syzbot


general protection fault in copy_user_generic_unrolled

Status: closed as invalid on 2017/11/30 15:20
Subsystems: fs
[Documentation on labels]
First crash: 2339d, last: 2339d
Similar bugs (2)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream general protection fault in copy_user_generic_unrolled (2) fs 1 2321d 2317d 0/26 closed as dup on 2017/12/31 08:14
linux-4.14 general protection fault in copy_user_generic_unrolled 1 497d 497d 0/1 auto-obsoleted due to no activity on 2023/04/15 10:00

Sample crash report:
Use struct sctp_assoc_value instead
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] SMP KASAN
Dumping ftrace buffer:
   (ftrace buffer empty)
FAULT_FLAG_ALLOW_RETRY missing 31
CPU: 1 PID: 8273 Comm: syz-executor0 Not tainted 4.15.0-rc1-next-20171130+ #56
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x194/0x257 lib/dump_stack.c:53
 handle_userfault+0x12fa/0x24c0 fs/userfaultfd.c:427
 do_anonymous_page mm/memory.c:3149 [inline]
 handle_pte_fault mm/memory.c:3922 [inline]
 __handle_mm_fault+0x3da6/0x3dd0 mm/memory.c:4048
 handle_mm_fault+0x38f/0x930 mm/memory.c:4085
 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1429
 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1504
 page_fault+0x2c/0x60 arch/x86/entry/entry_64.S:1230
RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 arch/x86/lib/copy_user_64.S:75
RSP: 0018:ffff8801d42079a0 EFLAGS: 00010202
RAX: ffffed003b221a00 RBX: 0000000000000001 RCX: 0000000000000001
RDX: 0000000000000001 RSI: ffff8801d910d690 RDI: 0000000020001fb2
RBP: ffff8801d42079d0 R08: ffffed003b221ad3 R09: ffffed003b221ad3
R10: 0000000000000001 R11: ffffed003b221ad2 R12: 0000000020001fb2
R13: ffff8801d910d690 R14: 00007ffffffff000 R15: 0000000020001fb3
 copy_to_user include/linux/uaccess.h:155 [inline]
 rfkill_fop_read+0x3e8/0x720 net/rfkill/core.c:1189
 do_loop_readv_writev fs/read_write.c:673 [inline]
 do_iter_read+0x3db/0x5b0 fs/read_write.c:897
 vfs_readv+0x121/0x1c0 fs/read_write.c:959
 do_readv+0xfc/0x2a0 fs/read_write.c:992
 SYSC_readv fs/read_write.c:1079 [inline]
 SyS_readv+0x27/0x30 fs/read_write.c:1076
 entry_SYSCALL_64_fastpath+0x1f/0x96
RIP: 0033:0x4529d9
RSP: 002b:00007f2c3b7a7c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000013
RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 00000000004529d9
RDX: 0000000000000001 RSI: 0000000020013000 RDI: 0000000000000014
RBP: 00000000000002f8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f17e0
R13: 00000000ffffffff R14: 00007f2c3b7a86d4 R15: 0000000000000000
Modules linked in:
CPU: 0 PID: 8272 Comm: syz-executor2 Not tainted 4.15.0-rc1-next-20171130+ #56
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: 00000000d73d40b8 task.stack: 00000000ca392edc
RIP: 0010:sidtab_search_core+0x6a/0x320 security/selinux/ss/sidtab.c:88
RSP: 0018:ffff8801c7ca7a10 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000000008 RCX: ffffffff8220eadd
RDX: 0000000000000001 RSI: ffffc90004520000 RDI: ffffffff874c8180
RBP: ffff8801c7ca7a40 R08: 0000000000000003 R09: 1ffffffff0d6b133
R10: 0000000000000000 R11: ffffffff8748cd60 R12: 0000000000000001
R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
FS:  00007f007f274700(0000) GS:ffff8801db400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b9bc22000 CR3: 00000001d3b71000 CR4: 00000000001426f0
Call Trace:
 sidtab_search+0x1f/0x30 security/selinux/ss/sidtab.c:111
 security_bounded_transition+0xa8/0x4d0 security/selinux/ss/services.c:873
 selinux_setprocattr+0x8d0/0xb50 security/selinux/hooks.c:6043
 security_setprocattr+0x85/0xc0 security/security.c:1264
 proc_pid_attr_write+0x1e6/0x280 fs/proc/base.c:2574
 __vfs_write+0xef/0x970 fs/read_write.c:480
 vfs_write+0x18f/0x510 fs/read_write.c:544
 SYSC_write fs/read_write.c:589 [inline]
 SyS_write+0xef/0x220 fs/read_write.c:581
 entry_SYSCALL_64_fastpath+0x1f/0x96
RIP: 0033:0x4529d9
RSP: 002b:00007f007f273c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007f007f273950 RCX: 00000000004529d9
RDX: 0000000000000008 RSI: 00000000208dd000 RDI: 0000000000000014
RBP: 00007f007f273940 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b7354
R13: 00007f007f273ac8 R14: 00000000004b7366 R15: 0000000000000000
Code: ea 03 41 83 e4 7f 80 3c 02 00 0f 85 7d 02 00 00 4c 8b 33 4d 63 e4 48 b8 00 00 00 00 00 fc ff df 4b 8d 1c e6 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f 85 41 02 00 00 48 8b 1b 48 85 db 0f 84 8b 00 00 
RIP: sidtab_search_core+0x6a/0x320 security/selinux/ss/sidtab.c:88 RSP: ffff8801c7ca7a10
---[ end trace aacfeeef1ee36457 ]---

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2017/11/30 14:12 linux-next 11fed7829bef 29b0fd90 .config console log report ci-upstream-next-kasan-gce
* Struck through repros no longer work on HEAD.