syzbot


BUG: stack guard page was hit in corrupted (23)

Status: auto-obsoleted due to no activity on 2023/09/30 03:13
Reported-by: syzbot+ce0a54903a8d199244c2@syzkaller.appspotmail.com
First crash: 319d, last: 319d
Cause bisection: failed (error log, bisect log)
  
Fix bisection: failed (error log, bisect log)
  
Similar bugs (22)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-5-10 BUG: stack guard page was hit in corrupted (14) C error 2 766d 766d 0/2 closed as dup on 2022/03/24 14:58
android-5-10 BUG: stack guard page was hit in corrupted (16) C error 2 759d 762d 0/2 closed as dup on 2022/03/30 17:23
android-5-10 BUG: stack guard page was hit in corrupted (9) C error 1 773d 773d 0/2 closed as dup on 2022/03/16 16:28
android-5-10 BUG: stack guard page was hit in corrupted (13) C error 1 767d 767d 0/2 closed as dup on 2022/03/22 16:23
android-5-10 BUG: stack guard page was hit in corrupted (17) C error 3 756d 756d 0/2 closed as dup on 2022/04/04 16:48
android-5-10 BUG: stack guard page was hit in corrupted (5) C error 3 778d 778d 0/2 closed as dup on 2022/03/11 15:58
android-5-10 BUG: stack guard page was hit in corrupted (19) C 1 750d 750d 0/2 closed as dup on 2022/04/08 17:06
android-5-10 BUG: stack guard page was hit in corrupted (6) C error 1 777d 777d 0/2 closed as dup on 2022/03/11 22:51
android-5-10 BUG: stack guard page was hit in corrupted (20) C error 1 747d 747d 0/2 closed as dup on 2022/04/11 14:20
android-5-10 BUG: stack guard page was hit in corrupted (21) C error 3 733d 734d 0/2 closed as dup on 2022/05/04 16:12
android-5-10 BUG: stack guard page was hit in corrupted (8) C 1 775d 775d 0/2 closed as dup on 2022/03/14 15:44
android-5-10 BUG: stack guard page was hit in corrupted (4) C error 1 780d 780d 0/2 closed as dup on 2022/03/09 18:22
android-5-10 BUG: stack guard page was hit in corrupted (7) C error 1 777d 777d 0/2 closed as dup on 2022/03/13 15:49
android-5-10 BUG: stack guard page was hit in corrupted (18) C error 1 752d 752d 0/2 closed as dup on 2022/04/05 20:24
android-5-10 BUG: stack guard page was hit in corrupted C error 3 808d 844d 0/2 closed as invalid on 2022/02/28 16:10
android-5-10 BUG: stack guard page was hit in corrupted (10) C error 1 772d 772d 0/2 closed as dup on 2022/03/17 16:45
android-5-10 BUG: stack guard page was hit in corrupted (15) C error 1 764d 764d 0/2 closed as dup on 2022/03/25 16:30
android-5-10 BUG: stack guard page was hit in corrupted (12) C done 2 768d 770d 0/2 closed as dup on 2022/03/21 14:57
android-5-10 BUG: stack guard page was hit in corrupted (2) C error 2 785d 787d 0/2 closed as dup on 2022/03/02 15:48
android-5-10 BUG: stack guard page was hit in corrupted (3) C error 1 780d 780d 0/2 closed as dup on 2022/03/09 15:36
android-5-10 BUG: stack guard page was hit in corrupted (11) C error 2 770d 770d 0/2 closed as dup on 2022/03/18 21:48
android-5-10 BUG: stack guard page was hit in corrupted (22) syz done done 1 718d 718d 0/2 auto-closed as invalid on 2022/08/31 02:51
Last patch testing requests (1)
Created Duration User Patch Repo Result
2023/09/30 02:52 13m retest repro android13-5.10-lts OK log
Cause bisection attempts (2)
Created Duration User Patch Repo Result
2023/06/22 06:04 15m bisect android13-5.10-lts error job log (0)
2023/06/13 00:58 12m bisect android13-5.10-lts error job log (0)

Sample crash report:
BUG: stack guard page was hit at ffffc900018cffb8 (stack is ffffc900018d0000..ffffc900018d7fff)
kernel stack overflow (double-fault): 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 2750 Comm: syz-executor.3 Not tainted 5.10.178-syzkaller-00127-g43c801dc3325 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023
RIP: 0010:__unwind_start+0x2f/0x3a0 arch/x86/kernel/unwind_frame.c:368
Code: 57 41 56 41 55 41 54 53 48 83 ec 48 48 89 4d d0 49 89 d4 49 89 f5 49 89 ff 48 bb 00 00 00 00 00 fc ff df ba 60 00 00 00 31 f6 <e8> 4c 70 75 00 49 8d 7f 28 48 89 f8 48 c1 e8 03 80 3c 18 00 74 05
RSP: 0018:ffffc900018cffc0 EFLAGS: 00010246
RAX: ffff88810ceabb40 RBX: dffffc0000000000 RCX: ffffc900018d00d0
RDX: 0000000000000060 RSI: 0000000000000000 RDI: ffffc900018d0040
RBP: ffffc900018d0030 R08: dffffc0000000000 R09: ffffc900018d0200
R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000
R13: ffff88810ceabb40 R14: ffffc900018d0120 R15: ffffc900018d0040
FS:  00007f7e28c19700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc900018cffb8 CR3: 000000010f879000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
Modules linked in:
---[ end trace bab7eefd4181181b ]---
RIP: 0010:__unwind_start+0x2f/0x3a0 arch/x86/kernel/unwind_frame.c:368
Code: 57 41 56 41 55 41 54 53 48 83 ec 48 48 89 4d d0 49 89 d4 49 89 f5 49 89 ff 48 bb 00 00 00 00 00 fc ff df ba 60 00 00 00 31 f6 <e8> 4c 70 75 00 49 8d 7f 28 48 89 f8 48 c1 e8 03 80 3c 18 00 74 05
RSP: 0018:ffffc900018cffc0 EFLAGS: 00010246
RAX: ffff88810ceabb40 RBX: dffffc0000000000 RCX: ffffc900018d00d0
RDX: 0000000000000060 RSI: 0000000000000000 RDI: ffffc900018d0040
RBP: ffffc900018d0030 R08: dffffc0000000000 R09: ffffc900018d0200
R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000
R13: ffff88810ceabb40 R14: ffffc900018d0120 R15: ffffc900018d0040
FS:  00007f7e28c19700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc900018cffb8 CR3: 000000010f879000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	57                   	push   %rdi
   1:	41 56                	push   %r14
   3:	41 55                	push   %r13
   5:	41 54                	push   %r12
   7:	53                   	push   %rbx
   8:	48 83 ec 48          	sub    $0x48,%rsp
   c:	48 89 4d d0          	mov    %rcx,-0x30(%rbp)
  10:	49 89 d4             	mov    %rdx,%r12
  13:	49 89 f5             	mov    %rsi,%r13
  16:	49 89 ff             	mov    %rdi,%r15
  19:	48 bb 00 00 00 00 00 	movabs $0xdffffc0000000000,%rbx
  20:	fc ff df
  23:	ba 60 00 00 00       	mov    $0x60,%edx
  28:	31 f6                	xor    %esi,%esi
* 2a:	e8 4c 70 75 00       	callq  0x75707b <-- trapping instruction
  2f:	49 8d 7f 28          	lea    0x28(%r15),%rdi
  33:	48 89 f8             	mov    %rdi,%rax
  36:	48 c1 e8 03          	shr    $0x3,%rax
  3a:	80 3c 18 00          	cmpb   $0x0,(%rax,%rbx,1)
  3e:	74 05                	je     0x45

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2023/06/13 00:55 android13-5.10-lts 43c801dc3325 aaed0183 .config console log report syz [disk image] [vmlinux] [kernel image] ci2-android-5-10 BUG: stack guard page was hit in corrupted
* Struck through repros no longer work on HEAD.