kernel BUG at arch/x86/mm/physaddr.c:LINE! (4)

0 views
Skip to first unread message

syzbot

unread,
Dec 28, 2019, 3:35:10 PM12/28/19
to syzkaller-upst...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: 46cf053e Linux 5.5-rc3
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=1475109ee00000
kernel config: https://syzkaller.appspot.com/x/.config?x=ed9d672709340e35
dashboard link: https://syzkaller.appspot.com/bug?extid=6dc9784bd3655245e245
compiler: gcc (GCC) 9.0.0 20181231 (experimental)
CC: [ak...@linux-foundation.org chri...@brauner.io
kees...@chromium.org linux-...@vger.kernel.org lu...@amacapital.net
mi...@kernel.org pet...@infradead.org tg...@linutronix.de w...@chromium.org]

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+6dc978...@syzkaller.appspotmail.com

------------[ cut here ]------------
kernel BUG at arch/x86/mm/physaddr.c:27!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 30763 Comm: blkid Not tainted 5.5.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
RIP: 0010:__phys_addr+0xb3/0x120 arch/x86/mm/physaddr.c:27
Code: 09 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 c6 04 40 00 48 85 db 75 0f e8
1c 03 40 00 4c 89 e0 5b 41 5c 41 5d 5d c3 e8 0d 03 40 00 <0f> 0b e8 06 03
40 00 48 c7 c0 10 50 87 89 48 ba 00 00 00 00 00 fc
RSP: 0018:ffffc9000733fa18 EFLAGS: 00010293
RAX: ffff888097d664c0 RBX: 001800000b95d440 RCX: ffffffff81352a82
RDX: 0000000000000000 RSI: ffffffff81352ae3 RDI: 0000000000000006
RBP: ffffc9000733fa30 R08: ffff888097d664c0 R09: fffffbfff1659bbd
R10: fffffbfff1659bbc R11: ffffffff8b2cdde7 R12: 001877800b95d440
R13: 001800008b95d440 R14: ffffc9000733fa80 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000738008 CR3: 0000000046766000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
virt_to_head_page include/linux/mm.h:731 [inline]
qlink_to_cache mm/kasan/quarantine.c:128 [inline]
qlist_free_all+0xc7/0x150 mm/kasan/quarantine.c:164
quarantine_reduce+0x15e/0x1a0 mm/kasan/quarantine.c:260
__kasan_kmalloc.constprop.0+0xa3/0xe0 mm/kasan/common.c:494
kasan_slab_alloc+0xf/0x20 mm/kasan/common.c:521
slab_post_alloc_hook mm/slab.h:584 [inline]
slab_alloc mm/slab.c:3320 [inline]
kmem_cache_alloc+0x121/0x710 mm/slab.c:3484
vm_area_alloc+0x20/0x110 kernel/fork.c:351
mmap_region+0x964/0x1760 mm/mmap.c:1754
do_mmap+0x837/0x1150 mm/mmap.c:1555
do_mmap_pgoff include/linux/mm.h:2338 [inline]
vm_mmap_pgoff+0x1c5/0x230 mm/util.c:506
ksys_mmap_pgoff+0xf7/0x630 mm/mmap.c:1607
__do_sys_mmap arch/x86/kernel/sys_x86_64.c:100 [inline]
__se_sys_mmap arch/x86/kernel/sys_x86_64.c:91 [inline]
__x64_sys_mmap+0xe9/0x1b0 arch/x86/kernel/sys_x86_64.c:91
do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:294
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f8bb34793ea
Code: 48 8d 3d 81 69 00 00 b2 84 e8 52 ec ff ff f7 d8 89 05 ae ad 20 00 eb
c6 90 90 90 90 90 90 90 90 49 89 ca b8 09 00 00 00 0f 05 <48> 3d 01 f0 ff
ff 73 01 c3 48 8d 0d 8a ad 20 00 31 d2 48 29 c2 89
RSP: 002b:00007ffc24e3db48 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
RAX: ffffffffffffffda RBX: 0000000000002000 RCX: 00007f8bb34793ea
RDX: 0000000000000003 RSI: 0000000000002000 RDI: 0000000000000000
RBP: 00000000000014a0 R08: 00000000ffffffff R09: 0000000000000000
R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000002 R14: 00007f8bb3684bc8 R15: 000000000000000f
Modules linked in:
---[ end trace 80f659c7b8698744 ]---
RIP: 0010:__phys_addr+0xb3/0x120 arch/x86/mm/physaddr.c:27
Code: 09 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 c6 04 40 00 48 85 db 75 0f e8
1c 03 40 00 4c 89 e0 5b 41 5c 41 5d 5d c3 e8 0d 03 40 00 <0f> 0b e8 06 03
40 00 48 c7 c0 10 50 87 89 48 ba 00 00 00 00 00 fc
RSP: 0018:ffffc9000733fa18 EFLAGS: 00010293
RAX: ffff888097d664c0 RBX: 001800000b95d440 RCX: ffffffff81352a82
RDX: 0000000000000000 RSI: ffffffff81352ae3 RDI: 0000000000000006
RBP: ffffc9000733fa30 R08: ffff888097d664c0 R09: fffffbfff1659bbd
R10: fffffbfff1659bbc R11: ffffffff8b2cdde7 R12: 001877800b95d440
R13: 001800008b95d440 R14: ffffc9000733fa80 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000714158 CR3: 0000000046766000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Feb 21, 2020, 8:13:11 PM2/21/20
to syzkaller-upst...@googlegroups.com
Sending this report upstream.
Reply all
Reply to author
Forward
0 new messages