syzbot


BUG: unable to handle kernel NULL pointer dereference in bpf_prog_ADDR

Status: auto-obsoleted due to no activity on 2023/04/14 06:50
Subsystems: net bpf
[Documentation on labels]
Reported-by: syzbot+192a7fbbece55f740074@syzkaller.appspotmail.com
First crash: 1526d, last: 1211d
Cause bisection: failed (error log, bisect log)
  
Fix bisection: failed (error log, bisect log)
  
Discussions (1)
Title Replies (including bot) Last reply
BUG: unable to handle kernel NULL pointer dereference in bpf_prog_ADDR 2 (3) 2020/08/03 05:06
Similar bugs (3)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream BUG: unable to handle kernel paging request in bpf_prog_ADDR (3) bpf net C done 6 84d 84d 27/28 upstream: reported C repro on 2024/07/13 16:24
upstream BUG: sleeping function called from invalid context in do_user_addr_fault (2) syz done error 27 816d 1380d 0/28 auto-obsoleted due to no activity on 2023/12/05 09:08
upstream BUG: unable to handle kernel paging request in bpf_prog_ADDR (2) bpf C 3 165d 179d 25/28 fixed on 2024/06/05 13:52
Last patch testing requests (10)
Created Duration User Patch Repo Result
2023/04/14 06:11 20m retest repro linux-next OK log
2023/04/14 05:11 20m retest repro linux-next OK log
2022/12/13 18:31 19m retest repro bpf-next OK log
2022/12/13 14:31 19m retest repro bpf-next OK log
2022/12/13 09:31 19m retest repro bpf OK log
2022/12/13 06:31 8m retest repro bpf error
2022/10/07 01:30 17m retest repro linux-next error
2022/10/06 12:30 17m retest repro linux-next error
2022/09/29 22:30 15m retest repro upstream OK log
2022/09/29 20:30 15m retest repro upstream OK log
Fix bisection attempts (3)
Created Duration User Patch Repo Result
2021/01/12 10:43 13m bisect fix upstream error job log
2020/11/12 11:27 26m bisect fix upstream OK (0) job log log
2020/10/13 03:28 28m bisect fix upstream OK (0) job log log

Sample crash report:
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 1d023067 P4D 1d023067 PUD 329d7067 PMD 0 
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 8794 Comm: syz-executor.0 Not tainted 5.13.0-rc5-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:bpf_prog_e48ebe87b99394c4+0x11/0x730
Code: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 0f 1f 44 00 00 66 90 55 48 89 e5 31 c0 48 8b 47 28 <48> 8b 40 00 8b 80 d0 00 00 00 c9 c3 cc cc cc cc cc cc cc cc cc cc
RSP: 0018:ffffc900016dfae8 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffffc90000eb8000 RCX: 0000000000000000
RDX: ffff88802beb8000 RSI: ffffc90000eb8048 RDI: ffffc900016dfca8
RBP: ffffc900016dfae8 R08: 0000000000000000 R09: 0000000000000001
R10: ffffffff87470adc R11: 0000000000000000 R12: dffffc0000000000
R13: 0000000000000000 R14: 0000000080000000 R15: 0000000000000001
FS:  00007f768d1af700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000001742e000 CR4: 0000000000350ee0
Call Trace:
 bpf_prog_run_xdp include/linux/filter.h:771 [inline]
 bpf_test_run+0x1f7/0xaa0 net/bpf/test_run.c:115
 bpf_prog_test_run_xdp+0x2c2/0x4d0 net/bpf/test_run.c:720
 bpf_prog_test_run kernel/bpf/syscall.c:3150 [inline]
 __do_sys_bpf+0x218b/0x4f40 kernel/bpf/syscall.c:4429
 do_syscall_64+0x3a/0xb0 arch/x86/entry/common.c:47
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x4665d9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f768d1af188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9
RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a
RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80
R13: 00007fff85f68fff R14: 00007f768d1af300 R15: 0000000000022000
Modules linked in:
CR2: 0000000000000000
---[ end trace 227f0a9c2671f32c ]---
RIP: 0010:bpf_prog_e48ebe87b99394c4+0x11/0x730
Code: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 0f 1f 44 00 00 66 90 55 48 89 e5 31 c0 48 8b 47 28 <48> 8b 40 00 8b 80 d0 00 00 00 c9 c3 cc cc cc cc cc cc cc cc cc cc
RSP: 0018:ffffc900016dfae8 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffffc90000eb8000 RCX: 0000000000000000
RDX: ffff88802beb8000 RSI: ffffc90000eb8048 RDI: ffffc900016dfca8
RBP: ffffc900016dfae8 R08: 0000000000000000 R09: 0000000000000001
R10: ffffffff87470adc R11: 0000000000000000 R12: dffffc0000000000
R13: 0000000000000000 R14: 0000000080000000 R15: 0000000000000001
FS:  00007f768d1af700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000001742e000 CR4: 0000000000350ee0

Crashes (19):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2021/06/12 18:50 upstream ad347abe4a98 1ba81399 .config console log report syz ci-upstream-kasan-gce-root BUG: unable to handle kernel NULL pointer dereference in bpf_prog_ADDR
2020/08/23 01:33 upstream c3d8f220d012 1da71ab0 .config console log report syz ci-upstream-kasan-gce-selinux-root
2020/08/23 01:11 upstream c3d8f220d012 1da71ab0 .config console log report syz ci-upstream-kasan-gce-root
2020/08/23 01:08 upstream c3d8f220d012 1da71ab0 .config console log report syz ci-upstream-kasan-gce-smack-root
2020/08/04 03:54 upstream 3208167a865e 196277c4 .config console log report syz ci-upstream-kasan-gce-root
2020/08/02 12:14 upstream ac3a0c847296 63a73341 .config console log report syz ci-upstream-kasan-gce-selinux-root
2020/08/01 23:27 upstream 7dc6fd0f3b84 d895b3be .config console log report syz ci-upstream-kasan-gce-smack-root
2020/08/23 01:04 bpf 4af7b32f84aa 1da71ab0 .config console log report syz ci-upstream-bpf-kasan-gce
2020/08/23 01:04 net-old eeaac3634ee0 1da71ab0 .config console log report syz ci-upstream-net-this-kasan-gce
2020/08/01 18:38 bpf 69138b34a724 d895b3be .config console log report syz ci-upstream-bpf-kasan-gce
2020/08/01 18:08 net-old 69138b34a724 d895b3be .config console log report syz ci-upstream-net-this-kasan-gce
2020/08/23 01:44 net-next-old 1aecbf1861f8 1da71ab0 .config console log report syz ci-upstream-net-kasan-gce
2020/08/23 01:04 bpf-next 9c0f8cbdc0e9 1da71ab0 .config console log report syz ci-upstream-bpf-next-kasan-gce
2020/08/05 11:07 bpf-next da7955405fb2 b7129355 .config console log report syz ci-upstream-bpf-next-kasan-gce
2020/08/01 21:42 net-next-old 8f3f330da28e d895b3be .config console log report syz ci-upstream-net-kasan-gce
2020/08/24 02:00 linux-next 494d311a82bb cef5ae68 .config console log report syz ci-upstream-linux-next-kasan-gce-root
2020/08/06 03:13 linux-next 01830e6c042e 0487ea6f .config console log report syz ci-upstream-linux-next-kasan-gce-root
2020/12/13 07:47 bpf d9838b1d3928 bca53db9 .config console log report info ci-upstream-bpf-kasan-gce
2020/08/01 17:19 net-old 69138b34a724 d895b3be .config console log report ci-upstream-net-this-kasan-gce
* Struck through repros no longer work on HEAD.