bisecting fixing commit since a03957ab0fd5d7d03b512a72ab9106a1749f556e building syzkaller on 1bfa09b9672821334a7ed926244ebc39910b84f4 testing commit a03957ab0fd5d7d03b512a72ab9106a1749f556e with gcc (GCC) 8.1.0 kernel signature: a79e10da57b0ec81eb42aa38630d876a4f2d4716 all runs: crashed: general protection fault in flex_array_get testing current HEAD 14260788bbb9c94b0e36abc17294266b69dd46e4 testing commit 14260788bbb9c94b0e36abc17294266b69dd46e4 with gcc (GCC) 8.1.0 kernel signature: 5b2fcf6da098a5609e6971c261c124e544f06a6d run #0: boot failed: create image operation failed: &{Code:QUOTA_EXCEEDED Location: Message:Quota 'CPUS' exceeded. Limit: 500.0 in region us-central1. ForceSendFields:[] NullFields:[]}. run #1: crashed: general protection fault in flex_array_get run #2: crashed: general protection fault in flex_array_get run #3: crashed: general protection fault in corrupted run #4: crashed: general protection fault in flex_array_get run #5: crashed: general protection fault in flex_array_get run #6: crashed: general protection fault in flex_array_get run #7: crashed: general protection fault in corrupted run #8: crashed: general protection fault in flex_array_get run #9: crashed: general protection fault in flex_array_get revisions tested: 2, total time: 24m45.320634504s (build: 16m35.124913456s, test: 7m15.528734575s) the crash still happens on HEAD commit msg: Linux 4.19.86 crash: general protection fault in flex_array_get sctp_inq_push+0x1aa/0x240 net/sctp/inqueue.c:95 sctp_backlog_rcv+0x153/0xb90 net/sctp/input.c:351 general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 7274 Comm: syz-executor.4 Not tainted 4.19.86-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 sk_backlog_rcv include/net/sock.h:941 [inline] __release_sock+0x10c/0x360 net/core/sock.c:2339 RIP: 0010:flex_array_get+0x23/0x240 lib/flex_array.c:320 release_sock+0x4f/0x180 net/core/sock.c:2855 Code: 90 90 90 90 90 90 90 48 b8 00 00 00 00 00 fc ff df 55 48 89 fa 48 89 e5 48 c1 ea 03 41 56 41 55 41 54 53 48 89 fb 48 83 ec 10 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 8d 01 00 00 44 8b 33 45 85 f6 sctp_wait_for_connect+0x22c/0x4c0 net/sctp/socket.c:8638 RSP: 0018:ffff8880939975a0 EFLAGS: 00010286 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 1ffff110123694b6 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffff8880939975d0 R08: ffff888093997908 R09: ffffed1015d64732 sctp_sendmsg_to_asoc+0x14dd/0x1b50 net/sctp/socket.c:1986 R10: ffffed1015d64732 R11: 0000000000000000 R12: ffff88809399e500 R13: ffff8880755828c4 R14: ffff888093607700 R15: 1ffff11012733d88 FS: 00007f4097c65700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f919df77518 CR3: 000000008ae47000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 sctp_sendmsg+0xd4f/0x17e0 net/sctp/socket.c:2132 Call Trace: sctp_stream_out include/net/sctp/structs.h:1471 [inline] sctp_sched_dequeue_done+0x1d8/0x300 net/sctp/stream_sched.c:255 __sctp_outq_teardown+0x660/0xc30 net/sctp/outqueue.c:267 inet_sendmsg+0x10d/0x450 net/ipv4/af_inet.c:798 sctp_outq_free+0x9/0x10 net/sctp/outqueue.c:291 sctp_association_free+0x1d5/0x711 net/sctp/associola.c:360 sctp_cmd_delete_tcb net/sctp/sm_sideeffect.c:944 [inline] sctp_cmd_interpreter net/sctp/sm_sideeffect.c:1332 [inline] sctp_side_effects net/sctp/sm_sideeffect.c:1199 [inline] sctp_do_sm+0x91e/0x52d0 net/sctp/sm_sideeffect.c:1170 sock_sendmsg_nosec net/socket.c:622 [inline] sock_sendmsg+0xb7/0xf0 net/socket.c:632 ___sys_sendmsg+0x649/0x950 net/socket.c:2115 sctp_primitive_SHUTDOWN+0x7c/0xc0 net/sctp/primitive.c:104 __sys_sendmsg+0xd9/0x180 net/socket.c:2153 sctp_close+0x354/0x750 net/sctp/socket.c:1560 inet_release+0xde/0x1c0 net/ipv4/af_inet.c:428 __sock_release+0xc7/0x2a0 net/socket.c:579 __do_sys_sendmsg net/socket.c:2162 [inline] __se_sys_sendmsg net/socket.c:2160 [inline] __x64_sys_sendmsg+0x73/0xb0 net/socket.c:2160 sock_close+0x10/0x20 net/socket.c:1140 do_syscall_64+0xd6/0x4e0 arch/x86/entry/common.c:293 __fput+0x24c/0x7f0 fs/file_table.c:278 entry_SYSCALL_64_after_hwframe+0x49/0xbe ____fput+0x9/0x10 fs/file_table.c:309 RIP: 0033:0x458da9 task_work_run+0x10e/0x190 kernel/task_work.c:113 Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 get_signal+0x139f/0x1a00 kernel/signal.c:2389 RSP: 002b:00007f4917137c78 EFLAGS: 00000246 do_signal+0x87/0x1960 arch/x86/kernel/signal.c:821 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f4917137c90 RCX: 0000000000458da9 RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49171386d4 R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000005 CPU: 0 PID: 7278 Comm: syz-executor.5 Not tainted 4.19.86-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x177 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0x5/0x13 lib/fault-inject.c:149 exit_to_usermode_loop+0x114/0x200 arch/x86/entry/common.c:163 __should_failslab+0xba/0xf0 mm/failslab.c:32 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x419/0x4e0 arch/x86/entry/common.c:296 should_failslab+0x9/0x14 mm/slab_common.c:1557 entry_SYSCALL_64_after_hwframe+0x49/0xbe slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc_trace+0x4b/0x750 mm/slab.c:3623 RIP: 0033:0x458da9 Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 kmalloc include/linux/slab.h:515 [inline] kzalloc include/linux/slab.h:709 [inline] sctp_add_bind_addr+0x5f/0x320 net/sctp/bind_addr.c:159 RSP: 002b:00007f4097c64c78 EFLAGS: 00000246 sctp_copy_local_addr_list+0x2bb/0x400 net/sctp/protocol.c:179 ORIG_RAX: 000000000000002e RAX: 000000000001fff8 RBX: 00007f4097c64c90 RCX: 0000000000458da9 RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 sctp_copy_one_addr+0x47/0xf0 net/sctp/bind_addr.c:449 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4097c656d4 R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000005 sctp_bind_addr_copy+0xe6/0x26d net/sctp/bind_addr.c:71 Modules linked in: sctp_assoc_set_bind_addr_from_ep+0x119/0x1c0 net/sctp/associola.c:1606 kobject: 'loop3' (00000000de8f7e70): kobject_uevent_env sctp_sendmsg_new_asoc+0x2ef/0xdc0 net/sctp/socket.c:1745 kobject: 'loop3' (00000000de8f7e70): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (00000000ad24e0ca): kobject_uevent_env sctp_sendmsg+0x116e/0x17e0 net/sctp/socket.c:2105 kobject: 'loop2' (00000000ad24e0ca): fill_kobj_path: path = '/devices/virtual/block/loop2' ---[ end trace 37a621d3d5ae8d9c ]--- inet_sendmsg+0x10d/0x450 net/ipv4/af_inet.c:798 RIP: 0010:flex_array_get+0x23/0x240 lib/flex_array.c:320 sock_sendmsg_nosec net/socket.c:622 [inline] sock_sendmsg+0xb7/0xf0 net/socket.c:632 ___sys_sendmsg+0x649/0x950 net/socket.c:2115 Code: 90 90 90 90 90 90 90 48 b8 00 00 00 00 00 fc ff df 55 48 89 fa 48 89 e5 48 c1 ea 03 41 56 41 55 41 54 53 48 89 fb 48 83 ec 10 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 8d 01 00 00 44 8b 33 45 85 f6 RSP: 0018:ffff8880939975a0 EFLAGS: 00010286 __sys_sendmsg+0xd9/0x180 net/socket.c:2153 __do_sys_sendmsg net/socket.c:2162 [inline] __se_sys_sendmsg net/socket.c:2160 [inline] __x64_sys_sendmsg+0x73/0xb0 net/socket.c:2160 do_syscall_64+0xd6/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x458da9 Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f35b8313c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f35b8313c90 RCX: 0000000000458da9 RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35b83146d4 R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000005 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 kobject: 'loop1' (0000000002ccbc75): kobject_uevent_env FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 7296 Comm: syz-executor.0 Tainted: G D 4.19.86-syzkaller #0 kobject: 'loop1' (0000000002ccbc75): fill_kobj_path: path = '/devices/virtual/block/loop1' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'loop5' (000000006db8bf83): kobject_uevent_env Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x177 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0x5/0x13 lib/fault-inject.c:149 __should_failslab+0xba/0xf0 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] __do_kmalloc mm/slab.c:3725 [inline] __kmalloc+0x70/0x770 mm/slab.c:3736 kmalloc include/linux/slab.h:520 [inline] kzalloc include/linux/slab.h:709 [inline] sctp_tsnmap_init+0x161/0x220 net/sctp/tsnmap.c:54 sctp_process_init+0x1bb0/0x2d50 net/sctp/sm_make_chunk.c:2445 kobject: 'loop5' (000000006db8bf83): fill_kobj_path: path = '/devices/virtual/block/loop5' sctp_cmd_process_init net/sctp/sm_sideeffect.c:682 [inline] sctp_cmd_interpreter net/sctp/sm_sideeffect.c:1389 [inline] sctp_side_effects net/sctp/sm_sideeffect.c:1199 [inline] sctp_do_sm+0x98b/0x52d0 net/sctp/sm_sideeffect.c:1170 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 1ffff110123694b6 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffff8880939975d0 R08: ffff888093997908 R09: ffffed1015d64732 R10: ffffed1015d64732 R11: 0000000000000000 R12: ffff88809399e500 sctp_assoc_bh_rcv+0x27f/0x5c0 net/sctp/associola.c:1072 R13: ffff8880755828c4 R14: ffff888093607700 R15: 1ffff11012733d88 sctp_inq_push+0x1aa/0x240 net/sctp/inqueue.c:95 sctp_backlog_rcv+0x153/0xb90 net/sctp/input.c:351 sk_backlog_rcv include/net/sock.h:941 [inline] __release_sock+0x10c/0x360 net/core/sock.c:2339 release_sock+0x4f/0x180 net/core/sock.c:2855 sctp_wait_for_connect+0x22c/0x4c0 net/sctp/socket.c:8638 FS: 00007f4097c65700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 sctp_sendmsg_to_asoc+0x14dd/0x1b50 net/sctp/socket.c:1986 CR2: 0000000020000040 CR3: 000000008ae47000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 sctp_sendmsg+0xd4f/0x17e0 net/sctp/socket.c:2132 inet_sendmsg+0x10d/0x450 net/ipv4/af_inet.c:798