syzbot


general protection fault in hugetlb_vma_lock_read

Status: auto-obsoleted due to no activity on 2024/02/13 18:27
Subsystems: mm
[Documentation on labels]
Reported-by: syzbot+93e7c679006f0d4e6105@syzkaller.appspotmail.com
First crash: 202d, last: 161d
Discussions (2)
Title Replies (including bot) Last reply
Re: [syzbot] [mm?] general protection fault in hugetlb_vma_lock_read 2 (2) 2023/11/16 17:32
[syzbot] [mm?] general protection fault in hugetlb_vma_lock_read 0 (1) 2023/11/02 15:26

Sample crash report:
general protection fault, probably for non-canonical address 0xdffffc000000001d: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x00000000000000e8-0x00000000000000ef]
CPU: 1 PID: 17591 Comm: syz-executor.3 Not tainted 6.7.0-rc4-syzkaller-00009-gbee0e7762ad2 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
RIP: 0010:__lock_acquire+0xe49/0x3b20 kernel/locking/lockdep.c:5005
Code: 11 00 00 39 05 c8 51 f6 0f 0f 82 c3 05 00 00 ba 01 00 00 00 e9 e4 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 <80> 3c 02 00 0f 85 26 1f 00 00 49 81 7d 00 a0 29 b5 90 0f 84 8e f2
RSP: 0018:ffffc9001063ef58 EFLAGS: 00010016
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 000000000000001d RSI: ffff88801c981dc0 RDI: 00000000000000e8
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
R10: ffffffff8f193a97 R11: 0000000000000002 R12: 0000000000000000
R13: 00000000000000e8 R14: 0000000000000000 R15: 0000000000000001
FS:  00007f48cfdfe6c0(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f5351175198 CR3: 000000002829e000 CR4: 0000000000350ef0
Call Trace:
 <TASK>
 lock_acquire kernel/locking/lockdep.c:5754 [inline]
 lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5719
 down_read+0x9a/0x330 kernel/locking/rwsem.c:1526
 hugetlb_vma_lock_read mm/hugetlb.c:274 [inline]
 hugetlb_vma_lock_read+0x8d/0xd0 mm/hugetlb.c:265
 hugetlb_follow_page_mask+0x15b/0x10c0 mm/hugetlb.c:6791
 follow_page_mask+0x49e/0xda0 mm/gup.c:824
 __get_user_pages+0x366/0x1490 mm/gup.c:1237
 __get_user_pages_locked mm/gup.c:1507 [inline]
 get_dump_page+0xfc/0x220 mm/gup.c:2029
 dump_user_range+0x45b/0x790 fs/coredump.c:913
 elf_core_dump+0x2706/0x3900 fs/binfmt_elf.c:2077
 do_coredump+0x2c97/0x3fd0 fs/coredump.c:764
 get_signal+0x2438/0x2790 kernel/signal.c:2890
 arch_do_signal_or_restart+0x90/0x7f0 arch/x86/kernel/signal.c:309
 exit_to_user_mode_loop kernel/entry/common.c:168 [inline]
 exit_to_user_mode_prepare+0x121/0x240 kernel/entry/common.c:204
 irqentry_exit_to_user_mode+0xa/0x40 kernel/entry/common.c:309
 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:570
RIP: 0033:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 002b:0000000020000008 EFLAGS: 00010217
RAX: 0000000000000000 RBX: 00007f48d139bf80 RCX: 00007f48d127cae9
RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000200
RBP: 00007f48d12c847a R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000
R13: 000000000000000b R14: 00007f48d139bf80 R15: 00007ffc18d3ee88
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:__lock_acquire+0xe49/0x3b20 kernel/locking/lockdep.c:5005
Code: 11 00 00 39 05 c8 51 f6 0f 0f 82 c3 05 00 00 ba 01 00 00 00 e9 e4 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 <80> 3c 02 00 0f 85 26 1f 00 00 49 81 7d 00 a0 29 b5 90 0f 84 8e f2
RSP: 0018:ffffc9001063ef58 EFLAGS: 00010016

RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 000000000000001d RSI: ffff88801c981dc0 RDI: 00000000000000e8
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
R10: ffffffff8f193a97 R11: 0000000000000002 R12: 0000000000000000
R13: 00000000000000e8 R14: 0000000000000000 R15: 0000000000000001
FS:  00007f48cfdfe6c0(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f5351175198 CR3: 000000002829e000 CR4: 0000000000350ef0
----------------
Code disassembly (best guess):
   0:	11 00                	adc    %eax,(%rax)
   2:	00 39                	add    %bh,(%rcx)
   4:	05 c8 51 f6 0f       	add    $0xff651c8,%eax
   9:	0f 82 c3 05 00 00    	jb     0x5d2
   f:	ba 01 00 00 00       	mov    $0x1,%edx
  14:	e9 e4 00 00 00       	jmp    0xfd
  19:	48 b8 00 00 00 00 00 	movabs $0xdffffc0000000000,%rax
  20:	fc ff df
  23:	4c 89 ea             	mov    %r13,%rdx
  26:	48 c1 ea 03          	shr    $0x3,%rdx
* 2a:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1) <-- trapping instruction
  2e:	0f 85 26 1f 00 00    	jne    0x1f5a
  34:	49 81 7d 00 a0 29 b5 	cmpq   $0xffffffff90b529a0,0x0(%r13)
  3b:	90
  3c:	0f                   	.byte 0xf
  3d:	84                   	.byte 0x84
  3e:	8e f2                	mov    %edx,%?

Crashes (16):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2023/12/05 18:26 upstream bee0e7762ad2 f819d6f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in hugetlb_vma_lock_read
2023/11/24 18:47 upstream f1a09972a45a 5b429f39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in hugetlb_vma_lock_read
2023/11/24 02:18 upstream d3fa86b1a7b4 fc59b78e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce general protection fault in hugetlb_vma_lock_read
2023/11/19 10:32 upstream 05aa69b096a0 cb976f63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce general protection fault in hugetlb_vma_lock_read
2023/11/06 06:39 upstream 77fa2fbe87fc 500bfdc4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in hugetlb_vma_lock_read
2023/11/05 02:26 upstream aea6bf908d73 500bfdc4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in hugetlb_vma_lock_read
2023/11/04 20:50 upstream 90b0c2b2edd1 500bfdc4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce general protection fault in hugetlb_vma_lock_read
2023/11/04 10:07 upstream 8f6f76a6a29f 500bfdc4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce general protection fault in hugetlb_vma_lock_read
2023/11/03 22:15 upstream 8f6f76a6a29f 500bfdc4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in hugetlb_vma_lock_read
2023/11/03 11:38 upstream 431f1051884e c4ac074c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root general protection fault in hugetlb_vma_lock_read
2023/11/02 15:25 upstream babe393974de b5f07fd3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce general protection fault in hugetlb_vma_lock_read
2023/10/28 08:13 upstream 888cf78c29e2 3c418d72 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce general protection fault in hugetlb_vma_lock_read
2023/10/25 09:37 upstream 4f82870119a4 17e6d526 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root general protection fault in hugetlb_vma_lock_read
2023/11/28 14:56 upstream df60cee26a2e 9fe51b7c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 general protection fault in hugetlb_vma_lock_read
2023/11/02 11:22 upstream 21e80f3841c0 c5562b0d .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 general protection fault in hugetlb_vma_lock_read
2023/10/31 13:59 linux-next 9c2d379d6345 58499c95 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root general protection fault in hugetlb_vma_lock_read
* Struck through repros no longer work on HEAD.