INFO: trying to register non-static key in unlink_anon_vmas

4 views
Skip to first unread message

syzbot

unread,
Aug 7, 2022, 5:49:18 PM8/7/22
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 3f8a27f9e27b Linux 4.19.211
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=15625612080000
kernel config: https://syzkaller.appspot.com/x/.config?x=9b9277b418617afe
dashboard link: https://syzkaller.appspot.com/bug?extid=b61ea3d48dec8ea886b8
compiler: gcc version 10.2.1 20210110 (Debian 10.2.1-6)

Unfortunately, I don't have any reproducer for this issue yet.

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+b61ea3...@syzkaller.appspotmail.com

INFO: trying to register non-static key.
The code is fine but needs lockdep annotation, or maybe
you didn't initialize this object before use?
turning off the locking correctness validator.
CPU: 1 PID: 14136 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1fc/0x2ef lib/dump_stack.c:118
assign_lock_key kernel/locking/lockdep.c:728 [inline]
register_lock_class+0xe82/0x11c0 kernel/locking/lockdep.c:754
__lock_acquire+0x17d/0x3ff0 kernel/locking/lockdep.c:3304
lock_acquire+0x170/0x3c0 kernel/locking/lockdep.c:3908
down_write+0x34/0x90 kernel/locking/rwsem.c:70
lock_anon_vma_root mm/rmap.c:238 [inline]
unlink_anon_vmas+0x178/0x840 mm/rmap.c:388
free_pgtables+0xe2/0x2f0 mm/memory.c:638
exit_mmap+0x2c8/0x530 mm/mmap.c:3094
__mmput kernel/fork.c:1016 [inline]
mmput+0x14e/0x4a0 kernel/fork.c:1037
exit_mm kernel/exit.c:549 [inline]
do_exit+0xaec/0x2be0 kernel/exit.c:857
do_group_exit+0x125/0x310 kernel/exit.c:967
get_signal+0x3f2/0x1f70 kernel/signal.c:2589
do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799
exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163
prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline]
syscall_return_slowpath arch/x86/entry/common.c:271 [inline]
do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f3523ba8279
Code: Bad RIP value.
RSP: 002b:00007f352251d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: 0000000000000800 RBX: 00007f3523cbaf80 RCX: 00007f3523ba8279
RDX: 0000000000001006 RSI: 0000000020001040 RDI: 0000000000000004
RBP: 00007f3523c02189 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffea7786d5f R14: 00007f352251d300 R15: 0000000000022000
BUG: unable to handle kernel NULL pointer dereference at 00000000000000fc
PGD 9b7b3067 P4D 9b7b3067 PUD 0
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 8144 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022
RIP: 0010:qlink_to_object mm/kasan/quarantine.c:136 [inline]
RIP: 0010:qlink_free mm/kasan/quarantine.c:141 [inline]
RIP: 0010:qlist_free_all+0x28/0x140 mm/kasan/quarantine.c:166
Code: 90 90 41 57 41 56 41 55 41 54 55 53 48 8b 1f 48 85 db 0f 84 08 01 00 00 48 89 f5 49 89 fd 48 85 ed 49 89 ee 0f 84 8b 00 00 00 <49> 63 86 fc 00 00 00 4c 8b 23 48 29 c3 48 83 3d 93 10 59 08 00 0f
RSP: 0018:ffff8880a99d76c0 EFLAGS: 00010246
RAX: ffffea0000000000 RBX: ffff888000000000 RCX: ffffea0000000007
RDX: 0000000000000000 RSI: ffffffff812b5eca RDI: 0000000000000007
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000007 R11: 0000000000000009 R12: ffff888000000000
R13: ffff8880a99d76f8 R14: 0000000000000000 R15: 0000000000000286
FS: 000055555702a400(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000fc CR3: 00000000a57f9000 CR4: 00000000003426f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
quarantine_reduce+0x1a9/0x230 mm/kasan/quarantine.c:259
kasan_kmalloc+0xa2/0x160 mm/kasan/kasan.c:538
slab_post_alloc_hook mm/slab.h:445 [inline]
slab_alloc mm/slab.c:3397 [inline]
kmem_cache_alloc+0x110/0x370 mm/slab.c:3557
ptlock_alloc+0x1d/0x70 mm/memory.c:4969
ptlock_init include/linux/mm.h:1900 [inline]
pgtable_page_ctor include/linux/mm.h:1934 [inline]
pte_alloc_one+0x68/0x190 arch/x86/mm/pgtable.c:38
__pte_alloc+0x21/0x340 mm/memory.c:665
copy_pte_range mm/memory.c:1089 [inline]
copy_pmd_range mm/memory.c:1165 [inline]
copy_pud_range mm/memory.c:1199 [inline]
copy_p4d_range mm/memory.c:1221 [inline]
copy_page_range+0x1d3d/0x2ff0 mm/memory.c:1283
dup_mmap kernel/fork.c:549 [inline]
dup_mm kernel/fork.c:1285 [inline]
copy_mm kernel/fork.c:1341 [inline]
copy_process.part.0+0x5b22/0x8260 kernel/fork.c:1913
copy_process kernel/fork.c:1710 [inline]
_do_fork+0x22f/0xf30 kernel/fork.c:2219
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f90235ca86b
Code: ed 0f 85 60 01 00 00 64 4c 8b 0c 25 10 00 00 00 45 31 c0 4d 8d 91 d0 02 00 00 31 d2 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 89 00 00 00 41 89 c5 85 c0 0f 85 90 00 00
RSP: 002b:00007ffeb66e8d60 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f90235ca86b
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011
RBP: 0000000000000001 R08: 0000000000000000 R09: 000055555702a400
R10: 000055555702a6d0 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffeb66e8e40
Modules linked in:
CR2: 00000000000000fc
---[ end trace e55cf02c9908de2c ]---
WARNING: CPU: 1 PID: 14136 at mm/rmap.c:235 lock_anon_vma_root mm/rmap.c:235 [inline]
WARNING: CPU: 1 PID: 14136 at mm/rmap.c:235 unlink_anon_vmas+0x58a/0x840 mm/rmap.c:388
RIP: 0010:qlink_to_object mm/kasan/quarantine.c:136 [inline]
RIP: 0010:qlink_free mm/kasan/quarantine.c:141 [inline]
RIP: 0010:qlist_free_all+0x28/0x140 mm/kasan/quarantine.c:166
----------------
Code disassembly (best guess):
0: 90 nop
1: 90 nop
2: 41 57 push %r15
4: 41 56 push %r14
6: 41 55 push %r13
8: 41 54 push %r12
a: 55 push %rbp
b: 53 push %rbx
c: 48 8b 1f mov (%rdi),%rbx
f: 48 85 db test %rbx,%rbx
12: 0f 84 08 01 00 00 je 0x120
18: 48 89 f5 mov %rsi,%rbp
1b: 49 89 fd mov %rdi,%r13
1e: 48 85 ed test %rbp,%rbp
21: 49 89 ee mov %rbp,%r14
24: 0f 84 8b 00 00 00 je 0xb5
* 2a: 49 63 86 fc 00 00 00 movslq 0xfc(%r14),%rax <-- trapping instruction
31: 4c 8b 23 mov (%rbx),%r12
34: 48 29 c3 sub %rax,%rbx
37: 48 83 3d 93 10 59 08 cmpq $0x0,0x8591093(%rip) # 0x85910d2
3e: 00
3f: 0f .byte 0xf


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Dec 5, 2022, 4:48:37 PM12/5/22
to syzkaller...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages