syzbot


general protection fault in anon_vma_interval_tree_insert (2)

Status: auto-closed as invalid on 2022/02/24 00:52
Subsystems: mm
[Documentation on labels]
Reported-by: syzbot+4e8d640167f03cec9bb8@syzkaller.appspotmail.com
First crash: 976d, last: 879d
Similar bugs (6)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.14 general protection fault in anon_vma_interval_tree_insert 1 1101d 1101d 0/1 auto-closed as invalid on 2021/08/16 07:22
linux-4.19 general protection fault in anon_vma_interval_tree_insert 1 1076d 1076d 0/1 auto-closed as invalid on 2021/09/09 17:59
upstream general protection fault in anon_vma_interval_tree_insert mm 3 1317d 1394d 0/26 auto-closed as invalid on 2020/12/13 06:13
upstream KASAN: use-after-free Read in anon_vma_interval_tree_insert mm 1 711d 711d 0/26 auto-closed as invalid on 2022/07/11 21:59
upstream KASAN: use-after-free Read in anon_vma_interval_tree_insert (2) mm 2 597d 649d 0/26 auto-obsoleted due to no activity on 2022/11/03 13:19
linux-4.19 KASAN: slab-out-of-bounds Read in anon_vma_interval_tree_insert 1 849d 849d 0/1 auto-closed as invalid on 2022/04/24 23:41

Sample crash report:
general protection fault, probably for non-canonical address 0xdffffc0000000013: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000098-0x000000000000009f]
CPU: 1 PID: 15072 Comm: syz-executor.2 Not tainted 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:vma_start_pgoff mm/interval_tree.c:15 [inline]
RIP: 0010:avc_start_pgoff mm/interval_tree.c:63 [inline]
RIP: 0010:__anon_vma_interval_tree_insert mm/interval_tree.c:71 [inline]
RIP: 0010:anon_vma_interval_tree_insert+0x1e2/0x4c0 mm/interval_tree.c:82
Code: 61 cd ff 48 8d 7b e0 48 89 f8 48 c1 e8 03 80 3c 28 00 0f 85 2c 02 00 00 4c 8b 7b e0 49 8d bf 98 00 00 00 48 89 fa 48 c1 ea 03 <80> 3c 2a 00 0f 85 06 02 00 00 4d 8b bf 98 00 00 00 4c 89 ef 4c 89
RSP: 0018:ffffc9000509f948 EFLAGS: 00010212
RAX: 1ffff11000028f34 RBX: ffff8880001479c0 RCX: 0000000000000000
RDX: 0000000000000013 RSI: ffffffff81aa384b RDI: 0000000000000098
RBP: dffffc0000000000 R08: 0000000000000022 R09: 0000000000000001
R10: ffffffff81aa3838 R11: 0000000000000000 R12: 0000000000000022
R13: 0000000000000000 R14: ffff88815671ee70 R15: 0000000000000000
FS:  00005555567ef400(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7a0c254563 CR3: 000000003c61e000 CR4: 0000000000350ee0
Call Trace:
 <TASK>
 anon_vma_chain_link mm/rmap.c:152 [inline]
 anon_vma_clone+0x23f/0x5f0 mm/rmap.c:293
 anon_vma_fork+0x82/0x630 mm/rmap.c:346
 dup_mmap kernel/fork.c:568 [inline]
 dup_mm+0xa07/0x13e0 kernel/fork.c:1450
 copy_mm kernel/fork.c:1502 [inline]
 copy_process+0x6fed/0x75a0 kernel/fork.c:2191
 kernel_clone+0xe7/0xab0 kernel/fork.c:2582
 __do_sys_clone+0xc8/0x110 kernel/fork.c:2699
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fe0881ba0db
Code: ed 0f 85 60 01 00 00 64 4c 8b 0c 25 10 00 00 00 45 31 c0 4d 8d 91 d0 02 00 00 31 d2 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 89 00 00 00 41 89 c5 85 c0 0f 85 90 00 00
RSP: 002b:00007ffd735338c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe0881ba0db
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011
RBP: 0000000000000001 R08: 0000000000000000 R09: 00005555567ef400
R10: 00005555567ef6d0 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000000001 R14: 0000000000000001 R15: 00007ffd735339a0
 </TASK>
Modules linked in:
---[ end trace 3788c0bf1303ba0d ]---
RIP: 0010:vma_start_pgoff mm/interval_tree.c:15 [inline]
RIP: 0010:avc_start_pgoff mm/interval_tree.c:63 [inline]
RIP: 0010:__anon_vma_interval_tree_insert mm/interval_tree.c:71 [inline]
RIP: 0010:anon_vma_interval_tree_insert+0x1e2/0x4c0 mm/interval_tree.c:82
Code: 61 cd ff 48 8d 7b e0 48 89 f8 48 c1 e8 03 80 3c 28 00 0f 85 2c 02 00 00 4c 8b 7b e0 49 8d bf 98 00 00 00 48 89 fa 48 c1 ea 03 <80> 3c 2a 00 0f 85 06 02 00 00 4d 8b bf 98 00 00 00 4c 89 ef 4c 89
RSP: 0018:ffffc9000509f948 EFLAGS: 00010212
RAX: 1ffff11000028f34 RBX: ffff8880001479c0 RCX: 0000000000000000
RDX: 0000000000000013 RSI: ffffffff81aa384b RDI: 0000000000000098
RBP: dffffc0000000000 R08: 0000000000000022 R09: 0000000000000001
R10: ffffffff81aa3838 R11: 0000000000000000 R12: 0000000000000022
R13: 0000000000000000 R14: ffff88815671ee70 R15: 0000000000000000
FS:  00005555567ef400(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020001680 CR3: 000000003c61e000 CR4: 0000000000350ef0
----------------
Code disassembly (best guess), 1 bytes skipped:
   0:	cd ff                	int    $0xff
   2:	48 8d 7b e0          	lea    -0x20(%rbx),%rdi
   6:	48 89 f8             	mov    %rdi,%rax
   9:	48 c1 e8 03          	shr    $0x3,%rax
   d:	80 3c 28 00          	cmpb   $0x0,(%rax,%rbp,1)
  11:	0f 85 2c 02 00 00    	jne    0x243
  17:	4c 8b 7b e0          	mov    -0x20(%rbx),%r15
  1b:	49 8d bf 98 00 00 00 	lea    0x98(%r15),%rdi
  22:	48 89 fa             	mov    %rdi,%rdx
  25:	48 c1 ea 03          	shr    $0x3,%rdx
* 29:	80 3c 2a 00          	cmpb   $0x0,(%rdx,%rbp,1) <-- trapping instruction
  2d:	0f 85 06 02 00 00    	jne    0x239
  33:	4d 8b bf 98 00 00 00 	mov    0x98(%r15),%r15
  3a:	4c 89 ef             	mov    %r13,%rdi
  3d:	4c                   	rex.WR
  3e:	89                   	.byte 0x89

Crashes (4):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2021/11/26 00:52 upstream b501b85957de 63eeac02 .config console log report info ci-upstream-kasan-gce-root general protection fault in anon_vma_interval_tree_insert
2021/11/11 01:19 upstream 89d714ab6043 75b04091 .config console log report info ci-upstream-kasan-gce general protection fault in anon_vma_interval_tree_insert
2021/09/10 06:07 upstream bf9f243f23e6 e2776ee4 .config console log report info ci-upstream-kasan-gce-386 general protection fault in anon_vma_interval_tree_insert
2021/08/21 04:36 linux-next 86ed57fd8c93 b599f2fc .config console log report info ci-upstream-linux-next-kasan-gce-root general protection fault in anon_vma_interval_tree_insert
* Struck through repros no longer work on HEAD.