On Thu, Nov 29, 2018 at 9:13 AM, Manfred Spraul[...]
<manfred@xxxxxxxxxxxxxxxx> wrote:
Hello together,
On 11/27/18 4:52 PM, syzbot wrote:
Hello,
syzbot found the following crash on:
HEAD commit: e195ca6cb6f2 Merge branch 'for-linus' of git://git.kernel...
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=10d3e6a3400000
Ok, thanks. And stack overrun detection is enabled as well -> a real stack overrun is unlikely.Isn't this a kernel stack overrun?I don't exact answer, that's just the kernel output that we captured
RSP: 0x..83e008. Assuming 8 kB kernel stack, and 8 kB alignment, we have
used up everything.
from console.
FWIW with KASAN stacks are 16K:
https://elixir.bootlin.com/linux/latest/source/arch/x86/include/asm/page_64_types.h#L10
Well, generally everything except for kernel crashes is expected.
We actually sandbox it with memcg quite aggressively:
https://github.com/google/syzkaller/blob/master/executor/common_linux.h#L2159
But it seems to manage to either break the limits, or cause some
massive memory leaks. The nature of that is yet unknown.
- Which stress tests are enabled? By chance, I found:What exactly do you mean by "Which stress tests"?
[ 433.304586] FAULT_INJECTION: forcing a failure.^M
[ 433.304586] name fail_page_alloc, interval 1, probability 0, space 0,
times 0^M
[ 433.316471] CPU: 1 PID: 19653 Comm: syz-executor4 Not tainted 4.20.0-rc3+
#348^M
[ 433.323841] Hardware name: Google Google Compute Engine/Google Compute
Engine, BIOS Google 01/01/2011^M
I need some more background, then I can review the code.
Fault injection is enabled. Also random workload from userspace.
Right now, I would put it into my "unknown syzcaller finding" folder.