syzbot


upstream boot error: BUG: unable to handle kernel paging request in copy_thread

Status: internal: reported on 2022/08/16 06:44
Reported-by: syzbot+@syzkaller.appspotmail.com
Fix commit: 9993a4f989c7 virtio: Revert "virtio: find_vqs() add arg sizes"
Patched on: [ci-qemu-upstream ci-qemu-upstream-386 ci-qemu2-arm32 ci-qemu2-arm64 ci-qemu2-arm64-compat ci-qemu2-arm64-mte ci-upstream-bpf-kasan-gce ci-upstream-bpf-next-kasan-gce ci-upstream-gce-arm64 ci-upstream-gce-leak ci-upstream-kasan-gce ci-upstream-kasan-gce-386 ci-upstream-kasan-gce-root ci-upstream-kasan-gce-selinux-root ci-upstream-kasan-gce-smack-root ci-upstream-kmsan-gce ci-upstream-kmsan-gce-386 ci-upstream-linux-next-kasan-gce-root ci-upstream-net-kasan-gce ci-upstream-net-this-kasan-gce ci2-upstream-fs ci2-upstream-kcsan-gce ci2-upstream-usb], missing on: [ci-qemu2-riscv64]
First crash: 166d, last: 166d

Sample crash report:
BUG: unable to handle page fault for address: ffffdc0000000fe9
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 11826067 P4D 11826067 PUD 0 
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 1086 Comm: kworker/u4:6 Not tainted 6.0.0-rc1-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022
Workqueue: events_unbound call_usermodehelper_exec_work
RIP: 0010:copy_thread+0xc5/0xa00 arch/x86/kernel/process.c:148
Code: 48 b8 00 00 00 00 00 fc ff df 48 8b 7d 20 4c 8d bf 58 7f 00 00 4c 8d a7 20 7f 00 00 48 81 c7 48 7f 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 12 08 00 00 49 8d 7f f8 49 c7 47 f0 00 00 00 00
RSP: 0018:ffffc900052df8f0 EFLAGS: 00010212
RAX: dffffc0000000000 RBX: ffffc900052dfc10 RCX: 0000000000000000
RDX: 1fffe00000000fe9 RSI: ffffc900052dfc10 RDI: ffff000000007f48
RBP: ffff88801fcf0000 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff000000007f20
R13: 0000000000808100 R14: 0000000000000000 R15: ffff000000007f58
FS:  0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffdc0000000fe9 CR3: 000000000bc8e000 CR4: 0000000000350ef0
Call Trace:
 <TASK>
 copy_process+0x3ced/0x7090 kernel/fork.c:2265
 kernel_clone+0xe7/0xab0 kernel/fork.c:2673
 user_mode_thread+0xad/0xe0 kernel/fork.c:2742
 call_usermodehelper_exec_work kernel/umh.c:174 [inline]
 call_usermodehelper_exec_work+0xcc/0x180 kernel/umh.c:160
 process_one_work+0x991/0x1610 kernel/workqueue.c:2289
 worker_thread+0x665/0x1080 kernel/workqueue.c:2436
 kthread+0x2e4/0x3a0 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306
 </TASK>
Modules linked in:
CR2: ffffdc0000000fe9
---[ end trace 0000000000000000 ]---
RIP: 0010:copy_thread+0xc5/0xa00 arch/x86/kernel/process.c:148
Code: 48 b8 00 00 00 00 00 fc ff df 48 8b 7d 20 4c 8d bf 58 7f 00 00 4c 8d a7 20 7f 00 00 48 81 c7 48 7f 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 12 08 00 00 49 8d 7f f8 49 c7 47 f0 00 00 00 00
RSP: 0018:ffffc900052df8f0 EFLAGS: 00010212
RAX: dffffc0000000000 RBX: ffffc900052dfc10 RCX: 0000000000000000
RDX: 1fffe00000000fe9 RSI: ffffc900052dfc10 RDI: ffff000000007f48
RBP: ffff88801fcf0000 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff000000007f20
R13: 0000000000808100 R14: 0000000000000000 R15: ffff000000007f58
FS:  0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffdc0000000fe9 CR3: 000000000bc8e000 CR4: 0000000000350ef0
----------------
Code disassembly (best guess):
   0:	48 b8 00 00 00 00 00 	movabs $0xdffffc0000000000,%rax
   7:	fc ff df
   a:	48 8b 7d 20          	mov    0x20(%rbp),%rdi
   e:	4c 8d bf 58 7f 00 00 	lea    0x7f58(%rdi),%r15
  15:	4c 8d a7 20 7f 00 00 	lea    0x7f20(%rdi),%r12
  1c:	48 81 c7 48 7f 00 00 	add    $0x7f48,%rdi
  23:	48 89 fa             	mov    %rdi,%rdx
  26:	48 c1 ea 03          	shr    $0x3,%rdx
* 2a:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1) <-- trapping instruction
  2e:	0f 85 12 08 00 00    	jne    0x846
  34:	49 8d 7f f8          	lea    -0x8(%r15),%rdi
  38:	49 c7 47 f0 00 00 00 	movq   $0x0,-0x10(%r15)
  3f:	00

Crashes (1):
Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets Title
ci-upstream-kasan-gce-root 2022/08/16 06:43 upstream 568035b01cfb 7a7cb304 .config console log report upstream boot error: BUG: unable to handle kernel paging request in copy_thread
* Struck through repros no longer work on HEAD.