syzbot


general protection fault in khugepaged (3)

Status: upstream: reported on 2024/07/13 12:38
Subsystems: mm
[Documentation on labels]
Reported-by: syzbot+33287c327c3bcd4ea552@syzkaller.appspotmail.com
First crash: 211d, last: 29d
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [mm?] general protection fault in khugepaged (3) 0 (1) 2024/07/13 12:38
Similar bugs (3)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream general protection fault in khugepaged mm C done 3 1502d 1514d 15/27 fixed on 2020/09/16 22:51
upstream general protection fault in khugepaged (2) mm 1 277d 273d 0/27 auto-obsoleted due to no activity on 2024/01/27 04:37
linux-4.19 general protection fault in khugepaged 1 1020d 1020d 0/1 auto-closed as invalid on 2022/03/15 05:26

Sample crash report:
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000084: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000420-0x0000000000000427]
CPU: 1 UID: 0 PID: 37 Comm: khugepaged Not tainted 6.11.0-rc1-syzkaller-00154-gc0ecd6388360 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
RIP: 0010:khugepaged_scan_mm_slot mm/khugepaged.c:2382 [inline]
RIP: 0010:khugepaged_do_scan mm/khugepaged.c:2514 [inline]
RIP: 0010:khugepaged+0xad9/0x1600 mm/khugepaged.c:2570
Code: 00 00 41 bc 01 00 00 00 45 31 ff e9 9a fd ff ff e8 ec be 9c ff 49 8d 7f 20 48 b9 00 00 00 00 00 fc ff df 48 89 f8 48 c1 e8 03 <80> 3c 08 00 0f 85 a3 09 00 00 49 8d 7f 70 49 8b 6f 20 48 b9 00 00
RSP: 0018:ffffc90000ad7ce8 EFLAGS: 00010207
RAX: 0000000000000084 RBX: 0000000000000000 RCX: dffffc0000000000
RDX: ffff888019ee1e00 RSI: ffffffff81edbc44 RDI: 0000000000000426
RBP: 0000000008100077 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000003
R13: 0000000000000000 R14: 1ffff9200015afaf R15: 0000000000000406
FS:  0000000000000000(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff8e14f6968 CR3: 000000007c162000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 kthread+0x2c1/0x3a0 kernel/kthread.c:389
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:khugepaged_scan_mm_slot mm/khugepaged.c:2382 [inline]
RIP: 0010:khugepaged_do_scan mm/khugepaged.c:2514 [inline]
RIP: 0010:khugepaged+0xad9/0x1600 mm/khugepaged.c:2570
Code: 00 00 41 bc 01 00 00 00 45 31 ff e9 9a fd ff ff e8 ec be 9c ff 49 8d 7f 20 48 b9 00 00 00 00 00 fc ff df 48 89 f8 48 c1 e8 03 <80> 3c 08 00 0f 85 a3 09 00 00 49 8d 7f 70 49 8b 6f 20 48 b9 00 00
RSP: 0018:ffffc90000ad7ce8 EFLAGS: 00010207
RAX: 0000000000000084 RBX: 0000000000000000 RCX: dffffc0000000000
RDX: ffff888019ee1e00 RSI: ffffffff81edbc44 RDI: 0000000000000426
RBP: 0000000008100077 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000003
R13: 0000000000000000 R14: 1ffff9200015afaf R15: 0000000000000406
FS:  0000000000000000(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000056322350ffd0 CR3: 000000002b1ea000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	00 00                	add    %al,(%rax)
   2:	41 bc 01 00 00 00    	mov    $0x1,%r12d
   8:	45 31 ff             	xor    %r15d,%r15d
   b:	e9 9a fd ff ff       	jmp    0xfffffdaa
  10:	e8 ec be 9c ff       	call   0xff9cbf01
  15:	49 8d 7f 20          	lea    0x20(%r15),%rdi
  19:	48 b9 00 00 00 00 00 	movabs $0xdffffc0000000000,%rcx
  20:	fc ff df
  23:	48 89 f8             	mov    %rdi,%rax
  26:	48 c1 e8 03          	shr    $0x3,%rax
* 2a:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1) <-- trapping instruction
  2e:	0f 85 a3 09 00 00    	jne    0x9d7
  34:	49 8d 7f 70          	lea    0x70(%r15),%rdi
  38:	49 8b 6f 20          	mov    0x20(%r15),%rbp
  3c:	48                   	rex.W
  3d:	b9                   	.byte 0xb9

Crashes (7):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/08/02 09:11 upstream c0ecd6388360 1e9c4cf3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root general protection fault in khugepaged
2024/08/01 20:53 upstream 21b136cc63d2 1e9c4cf3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce general protection fault in khugepaged
2024/07/13 12:37 upstream 528dd46d0fc3 eaeb5c15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root general protection fault in khugepaged
2024/07/01 22:27 upstream 22a40d14b572 b294e901 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in khugepaged
2024/04/21 10:16 upstream 977b1ef51866 af24b050 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce general protection fault in khugepaged
2024/02/02 12:37 upstream 021533194476 60bf9982 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root general protection fault in khugepaged
2024/07/02 05:34 upstream 9903efbddba0 b294e901 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream general protection fault in khugepaged
* Struck through repros no longer work on HEAD.