syzbot


BUG: unable to handle kernel NULL pointer dereference in __pfx_cmp_ex_search

Status: closed as invalid on 2024/09/13 10:29
First crash: 174d, last: 173d

Sample crash report:
BUG: kernel NULL pointer dereference, address: 0000000000000001
==================================================================
kernel tried to execute NX-protected page - exploit attempt? (uid: -251)
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 8000000029ece067 P4D 8000000029ece067 PUD 2dfd8067 PMD 0 
Oops: Oops: 0010 [#1] PREEMPT SMP KASAN PTI
CPU: 0 UID: 0 PID: 5974 Comm: syz.2.58 Not tainted 6.11.0-rc4-next-20240822-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: 0010:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0018:ffffc900075dd8c0 EFLAGS: 00010093
RAX: 0000000000000001 RBX: 1ffff92000ebbb20 RCX: ffff888022bd3c00
RDX: 0000000000000000 RSI: ffffffff81417194 RDI: ffffffff81430823
RBP: 0000000000000093 R08: 0000000000000001 R09: 0000000000000010
R10: 0000000000000000 R11: dffffc0000000000 R12: ffffffff8e4cb1f4
R13: ffffc900075dd940 R14: 0000000000000001 R15: 000000000000000c
FS:  0000555556eae500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 000000002b2be000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 __pfx_cmp_ex_search+0x10/0x10
 lookup_address_in_pgd_attr+0x2c3/0x800
 lookup_address_in_pgd_attr+0x2c3/0x800
 </TASK>
Modules linked in:
CR2: 0000000000000000
---[ end trace 0000000000000000 ]---
RIP: 0010:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0018:ffffc900075dd8c0 EFLAGS: 00010093
RAX: 0000000000000001 RBX: 1ffff92000ebbb20 RCX: ffff888022bd3c00
RDX: 0000000000000000 RSI: ffffffff81417194 RDI: ffffffff81430823
RBP: 0000000000000093 R08: 0000000000000001 R09: 0000000000000010
R10: 0000000000000000 R11: dffffc0000000000 R12: ffffffff8e4cb1f4
R13: ffffc900075dd940 R14: 0000000000000001 R15: 000000000000000c
FS:  0000555556eae500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 000000002b2be000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400

Crashes (2):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/08/22 18:17 linux-next 6a7917c89f21 295a4b50 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root BUG: unable to handle kernel NULL pointer dereference in __pfx_cmp_ex_search
2024/08/23 11:23 linux-next c79c85875f1a ce8a9099 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root BUG: spinlock recursion in __pfx_cmp_ex_search
* Struck through repros no longer work on HEAD.