syzbot


Unable to handle kernel execute from non-executable memory at virtual address ADDR

Status: auto-obsoleted due to no activity on 2023/09/23 17:35
Reported-by: syzbot+42249479d322d1df65e2@syzkaller.appspotmail.com
First crash: 593d, last: 593d
Similar bugs (1)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream Unable to handle kernel execute from non-executable memory at virtual address ADDR net s390 C 8 68d 168d 0/28 upstream: reported C repro on 2024/08/13 08:50

Sample crash report:
Unable to handle kernel execute from non-executable memory at virtual address ffff800017628ea0
Mem abort info:
  ESR = 0x000000008600000e
  EC = 0x21: IABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x0e: level 2 permission fault
swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000001b4920000
[ffff800017628ea0] pgd=100000023ffff003, p4d=100000023ffff003, pud=100000023fffe003, pmd=00680001b7a00701
Internal error: Oops: 8600000e [#1] PREEMPT SMP
Modules linked in:
CPU: 1 PID: 3551 Comm: kworker/1:3 Not tainted 5.15.117-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023
Workqueue: mld mld_ifc_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : stack_trace+0x1dca60/0x840000
lr : dev_hard_header include/linux/netdevice.h:3291 [inline]
lr : macvlan_hard_header+0xe4/0x114 drivers/net/macvlan.c:594
sp : ffff80001f0a7510
x29: ffff80001f0a7510 x28: ffff80000c83d290 x27: ffff0000db888238
x26: dfff800000000000 x25: ffff800017628ea0 x24: ffff800016ef54a0
x23: ffff0000ce081d28 x22: ffff0000e22ebb40 x21: 00000000000086dd
x20: ffff0000d95a19a8 x19: 0000000000000060 x18: 0000000000000200
x17: ff808000108fb7f4 x16: ffff8000082ea770 x15: ffff8000108fb7f4
x14: 1ffff0000291e06a x13: ffffffffffffffff x12: 0000000000000000
x11: ff8080000c83d358 x10: 0000000000000000 x9 : ffff80000c83d358
x8 : ffff0000d3931b40 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000060 x4 : ffff0000ce081d28 x3 : ffff0000d95a19a8
x2 : 00000000000086dd x1 : ffff800016ef54a0 x0 : ffff0000e22ebb40
Call trace:
 stack_trace+0x1dca60/0x840000
 dev_hard_header include/linux/netdevice.h:3291 [inline]
 neigh_resolve_output+0x408/0x5dc net/core/neighbour.c:1519
 neigh_output include/net/neighbour.h:516 [inline]
 ip6_finish_output2+0x1344/0x1c48 net/ipv6/ip6_output.c:126
 __ip6_finish_output+0x518/0x67c net/ipv6/ip6_output.c:191
 ip6_finish_output+0x40/0x218 net/ipv6/ip6_output.c:201
 NF_HOOK_COND include/linux/netfilter.h:296 [inline]
 ip6_output+0x270/0x594 net/ipv6/ip6_output.c:224
 dst_output include/net/dst.h:449 [inline]
 NF_HOOK+0x160/0x4ec include/linux/netfilter.h:307
 mld_sendpack+0x828/0x1264 net/ipv6/mcast.c:1820
 mld_send_cr net/ipv6/mcast.c:2121 [inline]
 mld_ifc_work+0x85c/0xb9c net/ipv6/mcast.c:2653
 process_one_work+0x790/0x11b8 kernel/workqueue.c:2307
 worker_thread+0x910/0x1034 kernel/workqueue.c:2454
 kthread+0x37c/0x45c kernel/kthread.c:319
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:870
Code: 1194f0fc ffff8000 08021e10 ffff8000 (00000000) 
---[ end trace e8d9337ed4fa828e ]---
----------------
Code disassembly (best guess):
   0:	1194f0fc 	.inst	0x1194f0fc ; undefined
   4:	ffff8000 	.inst	0xffff8000 ; undefined
   8:	08021e10 	stxrb	w2, w16, [x16]
   c:	ffff8000 	.inst	0xffff8000 ; undefined
* 10:	00000000 	udf	#0 <-- trapping instruction

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2023/06/15 17:35 linux-5.15.y 471e639e59d1 90d4044e .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan-arm64 Unable to handle kernel execute from non-executable memory at virtual address ADDR
* Struck through repros no longer work on HEAD.