a3c20 R09: 0000000000040411
R10: ffff88809c894a30 R11: ffff88809c894180 R12: 0000000000000000
R13: dffffc0000000000 R14: ffff88804f3675f8 R15: ffffffff8bf93da0
alloc_pages_vma+0xd2/0x6d0 mm/mempolicy.c:2077
FS: 00007ff6f103d700(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000
do_cow_fault mm/memory.c:3745 [inline]
do_fault mm/memory.c:3854 [inline]
handle_pte_fault mm/memory.c:4082 [inline]
__handle_mm_fault+0xe4f/0x4620 mm/memory.c:4206
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000016b9e60 CR3: 00000000ab854000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
handle_mm_fault+0x391/0x860 mm/memory.c:4243
integrity_inode_free+0x119/0x300 security/integrity/iint.c:146
faultin_page mm/gup.c:514 [inline]
__get_user_pages+0x445/0x11d0 mm/gup.c:714
security_inode_free+0x14/0x80 security/security.c:443
__destroy_inode+0x1e8/0x4d0 fs/inode.c:238
destroy_inode+0x49/0x110 fs/inode.c:265
populate_vma_page_range+0x17b/0x210 mm/gup.c:1231
iput_final fs/inode.c:1524 [inline]
iput+0x458/0x7e0 fs/inode.c:1551
__mm_populate+0x195/0x2c0 mm/gup.c:1279
swap_inode_boot_loader fs/ext4/ioctl.c:197 [inline]
ext4_ioctl+0x16c5/0x3870 fs/ext4/ioctl.c:924
mm_populate include/linux/mm.h:2194 [inline]
vm_mmap_pgoff+0x18f/0x1a0 mm/util.c:338
SYSC_mmap_pgoff mm/mmap.c:1545 [inline]
SyS_mmap_pgoff+0x249/0x510 mm/mmap.c:1503
do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45e219
RSP: 002b:00007ff6e56c3c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
vfs_ioctl fs/ioctl.c:46 [inline]
file_ioctl fs/ioctl.c:500 [inline]
do_vfs_ioctl+0x75a/0xff0 fs/ioctl.c:684
RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e219
RDX: 0000000000000002 RSI: 0000000000004000 RDI: 0000000020002000
RBP: 00007ff6e56c3ca0 R08: 0000000000000004 R09: 0000000000000000
R10: 0000000000002812 R11: 0000000000000246 R12: 0000000000000007
R13: 00007fffd29a70af R14: 00007ff6e56c49c0 R15: 000000000119bf8c
SYSC_ioctl fs/ioctl.c:701 [inline]
SyS_ioctl+0x7f/0xb0 fs/ioctl.c:692
do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45e219
RSP: 002b:00007ff6f103cc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 000000000045e219
RDX: 0000000000000000 RSI: 0000000000006611 RDI: 0000000000000004
RBP: 000000000119bfb8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119bf8c
R13: 00007ffc0edae84f R14: 00007ff6f103d9c0 R15: 000000000119bf8c
Code: ff ff 48 b8 00 00 00 00 00 fc ff df 41 57 49 89 f7 41 56 41 55 41 54 49 89 fc 48 83 c7 08 48 89 fa 55 48 c1 ea 03 53 48 83 ec 18 <80> 3c 02 00 0f 85 f2 0c 00 00 49 8d 7c 24 10 4d 8b 74 24 08 48
RIP: __rb_erase_augmented include/linux/rbtree_augmented.h:167 [inline] RSP: ffff888051497a68
RIP: rb_erase+0x29/0x1290 lib/rbtree.c:459 RSP: ffff888051497a68
---[ end trace 788b26d0c9a5f03f ]---


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
May 19, 2021, 4:48:15 AM5/19/21
to syzkaller...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages