syzbot


general protection fault in mm_update_next_owner (2)

Status: auto-closed as invalid on 2021/03/07 09:36
Subsystems: kernel
[Documentation on labels]
Reported-by: syzbot+a0f91e07da410c63b9c3@syzkaller.appspotmail.com
First crash: 1435d, last: 1227d
Discussions (1)
Title Replies (including bot) Last reply
general protection fault in mm_update_next_owner (2) 1 (2) 2020/04/18 06:55
Similar bugs (7)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.19 BUG: unable to handle kernel paging request in mm_update_next_owner 21 772d 1298d 0/1 auto-closed as invalid on 2022/06/06 03:00
linux-4.19 general protection fault in mm_update_next_owner (2) 1 503d 503d 0/1 auto-obsoleted due to no activity on 2023/03/01 16:07
linux-4.14 general protection fault in mm_update_next_owner 6 1306d 1524d 0/1 auto-closed as invalid on 2020/12/18 13:04
linux-4.14 general protection fault in mm_update_next_owner (2) 6 1049d 1137d 0/1 auto-closed as invalid on 2021/09/01 20:39
linux-4.19 general protection fault in mm_update_next_owner 6 1317d 1437d 0/1 auto-closed as invalid on 2020/12/07 18:48
upstream general protection fault in mm_update_next_owner kernel syz done done 1 1745d 1745d 12/26 fixed on 2019/08/27 17:15
upstream general protection fault in mm_update_next_owner (3) kernel 1 346d 342d 0/26 auto-obsoleted due to no activity on 2023/07/06 16:17

Sample crash report:
general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]
CPU: 0 PID: 16665 Comm: syz-executor.2 Not tainted 5.10.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:mm_update_next_owner+0x497/0x7a0 kernel/exit.c:389
Code: 48 8d bd 68 03 00 00 48 89 f8 48 c1 e8 03 80 3c 18 00 0f 85 f7 02 00 00 48 8b ad 68 03 00 00 4c 8d 7d 10 4c 89 f8 48 c1 e8 03 <80> 3c 18 00 0f 85 ce 02 00 00 48 8b 45 10 48 8d a8 48 fa ff ff 49
RSP: 0018:ffffc9000deefd58 EFLAGS: 00010202
RAX: 0000000000000002 RBX: dffffc0000000000 RCX: ffffffff8141f3af
RDX: ffff888064ad1a40 RSI: ffffffff8141f3bd RDI: ffff88801fe821a0
RBP: 0000000000000000 R08: 0000000000000001 R09: ffffffff8b00a083
R10: 0000000000000000 R11: 0000000000000000 R12: ffff888023b6bcc0
R13: ffff88801fe81a40 R14: 0000000000000000 R15: 0000000000000010
FS:  0000000000000000(0000) GS:ffff8880b9e00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000400200 CR3: 00000000294c2000 CR4: 00000000001506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 exit_mm kernel/exit.c:482 [inline]
 do_exit+0xa29/0x2930 kernel/exit.c:793
 do_group_exit+0x125/0x310 kernel/exit.c:903
 __do_sys_exit_group kernel/exit.c:914 [inline]
 __se_sys_exit_group kernel/exit.c:912 [inline]
 __x64_sys_exit_group+0x3a/0x50 kernel/exit.c:912
 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x45deb9
Code: Unable to access opcode bytes at RIP 0x45de8f.
RSP: 002b:000000000169fd88 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 000000000000001e RCX: 000000000045deb9
RDX: 0000000000417811 RSI: fffffffffffffff7 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000169fde0
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 000000000169fde0 R14: 0000000000000000 R15: 000000000169fdf0
Modules linked in:
---[ end trace 8357e759bea67707 ]---
RIP: 0010:mm_update_next_owner+0x497/0x7a0 kernel/exit.c:389
Code: 48 8d bd 68 03 00 00 48 89 f8 48 c1 e8 03 80 3c 18 00 0f 85 f7 02 00 00 48 8b ad 68 03 00 00 4c 8d 7d 10 4c 89 f8 48 c1 e8 03 <80> 3c 18 00 0f 85 ce 02 00 00 48 8b 45 10 48 8d a8 48 fa ff ff 49
RSP: 0018:ffffc9000deefd58 EFLAGS: 00010202
RAX: 0000000000000002 RBX: dffffc0000000000 RCX: ffffffff8141f3af
RDX: ffff888064ad1a40 RSI: ffffffff8141f3bd RDI: ffff88801fe821a0
RBP: 0000000000000000 R08: 0000000000000001 R09: ffffffff8b00a083
R10: 0000000000000000 R11: 0000000000000000 R12: ffff888023b6bcc0
R13: ffff88801fe81a40 R14: 0000000000000000 R15: 0000000000000010
FS:  0000000000000000(0000) GS:ffff8880b9e00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000400200 CR3: 00000000294c2000 CR4: 00000000001506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400

Crashes (14):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2020/11/07 09:35 upstream bf3e76289cd2 64069d48 .config console log report info ci-upstream-kasan-gce
2020/10/06 20:03 upstream 7575fdda569b 1880b4a9 .config console log report info ci-upstream-kasan-gce
2020/10/06 13:56 upstream 7575fdda569b 1880b4a9 .config console log report info ci-upstream-kasan-gce-root
2020/10/02 18:00 upstream 472e5b056f00 4969d6ca .config console log report info ci-upstream-kasan-gce
2020/09/01 05:39 upstream f75aef392f86 d5a3ae1f .config console log report ci-upstream-kasan-gce
2020/08/26 06:14 upstream abb3438d69fb 344da168 .config console log report ci-upstream-kasan-gce-root
2020/08/23 21:16 upstream c3d8f220d012 cef5ae68 .config console log report ci-upstream-kasan-gce-selinux-root
2020/07/18 02:23 upstream 8882572675c1 9c812472 .config console log report ci-upstream-kasan-gce-selinux-root
2020/07/14 17:17 upstream 0dc589da873b ce4c95b3 .config console log report ci-upstream-kasan-gce-root
2020/07/08 06:41 upstream 7cc2a8ea1048 51095195 .config console log report ci-upstream-kasan-gce-smack-root
2020/06/30 00:13 upstream 4e99b32169e8 a2cdad9d .config console log report ci-upstream-kasan-gce
2020/04/24 05:59 upstream c578ddb39e56 2e44d63e .config console log report ci-upstream-kasan-gce
2020/04/14 02:00 upstream 8f3d9f354286 7c54686a .config console log report ci-upstream-kasan-gce-root
2020/08/22 04:56 linux-next 494d311a82bb 6436ce4b .config console log report ci-upstream-linux-next-kasan-gce-root
* Struck through repros no longer work on HEAD.