[moderation] [mm?] BUG: unable to handle kernel paging request in clear_page_erms (5)

11 views
Skip to first unread message

syzbot

unread,
Oct 23, 2023, 7:39:59 PM10/23/23
to syzkaller-upst...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: dd72f9c7e512 Merge tag 'spi-fix-v6-6-rc4' of git://git.ker..
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=14f911bd680000
kernel config: https://syzkaller.appspot.com/x/.config?x=530f7d8ed0a57417
dashboard link: https://syzkaller.appspot.com/bug?extid=a25c2bef11a9ba847215
compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40
CC: [ak...@linux-foundation.org linux-...@vger.kernel.org linu...@kvack.org]

Unfortunately, I don't have any reproducer for this issue yet.

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/2b7ad65ebebf/disk-dd72f9c7.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/2cb2ba1da10e/vmlinux-dd72f9c7.xz
kernel image: https://storage.googleapis.com/syzbot-assets/0d67d5f67e51/bzImage-dd72f9c7.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+a25c2b...@syzkaller.appspotmail.com

BUG: unable to handle page fault for address: ffff888042a24000
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 12801067 P4D 12801067 PUD 41e19063 PMD 739a0063 PTE 800fffffbd5db060
Oops: 0002 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 11457 Comm: syz-executor.0 Not tainted 6.6.0-rc6-syzkaller-00043-gdd72f9c7e512 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023
RIP: 0010:clear_page_erms+0xb/0x10 arch/x86/lib/clear_page_64.S:50
Code: 48 89 47 20 48 89 47 28 48 89 47 30 48 89 47 38 48 8d 7f 40 75 d9 90 c3 0f 1f 80 00 00 00 00 f3 0f 1e fa b9 00 10 00 00 31 c0 <f3> aa c3 66 90 f3 0f 1e fa 48 83 f9 40 73 36 83 f9 08 73 0f 85 c9
RSP: 0018:ffffc90014ec7380 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000001000
RDX: ffffea00010a8900 RSI: ffff888000000000 RDI: ffff888042a24000
RBP: ffffea00010a8900 R08: 0000160000000000 R09: 0000000000000000
R10: ffffed1008544800 R11: dffffc0000000000 R12: 0000000000000000
R13: ffffea00010a8940 R14: 0000000000000001 R15: 0000000000000000
FS: 0000555555e39480(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff888042a24000 CR3: 00000000278a6000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
clear_page arch/x86/include/asm/page_64.h:53 [inline]
clear_highpage_kasan_tagged include/linux/highmem.h:248 [inline]
kernel_init_pages mm/page_alloc.c:1071 [inline]
post_alloc_hook+0x1a3/0x340 mm/page_alloc.c:1534
prep_new_page mm/page_alloc.c:1543 [inline]
get_page_from_freelist+0xee0/0x2f20 mm/page_alloc.c:3170
__alloc_pages+0x1d0/0x4a0 mm/page_alloc.c:4426
alloc_pages+0x1a9/0x270 mm/mempolicy.c:2297
__get_free_pages+0xc/0x40 mm/page_alloc.c:4477
kasan_populate_vmalloc_pte+0x29/0x160 mm/kasan/shadow.c:323
apply_to_pte_range mm/memory.c:2586 [inline]
apply_to_pmd_range mm/memory.c:2630 [inline]
apply_to_pud_range mm/memory.c:2666 [inline]
apply_to_p4d_range mm/memory.c:2702 [inline]
__apply_to_page_range+0x5ed/0xdb0 mm/memory.c:2736
alloc_vmap_area+0x85f/0x2060 mm/vmalloc.c:1641
__get_vm_area_node+0x132/0x3d0 mm/vmalloc.c:2595
__vmalloc_node_range+0x27a/0x1540 mm/vmalloc.c:3280
alloc_thread_stack_node kernel/fork.c:309 [inline]
dup_task_struct kernel/fork.c:1118 [inline]
copy_process+0x13e3/0x73f0 kernel/fork.c:2327
kernel_clone+0xfd/0x920 kernel/fork.c:2909
__do_sys_clone3+0x1f1/0x260 kernel/fork.c:3210
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7efcdf4a88d9
Code: ff ff eb d2 e8 f8 62 fd ff 0f 1f 84 00 00 00 00 00 b8 ea ff ff ff 48 85 ff 74 2c 48 85 d2 74 27 49 89 c8 b8 b3 01 00 00 0f 05 <48> 85 c0 7c 18 74 01 c3 31 ed 48 83 e4 f0 4c 89 c7 ff d2 48 89 c7
RSP: 002b:00007efcdf6bf918 EFLAGS: 00000202 ORIG_RAX: 00000000000001b3
RAX: ffffffffffffffda RBX: 00007efcdf450fb0 RCX: 00007efcdf4a88d9
RDX: 00007efcdf450fb0 RSI: 0000000000000058 RDI: 00007efcdf6bf960
RBP: 00007efce01036c0 R08: 00007efce01036c0 R09: 00007efcdf6bfa47
R10: 0000000000000008 R11: 0000000000000202 R12: ffffffffffffffb0
R13: 000000000000006e R14: 00007efcdf6bf960 R15: 00007efcdf6bfa48
</TASK>
Modules linked in:
CR2: ffff888042a24000
---[ end trace 0000000000000000 ]---
RIP: 0010:clear_page_erms+0xb/0x10 arch/x86/lib/clear_page_64.S:50
Code: 48 89 47 20 48 89 47 28 48 89 47 30 48 89 47 38 48 8d 7f 40 75 d9 90 c3 0f 1f 80 00 00 00 00 f3 0f 1e fa b9 00 10 00 00 31 c0 <f3> aa c3 66 90 f3 0f 1e fa 48 83 f9 40 73 36 83 f9 08 73 0f 85 c9
RSP: 0018:ffffc90014ec7380 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000001000
RDX: ffffea00010a8900 RSI: ffff888000000000 RDI: ffff888042a24000
RBP: ffffea00010a8900 R08: 0000160000000000 R09: 0000000000000000
R10: ffffed1008544800 R11: dffffc0000000000 R12: 0000000000000000
R13: ffffea00010a8940 R14: 0000000000000001 R15: 0000000000000000
FS: 0000555555e39480(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff888042a24000 CR3: 00000000278a6000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 48 89 47 20 mov %rax,0x20(%rdi)
4: 48 89 47 28 mov %rax,0x28(%rdi)
8: 48 89 47 30 mov %rax,0x30(%rdi)
c: 48 89 47 38 mov %rax,0x38(%rdi)
10: 48 8d 7f 40 lea 0x40(%rdi),%rdi
14: 75 d9 jne 0xffffffef
16: 90 nop
17: c3 ret
18: 0f 1f 80 00 00 00 00 nopl 0x0(%rax)
1f: f3 0f 1e fa endbr64
23: b9 00 10 00 00 mov $0x1000,%ecx
28: 31 c0 xor %eax,%eax
* 2a: f3 aa rep stos %al,%es:(%rdi) <-- trapping instruction
2c: c3 ret
2d: 66 90 xchg %ax,%ax
2f: f3 0f 1e fa endbr64
33: 48 83 f9 40 cmp $0x40,%rcx
37: 73 36 jae 0x6f
39: 83 f9 08 cmp $0x8,%ecx
3c: 73 0f jae 0x4d
3e: 85 c9 test %ecx,%ecx


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

If the bug is already fixed, let syzbot know by replying with:
#syz fix: exact-commit-title

If you want to overwrite bug's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)

If the bug is a duplicate of another bug, reply with:
#syz dup: exact-subject-of-another-report

If you want to undo deduplication, reply with:
#syz undup
Reply all
Reply to author
Forward
0 new messages