Hello,
syzbot found the following issue on:
HEAD commit: 2cc14f52aeb7 Linux 6.7-rc3
git tree: upstream
console output:
https://syzkaller.appspot.com/x/log.txt?x=17c4abd8e80000
kernel config:
https://syzkaller.appspot.com/x/.config?x=585869067cd7ce59
dashboard link:
https://syzkaller.appspot.com/bug?extid=9ac3ebf5508b549b115e
compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40
CC: [
ak...@linux-foundation.org linux-...@vger.kernel.org linu...@kvack.org]
Unfortunately, I don't have any reproducer for this issue yet.
Downloadable assets:
disk image:
https://storage.googleapis.com/syzbot-assets/baa9e55a0f41/disk-2cc14f52.raw.xz
vmlinux:
https://storage.googleapis.com/syzbot-assets/5aa402127494/vmlinux-2cc14f52.xz
kernel image:
https://storage.googleapis.com/syzbot-assets/6ee6f93940bb/bzImage-2cc14f52.xz
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by:
syzbot+9ac3eb...@syzkaller.appspotmail.com
==================================================================
BUG: KCSAN: data-race in _copy_from_iter / _copy_from_iter
write to 0xffff888186b3f000 of 4096 bytes by task 32163 on cpu 1:
instrument_copy_from_user_before include/linux/instrumented.h:130 [inline]
copy_from_user_iter lib/iov_iter.c:54 [inline]
iterate_iovec include/linux/iov_iter.h:51 [inline]
iterate_and_advance2 include/linux/iov_iter.h:247 [inline]
iterate_and_advance include/linux/iov_iter.h:271 [inline]
__copy_from_iter lib/iov_iter.c:268 [inline]
_copy_from_iter+0x2e7/0xb60 lib/iov_iter.c:279
copy_page_from_iter+0x14f/0x280 lib/iov_iter.c:441
process_vm_rw_pages mm/process_vm_access.c:43 [inline]
process_vm_rw_single_vec mm/process_vm_access.c:117 [inline]
process_vm_rw_core mm/process_vm_access.c:215 [inline]
process_vm_rw+0x5d3/0x8c0 mm/process_vm_access.c:283
__do_sys_process_vm_writev mm/process_vm_access.c:303 [inline]
__se_sys_process_vm_writev mm/process_vm_access.c:298 [inline]
__x64_sys_process_vm_writev+0x7a/0x90 mm/process_vm_access.c:298
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x44/0x110 arch/x86/entry/common.c:82
entry_SYSCALL_64_after_hwframe+0x63/0x6b
write to 0xffff888186b3f000 of 4096 bytes by task 32162 on cpu 0:
instrument_copy_from_user_before include/linux/instrumented.h:130 [inline]
copy_from_user_iter lib/iov_iter.c:54 [inline]
iterate_iovec include/linux/iov_iter.h:51 [inline]
iterate_and_advance2 include/linux/iov_iter.h:247 [inline]
iterate_and_advance include/linux/iov_iter.h:271 [inline]
__copy_from_iter lib/iov_iter.c:268 [inline]
_copy_from_iter+0x2e7/0xb60 lib/iov_iter.c:279
copy_page_from_iter+0x14f/0x280 lib/iov_iter.c:441
process_vm_rw_pages mm/process_vm_access.c:43 [inline]
process_vm_rw_single_vec mm/process_vm_access.c:117 [inline]
process_vm_rw_core mm/process_vm_access.c:215 [inline]
process_vm_rw+0x5d3/0x8c0 mm/process_vm_access.c:283
__do_sys_process_vm_writev mm/process_vm_access.c:303 [inline]
__se_sys_process_vm_writev mm/process_vm_access.c:298 [inline]
__x64_sys_process_vm_writev+0x7a/0x90 mm/process_vm_access.c:298
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x44/0x110 arch/x86/entry/common.c:82
entry_SYSCALL_64_after_hwframe+0x63/0x6b
Reported by Kernel Concurrency Sanitizer on:
CPU: 0 PID: 32162 Comm: syz-executor.5 Not tainted 6.7.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
==================================================================
---
This report is generated by a bot. It may contain errors.
See
https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at
syzk...@googlegroups.com.
syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title
If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)
If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report
If you want to undo deduplication, reply with:
#syz undup