BUG: unable to handle kernel paging request in bpf_prog_kallsyms_add

6 views
Skip to first unread message

syzbot

unread,
Aug 21, 2019, 1:54:07 AM8/21/19
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: 45f092f9 Linux 4.14.139
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=13980da6600000
kernel config: https://syzkaller.appspot.com/x/.config?x=56ab4cf14cc8892d
dashboard link: https://syzkaller.appspot.com/bug?extid=0e08413b13da063292e3
compiler: gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+0e0841...@syzkaller.appspotmail.com

BUG: unable to handle kernel paging request at ffffc90005cce018
IP: bpf_prog_kallsyms_add+0xdd/0x7b0 kernel/bpf/core.c:397
PGD 21f832067 P4D 21f832067 PUD aa947067 PMD 86fed067 PTE 0
Oops: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 0 PID: 32614 Comm: syz-executor.5 Not tainted 4.14.139 #35
kobject: 'brif' (ffff8880a94a6300): kobject_cleanup, parent ffff88802ff45930
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
task: ffff888089852440 task.stack: ffff88808a338000
RIP: 0010:bpf_prog_kallsyms_add+0xdd/0x7b0 kernel/bpf/core.c:397
RSP: 0018:ffff88808a33fbc0 EFLAGS: 00010246
kobject: 'brif' (ffff8880a94a6300): auto cleanup kobject_del
RAX: dffffc0000000000 RBX: ffffc90005cce000 RCX: 00000000331e96b1
RDX: 1ffff92000b99c03 RSI: ffff888089852cc0 RDI: ffffc90005cce018
RBP: ffff88808a33fc00 R08: 00000000000069a6 R09: ffffffff88cb4170
R10: ffff888089852cc0 R11: ffff888089852440 R12: ffff8880a6012800
R13: 000000000000008e R14: ffff8880a6012800 R15: ffffffff8775e700
FS: 00007f3a1bc72700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc90005cce018 CR3: 0000000081b52000 CR4: 00000000001426f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
kobject: 'brif' (ffff8880a94a6300): calling ktype release
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
bpf_prog_load+0x78f/0xf30 kernel/bpf/syscall.c:1082
kobject: (ffff8880a94a6300): dynamic_kobj_release
kobject: 'brif': free name
SYSC_bpf kernel/bpf/syscall.c:1503 [inline]
SyS_bpf+0x431/0x38f3 kernel/bpf/syscall.c:1469
kobject: 'loop2' (ffff8880a4a769a0): kobject_uevent_env
kobject: 'loop2' (ffff8880a4a769a0): fill_kobj_path: path
= '/devices/virtual/block/loop2'
do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x459829
RSP: 002b:00007f3a1bc71c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829
RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000005
RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3a1bc726d4
R13: 00000000004bfc7c R14: 00000000004d1938 R15: 00000000ffffffff
Code: b6 04 48 8d 7b 18 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03
80 3c 02 00 0f 85 50 06 00 00 48 b8 00 00 00 00 00 fc ff df <4c> 8b 63 18
49 8d 5c 24 48 48 89 da 48 c1 ea 03 80 3c 02 00 0f
RIP: bpf_prog_kallsyms_add+0xdd/0x7b0 kernel/bpf/core.c:397 RSP:
ffff88808a33fbc0
CR2: ffffc90005cce018
---[ end trace 054b2d54f79f9065 ]---


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Dec 18, 2019, 11:54:06 PM12/18/19
to syzkaller...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages