linux-usb.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* usb-fuzzer boot error: general protection fault in dma_direct_max_mapping_size
@ 2019-07-23 14:48 syzbot
  2019-07-23 16:14 ` Eric Biggers
  0 siblings, 1 reply; 3+ messages in thread
From: syzbot @ 2019-07-23 14:48 UTC (permalink / raw)
  To: andreyknvl, linux-kernel, linux-usb, syzkaller-bugs

Hello,

syzbot found the following crash on:

HEAD commit:    1154c0b0 wip
git tree:       https://github.com/google/kasan.git usb-fuzzer
console output: https://syzkaller.appspot.com/x/log.txt?x=1197774c600000
kernel config:  https://syzkaller.appspot.com/x/.config?x=b228fb19779df17d
dashboard link: https://syzkaller.appspot.com/bug?extid=4efacf59126f1ae87000
compiler:       gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+4efacf59126f1ae87000@syzkaller.appspotmail.com

RPC: Registered udp transport module.
RPC: Registered tcp transport module.
RPC: Registered tcp NFSv4.1 backchannel transport module.
pci 0000:00:00.0: Limiting direct PCI/PCI transfers
PCI: CLS 0 bytes, default 64
PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
software IO TLB: mapped [mem 0xbbffd000-0xbfffd000] (64MB)
RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl  
timer
clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212735223b2,  
max_idle_ns: 440795277976 ns
clocksource: Switched to clocksource tsc
check: Scanning for low memory corruption every 60 seconds
Initialise system trusted keyrings
workingset: timestamp_bits=40 max_order=21 bucket_order=0
NFS: Registering the id_resolver key type
Key type id_resolver registered
Key type id_legacy registered
9p: Installing v9fs 9p2000 file system support
Key type asymmetric registered
Asymmetric key parser 'x509' registered
Block layer SCSI generic (bsg) driver version 0.4 loaded (major 247)
io scheduler mq-deadline registered
io scheduler kyber registered
usbcore: registered new interface driver udlfb
usbcore: registered new interface driver smscufx
input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0
ACPI: Power Button [PWRF]
input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input1
ACPI: Sleep Button [SLPF]
PCI Interrupt Link [LNKC] enabled at IRQ 11
virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver
PCI Interrupt Link [LNKD] enabled at IRQ 10
virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver
Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A
00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A
00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A
Non-volatile memory driver v1.3
Linux agpgart interface v0.103
usbcore: registered new interface driver udl
loop: module loaded
usbcore: registered new interface driver rtsx_usb
usbcore: registered new interface driver viperboard
usbcore: registered new interface driver dln2
usbcore: registered new interface driver pn533_usb
usbcore: registered new interface driver port100
usbcore: registered new interface driver nfcmrvl
scsi host0: Virtio SCSI HBA
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] SMP KASAN
CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.3.0-rc1+ #16
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS  
Google 01/01/2011
RIP: 0010:dma_addressing_limited /./include/linux/dma-mapping.h:692 [inline]
RIP: 0010:dma_direct_max_mapping_size+0x73/0x19a /kernel/dma/direct.c:408
Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 1e 01 00 00 48 8b 9d 38 03  
00 00 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f  
85 06 01 00 00 48 8d bd 48 03 00 00 48 8b 1b 48 b8
RSP: 0000:ffff8881da18f628 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff812d716c
RDX: 0000000000000000 RSI: ffffffff812d7189 RDI: ffff8881d7428378
RBP: ffff8881d7428040 R08: ffff8881da180000 R09: ffffed103ade30cb
R10: ffffed103ade30ca R11: ffff8881d6f18657 R12: ffff8881d7428040
R13: ffff8881d769e8b0 R14: 0000000000000200 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff8881db300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 0000000006a21000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
  dma_max_mapping_size+0xb5/0xf0 /kernel/dma/mapping.c:375
  __scsi_init_queue+0x17e/0x510 /drivers/scsi/scsi_lib.c:1787
  scsi_mq_alloc_queue+0xcb/0x170 /drivers/scsi/scsi_lib.c:1833
  scsi_alloc_sdev+0x82e/0xc50 /drivers/scsi/scsi_scan.c:269
  scsi_probe_and_add_lun+0x1ee5/0x2cd0 /drivers/scsi/scsi_scan.c:1078
  __scsi_scan_target+0x273/0xc30 /drivers/scsi/scsi_scan.c:1562
  scsi_scan_channel.part.0+0x126/0x1a0 /drivers/scsi/scsi_scan.c:1650
  scsi_scan_channel /drivers/scsi/scsi_scan.c:1677 [inline]
  scsi_scan_host_selected+0x2bb/0x3f0 /drivers/scsi/scsi_scan.c:1679
  do_scsi_scan_host /drivers/scsi/scsi_scan.c:1817 [inline]
  do_scsi_scan_host+0x1e8/0x260 /drivers/scsi/scsi_scan.c:1807
  scsi_scan_host /drivers/scsi/scsi_scan.c:1847 [inline]
  scsi_scan_host+0x37c/0x440 /drivers/scsi/scsi_scan.c:1835
  virtscsi_probe+0x9b7/0xbb5 /drivers/scsi/virtio_scsi.c:847
  virtio_dev_probe+0x463/0x710 /drivers/virtio/virtio.c:248
  really_probe+0x281/0x650 /drivers/base/dd.c:548
  driver_probe_device+0x101/0x1b0 /drivers/base/dd.c:709
  device_driver_attach+0x108/0x140 /drivers/base/dd.c:983
  __driver_attach+0xda/0x240 /drivers/base/dd.c:1060
  bus_for_each_dev+0x14b/0x1d0 /drivers/base/bus.c:304
  bus_add_driver+0x44e/0x5a0 /drivers/base/bus.c:645
  driver_register+0x1c4/0x320 /drivers/base/driver.c:170
  __write_once_size /./include/linux/compiler.h:226 [inline]
  INIT_LIST_HEAD /./include/linux/list.h:28 [inline]
  init+0xa1/0x115 /drivers/char/virtio_console.c:2251
  do_one_initcall+0xf0/0x614 /init/main.c:939
  do_initcall_level /init/main.c:1007 [inline]
  do_initcalls /init/main.c:1015 [inline]
  do_basic_setup /init/main.c:1032 [inline]
  kernel_init_freeable+0x4a9/0x596 /init/main.c:1192
  kernel_init+0xd/0x1bf /init/main.c:1110
  ret_from_fork+0x24/0x30 /arch/x86/entry/entry_64.S:352
Modules linked in:
---[ end trace 73ab592d53bc046f ]---
RIP: 0010:dma_addressing_limited /./include/linux/dma-mapping.h:692 [inline]
RIP: 0010:dma_direct_max_mapping_size+0x73/0x19a /kernel/dma/direct.c:408
Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 1e 01 00 00 48 8b 9d 38 03  
00 00 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f  
85 06 01 00 00 48 8d bd 48 03 00 00 48 8b 1b 48 b8
RSP: 0000:ffff8881da18f628 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff812d716c
RDX: 0000000000000000 RSI: ffffffff812d7189 RDI: ffff8881d7428378
RBP: ffff8881d7428040 R08: ffff8881da180000 R09: ffffed103ade30cb
R10: ffffed103ade30ca R11: ffff8881d6f18657 R12: ffff8881d7428040
R13: ffff8881d769e8b0 R14: 0000000000000200 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff8881db300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 0000000006a21000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzkaller@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: usb-fuzzer boot error: general protection fault in dma_direct_max_mapping_size
  2019-07-23 14:48 usb-fuzzer boot error: general protection fault in dma_direct_max_mapping_size syzbot
@ 2019-07-23 16:14 ` Eric Biggers
  2019-07-23 16:19   ` Andrey Konovalov
  0 siblings, 1 reply; 3+ messages in thread
From: Eric Biggers @ 2019-07-23 16:14 UTC (permalink / raw)
  To: syzbot; +Cc: andreyknvl, linux-kernel, linux-usb, syzkaller-bugs

On Tue, Jul 23, 2019 at 07:48:05AM -0700, syzbot wrote:
> Hello,
> 
> syzbot found the following crash on:
> 
> HEAD commit:    1154c0b0 wip
> git tree:       https://github.com/google/kasan.git usb-fuzzer
> console output: https://syzkaller.appspot.com/x/log.txt?x=1197774c600000
> kernel config:  https://syzkaller.appspot.com/x/.config?x=b228fb19779df17d
> dashboard link: https://syzkaller.appspot.com/bug?extid=4efacf59126f1ae87000
> compiler:       gcc (GCC) 9.0.0 20181231 (experimental)
> 
> Unfortunately, I don't have any reproducer for this crash yet.
> 
> IMPORTANT: if you fix the bug, please add the following tag to the commit:
> Reported-by: syzbot+4efacf59126f1ae87000@syzkaller.appspotmail.com
> 
> RPC: Registered udp transport module.
> RPC: Registered tcp transport module.
> RPC: Registered tcp NFSv4.1 backchannel transport module.
> pci 0000:00:00.0: Limiting direct PCI/PCI transfers
> PCI: CLS 0 bytes, default 64
> PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
> software IO TLB: mapped [mem 0xbbffd000-0xbfffd000] (64MB)
> RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl
> timer
> clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212735223b2,
> max_idle_ns: 440795277976 ns
> clocksource: Switched to clocksource tsc
> check: Scanning for low memory corruption every 60 seconds
> Initialise system trusted keyrings
> workingset: timestamp_bits=40 max_order=21 bucket_order=0
> NFS: Registering the id_resolver key type
> Key type id_resolver registered
> Key type id_legacy registered
> 9p: Installing v9fs 9p2000 file system support
> Key type asymmetric registered
> Asymmetric key parser 'x509' registered
> Block layer SCSI generic (bsg) driver version 0.4 loaded (major 247)
> io scheduler mq-deadline registered
> io scheduler kyber registered
> usbcore: registered new interface driver udlfb
> usbcore: registered new interface driver smscufx
> input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0
> ACPI: Power Button [PWRF]
> input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input1
> ACPI: Sleep Button [SLPF]
> PCI Interrupt Link [LNKC] enabled at IRQ 11
> virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver
> PCI Interrupt Link [LNKD] enabled at IRQ 10
> virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver
> Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
> 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
> 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A
> 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A
> 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A
> Non-volatile memory driver v1.3
> Linux agpgart interface v0.103
> usbcore: registered new interface driver udl
> loop: module loaded
> usbcore: registered new interface driver rtsx_usb
> usbcore: registered new interface driver viperboard
> usbcore: registered new interface driver dln2
> usbcore: registered new interface driver pn533_usb
> usbcore: registered new interface driver port100
> usbcore: registered new interface driver nfcmrvl
> scsi host0: Virtio SCSI HBA
> kasan: CONFIG_KASAN_INLINE enabled
> kasan: GPF could be caused by NULL-ptr deref or user memory access
> general protection fault: 0000 [#1] SMP KASAN
> CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.3.0-rc1+ #16
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
> Google 01/01/2011
> RIP: 0010:dma_addressing_limited /./include/linux/dma-mapping.h:692 [inline]
> RIP: 0010:dma_direct_max_mapping_size+0x73/0x19a /kernel/dma/direct.c:408
> Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 1e 01 00 00 48 8b 9d 38 03
> 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f 85
> 06 01 00 00 48 8d bd 48 03 00 00 48 8b 1b 48 b8
> RSP: 0000:ffff8881da18f628 EFLAGS: 00010246
> RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff812d716c
> RDX: 0000000000000000 RSI: ffffffff812d7189 RDI: ffff8881d7428378
> RBP: ffff8881d7428040 R08: ffff8881da180000 R09: ffffed103ade30cb
> R10: ffffed103ade30ca R11: ffff8881d6f18657 R12: ffff8881d7428040
> R13: ffff8881d769e8b0 R14: 0000000000000200 R15: 0000000000000000
> FS:  0000000000000000(0000) GS:ffff8881db300000(0000) knlGS:0000000000000000
> CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> CR2: 0000000000000000 CR3: 0000000006a21000 CR4: 00000000001406e0
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
> Call Trace:
>  dma_max_mapping_size+0xb5/0xf0 /kernel/dma/mapping.c:375
>  __scsi_init_queue+0x17e/0x510 /drivers/scsi/scsi_lib.c:1787
>  scsi_mq_alloc_queue+0xcb/0x170 /drivers/scsi/scsi_lib.c:1833
>  scsi_alloc_sdev+0x82e/0xc50 /drivers/scsi/scsi_scan.c:269
>  scsi_probe_and_add_lun+0x1ee5/0x2cd0 /drivers/scsi/scsi_scan.c:1078
>  __scsi_scan_target+0x273/0xc30 /drivers/scsi/scsi_scan.c:1562
>  scsi_scan_channel.part.0+0x126/0x1a0 /drivers/scsi/scsi_scan.c:1650
>  scsi_scan_channel /drivers/scsi/scsi_scan.c:1677 [inline]
>  scsi_scan_host_selected+0x2bb/0x3f0 /drivers/scsi/scsi_scan.c:1679
>  do_scsi_scan_host /drivers/scsi/scsi_scan.c:1817 [inline]
>  do_scsi_scan_host+0x1e8/0x260 /drivers/scsi/scsi_scan.c:1807
>  scsi_scan_host /drivers/scsi/scsi_scan.c:1847 [inline]
>  scsi_scan_host+0x37c/0x440 /drivers/scsi/scsi_scan.c:1835
>  virtscsi_probe+0x9b7/0xbb5 /drivers/scsi/virtio_scsi.c:847
>  virtio_dev_probe+0x463/0x710 /drivers/virtio/virtio.c:248
>  really_probe+0x281/0x650 /drivers/base/dd.c:548
>  driver_probe_device+0x101/0x1b0 /drivers/base/dd.c:709
>  device_driver_attach+0x108/0x140 /drivers/base/dd.c:983
>  __driver_attach+0xda/0x240 /drivers/base/dd.c:1060
>  bus_for_each_dev+0x14b/0x1d0 /drivers/base/bus.c:304
>  bus_add_driver+0x44e/0x5a0 /drivers/base/bus.c:645
>  driver_register+0x1c4/0x320 /drivers/base/driver.c:170
>  __write_once_size /./include/linux/compiler.h:226 [inline]
>  INIT_LIST_HEAD /./include/linux/list.h:28 [inline]
>  init+0xa1/0x115 /drivers/char/virtio_console.c:2251
>  do_one_initcall+0xf0/0x614 /init/main.c:939
>  do_initcall_level /init/main.c:1007 [inline]
>  do_initcalls /init/main.c:1015 [inline]
>  do_basic_setup /init/main.c:1032 [inline]
>  kernel_init_freeable+0x4a9/0x596 /init/main.c:1192
>  kernel_init+0xd/0x1bf /init/main.c:1110
>  ret_from_fork+0x24/0x30 /arch/x86/entry/entry_64.S:352
> Modules linked in:
> ---[ end trace 73ab592d53bc046f ]---
> RIP: 0010:dma_addressing_limited /./include/linux/dma-mapping.h:692 [inline]
> RIP: 0010:dma_direct_max_mapping_size+0x73/0x19a /kernel/dma/direct.c:408
> Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 1e 01 00 00 48 8b 9d 38 03
> 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f 85
> 06 01 00 00 48 8d bd 48 03 00 00 48 8b 1b 48 b8
> RSP: 0000:ffff8881da18f628 EFLAGS: 00010246
> RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff812d716c
> RDX: 0000000000000000 RSI: ffffffff812d7189 RDI: ffff8881d7428378
> RBP: ffff8881d7428040 R08: ffff8881da180000 R09: ffffed103ade30cb
> R10: ffffed103ade30ca R11: ffff8881d6f18657 R12: ffff8881d7428040
> R13: ffff8881d769e8b0 R14: 0000000000000200 R15: 0000000000000000
> FS:  0000000000000000(0000) GS:ffff8881db300000(0000) knlGS:0000000000000000
> CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> CR2: 0000000000000000 CR3: 0000000006a21000 CR4: 00000000001406e0
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
> 
> 
> ---
> This bug is generated by a bot. It may contain errors.
> See https://goo.gl/tpsmEJ for more information about syzbot.
> syzbot engineers can be reached at syzkaller@googlegroups.com.
> 
> syzbot will keep track of this bug report. See:
> https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
> 
> -- 
> You received this message because you are subscribed to the Google Groups "syzkaller-bugs" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to syzkaller-bugs+unsubscribe@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/msgid/syzkaller-bugs/000000000000c3c7b6058e5a47af%40google.com.

Seems there is a fix for this queued in the SCSI tree.

#syz fix: scsi: core: fix the dma_max_mapping_size call

Other threads:

https://marc.info/?l=linux-scsi&m=156378725427719&w=2
https://lkml.kernel.org/lkml/20190722163759.GA28686@codemonkey.org.uk/
https://lkml.kernel.org/lkml/CACVXFVMWM3xg6EEyoyNjkLPv=8+wQKiHj6erMS_gGX25f-Ot4g@mail.gmail.com/

- Eric

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: usb-fuzzer boot error: general protection fault in dma_direct_max_mapping_size
  2019-07-23 16:14 ` Eric Biggers
@ 2019-07-23 16:19   ` Andrey Konovalov
  0 siblings, 0 replies; 3+ messages in thread
From: Andrey Konovalov @ 2019-07-23 16:19 UTC (permalink / raw)
  To: syzbot, Andrey Konovalov, LKML, USB list, syzkaller-bugs

On Tue, Jul 23, 2019 at 6:14 PM Eric Biggers <ebiggers@kernel.org> wrote:
>
> On Tue, Jul 23, 2019 at 07:48:05AM -0700, syzbot wrote:
> > Hello,
> >
> > syzbot found the following crash on:
> >
> > HEAD commit:    1154c0b0 wip
> > git tree:       https://github.com/google/kasan.git usb-fuzzer
> > console output: https://syzkaller.appspot.com/x/log.txt?x=1197774c600000
> > kernel config:  https://syzkaller.appspot.com/x/.config?x=b228fb19779df17d
> > dashboard link: https://syzkaller.appspot.com/bug?extid=4efacf59126f1ae87000
> > compiler:       gcc (GCC) 9.0.0 20181231 (experimental)
> >
> > Unfortunately, I don't have any reproducer for this crash yet.
> >
> > IMPORTANT: if you fix the bug, please add the following tag to the commit:
> > Reported-by: syzbot+4efacf59126f1ae87000@syzkaller.appspotmail.com
> >
> > RPC: Registered udp transport module.
> > RPC: Registered tcp transport module.
> > RPC: Registered tcp NFSv4.1 backchannel transport module.
> > pci 0000:00:00.0: Limiting direct PCI/PCI transfers
> > PCI: CLS 0 bytes, default 64
> > PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
> > software IO TLB: mapped [mem 0xbbffd000-0xbfffd000] (64MB)
> > RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl
> > timer
> > clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212735223b2,
> > max_idle_ns: 440795277976 ns
> > clocksource: Switched to clocksource tsc
> > check: Scanning for low memory corruption every 60 seconds
> > Initialise system trusted keyrings
> > workingset: timestamp_bits=40 max_order=21 bucket_order=0
> > NFS: Registering the id_resolver key type
> > Key type id_resolver registered
> > Key type id_legacy registered
> > 9p: Installing v9fs 9p2000 file system support
> > Key type asymmetric registered
> > Asymmetric key parser 'x509' registered
> > Block layer SCSI generic (bsg) driver version 0.4 loaded (major 247)
> > io scheduler mq-deadline registered
> > io scheduler kyber registered
> > usbcore: registered new interface driver udlfb
> > usbcore: registered new interface driver smscufx
> > input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0
> > ACPI: Power Button [PWRF]
> > input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input1
> > ACPI: Sleep Button [SLPF]
> > PCI Interrupt Link [LNKC] enabled at IRQ 11
> > virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver
> > PCI Interrupt Link [LNKD] enabled at IRQ 10
> > virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver
> > Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
> > 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
> > 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A
> > 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A
> > 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A
> > Non-volatile memory driver v1.3
> > Linux agpgart interface v0.103
> > usbcore: registered new interface driver udl
> > loop: module loaded
> > usbcore: registered new interface driver rtsx_usb
> > usbcore: registered new interface driver viperboard
> > usbcore: registered new interface driver dln2
> > usbcore: registered new interface driver pn533_usb
> > usbcore: registered new interface driver port100
> > usbcore: registered new interface driver nfcmrvl
> > scsi host0: Virtio SCSI HBA
> > kasan: CONFIG_KASAN_INLINE enabled
> > kasan: GPF could be caused by NULL-ptr deref or user memory access
> > general protection fault: 0000 [#1] SMP KASAN
> > CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.3.0-rc1+ #16
> > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
> > Google 01/01/2011
> > RIP: 0010:dma_addressing_limited /./include/linux/dma-mapping.h:692 [inline]
> > RIP: 0010:dma_direct_max_mapping_size+0x73/0x19a /kernel/dma/direct.c:408
> > Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 1e 01 00 00 48 8b 9d 38 03
> > 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f 85
> > 06 01 00 00 48 8d bd 48 03 00 00 48 8b 1b 48 b8
> > RSP: 0000:ffff8881da18f628 EFLAGS: 00010246
> > RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff812d716c
> > RDX: 0000000000000000 RSI: ffffffff812d7189 RDI: ffff8881d7428378
> > RBP: ffff8881d7428040 R08: ffff8881da180000 R09: ffffed103ade30cb
> > R10: ffffed103ade30ca R11: ffff8881d6f18657 R12: ffff8881d7428040
> > R13: ffff8881d769e8b0 R14: 0000000000000200 R15: 0000000000000000
> > FS:  0000000000000000(0000) GS:ffff8881db300000(0000) knlGS:0000000000000000
> > CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> > CR2: 0000000000000000 CR3: 0000000006a21000 CR4: 00000000001406e0
> > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
> > Call Trace:
> >  dma_max_mapping_size+0xb5/0xf0 /kernel/dma/mapping.c:375
> >  __scsi_init_queue+0x17e/0x510 /drivers/scsi/scsi_lib.c:1787
> >  scsi_mq_alloc_queue+0xcb/0x170 /drivers/scsi/scsi_lib.c:1833
> >  scsi_alloc_sdev+0x82e/0xc50 /drivers/scsi/scsi_scan.c:269
> >  scsi_probe_and_add_lun+0x1ee5/0x2cd0 /drivers/scsi/scsi_scan.c:1078
> >  __scsi_scan_target+0x273/0xc30 /drivers/scsi/scsi_scan.c:1562
> >  scsi_scan_channel.part.0+0x126/0x1a0 /drivers/scsi/scsi_scan.c:1650
> >  scsi_scan_channel /drivers/scsi/scsi_scan.c:1677 [inline]
> >  scsi_scan_host_selected+0x2bb/0x3f0 /drivers/scsi/scsi_scan.c:1679
> >  do_scsi_scan_host /drivers/scsi/scsi_scan.c:1817 [inline]
> >  do_scsi_scan_host+0x1e8/0x260 /drivers/scsi/scsi_scan.c:1807
> >  scsi_scan_host /drivers/scsi/scsi_scan.c:1847 [inline]
> >  scsi_scan_host+0x37c/0x440 /drivers/scsi/scsi_scan.c:1835
> >  virtscsi_probe+0x9b7/0xbb5 /drivers/scsi/virtio_scsi.c:847
> >  virtio_dev_probe+0x463/0x710 /drivers/virtio/virtio.c:248
> >  really_probe+0x281/0x650 /drivers/base/dd.c:548
> >  driver_probe_device+0x101/0x1b0 /drivers/base/dd.c:709
> >  device_driver_attach+0x108/0x140 /drivers/base/dd.c:983
> >  __driver_attach+0xda/0x240 /drivers/base/dd.c:1060
> >  bus_for_each_dev+0x14b/0x1d0 /drivers/base/bus.c:304
> >  bus_add_driver+0x44e/0x5a0 /drivers/base/bus.c:645
> >  driver_register+0x1c4/0x320 /drivers/base/driver.c:170
> >  __write_once_size /./include/linux/compiler.h:226 [inline]
> >  INIT_LIST_HEAD /./include/linux/list.h:28 [inline]
> >  init+0xa1/0x115 /drivers/char/virtio_console.c:2251
> >  do_one_initcall+0xf0/0x614 /init/main.c:939
> >  do_initcall_level /init/main.c:1007 [inline]
> >  do_initcalls /init/main.c:1015 [inline]
> >  do_basic_setup /init/main.c:1032 [inline]
> >  kernel_init_freeable+0x4a9/0x596 /init/main.c:1192
> >  kernel_init+0xd/0x1bf /init/main.c:1110
> >  ret_from_fork+0x24/0x30 /arch/x86/entry/entry_64.S:352
> > Modules linked in:
> > ---[ end trace 73ab592d53bc046f ]---
> > RIP: 0010:dma_addressing_limited /./include/linux/dma-mapping.h:692 [inline]
> > RIP: 0010:dma_direct_max_mapping_size+0x73/0x19a /kernel/dma/direct.c:408
> > Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 1e 01 00 00 48 8b 9d 38 03
> > 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f 85
> > 06 01 00 00 48 8d bd 48 03 00 00 48 8b 1b 48 b8
> > RSP: 0000:ffff8881da18f628 EFLAGS: 00010246
> > RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff812d716c
> > RDX: 0000000000000000 RSI: ffffffff812d7189 RDI: ffff8881d7428378
> > RBP: ffff8881d7428040 R08: ffff8881da180000 R09: ffffed103ade30cb
> > R10: ffffed103ade30ca R11: ffff8881d6f18657 R12: ffff8881d7428040
> > R13: ffff8881d769e8b0 R14: 0000000000000200 R15: 0000000000000000
> > FS:  0000000000000000(0000) GS:ffff8881db300000(0000) knlGS:0000000000000000
> > CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> > CR2: 0000000000000000 CR3: 0000000006a21000 CR4: 00000000001406e0
> > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
> >
> >
> > ---
> > This bug is generated by a bot. It may contain errors.
> > See https://goo.gl/tpsmEJ for more information about syzbot.
> > syzbot engineers can be reached at syzkaller@googlegroups.com.
> >
> > syzbot will keep track of this bug report. See:
> > https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
> >
> > --
> > You received this message because you are subscribed to the Google Groups "syzkaller-bugs" group.
> > To unsubscribe from this group and stop receiving emails from it, send an email to syzkaller-bugs+unsubscribe@googlegroups.com.
> > To view this discussion on the web visit https://groups.google.com/d/msgid/syzkaller-bugs/000000000000c3c7b6058e5a47af%40google.com.
>
> Seems there is a fix for this queued in the SCSI tree.
>
> #syz fix: scsi: core: fix the dma_max_mapping_size call

Great, thanks! Because of this bug USB fuzzing is currently broken.

>
> Other threads:
>
> https://marc.info/?l=linux-scsi&m=156378725427719&w=2
> https://lkml.kernel.org/lkml/20190722163759.GA28686@codemonkey.org.uk/
> https://lkml.kernel.org/lkml/CACVXFVMWM3xg6EEyoyNjkLPv=8+wQKiHj6erMS_gGX25f-Ot4g@mail.gmail.com/
>
> - Eric

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2019-07-23 16:19 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-07-23 14:48 usb-fuzzer boot error: general protection fault in dma_direct_max_mapping_size syzbot
2019-07-23 16:14 ` Eric Biggers
2019-07-23 16:19   ` Andrey Konovalov

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).