syzbot


upstream boot error: kernel BUG in __phys_addr

Status: upstream: reported on 2022/08/16 08:35
Reported-by: syzbot+ec21a071f40cfb3fb6b5@syzkaller.appspotmail.com
First crash: 52d, last: 47d

Sample crash report:
------------[ cut here ]------------
kernel BUG at arch/x86/mm/physaddr.c:28!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 2973 Comm: udevadm Not tainted 6.0.0-rc1-syzkaller-00017-g3cc40a443a04 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022
RIP: 0010:__phys_addr+0xd3/0x140 arch/x86/mm/physaddr.c:28
Code: e3 44 89 e9 31 ff 48 d3 eb 48 89 de e8 f6 50 44 00 48 85 db 75 0f e8 0c 54 44 00 4c 89 e0 5b 5d 41 5c 41 5d c3 e8 fd 53 44 00 <0f> 0b e8 f6 53 44 00 48 c7 c0 10 50 cb 8b 48 ba 00 00 00 00 00 fc
RSP: 0018:ffffc90003067690 EFLAGS: 00010293
RAX: 0000000000000000 RBX: ffff000000000000 RCX: 0000000000000000
RDX: ffff88807b4f4100 RSI: ffffffff8136e603 RDI: 0000000000000006
RBP: ffff000080000000 R08: 0000000000000006 R09: ffff000080000000
R10: ffff778000000000 R11: 0000000000000000 R12: ffff778000000000
R13: ffff888147608000 R14: ffff888147608000 R15: 0000000000000000
FS:  00007fd6a3393840(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005613a7ff7018 CR3: 000000007bf65000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 virt_to_folio include/linux/mm.h:856 [inline]
 virt_to_slab mm/kasan/../slab.h:175 [inline]
 qlink_to_cache mm/kasan/quarantine.c:131 [inline]
 qlist_free_all+0x102/0x1b0 mm/kasan/quarantine.c:184
 kasan_quarantine_reduce+0x180/0x200 mm/kasan/quarantine.c:294
 __kasan_slab_alloc+0x97/0xb0 mm/kasan/common.c:447
 kasan_slab_alloc include/linux/kasan.h:224 [inline]
 slab_post_alloc_hook mm/slab.h:727 [inline]
 slab_alloc mm/slab.c:3294 [inline]
 __do_kmalloc mm/slab.c:3684 [inline]
 __kmalloc+0x315/0x4a0 mm/slab.c:3695
 kmalloc include/linux/slab.h:605 [inline]
 tomoyo_realpath_from_path+0xc3/0x620 security/tomoyo/realpath.c:254
 tomoyo_get_realpath security/tomoyo/file.c:151 [inline]
 tomoyo_check_open_permission+0x272/0x380 security/tomoyo/file.c:771
 tomoyo_file_open security/tomoyo/tomoyo.c:320 [inline]
 tomoyo_file_open+0x9d/0xc0 security/tomoyo/tomoyo.c:315
 security_file_open+0x45/0xb0 security/security.c:1646
 do_dentry_open+0x349/0x13a0 fs/open.c:865
 do_open fs/namei.c:3557 [inline]
 path_openat+0x1c92/0x28f0 fs/namei.c:3691
 do_filp_open+0x1b6/0x400 fs/namei.c:3718
 do_sys_openat2+0x16d/0x4c0 fs/open.c:1311
 do_sys_open fs/open.c:1327 [inline]
 __do_sys_openat fs/open.c:1343 [inline]
 __se_sys_openat fs/open.c:1338 [inline]
 __x64_sys_openat+0x13f/0x1f0 fs/open.c:1338
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fd6a2f25697
Code: 25 00 00 41 00 3d 00 00 41 00 74 37 64 8b 04 25 18 00 00 00 85 c0 75 5b 44 89 e2 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 85 00 00 00 48 83 c4 68 5d 41 5c c3 0f 1f
RSP: 002b:00007ffe79a55320 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 00007ffe79a57f41 RCX: 00007fd6a2f25697
RDX: 0000000000080001 RSI: 00007ffe79a553a8 RDI: 00000000ffffff9c
RBP: 00007ffe79a553a8 R08: 0000000000000000 R09: 00007fd6a2ff5a60
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000080001
R13: 00007ffe79a553a8 R14: 0000000000000000 R15: 000055f3a1f930b4
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:__phys_addr+0xd3/0x140 arch/x86/mm/physaddr.c:28
Code: e3 44 89 e9 31 ff 48 d3 eb 48 89 de e8 f6 50 44 00 48 85 db 75 0f e8 0c 54 44 00 4c 89 e0 5b 5d 41 5c 41 5d c3 e8 fd 53 44 00 <0f> 0b e8 f6 53 44 00 48 c7 c0 10 50 cb 8b 48 ba 00 00 00 00 00 fc
RSP: 0018:ffffc90003067690 EFLAGS: 00010293

RAX: 0000000000000000 RBX: ffff000000000000 RCX: 0000000000000000
RDX: ffff88807b4f4100 RSI: ffffffff8136e603 RDI: 0000000000000006
RBP: ffff000080000000 R08: 0000000000000006 R09: ffff000080000000
R10: ffff778000000000 R11: 0000000000000000 R12: ffff778000000000
R13: ffff888147608000 R14: ffff888147608000 R15: 0000000000000000
FS:  00007fd6a3393840(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005613a7ff7018 CR3: 000000007bf65000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400

Crashes (16):
Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Title
ci-upstream-kasan-gce-selinux-root 2022/08/17 03:35 upstream 3cc40a443a04 4e72d229 .config log report upstream boot error: kernel BUG in __phys_addr
ci-upstream-kasan-gce-selinux-root 2022/08/17 00:54 upstream 3cc40a443a04 7a7cb304 .config log report upstream boot error: kernel BUG in __phys_addr
ci-upstream-kasan-gce-selinux-root 2022/08/16 06:10 upstream 568035b01cfb 7a7cb304 .config log report upstream boot error: kernel BUG in __phys_addr
ci-upstream-kasan-gce-smack-root 2022/08/15 08:32 upstream 568035b01cfb 8dfcaa3d .config log report upstream boot error: kernel BUG in __phys_addr
ci-upstream-kasan-gce-selinux-root 2022/08/15 07:26 upstream 9f162193d6e4 8dfcaa3d .config log report upstream boot error: kernel BUG in __phys_addr
ci-upstream-kasan-gce-smack-root 2022/08/15 06:37 upstream 9f162193d6e4 8dfcaa3d .config log report upstream boot error: kernel BUG in __phys_addr
ci-upstream-kasan-gce-smack-root 2022/08/14 06:12 upstream aea23e7c464b 8dfcaa3d .config log report upstream boot error: kernel BUG in __phys_addr
ci-upstream-kasan-gce-selinux-root 2022/08/14 03:59 upstream f6eb0fed6a39 8dfcaa3d .config log report upstream boot error: kernel BUG in __phys_addr
ci-upstream-kasan-gce-selinux-root 2022/08/14 03:59 upstream f6eb0fed6a39 8dfcaa3d .config log report upstream boot error: kernel BUG in __phys_addr
ci-upstream-kasan-gce-smack-root 2022/08/13 03:59 upstream 69dac8e431af 8dfcaa3d .config log report upstream boot error: kernel BUG in __phys_addr
ci-upstream-kasan-gce-selinux-root 2022/08/13 01:05 upstream 4a9350597aff 8dfcaa3d .config log report upstream boot error: kernel BUG in __phys_addr
ci-upstream-kasan-gce-386 2022/08/16 05:13 upstream 568035b01cfb 7a7cb304 .config log report upstream boot error: kernel BUG in __phys_addr
ci-upstream-kasan-gce-386 2022/08/15 06:05 upstream 9f162193d6e4 8dfcaa3d .config log report upstream boot error: kernel BUG in __phys_addr
ci-upstream-kasan-gce-386 2022/08/14 05:20 upstream aea23e7c464b 8dfcaa3d .config log report upstream boot error: kernel BUG in __phys_addr
ci-upstream-kasan-gce-386 2022/08/14 03:42 upstream f6eb0fed6a39 8dfcaa3d .config log report upstream boot error: kernel BUG in __phys_addr
ci-upstream-kasan-gce-386 2022/08/12 23:38 upstream 4a9350597aff 402cd70d .config log report upstream boot error: kernel BUG in __phys_addr
* Struck through repros no longer work on HEAD.