[v6.1] BUG: unable to handle kernel paging request in ir_raw_event_store_with_filter

1 view
Skip to first unread message

syzbot

unread,
Apr 29, 2023, 7:42:41 PM4/29/23
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: ca1c9012c941 Linux 6.1.26
git tree: linux-6.1.y
console output: https://syzkaller.appspot.com/x/log.txt?x=14c33e1c280000
kernel config: https://syzkaller.appspot.com/x/.config?x=f95cba4715d63af9
dashboard link: https://syzkaller.appspot.com/bug?extid=6e664bfda2d7e484dd0b
compiler: Debian clang version 15.0.7, GNU ld (GNU Binutils for Debian) 2.35.2
userspace arch: arm64
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=16accda4280000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=15a9b964280000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/b6b74e769ec1/disk-ca1c9012.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/31fce9ce6f18/vmlinux-ca1c9012.xz
kernel image: https://storage.googleapis.com/syzbot-assets/cd73b5bb5ef4/Image-ca1c9012.gz.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+6e664b...@syzkaller.appspotmail.com

rc rc0: IR event FIFO is full!
rc rc0: IR event FIFO is full!
rc rc0: IR event FIFO is full!
rc rc0: IR event FIFO is full!
Unable to handle kernel paging request at virtual address dfff80000000021b
KASAN: probably user-memory-access in range [0x00000000000010d8-0x00000000000010df]
Mem abort info:
ESR = 0x0000000096000006
EC = 0x25: DABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x06: level 2 translation fault
Data abort info:
ISV = 0, ISS = 0x00000006
CM = 0, WnR = 0
[dfff80000000021b] address between user and kernel address ranges
Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP
Modules linked in:
CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.1.26-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : ir_raw_event_store_with_filter+0x354/0x7ac drivers/media/rc/rc-ir-raw.c:184
lr : ir_raw_event_store drivers/media/rc/rc-ir-raw.c:81 [inline]
lr : ir_raw_event_store_with_filter+0x464/0x7ac drivers/media/rc/rc-ir-raw.c:183
sp : ffff800008017580
x29: ffff8000080175a0 x28: 0000000000000200 x27: 1fffe0001a9ee4ba
x26: dfff800000000000 x25: 0000000000000200 x24: 00000000000010d8
x23: 00000000000010d8 x22: 0000000000000080 x21: ffff800008017740
x20: ffff0000d4f725d0 x19: ffff0000d4f72000 x18: ffff800008016d60
x17: 0000000000000000 x16: ffff8000120e0c54 x15: 0000000000000100
x14: 0000000000000000 x13: 0000000000000001 x12: 0000000000000001
x11: ff8080000834483c x10: 0000000000000000 x9 : 2a2ec750d6100600
x8 : 000000000000021b x7 : 0000000000000001 x6 : 0000000000000001
x5 : ffff800008016d78 x4 : ffff800015672960 x3 : ffff800008585158
x2 : 0000000000000001 x1 : 0000000000000101 x0 : 000000000000001e
Call trace:
ir_raw_event_store_with_filter+0x354/0x7ac drivers/media/rc/rc-ir-raw.c:184
sz_push drivers/media/rc/streamzap.c:104 [inline]
sz_push_full_space drivers/media/rc/streamzap.c:132 [inline]
sz_push_half_space drivers/media/rc/streamzap.c:138 [inline]
streamzap_callback+0x668/0xee4 drivers/media/rc/streamzap.c:190
__usb_hcd_giveback_urb+0x2e0/0x504 drivers/usb/core/hcd.c:1671
usb_hcd_giveback_urb+0x108/0x3f8 drivers/usb/core/hcd.c:1754
dummy_timer+0x66c/0x26cc drivers/usb/gadget/udc/dummy_hcd.c:1988
call_timer_fn+0x1c0/0xa1c kernel/time/timer.c:1474
expire_timers kernel/time/timer.c:1519 [inline]
__run_timers+0x554/0x718 kernel/time/timer.c:1790
run_timer_softirq+0x7c/0x114 kernel/time/timer.c:1803
__do_softirq+0x30c/0xea0 kernel/softirq.c:571
____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:79
call_on_irq_stack+0x2c/0x54 arch/arm64/kernel/entry.S:889
do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:84
invoke_softirq kernel/softirq.c:452 [inline]
__irq_exit_rcu+0x28c/0x534 kernel/softirq.c:650
irq_exit_rcu+0x14/0x84 kernel/softirq.c:662
__el1_irq arch/arm64/kernel/entry-common.c:472 [inline]
el1_interrupt+0x38/0x68 arch/arm64/kernel/entry-common.c:486
el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:491
el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:577
arch_local_irq_enable+0xc/0x18 arch/arm64/include/asm/irqflags.h:35
default_idle_call+0x68/0xdc kernel/sched/idle.c:109
cpuidle_idle_call kernel/sched/idle.c:191 [inline]
do_idle+0x1e0/0x514 kernel/sched/idle.c:303
cpu_startup_entry+0x24/0x28 kernel/sched/idle.c:400
secondary_start_kernel+0x19c/0x1c4 arch/arm64/kernel/smp.c:265
__secondary_switched+0xb0/0xb4 arch/arm64/kernel/head.S:618
Code: 38fa6908 35001428 d343fee8 f94002b6 (387a6908)
---[ end trace 0000000000000000 ]---
----------------
Code disassembly (best guess):
0: 38fa6908 ldrsb w8, [x8, x26]
4: 35001428 cbnz w8, 0x288
8: d343fee8 lsr x8, x23, #3
c: f94002b6 ldr x22, [x21]
* 10: 387a6908 ldrb w8, [x8, x26] <-- trapping instruction


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

If the bug is already fixed, let syzbot know by replying with:
#syz fix: exact-commit-title

If you want syzbot to run the reproducer, reply with:
#syz test: git://repo/address.git branch-or-commit-hash
If you attach or paste a git patch, syzbot will apply it before testing.

If you want to change bug's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)

If the bug is a duplicate of another bug, reply with:
#syz dup: exact-subject-of-another-report

If you want to undo deduplication, reply with:
#syz undup
Reply all
Reply to author
Forward
0 new messages