Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2812360ybl; Thu, 19 Dec 2019 22:05:33 -0800 (PST) X-Google-Smtp-Source: APXvYqx8to8BJ82PENW1cGP/InzcnvKWlGF/guWpzw38+k6BR4ZxBP7VKvaCehZYeyiOZ0l0JbNN X-Received: by 2002:a05:6830:184:: with SMTP id q4mr13365857ota.52.1576821933856; Thu, 19 Dec 2019 22:05:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576821933; cv=none; d=google.com; s=arc-20160816; b=SRfifbMcRNxd1jZ7Kw/C+TPM6TwQBhaIItTQgJV1yJFBBvTZUgGF3ymOMvlrv7VMfo WRCjoSKw7Xzbte9qMldPQ7SIIEraQnzs60uqwjK/gaa+cPBmocxE1L6O+0pa5Hmn7uzK K3SNLASSu2RPdxoIbCibn//2lssp3xR9u/W34Qy8v8Pug4UsqxmnKuLvbt9VaRwU8AOg 3QKsb5kfoiABEQnA0wKwsH2gLTKoJuySilcy70qaQjSiAg6goxOO9ag5PtHutKAnweZy Rf1sXLtafhWkuCAt1YOlOr6KY4rb+ohIa2YxB+SEDDV2fDU1f3PWUpYzVOPQMd1LHvmB nutw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:to:from:dkim-signature; bh=AMPB7ShRq26cjcwcJP9t45jKBX3IyVrTQyCL756tp90=; b=uusPTR9XJRfpuOzV8gpfXK3S8iPuoNdU8X6qOA5PZXpQUV+zBsTY01WCKaoCwdzOBn F0xtILctnlI2UaRdCMAhhbXwTuiPBq8TgpWz9ZlausRCN9qOVrJm1xZ5cQszvuqSgkFH NCCwHugh+5EXaQvqKAEOtVvaP7PIxmBtx1FjRKgdX3KREJA0D/F1ygKMP9380/RKoCOj heWEUyVnq6UDOceC5aVSYCDp//tms8Op3+3ejmJAMkK8xZaHbjm3guegKDFx/9xzI88r uCMwGDaZoqlilYPiIic6evPc6ardLSQQelOxcn145tPb9CSNuTsM67zjdj/vIolZqVCh cjtg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@axtens.net header.s=google header.b=I8riZzVk; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c1si4685416oto.91.2019.12.19.22.05.22; Thu, 19 Dec 2019 22:05:33 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@axtens.net header.s=google header.b=I8riZzVk; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727202AbfLTGEB (ORCPT + 99 others); Fri, 20 Dec 2019 01:04:01 -0500 Received: from mail-pl1-f193.google.com ([209.85.214.193]:41501 "EHLO mail-pl1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726327AbfLTGEA (ORCPT ); Fri, 20 Dec 2019 01:04:00 -0500 Received: by mail-pl1-f193.google.com with SMTP id bd4so3630311plb.8 for ; Thu, 19 Dec 2019 22:04:00 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=axtens.net; s=google; h=from:to:subject:in-reply-to:references:date:message-id:mime-version; bh=AMPB7ShRq26cjcwcJP9t45jKBX3IyVrTQyCL756tp90=; b=I8riZzVk/K2+pnrgpWFE1uZQLo+TNx4sVlk/qjoiA4YqJLEt061dszIV+0U/r2TdWE 9k043b3Xrp4h8IexCbkjlDyqRhHz6PCBV2U2DrqfVto2v680PLjO2J/CiyKPL955+EEQ B9b4DWKXAkj/aiOjOeN1zMKc7Ba77qz8ITRF8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:in-reply-to:references:date :message-id:mime-version; bh=AMPB7ShRq26cjcwcJP9t45jKBX3IyVrTQyCL756tp90=; b=Hwqem2/owWMAsk2mX+SdAxbwNmJoOJfZV4IkJhSck0D27D7juxknE8c1hO7DKzL2U6 O9DNMrUJh5BnMD9Uwro3v+eUP5CCpAYsQKzScMfARGeoi64vx1FpP+g4ny56BU/3mvvv IH2vczvwkKscDRiM/uWY6CLtkQaq7Tiqcb/yM66+G1deKCObqSBRuSmHn7UDWl4BrICB cWqwshqknvAfKy005aFdO/fUm1bT3pOnv1XI0EimYiUWf3z2JqEuk+eM16BD5nqEbRyx PgilqJMDd5vZexa9ejHrQadbRnLdmH7JIyouHuI9PIWp41gZj/t1AMEDc13d1rdUSvE8 E/ZA== X-Gm-Message-State: APjAAAU6McAjJphvZsvu11eIA0Uv93+KeR8ZnQMf7k5JlCv9Y86XwbP7 27ulcTqQwzKxSSee168Gu35SCQ== X-Received: by 2002:a17:90a:5ac4:: with SMTP id n62mr14478392pji.59.1576821839745; Thu, 19 Dec 2019 22:03:59 -0800 (PST) Received: from localhost (2001-44b8-1113-6700-b05d-cbfe-b2ee-de17.static.ipv6.internode.on.net. [2001:44b8:1113:6700:b05d:cbfe:b2ee:de17]) by smtp.gmail.com with ESMTPSA id y38sm9527104pgk.33.2019.12.19.22.03.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 19 Dec 2019 22:03:58 -0800 (PST) From: Daniel Axtens To: syzbot , akpm@linux-foundation.org, allison.henderson@oracle.com, aryabinin@virtuozzo.com, bfoster@redhat.com, darrick.wong@oracle.com, dchinner@redhat.com, dvyukov@google.com, linux-kernel@vger.kernel.org, linux-xfs@vger.kernel.org, sandeen@redhat.com, syzkaller-bugs@googlegroups.com, torvalds@linux-foundation.org Subject: Re: BUG: unable to handle kernel paging request in xfs_sb_quiet_read_verify In-Reply-To: <000000000000d99340059a100686@google.com> References: <000000000000d99340059a100686@google.com> Date: Fri, 20 Dec 2019 17:03:55 +1100 Message-ID: <874kxvttx0.fsf@dja-thinkpad.axtens.net> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org syzbot writes: > Hello, > > syzbot found the following crash on: > > HEAD commit: 2187f215 Merge tag 'for-5.5-rc2-tag' of git://git.kernel.o.. > git tree: upstream > console output: https://syzkaller.appspot.com/x/log.txt?x=11059951e00000 > kernel config: https://syzkaller.appspot.com/x/.config?x=ab2ae0615387ef78 > dashboard link: https://syzkaller.appspot.com/bug?extid=4722bf4c6393b73a792b > compiler: gcc (GCC) 9.0.0 20181231 (experimental) > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=12727c71e00000 > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=12ff5151e00000 > > The bug was bisected to: > > commit 0609ae011deb41c9629b7f5fd626dfa1ac9d16b0 > Author: Daniel Axtens > Date: Sun Dec 1 01:55:00 2019 +0000 > > x86/kasan: support KASAN_VMALLOC Looking at the log, it's an access of fffff52000680000 that goes wrong. Reversing the shadow calculation, it looks like an attempted access of FFFFC90003400000, which is in vmalloc space. I'm not sure what that memory represents. Looking at the instruction pointer, it seems like we're here: static void xfs_sb_quiet_read_verify( struct xfs_buf *bp) { struct xfs_dsb *dsb = XFS_BUF_TO_SBP(bp); if (dsb->sb_magicnum == cpu_to_be32(XFS_SB_MAGIC)) { <<<< fault here /* XFS filesystem, verify noisily! */ xfs_sb_read_verify(bp); Is it possible that dsb is junk? Regards, Daniel > > bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=161240aee00000 > final crash: https://syzkaller.appspot.com/x/report.txt?x=151240aee00000 > console output: https://syzkaller.appspot.com/x/log.txt?x=111240aee00000 > > IMPORTANT: if you fix the bug, please add the following tag to the commit: > Reported-by: syzbot+4722bf4c6393b73a792b@syzkaller.appspotmail.com > Fixes: 0609ae011deb ("x86/kasan: support KASAN_VMALLOC") > > BUG: unable to handle page fault for address: fffff52000680000 > #PF: supervisor read access in kernel mode > #PF: error_code(0x0000) - not-present page > PGD 21ffee067 P4D 21ffee067 PUD aa51c067 PMD a85e1067 PTE 0 > Oops: 0000 [#1] PREEMPT SMP KASAN > CPU: 1 PID: 3088 Comm: kworker/1:2 Not tainted 5.5.0-rc2-syzkaller #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS > Google 01/01/2011 > Workqueue: xfs-buf/loop0 xfs_buf_ioend_work > RIP: 0010:xfs_sb_quiet_read_verify+0x47/0xc0 fs/xfs/libxfs/xfs_sb.c:735 > Code: 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 7f 49 8b 9c 24 30 01 > 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 <0f> b6 04 02 84 > c0 74 04 3c 03 7e 50 8b 1b bf 58 46 53 42 89 de e8 > RSP: 0018:ffffc90008187cc0 EFLAGS: 00010a06 > RAX: dffffc0000000000 RBX: ffffc90003400000 RCX: ffffffff82ad3c26 > RDX: 1ffff92000680000 RSI: ffffffff82aa0a0f RDI: ffff8880a2cdba70 > RBP: ffffc90008187cd0 R08: ffff88809eb6c500 R09: ffffed1015d2703d > R10: ffffed1015d2703c R11: ffff8880ae9381e3 R12: ffff8880a2cdb940 > R13: ffff8880a2cdb95c R14: ffff8880a2cdbb74 R15: 0000000000000000 > FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > CR2: fffff52000680000 CR3: 000000009f5ab000 CR4: 00000000001406e0 > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > Call Trace: > xfs_buf_ioend+0x3f9/0xde0 fs/xfs/xfs_buf.c:1162 > xfs_buf_ioend_work+0x19/0x20 fs/xfs/xfs_buf.c:1183 > process_one_work+0x9af/0x1740 kernel/workqueue.c:2264 > worker_thread+0x98/0xe40 kernel/workqueue.c:2410 > kthread+0x361/0x430 kernel/kthread.c:255 > ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352 > Modules linked in: > CR2: fffff52000680000 > ---[ end trace 744ceb50d377bf94 ]--- > RIP: 0010:xfs_sb_quiet_read_verify+0x47/0xc0 fs/xfs/libxfs/xfs_sb.c:735 > Code: 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 7f 49 8b 9c 24 30 01 > 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 <0f> b6 04 02 84 > c0 74 04 3c 03 7e 50 8b 1b bf 58 46 53 42 89 de e8 > RSP: 0018:ffffc90008187cc0 EFLAGS: 00010a06 > RAX: dffffc0000000000 RBX: ffffc90003400000 RCX: ffffffff82ad3c26 > RDX: 1ffff92000680000 RSI: ffffffff82aa0a0f RDI: ffff8880a2cdba70 > RBP: ffffc90008187cd0 R08: ffff88809eb6c500 R09: ffffed1015d2703d > R10: ffffed1015d2703c R11: ffff8880ae9381e3 R12: ffff8880a2cdb940 > R13: ffff8880a2cdb95c R14: ffff8880a2cdbb74 R15: 0000000000000000 > FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > CR2: fffff52000680000 CR3: 000000009f5ab000 CR4: 00000000001406e0 > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > > > --- > This bug is generated by a bot. It may contain errors. > See https://goo.gl/tpsmEJ for more information about syzbot. > syzbot engineers can be reached at syzkaller@googlegroups.com. > > syzbot will keep track of this bug report. See: > https://goo.gl/tpsmEJ#status for how to communicate with syzbot. > For information about bisection process see: https://goo.gl/tpsmEJ#bisection > syzbot can test patches for this bug, for details see: > https://goo.gl/tpsmEJ#testing-patches