syzbot


BUG: unable to handle kernel paging request in call_usermodehelper_exec_work

Status: moderation: reported on 2022/11/15 00:29
Reported-by: syzbot+9e69e91a8cb17766921b@syzkaller.appspotmail.com
First crash: 86d, last: 86d

Sample crash report:
Unable to handle kernel paging request at virtual address 0067c2d67a315ef8
Mem abort info:
  ESR = 0x0000000096000004
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x04: level 0 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000004
  CM = 0, WnR = 0
[0067c2d67a315ef8] address between user and kernel address ranges
Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 126 Comm: kworker/u4:3 Not tainted 6.1.0-rc4-syzkaller-31872-g1621b6eaebf7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022
Workqueue: events_unbound call_usermodehelper_exec_work
pstate: 004000c5 (nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : swake_up_locked kernel/sched/swait.c:29 [inline]
pc : complete+0x48/0x90 kernel/sched/completion.c:36
lr : complete+0x24/0x90 kernel/sched/completion.c:32
sp : ffff800012b73d20
x29: ffff800012b73d20 x28: ffff80000d24b000 x27: ffff0000c0028005
x26: ffff0000c2771010 x25: 0000000000000004 x24: ffff0000c0028005
x23: ffff00011cd4cc00 x22: ffff800013ab3ad8 x21: 6567c2d67a315f00
x20: 0000000000000000 x19: ffff800013ab3a98 x18: 0000000000000051
x17: ffff80000c04d83c x16: ffff80000db1a158 x15: ffff0000c23a0000
x14: 0000000000000040 x13: 00000000ffffffff x12: ffff0000c23a0000
x11: ff808000095f1718 x10: 0000000000000000 x9 : 0000000000000000
x8 : 000000000d30b989 x7 : ffff800008186f8c x6 : 0000000000000000
x5 : 0000000000000080 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 swake_up_locked kernel/sched/swait.c:25 [inline]
 complete+0x48/0x90 kernel/sched/completion.c:36
 call_usermodehelper_exec_work+0x128/0x17c
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
Code: b90002c8 f8448ed5 eb1602bf 54000160 (f85f82a0) 
---[ end trace 0000000000000000 ]---
----------------
Code disassembly (best guess):
   0:	b90002c8 	str	w8, [x22]
   4:	f8448ed5 	ldr	x21, [x22, #72]!
   8:	eb1602bf 	cmp	x21, x22
   c:	54000160 	b.eq	0x38  // b.none
* 10:	f85f82a0 	ldur	x0, [x21, #-8] <-- trapping instruction

Crashes (1):
Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets Title
ci-upstream-gce-arm64 2022/11/11 00:23 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 1621b6eaebf7 3ead01ad .config console log report info [disk image] [vmlinux] [kernel image] BUG: unable to handle kernel paging request in call_usermodehelper_exec_work
* Struck through repros no longer work on HEAD.