kernel BUG at drivers/dma-buf/dma-buf.c:LINE!

18 views
Skip to first unread message

syzbot

unread,
Mar 3, 2020, 4:29:13 AM3/3/20
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: 78d697fc Linux 4.14.172
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=160986c3e00000
kernel config: https://syzkaller.appspot.com/x/.config?x=31ad682bcda9b93f
dashboard link: https://syzkaller.appspot.com/bug?extid=df623b51c417453842cc
compiler: gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+df623b...@syzkaller.appspotmail.com

------------[ cut here ]------------
kernel BUG at drivers/dma-buf/dma-buf.c:68!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 1 PID: 19448 Comm: syz-executor.1 Not tainted 4.14.172-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff88805976e3c0 task.stack: ffff888207010000
RIP: 0010:dma_buf_release+0x313/0x5c0 drivers/dma-buf/dma-buf.c:68
RSP: 0018:ffff888207017dc0 EFLAGS: 00010297
RAX: ffff88805976e3c0 RBX: ffff888094b5c780 RCX: 1ffffffff14cb674
RDX: 0000000000000000 RSI: ffff888094b5c780 RDI: ffff888090c62178
RBP: ffff888090c62000 R08: 0000000000000001 R09: 0000000000000000
R10: ffff88805976ec40 R11: ffff88805976e3c0 R12: ffff888094b5c7a8
R13: ffff888094b5c7fc R14: ffffffff83a4c360 R15: ffff888094b5c790
FS: 0000000001f11940(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f2936fdcd90 CR3: 00000001fffbd000 CR4: 00000000001426e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__fput+0x25f/0x790 fs/file_table.c:210
task_work_run+0x113/0x190 kernel/task_work.c:113
tracehook_notify_resume include/linux/tracehook.h:191 [inline]
exit_to_usermode_loop+0x1d6/0x220 arch/x86/entry/common.c:164
prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x416011
RSP: 002b:00007fff8b511200 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000009 RCX: 0000000000416011
RDX: 0000000000000000 RSI: 0000000000000081 RDI: 0000000000000008
RBP: 0000000000000000 R08: 0000000000000000 R09: 01ffffffffffffff
R10: 0000000000770938 R11: 0000000000000293 R12: 000000000076bf20
R13: 0000000000770948 R14: 0000000000000000 R15: 000000000076bf2c
Code: 31 e4 e8 61 1f ad fd 48 89 ef e8 49 a9 de fd e8 d4 7e b5 fd 44 89 e0 48 83 c4 10 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 bd 7e b5 fd <0f> 0b e8 b6 7e b5 fd e8 01 2c a6 fd 48 8d bd 38 02 00 00 48 b8
RIP: dma_buf_release+0x313/0x5c0 drivers/dma-buf/dma-buf.c:68 RSP: ffff888207017dc0
---[ end trace 45abceed5fdae7ce ]---


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Mar 3, 2020, 6:46:17 AM3/3/20
to syzkaller...@googlegroups.com
syzbot has found a reproducer for the following crash on:

HEAD commit: 78d697fc Linux 4.14.172
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=1193e255e00000
kernel config: https://syzkaller.appspot.com/x/.config?x=31ad682bcda9b93f
dashboard link: https://syzkaller.appspot.com/bug?extid=df623b51c417453842cc
compiler: gcc (GCC) 9.0.0 20181231 (experimental)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=17f50819e00000

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+df623b...@syzkaller.appspotmail.com

IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready
batman_adv: batadv0: Interface activated: batadv_slave_1
IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
------------[ cut here ]------------
kernel BUG at drivers/dma-buf/dma-buf.c:68!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 0 PID: 7780 Comm: syz-executor.0 Not tainted 4.14.172-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff88809f26e140 task.stack: ffff888097500000
RIP: 0010:dma_buf_release+0x313/0x5c0 drivers/dma-buf/dma-buf.c:68
RSP: 0018:ffff888097507dc0 EFLAGS: 00010297
RAX: ffff88809f26e140 RBX: ffff88808f3270c0 RCX: 1ffffffff14cb674
RDX: 0000000000000000 RSI: ffff88808f3270c0 RDI: ffff88808f872178
RBP: ffff88808f872000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff88808f3270e8
R13: ffff88808f32713c R14: ffffffff83a4c360 R15: ffff88808f3270d0
FS: 0000000002739940(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000076c000 CR3: 000000009746d000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__fput+0x25f/0x790 fs/file_table.c:210
task_work_run+0x113/0x190 kernel/task_work.c:113
tracehook_notify_resume include/linux/tracehook.h:191 [inline]
exit_to_usermode_loop+0x1d6/0x220 arch/x86/entry/common.c:164
prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x416011
RSP: 002b:00007ffd7703d720 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000009 RCX: 0000000000416011
RDX: 0000000000000000 RSI: 0000000000000081 RDI: 0000000000000008
RBP: 0000000000000000 R08: 0000000000000000 R09: 01ffffffffffffff
R10: 0000000000770938 R11: 0000000000000293 R12: 000000000076bf20
R13: 0000000000770948 R14: 0000000000000000 R15: 000000000076bf2c
Code: 31 e4 e8 61 1f ad fd 48 89 ef e8 49 a9 de fd e8 d4 7e b5 fd 44 89 e0 48 83 c4 10 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 bd 7e b5 fd <0f> 0b e8 b6 7e b5 fd e8 01 2c a6 fd 48 8d bd 38 02 00 00 48 b8
RIP: dma_buf_release+0x313/0x5c0 drivers/dma-buf/dma-buf.c:68 RSP: ffff888097507dc0
---[ end trace dcfc34e4eb362004 ]---

syzbot

unread,
Apr 2, 2022, 9:10:18 PM4/2/22
to syzkaller...@googlegroups.com
syzbot has found a reproducer for the following issue on:

HEAD commit: 74766a973637 Linux 4.14.275
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=175fe6fd700000
kernel config: https://syzkaller.appspot.com/x/.config?x=78767ee43940f0a8
dashboard link: https://syzkaller.appspot.com/bug?extid=df623b51c417453842cc
compiler: gcc version 10.2.1 20210110 (Debian 10.2.1-6)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=12325710f00000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=10a10710f00000

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+df623b...@syzkaller.appspotmail.com

IPVS: ftp: loaded support on port[0] = 21
------------[ cut here ]------------
kernel BUG at drivers/dma-buf/dma-buf.c:68!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 0 PID: 7966 Comm: syz-executor638 Not tainted 4.14.275-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff888097df6300 task.stack: ffff8880b3460000
RIP: 0010:dma_buf_release+0x313/0x5c0 drivers/dma-buf/dma-buf.c:68
RSP: 0018:ffff8880b3467db8 EFLAGS: 00010297
RAX: ffff888097df6300 RBX: ffff8880b514c800 RCX: 1ffffffff17f627c
RDX: 0000000000000000 RSI: ffff8880b514c800 RDI: ffff88809ab20a78
RBP: ffff88809ab20900 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880b514c828
R13: ffff8880b514c87c R14: ffffffff8398b080 R15: ffff8880b514c810
FS: 00005555568b0300(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff4df277140 CR3: 00000000af06d000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__fput+0x25f/0x7a0 fs/file_table.c:210
task_work_run+0x11f/0x190 kernel/task_work.c:113
tracehook_notify_resume include/linux/tracehook.h:191 [inline]
exit_to_usermode_loop+0x1ad/0x200 arch/x86/entry/common.c:164
prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x7ff4df1c45a3
RSP: 002b:00007ffcc788e568 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007ff4df1c45a3
RDX: 0000000020000000 RSI: 00000000c00464b4 RDI: 0000000000000003
RBP: 00007ffcc788e578 R08: 00007ff4df273e40 R09: 00007ff4df273e40
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcc788e580
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
Code: 31 e4 e8 21 49 b4 fd 48 89 ef e8 89 15 e6 fd e8 c4 8e bc fd 44 89 e0 48 83 c4 10 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 ad 8e bc fd <0f> 0b e8 a6 8e bc fd e8 71 6d ad fd 48 8d bd 38 02 00 00 48 b8
RIP: dma_buf_release+0x313/0x5c0 drivers/dma-buf/dma-buf.c:68 RSP: ffff8880b3467db8
---[ end trace 0dfc979aa52f087f ]---

Reply all
Reply to author
Forward
0 new messages