BUG: unable to handle kernel paging request in qlist_free_all (4)

29 views
Skip to first unread message

syzbot

unread,
Mar 10, 2018, 9:59:05 AM3/10/18
to syzkaller-upst...@googlegroups.com
Hello,

syzbot hit the following crash on upstream commit
ce380619fab99036f5e745c7a865b21c59f005f6 (Tue Mar 6 04:31:14 2018 +0000)
Merge tag 'please-pull-ia64_misc' of
git://git.kernel.org/pub/scm/linux/kernel/git/aegl/linux

Unfortunately, I don't have any reproducer for this crash yet.
Raw console output is attached.
compiler: gcc (GCC) 7.1.1 20170620
.config is attached.
CC: [linux-...@vger.kernel.org linux-...@vger.kernel.org
vi...@zeniv.linux.org.uk]

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+4e2b75...@syzkaller.appspotmail.com
It will help syzbot understand when the bug is fixed. See footer for
details.
If you forward the report, please keep this part and the footer.

netlink: 4 bytes leftover after parsing attributes in process
`syz-executor3'.
PPPIOCDETACH file->f_count=2
netlink: 4 bytes leftover after parsing attributes in process
`syz-executor3'.
BUG: unable to handle kernel paging request at ffffebe000000020
IP: virt_to_head_page include/linux/mm.h:615 [inline]
IP: qlink_to_cache mm/kasan/quarantine.c:127 [inline]
IP: qlist_free_all+0x12b/0x160 mm/kasan/quarantine.c:163
PGD 0 P4D 0
Oops: 0000 [#1] SMP KASAN
Dumping ftrace buffer:
(ftrace buffer empty)
Modules linked in:
CPU: 0 PID: 11197 Comm: syz-executor2 Not tainted 4.16.0-rc4+ #343
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
RIP: 0010:virt_to_head_page include/linux/mm.h:615 [inline]
RIP: 0010:qlink_to_cache mm/kasan/quarantine.c:127 [inline]
RIP: 0010:qlist_free_all+0x12b/0x160 mm/kasan/quarantine.c:163
RSP: 0018:ffff8801b623fb68 EFLAGS: 00010286
RAX: 0000000000000002 RBX: 0000000000000286 RCX: ffffea0000000000
RDX: ffffebe000000000 RSI: ffff8801d38108f8 RDI: 0000000000000286
RBP: ffff8801b623fba0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000002 R15: ffffffff86ec9920
FS: 0000000002714940(0000) GS:ffff8801db200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffebe000000020 CR3: 00000001b36e6001 CR4: 00000000001626f0
DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
quarantine_reduce+0x141/0x170 mm/kasan/quarantine.c:259
kasan_kmalloc+0xca/0xe0 mm/kasan/kasan.c:537
kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:489
slab_post_alloc_hook mm/slab.h:443 [inline]
slab_alloc mm/slab.c:3379 [inline]
kmem_cache_alloc+0x11b/0x760 mm/slab.c:3539
getname_flags+0xcb/0x580 fs/namei.c:138
getname+0x19/0x20 fs/namei.c:209
do_sys_open+0x2e7/0x6d0 fs/open.c:1053
SYSC_open fs/open.c:1077 [inline]
SyS_open+0x2d/0x40 fs/open.c:1072
do_syscall_64+0x281/0x940 arch/x86/entry/common.c:287
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x451fd0
RSP: 002b:0000000000a3d9d0 EFLAGS: 00000202 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00000000000000d3 RCX: 0000000000451fd0
RDX: 000000000000000c RSI: 0000000000090800 RDI: 0000000000a3f830
RBP: 0000000000a3f830 R08: 0000000000000001 R09: 0000000002714940
R10: 0000000000000000 R11: 0000000000000202 R12: 00000000000002f0
R13: 0000000000000000 R14: 0000000000000005 R15: 0000000002714914
Code: 00 00 00 80 48 01 c2 72 44 48 b9 00 00 00 80 ff 77 00 00 48 01 ca 48
b9 00 00 00 00 00 ea ff ff 48 c1 ea 0c 48 c1 e2 06 48 01 ca <48> 8b 4a 20
48 8d 71 ff 83 e1 01 48 0f 45 d6 4c 8b 6a 30 e9 f4
RIP: virt_to_head_page include/linux/mm.h:615 [inline] RSP: ffff8801b623fb68
RIP: qlink_to_cache mm/kasan/quarantine.c:127 [inline] RSP: ffff8801b623fb68
RIP: qlist_free_all+0x12b/0x160 mm/kasan/quarantine.c:163 RSP:
ffff8801b623fb68
CR2: ffffebe000000020
---[ end trace 298a91de21a5e04b ]---


---
This bug is generated by a dumb bot. It may contain errors.
See https://goo.gl/tpsmEJ for details.
Direct all questions to syzk...@googlegroups.com.

syzbot will keep track of this bug report.
If you forgot to add the Reported-by tag, once the fix for this bug is
merged
into any tree, please reply to this email with:
#syz fix: exact-commit-title
To mark this as a duplicate of another syzbot report, please reply with:
#syz dup: exact-subject-of-another-report
If it's a one-off invalid bug report, please reply with:
#syz invalid
Note: if the crash happens again, it will cause creation of a new bug
report.
Note: all commands must start from beginning of the line in the email body.
To upstream this report, please reply with:
#syz upstream
raw.log.txt
config.txt

syzbot

unread,
Jul 8, 2018, 10:26:03 AM7/8/18
to syzkaller-upst...@googlegroups.com
syzbot has found a reproducer for the following crash on:

HEAD commit: d90c936fb318 Merge branch 'bpf-nfp-mul-div-support'
git tree: bpf-next
console output: https://syzkaller.appspot.com/x/log.txt?x=146aa6d0400000
kernel config: https://syzkaller.appspot.com/x/.config?x=a501a01deaf0fe9
dashboard link: https://syzkaller.appspot.com/bug?extid=4e2b7596e76e98664346
compiler: gcc (GCC) 8.0.1 20180413 (experimental)
syzkaller repro:https://syzkaller.appspot.com/x/repro.syz?x=163fe2c2400000
CC: [ak...@linux-foundation.org dan.j.w...@intel.com
jgl...@redhat.com kirill....@linux.intel.com
ldu...@linux.vnet.ibm.com linux-...@vger.kernel.org linu...@kvack.org
mho...@suse.com min...@kernel.org ross.z...@linux.intel.com
wi...@infradead.org ying....@intel.com]

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+4e2b75...@syzkaller.appspotmail.com

IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
8021q: adding VLAN 0 to HW filter on device team0
IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
BUG: unable to handle kernel paging request at ffffebe00106d608
PGD 0 P4D 0
Oops: 0000 [#1] SMP KASAN
CPU: 0 PID: 4445 Comm: syz-executor0 Not tainted 4.18.0-rc3+ #48
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
RIP: 0010:virt_to_head_page include/linux/mm.h:638 [inline]
RIP: 0010:qlink_to_cache mm/kasan/quarantine.c:127 [inline]
RIP: 0010:qlist_free_all+0x12b/0x160 mm/kasan/quarantine.c:163
Code: 00 00 80 48 01 c2 72 43 48 b9 00 00 00 80 ff 77 00 00 48 01 ca 48 b9
00 00 00 00 00 ea ff ff 48 c1 ea 0c 48 c1 e2 06 48 01 ca <48> 8b 4a 08 48
8d 71 ff 83 e1 01 48 0f 45 d6 4c 8b 6a 18 e9 f4 fe
RSP: 0000:ffff8801a9cb73b0 EFLAGS: 00010286
RAX: 0000000041b58ab3 RBX: 0000000000000282 RCX: ffffea0000000000
==================================================================
RDX: ffffebe00106d600 RSI: ffff8801b8ac8f60 RDI: 0000000000000282
BUG: KASAN: stack-out-of-bounds in is_idle_task include/linux/sched.h:1542
[inline]
BUG: KASAN: stack-out-of-bounds in irq_enter+0xc9/0xd0 kernel/softirq.c:343
RBP: ffff8801a9cb73e8 R08: fffffbfff1205459 R09: fffffbfff1205458
Read of size 4 at addr ffff8801b3da81e4 by task
���������̥ �����̥ ���/-1513305440
R10: fffffbfff1205458 R11: ffffffff8902a2c3 R12: 0000000000000000

R13: 0000000000000000 R14: 0000000041b58ab3 R15: ffffffff88f1b060
CPU: 1 PID: -1513305440 Comm: ���������̥ �����̥ Not tainted 4.18.0-rc3+ #48
FS: 0000000001d8b940(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Call Trace:
CR2: ffffebe00106d608 CR3: 00000001bf7e9000 CR4: 00000000001406f0
<IRQ>
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1c9/0x2b4 lib/dump_stack.c:113
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
quarantine_reduce+0x163/0x1a0 mm/kasan/quarantine.c:259
kasan_kmalloc+0x99/0xe0 mm/kasan/kasan.c:538
kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:490
print_address_description+0x6c/0x20b mm/kasan/report.c:256
slab_post_alloc_hook mm/slab.h:444 [inline]
slab_alloc mm/slab.c:3392 [inline]
kmem_cache_alloc+0x11b/0x760 mm/slab.c:3552
kasan_report_error mm/kasan/report.c:354 [inline]
kasan_report.cold.7+0x242/0x2fe mm/kasan/report.c:412
__asan_report_load4_noabort+0x14/0x20 mm/kasan/report.c:432
ptlock_alloc+0x20/0x80 mm/memory.c:4721
is_idle_task include/linux/sched.h:1542 [inline]
irq_enter+0xc9/0xd0 kernel/softirq.c:343
ptlock_init include/linux/mm.h:1858 [inline]
pgtable_page_ctor include/linux/mm.h:1892 [inline]
pte_alloc_one+0x6b/0x1a0 arch/x86/mm/pgtable.c:38
entering_irq arch/x86/include/asm/apic.h:510 [inline]
entering_ack_irq arch/x86/include/asm/apic.h:515 [inline]
smp_apic_timer_interrupt+0xb6/0x730 arch/x86/kernel/apic/apic.c:1048
__pte_alloc+0x2a/0x3c0 mm/memory.c:654
do_anonymous_page mm/memory.c:3134 [inline]
handle_pte_fault mm/memory.c:3970 [inline]
__handle_mm_fault+0x37fd/0x4460 mm/memory.c:4096
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:863
</IRQ>

Allocated by task 3114748688:
handle_mm_fault+0x53e/0xc80 mm/memory.c:4133
__do_page_fault+0x620/0xe50 arch/x86/mm/fault.c:1396
do_page_fault+0xf6/0x8c0 arch/x86/mm/fault.c:1471
page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1160
RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20
arch/x86/lib/copy_user_64.S:180
Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f
80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 <f3> a4 31 c0 0f
1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83
RSP: 0000:ffff8801a9cb7b88 EFLAGS: 00010202
RAX: ffffed0035396fb3 RBX: 0000000000000080 RCX: 0000000000000080
RDX: 0000000000000080 RSI: ffff8801a9cb7d18 RDI: 00007ffc541fff70
RBP: ffff8801a9cb7bc0 R08: ffffed0035396fb3 R09: ffffed0035396fa3
R10: ffffed0035396fb2 R11: ffff8801a9cb7d97 R12: 00007ffc541ffff0
R13: 00007ffc541fff70 R14: ffff8801a9cb7d18 R15: 00007ffffffff000
copy_to_user include/linux/uaccess.h:155 [inline]
copy_siginfo_to_user+0x22/0x50 kernel/signal.c:2854
__setup_rt_frame arch/x86/kernel/signal.c:472 [inline]
setup_rt_frame arch/x86/kernel/signal.c:706 [inline]
handle_signal arch/x86/kernel/signal.c:750 [inline]
do_signal+0x11fd/0x21c0 arch/x86/kernel/signal.c:818
exit_to_usermode_loop+0x2e0/0x370 arch/x86/entry/common.c:162
prepare_exit_to_usermode+0x342/0x3b0 arch/x86/entry/common.c:197
retint_user+0x8/0x18
RIP: 0033:0x455ba7
Code: 00 00 00 50 e9 be 88 ff ff ff ff b0 db 90 81 ff ff ff ff 48 89 f8 48
89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 <0f> 00 11 ca 8d
b6 20 c6 1e 86 a1 1e 37 00 f1 ff 1f c0 81 da b3 01
RSP: 002b:00007ffc542003c8 EFLAGS: 00010246
RAX: 00000000000000e7 RBX: 000000000000000b RCX: 00000000004812b0
RDX: 00000000004812b0 RSI: 00007ffc54200400 RDI: 000000000000000b
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009
R13: 00000000000002f3 R14: 00007ffc54289950 R15: 0000000000016a33
Modules linked in:
Dumping ftrace buffer:
(ftrace buffer empty)
CR2: ffffebe00106d608
---[ end trace ae3c7fae2ecc0557 ]---
BUG: unable to handle kernel paging request at ffffffff8c3f6968
PGD 8e6d067
RIP: 0010:virt_to_head_page include/linux/mm.h:638 [inline]
RIP: 0010:qlink_to_cache mm/kasan/quarantine.c:127 [inline]
RIP: 0010:qlist_free_all+0x12b/0x160 mm/kasan/quarantine.c:163
P4D 8e6d067
Code:
PUD 8e6e063
00
PMD 0
00
80 48 01
kasan: CONFIG_KASAN_INLINE enabled
c2
kasan: GPF could be caused by NULL-ptr deref or user memory access
72
general protection fault: 0000 [#2] SMP KASAN
43
CPU: 1 PID: -1513305440 Comm: ���������̥ �����̥ Tainted: G
D 4.18.0-rc3+ #48
48
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
b9
RIP: 0010:no_context+0x2f4/0x980 arch/x86/mm/fault.c:800
00 00
Code:
00
00
80
48 89
ff
fa 48
77
c1
00
e0 2a
00
48
48 01
c1
ca
ea 03
48
80
b9
3c 02
00
00
00
0f
00
85 8c
00
06
00
00 00
ea
4d 8b
ff
65 18
ff
b8
48
ff
c1
ff
ea
37
0c
00
48
48
c1
c1
e2
e0
06
2a
48 01
4c
ca
89 e2
<48>
48
8b
c1
4a
ea
08
03
48
<80>
8d
3c
71
02 00
ff
0f
83
85 61
e1
06
01
00 00
48 0f
4d
45
8b
d6 4c
24
8b
24
6a 18
bf
e9
9d
f4
6e
fe
ac
57
RSP: 0000:ffff8801a9cb73b0 EFLAGS: 00010286
4c
89
RAX: 0000000041b58ab3 RBX: 0000000000000282 RCX: ffffea0000000000
e6
RDX: ffffebe00106d600 RSI: ffff8801b8ac8f60 RDI: 0000000000000282
RBP: ffff8801a9cb73e8 R08: fffffbfff1205459 R09: fffffbfff1205458
RSP: 0018:ffff8801daf07950 EFLAGS: 00010006
R10: fffffbfff1205458 R11: ffffffff8902a2c3 R12: 0000000000000000
RAX: dffffc0000000000 RBX: 1ffff1003b5e0f31 RCX: ffffffff81361d71
R13: 0000000000000000 R14: 0000000041b58ab3 R15: ffffffff88f1b060
RDX: 000000000836b156 RSI: 0000000000000008 RDI: ffff8801b3da81d8
FS: 0000000001d8b940(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000
RBP: ffff8801daf07a10 R08: ffff8801b3da81c0 R09: ffffed003b5e3ec2
R10: ffffed003b5e3ec2 R11: ffff8801daf1f617 R12: 0000000041b58ab3
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
R13: ffff8801b3da81c0 R14: 0000000000000000 R15: ffff8801daf07d08
FS: 00007f77311d4700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000
CR2: ffffebe00106d608 CR3: 00000001bf7e9000 CR4: 00000000001406f0
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
CR2: ffffffff8c3f6968 CR3: 0000000008e6a000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400

Dmitry Vyukov

unread,
Jul 8, 2018, 10:57:10 AM7/8/18
to syzbot, 'Dmitry Vyukov' via syzkaller-upstream-moderation
#syz dup: BUG: unable to handle kernel paging request in ttwu_do_activate
> --
> You received this message because you are subscribed to the Google Groups
> "syzkaller-upstream-moderation" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to syzkaller-upstream-m...@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/syzkaller-upstream-moderation/00000000000031981c05707dad94%40google.com.
>
> For more options, visit https://groups.google.com/d/optout.
Reply all
Reply to author
Forward
0 new messages