general protection fault in print_bad_pte

5 views
Skip to first unread message

syzbot

unread,
Jul 15, 2018, 9:39:03 AM7/15/18
to syzkaller-upst...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: 483d835c8189 Add linux-next specific files for 20180713
git tree: linux-next
console output: https://syzkaller.appspot.com/x/log.txt?x=1692c9dc400000
kernel config: https://syzkaller.appspot.com/x/.config?x=60e5ac2478928314
dashboard link: https://syzkaller.appspot.com/bug?extid=c2225cd254df6b076906
compiler: gcc (GCC) 8.0.1 20180413 (experimental)
CC: [ak...@linux-foundation.org dan.j.w...@intel.com
jgl...@redhat.com ldu...@linux.vnet.ibm.com linux-...@vger.kernel.org
linu...@kvack.org mho...@suse.com min...@kernel.org
ross.z...@linux.intel.com s...@canb.auug.org.au ying....@intel.com]

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+c2225c...@syzkaller.appspotmail.com

kasan: CONFIG_KASAN_INLINE enabled
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1c9/0x2b4 lib/dump_stack.c:113
kasan: GPF could be caused by NULL-ptr deref or user memory access
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold.4+0xa/0x11 lib/fault-inject.c:149
general protection fault: 0000 [#1] SMP KASAN
CPU: 0 PID: 16660 Comm: syz-executor6 Not tainted 4.18.0-rc4-next-20180713+
#7
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
RIP: 0010:print_bad_pte+0xad/0x5f0 mm/memory.c:730
Code:
89
f8
48
c1
e8
03 80
3c
18
00 0f
85
32
02
00 00
48
b8
__should_failslab+0x124/0x180 mm/failslab.c:32
00 00
should_failslab+0x9/0x14 mm/slab_common.c:1557
00
slab_pre_alloc_hook mm/slab.h:423 [inline]
slab_alloc_node mm/slab.c:3299 [inline]
kmem_cache_alloc_node_trace+0x26f/0x770 mm/slab.c:3661
00
00
__do_kmalloc_node mm/slab.c:3681 [inline]
__kmalloc_node_track_caller+0x33/0x70 mm/slab.c:3696
fc
__kmalloc_reserve.isra.41+0x3a/0xe0 net/core/skbuff.c:137
ff
__alloc_skb+0x155/0x790 net/core/skbuff.c:205
df
4d
8b
66
40
49
8d
7c 24
50
alloc_skb include/linux/skbuff.h:988 [inline]
alloc_uevent_skb+0x89/0x220 lib/kobject_uevent.c:288
48 89
uevent_net_broadcast_untagged lib/kobject_uevent.c:324 [inline]
kobject_uevent_net_broadcast lib/kobject_uevent.c:406 [inline]
kobject_uevent_env+0x866/0x1110 lib/kobject_uevent.c:587
fa
48
kobject_uevent+0x1f/0x30 lib/kobject_uevent.c:636
c1
device_add+0x95d/0x16f0 drivers/base/core.c:1915
ea
03
<80>
3c
device_create_groups_vargs+0x1ff/0x270 drivers/base/core.c:2512
02
device_create_vargs+0x46/0x60 drivers/base/core.c:2552
00
bdi_register_va.part.12+0xc3/0x9c0 mm/backing-dev.c:914
0f
85
18 02
00
00
48
b8
00
00
bdi_register_va+0x68/0x80 mm/backing-dev.c:930
00
super_setup_bdi_name+0x12d/0x240 fs/super.c:1446
00
00
fc
ff
super_setup_bdi+0x7f/0xb0 fs/super.c:1467
df
v9fs_fill_super fs/9p/vfs_super.c:90 [inline]
v9fs_mount+0x268/0x900 fs/9p/vfs_super.c:146
4c
89
legacy_get_tree+0x118/0x440 fs/fs_context.c:659
RSP: 0018:ffff88018f31ed88 EFLAGS: 00010202
vfs_get_tree+0x1cb/0x5c0 fs/super.c:1743
do_new_mount fs/namespace.c:2567 [inline]
do_mount+0x6c1/0x1fb0 fs/namespace.c:2889
RAX: dffffc0000000000 RBX: dffffc0000000000 RCX: ffffc90001baf000
RDX: 090000010797f1b3 RSI: ffffffff81ab917e RDI: 480000083cbf8d99
RBP: ffff88018f31ee48 R08: ffff880198f8c180 R09: ffffed003ae0a7e0
R10: ffffed003ae0a7e0 R11: ffff8801d7053f07 R12: 480000083cbf8d49
R13: 1ffff10031e63db8 R14: ffffffff815f30e0 R15: ffffffff81abed00
FS: 00007f1dcdd34700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b31a23000 CR3: 00000001cb0fc000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
ksys_mount+0x12d/0x140 fs/namespace.c:3105
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
__do_sys_mount fs/namespace.c:3119 [inline]
__se_sys_mount fs/namespace.c:3116 [inline]
__x64_sys_mount+0xbe/0x150 fs/namespace.c:3116
Call Trace:
do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290
_vm_normal_page+0x2c3/0x340 mm/memory.c:860
entry_SYSCALL_64_after_hwframe+0x49/0xbe
copy_one_pte mm/memory.c:1039 [inline]
copy_pte_range mm/memory.c:1103 [inline]
copy_pmd_range mm/memory.c:1154 [inline]
copy_pud_range mm/memory.c:1188 [inline]
copy_p4d_range mm/memory.c:1210 [inline]
copy_page_range+0xd15/0x24c0 mm/memory.c:1272
RIP: 0033:0x455ab9
Code:
1d
ba
fb
ff
c3
66
2e
shrink_slab_memcg mm/vmscan.c:598 [inline]
shrink_slab+0x861/0xa60 mm/vmscan.c:671
0f
1f
84
00
00
00
00 00
66
shrink_node+0x429/0x16a0 mm/vmscan.c:2735
90
48
89
f8
48
89
f7
shrink_zones mm/vmscan.c:2964 [inline]
do_try_to_free_pages+0x3e7/0x1290 mm/vmscan.c:3026
48
89
d6
48
89
ca
4d
try_to_free_mem_cgroup_pages+0x49d/0xc90 mm/vmscan.c:3324
89
c2 4d
89
c8 4c
8b
4c
24
08
0f
05
<48>
3d
01
f0
ff
memory_high_write+0x283/0x310 mm/memcontrol.c:5611
ff 0f
83
eb
b9
cgroup_file_write+0x31f/0x840 kernel/cgroup/cgroup.c:3502
fb
ff
c3
66
kernfs_fop_write+0x2ba/0x480 fs/kernfs/file.c:316
2e
__vfs_write+0x117/0x9d0 fs/read_write.c:485
0f
1f
84
00
00
00 00
RSP: 002b:00007fe830814c68 EFLAGS: 00000246
ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007fe8308156d4 RCX: 0000000000455ab9
vfs_write+0x1fc/0x560 fs/read_write.c:549
RDX: 0000000020000080 RSI: 0000000020000300 RDI: 0000000000000000
ksys_write+0x101/0x260 fs/read_write.c:598
RBP: 000000000072bea0 R08: 0000000020000bc0 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016
R13: 00000000004c0201 R14: 00000000004cfe50 R15: 000000000000005b
__do_sys_write fs/read_write.c:610 [inline]
__se_sys_write fs/read_write.c:607 [inline]
__x64_sys_write+0x73/0xb0 fs/read_write.c:607
do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455ab9
Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7
48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff
ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007f1dcdd33c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007f1dcdd346d4 RCX: 0000000000455ab9
RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000015
RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
R13: 00000000004c2cae R14: 00000000004d4cc8 R15: 0000000000000000
Modules linked in:
Dumping ftrace buffer:
(ftrace buffer empty)
---[ end trace e75e635afdb00c9d ]---
RIP: 0010:print_bad_pte+0xad/0x5f0 mm/memory.c:730
Code: 89 f8 48 c1 e8 03 80 3c 18 00 0f 85 32 02 00 00 48 b8 00 00 00 00 00
fc ff df 4d 8b 66 40 49 8d 7c 24 50 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f
85 18 02 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89
RSP: 0018:ffff88018f31ed88 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: dffffc0000000000 RCX: ffffc90001baf000
RDX: 090000010797f1b3 RSI: ffffffff81ab917e RDI: 480000083cbf8d99
RBP: ffff88018f31ee48 R08: ffff880198f8c180 R09: ffffed003ae0a7e0
R10: ffffed003ae0a7e0 R11: ffff8801d7053f07 R12: 480000083cbf8d49
R13: 1ffff10031e63db8 R14: ffffffff815f30e0 R15: ffffffff81abed00
FS: 00007f1dcdd34700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b31a23000 CR3: 00000001cb0fc000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#bug-status-tracking for how to communicate with
syzbot.

syzbot

unread,
Feb 22, 2019, 5:34:22 AM2/22/19
to syzkaller-upst...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages