syzbot


BUG: unable to handle kernel paging request in arch_uprobe_exception_notify

Status: closed as invalid on 2024/09/06 13:56
Subsystems: kernel
[Documentation on labels]
First crash: 154d, last: 154d

Sample crash report:
BUG: unable to handle page fault for address: ffffffff8e4ce8cc
#PF: supervisor read access in user mode
#PF: error_code(0x0000) - not-present page
IDT: 0xfffffe0000000000 (limit=0xfff) GDT: 0xfffffe0000048000 (limit=0x7f)
LDTR: NULL
TR: 0x40 -- base=0xfffffe000004a000 limit=0x4087
PGD e73a067 P4D e73a067 PUD e73b063 PMD 2d72f163 PTE 800ffffff1b31022
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 1 UID: 0 PID: 5325 Comm: syz.3.7 Not tainted 6.11.0-rc5-next-20240827-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: ffff:0x8bb9790100000000
RSP: 0010:0000000000000000 EFLAGS: ffff1020 ORIG_RAX: 00000000ffff1020
RAX: ffffffff8bb9836e RBX: ffffc90003fa6cc0 RCX: 00000000fffffffc
RDX: 00fffc0000000000 RSI: ffffc90003fa703c RDI: 00ffffffffffffff
RBP: ffffc90003fa700e R08: ffffc90003fa6d50 R09: ffff1020ffffff09
R10: ffffc90003fa6cc0 R11: ffffffff81fce8b3 R12: 0000000000000000
R13: ffffffff8c051f22 R14: 0000000000000018 R15: 0000000000000000
FS:  0000555565447500 GS:  0000000000000000
Modules linked in:
CR2: ffffffff8e4ce8cc
Oops: general protection fault, maybe for address 0x0: 0000 [#2] PREEMPT SMP KASAN PTI
CPU: 0 UID: 0 PID: 5325 Comm: syz.3.7 Tainted: G      D            6.11.0-rc5-next-20240827-syzkaller #0
Tainted: [D]=DIE
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Oops: general protection fault, probably for non-canonical address 0xe3fffb24000fe957: 0000 [#3] PREEMPT SMP KASAN PTI
KASAN: maybe wild-memory-access in range [0x1ffff920007f4ab8-0x1ffff920007f4abf]
CPU: 0 UID: 0 PID: 5325 Comm: syz.3.7 Tainted: G      D            6.11.0-rc5-next-20240827-syzkaller #0
Tainted: [D]=DIE
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: 0010:user_mode arch/x86/include/asm/ptrace.h:214 [inline]
RIP: 0010:arch_uprobe_exception_notify+0x4e/0x110 arch/x86/kernel/uprobes.c:1125
Code: 48 c1 e8 03 42 80 3c 38 00 74 08 48 89 df e8 49 fd bb 00 4c 8b 23 4d 85 e4 74 3a 49 8d ac 24 88 00 00 00 48 89 e8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 8e 00 00 00 0f b7 5d 00 89 de 83 e6 03
RSP: 0018:ffffc90003fa5040 EFLAGS: 00010003
RAX: 03ffff24000fe957 RBX: ffffc90003fa5140 RCX: ffff888021fdbc00
RDX: 0000000000000000 RSI: 0000000000000009 RDI: ffffffff8e9e7ac0
RBP: 1ffff920007f4abc R08: ffffffff8160fbe0 R09: 1ffffffff20386c5
R10: dffffc0000000000 R11: ffffffff8140e840 R12: 1ffff920007f4a34
R13: 00000000fffffffd R14: 0000000000000009 R15: dffffc0000000000
FS:  0000555565447500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffff8e52c544 CR3: 000000007af42000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 notifier_call_chain+0x19f/0x3e0 kernel/notifier.c:93
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: ffff:0x8bb9790100000000
RSP: 0010:0000000000000000 EFLAGS: ffff1020 ORIG_RAX: 00000000ffff1020
RAX: ffffffff8bb9836e RBX: ffffc90003fa6cc0 RCX: 00000000fffffffc
RDX: 00fffc0000000000 RSI: ffffc90003fa703c RDI: 00ffffffffffffff
RBP: ffffc90003fa700e R08: ffffc90003fa6d50 R09: ffff1020ffffff09
R10: ffffc90003fa6cc0 R11: ffffffff81fce8b3 R12: 0000000000000000
R13: ffffffff8c051f22 R14: 0000000000000018 R15: 0000000000000000
FS:  0000555565447500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000
CS:  ffff DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffff8e52c544 CR3: 000000007af42000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	48 c1 e8 03          	shr    $0x3,%rax
   4:	42 80 3c 38 00       	cmpb   $0x0,(%rax,%r15,1)
   9:	74 08                	je     0x13
   b:	48 89 df             	mov    %rbx,%rdi
   e:	e8 49 fd bb 00       	call   0xbbfd5c
  13:	4c 8b 23             	mov    (%rbx),%r12
  16:	4d 85 e4             	test   %r12,%r12
  19:	74 3a                	je     0x55
  1b:	49 8d ac 24 88 00 00 	lea    0x88(%r12),%rbp
  22:	00
  23:	48 89 e8             	mov    %rbp,%rax
  26:	48 c1 e8 03          	shr    $0x3,%rax
* 2a:	42 0f b6 04 38       	movzbl (%rax,%r15,1),%eax <-- trapping instruction
  2f:	84 c0                	test   %al,%al
  31:	0f 85 8e 00 00 00    	jne    0xc5
  37:	0f b7 5d 00          	movzwl 0x0(%rbp),%ebx
  3b:	89 de                	mov    %ebx,%esi
  3d:	83 e6 03             	and    $0x3,%esi

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/08/27 21:53 linux-next 6f923748057a 6c853ff9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root BUG: unable to handle kernel paging request in arch_uprobe_exception_notify
* Struck through repros no longer work on HEAD.