syzbot


BUG: unable to handle kernel paging request in crypto_shash_update

Status: auto-obsoleted due to no activity on 2025/02/21 11:14
Subsystems: bcachefs
[Documentation on labels]
Reported-by: syzbot+e46f29a4b409be681ad9@syzkaller.appspotmail.com
First crash: 258d, last: 136d
Discussions (2)
Title Replies (including bot) Last reply
[syzbot] Monthly crypto report (Nov 2024) 1 (2) 2024/11/14 11:25
[syzbot] [crypto?] [bcachefs?] BUG: unable to handle kernel paging request in crypto_shash_update 0 (1) 2024/07/16 01:23
Similar bugs (2)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-5.15 KASAN: slab-out-of-bounds Read in crypto_shash_update 6 267d 277d 0/3 auto-obsoleted due to no activity on 2024/10/13 17:32
linux-6.1 KASAN: slab-out-of-bounds Read in crypto_shash_update 2 266d 266d 0/3 auto-obsoleted due to no activity on 2024/10/14 02:06
Last patch testing requests (5)
Created Duration User Patch Repo Result
2025/02/05 12:20 20m retest repro upstream OK log
2024/12/28 13:22 27m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci OK log
2024/11/27 11:16 14m retest repro upstream report log
2024/10/19 13:03 18m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci report log
2024/08/10 12:16 33m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci report log

Sample crash report:
loop0: detected capacity change from 0 to 4096
ntfs3(loop0): Different NTFS sector size (2048) and media sector size (512).
BUG: unable to handle page fault for address: ffffff8e7c63e7a0
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD e738067 P4D e738067 PUD 0 
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI
CPU: 0 UID: 0 PID: 5814 Comm: syz.0.184 Not tainted 6.12.0-rc7-syzkaller-00012-g3022e9d00ebe #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:crypto_shash_update+0x75/0x90 crypto/shash.c:52
Code: 3c 20 00 74 08 48 89 df e8 68 2d 7c fd 48 8b 1b 48 83 c3 a0 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 4b 2d 7c fd <4c> 8b 1b 48 89 ef 4c 89 fe 44 89 f2 5b 41 5c 41 5e 41 5f 5d 41 ff
RSP: 0018:ffffc9000cc671b0 EFLAGS: 00010246
RAX: 1ffffff1cf8c7cf4 RBX: ffffff8e7c63e7a0 RCX: ffff88801f02a440
RDX: 0000000000000000 RSI: ffff88805f376000 RDI: ffffc9000cc672c0
RBP: ffffc9000cc672c0 R08: ffffffff847e3b52 R09: 1ffffffff2859b15
R10: dffffc0000000000 R11: fffffbfff2859b16 R12: dffffc0000000000
R13: ffff88805f376000 R14: 000000000000000a R15: ffff88805f376000
FS:  00005555905fd500(0000) GS:ffff88801fc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffff8e7c63e7a0 CR3: 00000000130da000 CR4: 0000000000352ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 ima_calc_file_hash_tfm security/integrity/ima/ima_crypto.c:491 [inline]
 ima_calc_file_shash security/integrity/ima/ima_crypto.c:511 [inline]
 ima_calc_file_hash+0xb1c/0x1b30 security/integrity/ima/ima_crypto.c:568
 ima_collect_measurement+0x520/0xb10 security/integrity/ima/ima_api.c:293
 process_measurement+0x1351/0x1fb0 security/integrity/ima/ima_main.c:372
 ima_bprm_check+0x129/0x2b0 security/integrity/ima/ima_main.c:547
 security_bprm_check+0xd2/0x250 security/security.c:1297
 search_binary_handler fs/exec.c:1740 [inline]
 exec_binprm fs/exec.c:1794 [inline]
 bprm_execve+0xa56/0x1770 fs/exec.c:1845
 do_execveat_common+0x55f/0x6f0 fs/exec.c:1952
 do_execveat fs/exec.c:2037 [inline]
 __do_sys_execveat fs/exec.c:2111 [inline]
 __se_sys_execveat fs/exec.c:2105 [inline]
 __x64_sys_execveat+0xc4/0xe0 fs/exec.c:2105
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f981eb7e719
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffcdccaf0d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
RAX: ffffffffffffffda RBX: 00007f981ed35f80 RCX: 00007f981eb7e719
RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c
RBP: 00007f981ebf1616 R08: 0000000000001000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f981ed35f80 R14: 00007f981ed35f80 R15: 00000000000000ff
 </TASK>
Modules linked in:
CR2: ffffff8e7c63e7a0
---[ end trace 0000000000000000 ]---
RIP: 0010:crypto_shash_update+0x75/0x90 crypto/shash.c:52
Code: 3c 20 00 74 08 48 89 df e8 68 2d 7c fd 48 8b 1b 48 83 c3 a0 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 4b 2d 7c fd <4c> 8b 1b 48 89 ef 4c 89 fe 44 89 f2 5b 41 5c 41 5e 41 5f 5d 41 ff
RSP: 0018:ffffc9000cc671b0 EFLAGS: 00010246
RAX: 1ffffff1cf8c7cf4 RBX: ffffff8e7c63e7a0 RCX: ffff88801f02a440
RDX: 0000000000000000 RSI: ffff88805f376000 RDI: ffffc9000cc672c0
RBP: ffffc9000cc672c0 R08: ffffffff847e3b52 R09: 1ffffffff2859b15
R10: dffffc0000000000 R11: fffffbfff2859b16 R12: dffffc0000000000
R13: ffff88805f376000 R14: 000000000000000a R15: ffff88805f376000
FS:  00005555905fd500(0000) GS:ffff88801fc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffff8e7c63e7a0 CR3: 00000000130da000 CR4: 0000000000352ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	3c 20                	cmp    $0x20,%al
   2:	00 74 08 48          	add    %dh,0x48(%rax,%rcx,1)
   6:	89 df                	mov    %ebx,%edi
   8:	e8 68 2d 7c fd       	call   0xfd7c2d75
   d:	48 8b 1b             	mov    (%rbx),%rbx
  10:	48 83 c3 a0          	add    $0xffffffffffffffa0,%rbx
  14:	48 89 d8             	mov    %rbx,%rax
  17:	48 c1 e8 03          	shr    $0x3,%rax
  1b:	42 80 3c 20 00       	cmpb   $0x0,(%rax,%r12,1)
  20:	74 08                	je     0x2a
  22:	48 89 df             	mov    %rbx,%rdi
  25:	e8 4b 2d 7c fd       	call   0xfd7c2d75
* 2a:	4c 8b 1b             	mov    (%rbx),%r11 <-- trapping instruction
  2d:	48 89 ef             	mov    %rbp,%rdi
  30:	4c 89 fe             	mov    %r15,%rsi
  33:	44 89 f2             	mov    %r14d,%edx
  36:	5b                   	pop    %rbx
  37:	41 5c                	pop    %r12
  39:	41 5e                	pop    %r14
  3b:	41 5f                	pop    %r15
  3d:	5d                   	pop    %rbp
  3e:	41                   	rex.B
  3f:	ff                   	.byte 0xff

Crashes (6):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/11/13 11:13 upstream 3022e9d00ebe 62026c85 .config console log report syz / log [disk image (non-bootable)] [vmlinux] [kernel image] [mounted in repro] ci-snapshot-upstream-root BUG: unable to handle kernel paging request in crypto_shash_update
2024/11/13 09:39 upstream 3022e9d00ebe 62026c85 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel paging request in crypto_shash_update
2024/07/27 12:06 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci c912bf709078 46eb10b7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: unable to handle kernel paging request in crypto_shash_update
2024/07/13 23:53 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci c912bf709078 eaeb5c15 .config console log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-gce-arm64 BUG: unable to handle kernel paging request in crypto_shash_update
2024/07/13 22:46 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci c912bf709078 eaeb5c15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: unable to handle kernel paging request in crypto_shash_update
2024/07/14 11:26 upstream 4d145e3f830b eaeb5c15 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in crypto_shash_update
* Struck through repros no longer work on HEAD.