panic: attempt to execute user address ADDR in supervisor mode

1 view
Skip to first unread message

syzbot

unread,
Sep 15, 2019, 1:53:07 PM9/15/19
to syzkaller-o...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: e2edd184 Fix line breaking in no-fill mode (.Bd -unfilled/..
git tree: openbsd
console output: https://syzkaller.appspot.com/x/log.txt?x=164fe4b5600000
kernel config: https://syzkaller.appspot.com/x/.config?x=d0fe83f82fe104d4
dashboard link: https://syzkaller.appspot.com/bug?extid=b3f06955201e0771cb62

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+b3f069...@syzkaller.appspotmail.com

panic: attempt to execute user address 0x40000000 in supervisor mode
Stopped at db_enter+0x18: addq $0x8,%rsp
TID PID UID PRFLAGS PFLAGS CPU COMMAND
*139223 96265 0 0 0x4000000 0 syz-executor.1
db_enter() at db_enter+0x18 sys/arch/amd64/amd64/db_interface.c:398
panic() at panic+0x15c sys/kern/subr_prf.c:207
pageflttrap() at pageflttrap+0x3eb
kerntrap(ffff80001594c050) at kerntrap+0xdb sys/arch/amd64/amd64/trap.c:287
alltraps_kern_meltdown(6,ffff800014909000,fffffd802ecb3a18,10,ffff80000005b410,ffff80001594c2b8)
at
alltraps_kern_meltdown+0x7b
__kernel_end_phys(b,ffff80001594c218,83,ffff80001594c2b8,0,b) at 0x40000000
rt_match(fffffd803a41db70,0,1,0) at rt_match+0xbe rt_clone
sys/net/route.c:266 [inline]
rt_match(fffffd803a41db70,0,1,0) at rt_match+0xbe sys/net/route.c:242
in_pcbselsrc(ffff80001594c3d0,fffffd802e36a120,fffffd803a41daf0) at
in_pcbselsrc+0x219 sys/netinet/in_pcb.c:934
udp_output(fffffd803a41daf0,fffffd802ec71700,fffffd802e36a100,0) at
udp_output+0x5ab sys/netinet/udp_usrreq.c:937
sosend(fffffd8038adaad8,fffffd802e36a100,ffff80001594c530,0,0,0) at
sosend+0x63d sys/kern/uipc_socket.c:524
sendit(ffff800016b32290,3,ffff80001594c610,0,ffff80001594c6f0) at
sendit+0x52b sys/kern/uipc_syscalls.c:662
sys_sendto(ffff800016b32290,ffff80001594c6a8,ffff80001594c6f0) at
sys_sendto+0x80 sys/kern/uipc_syscalls.c:527
syscall(ffff80001594c770) at syscall+0x507 sys/arch/amd64/amd64/trap.c:555
Xsyscall(6,0,ffffffffffffffd8,0,6,36aa2cd4010) at Xsyscall+0x128
end of kernel
end trace frame: 0x36d6afc4390, count: 1
https://www.openbsd.org/ddb.html describes the minimum info required in bug
reports. Insufficient info makes it difficult to find and fix bugs.
ddb>
ddb> set $lines = 0
ddb> set $maxwidth = 0
ddb> show panic
attempt to execute user address 0x40000000 in supervisor mode
ddb> trace
db_enter() at db_enter+0x18 sys/arch/amd64/amd64/db_interface.c:398
panic() at panic+0x15c sys/kern/subr_prf.c:207
pageflttrap() at pageflttrap+0x3eb
kerntrap(ffff80001594c050) at kerntrap+0xdb sys/arch/amd64/amd64/trap.c:287
alltraps_kern_meltdown(6,ffff800014909000,fffffd802ecb3a18,10,ffff80000005b410,ffff80001594c2b8)
at
alltraps_kern_meltdown+0x7b
__kernel_end_phys(b,ffff80001594c218,83,ffff80001594c2b8,0,b) at 0x40000000
rt_match(fffffd803a41db70,0,1,0) at rt_match+0xbe rt_clone
sys/net/route.c:266 [inline]
rt_match(fffffd803a41db70,0,1,0) at rt_match+0xbe sys/net/route.c:242
in_pcbselsrc(ffff80001594c3d0,fffffd802e36a120,fffffd803a41daf0) at
in_pcbselsrc+0x219 sys/netinet/in_pcb.c:934
udp_output(fffffd803a41daf0,fffffd802ec71700,fffffd802e36a100,0) at
udp_output+0x5ab sys/netinet/udp_usrreq.c:937
sosend(fffffd8038adaad8,fffffd802e36a100,ffff80001594c530,0,0,0) at
sosend+0x63d sys/kern/uipc_socket.c:524
sendit(ffff800016b32290,3,ffff80001594c610,0,ffff80001594c6f0) at
sendit+0x52b sys/kern/uipc_syscalls.c:662
sys_sendto(ffff800016b32290,ffff80001594c6a8,ffff80001594c6f0) at
sys_sendto+0x80 sys/kern/uipc_syscalls.c:527
syscall(ffff80001594c770) at syscall+0x507 sys/arch/amd64/amd64/trap.c:555
Xsyscall(6,0,ffffffffffffffd8,0,6,36aa2cd4010) at Xsyscall+0x128
end of kernel
end trace frame: 0x36d6afc4390, count: -14
ddb> show registers
rdi 0xffffffff814de0a7 db_enter+0x17
rsi 0x274c __ALIGN_SIZE+0x174c
rbp 0xffff80001594bec0
rbx 0xffff80001594bf70
rdx 0x274d __ALIGN_SIZE+0x174d
rcx 0xffff800014909000
rax 0xffff800014909000
r8 0xffff80001594be80
r9 0x1
r10 0xffff800000a629c0
r11 0xcf7561411b279afb
r12 0x3000000008
r13 0xffff80001594bed0
r14 0x100
r15 0x1
rip 0xffffffff814de0a8 db_enter+0x18
cs 0x8
rflags 0x246
rsp 0xffff80001594beb0
ss 0x10
db_enter+0x18: addq $0x8,%rsp
ddb> show proc
PROC (syz-executor.1) pid=139223 stat=onproc
flags process=0 proc=4000000<THREAD>
pri=68, usrpri=68, nice=20
forw=0xffffffffffffffff, list=0xffff800016b338c8,0xffffffff8258b9c8
process=0xffff8000148a2a38 user=0xffff800015947000,
vmspace=0xfffffd803f014440
estcpu=36, cpticks=0, pctcpu=0.0
user=0, sys=0, intr=0
ddb> ps
PID TID PPID UID S FLAGS WAIT COMMAND
96265 473046 36546 0 2 0 syz-executor.1
*96265 139223 36546 0 7 0x4000000 syz-executor.1
58133 412337 83889 0 2 0 syz-executor.0
58133 437151 83889 0 3 0x4000080 ttyin syz-executor.0
36546 233479 90653 0 3 0x82 nanosleep syz-executor.1
83889 1032 90653 0 3 0x82 nanosleep syz-executor.0
82109 292014 1 0 3 0x100083 ttyopn getty
80813 308324 0 0 3 0x14200 bored sosplice
90653 380177 87647 0 3 0x82 thrsleep syz-fuzzer
90653 54862 87647 0 3 0x4000082 thrsleep syz-fuzzer
90653 242781 87647 0 3 0x4000082 thrsleep syz-fuzzer
90653 320555 87647 0 3 0x4000082 thrsleep syz-fuzzer
90653 128497 87647 0 3 0x4000082 kqread syz-fuzzer
90653 244723 87647 0 3 0x4000082 thrsleep syz-fuzzer
90653 392151 87647 0 3 0x4000082 thrsleep syz-fuzzer
90653 214505 87647 0 3 0x4000082 thrsleep syz-fuzzer
87647 436891 48764 0 3 0x10008a pause ksh
48764 41438 42054 0 3 0x92 select sshd
42054 262898 1 0 3 0x80 select sshd
28117 215364 50018 73 3 0x100090 kqread syslogd
50018 239016 1 0 3 0x100082 netio syslogd
15013 61788 1 77 3 0x100090 poll dhclient
84881 98907 1 0 3 0x80 poll dhclient
9383 297225 0 0 2 0x14200 zerothread
27805 232621 0 0 3 0x14200 aiodoned aiodoned
13288 503628 0 0 3 0x14200 syncer update
21619 137140 0 0 3 0x14200 cleaner cleaner
80381 252619 0 0 3 0x14200 reaper reaper
86351 261761 0 0 3 0x14200 pgdaemon pagedaemon
69486 254242 0 0 3 0x14200 bored crynlk
45164 315060 0 0 3 0x14200 bored crypto
5310 384226 0 0 3 0x40014200 acpi0 acpi0
39226 227636 0 0 3 0x14200 bored softnet
30202 320904 0 0 3 0x14200 bored systqmp
64610 414561 0 0 3 0x14200 bored systq
77601 500891 0 0 3 0x40014200 bored softclock
1559 202268 0 0 3 0x40014200 idle0
53234 46347 0 0 3 0x14200 bored smr
1 376583 0 0 3 0x82 wait init
0 0 -1 0 3 0x10200 scheduler swapper
ddb> show all locks
No such command
ddb> show malloc
Type InUse MemUse HighUse Limit Requests Type Lim Kern Lim
devbuf 9600 6401K 7799K 78643K 38618 0 0
pcb 13 10K 12K 78643K 1644 0 0
rtable 132 12K 13K 78643K 4445 0 0
ifaddr 99 26K 30K 78643K 1529 0 0
counters 19 16K 16K 78643K 19 0 0
ioctlops 0 0K 2K 78643K 406 0 0
iov 0 0K 32K 78643K 1363 0 0
mount 1 1K 1K 78643K 1 0 0
vnodes 1211 76K 77K 78643K 12918 0 0
UFS quota 1 32K 32K 78643K 1 0 0
UFS mount 5 36K 36K 78643K 5 0 0
shm 2 1K 9K 78643K 547 0 0
VM map 2 0K 0K 78643K 10 0 0
sem 12 1K 1K 78643K 1572 0 0
dirhash 12 2K 2K 78643K 12 0 0
ACPI 1793 195K 288K 78643K 12645 0 0
file desc 6 17K 25K 78643K 12223 0 0
sigio 0 0K 0K 78643K 165 0 0
proc 50 38K 63K 78643K 3505 0 0
subproc 32 2K 2K 78643K 888 0 0
NFS srvsock 1 0K 0K 78643K 1 0 0
NFS daemon 1 16K 16K 78643K 1 0 0
ip_moptions 0 0K 0K 78643K 1125 0 0
in_multi 38 2K 2K 78643K 901 0 0
ether_multi 1 0K 0K 78643K 52 0 0
mrt 1 0K 0K 78643K 51 0 0
ISOFS mount 1 32K 32K 78643K 1 0 0
MSDOSFS mount 1 16K 16K 78643K 1 0 0
ttys 162 715K 715K 78643K 162 0 0
exec 0 0K 1K 78643K 1939 0 0
pfkey data 0 0K 4K 78643K 8 0 0
pagedep 1 8K 8K 78643K 1 0 0
inodedep 1 32K 32K 78643K 1 0 0
newblk 1 0K 0K 78643K 1 0 0
VM swap 7 26K 26K 78643K 7 0 0
UVM amap 151 24K 32K 78643K 31564 0 0
UVM aobj 130 5K 5K 78643K 337 0 0
memdesc 1 4K 4K 78643K 1 0 0
crypto data 1 1K 1K 78643K 1 0 0
ip6_options 0 0K 1K 78643K 1657 0 0
NDP 21 0K 0K 78643K 476 0 0
temp 234 3537K 4177K 78643K 232528 0 0
kqueue 0 0K 0K 78643K 119 0 0
SYN cache 2 16K 16K 78643K 2 0 0
ddb> show all pools
Name Size Requests Fail Releases Pgreq Pgrel Npage Hiwat Minpg Maxpg
Idle
arp 64 98 0 91 1 0 1 1 0
8 0
rtpcb 80 738 0 736 1 0 1 1 0
8 0
rtentry 112 566 0 516 2 0 2 2 0
8 0
unpcb 120 5128 0 5097 4 2 2 3 0
8 0
syncache 264 32 0 32 14 13 1 1 0
8 1
sackhl 24 4 0 4 2 2 0 1 0
8 0
tcpqe 32 6316 0 6316 4 3 1 1 0
8 1
tcpcb 544 2999 0 2995 3 2 1 2 0
8 0
ipq 40 30 0 30 13 13 0 1 0
8 0
ipqe 40 66 0 66 13 13 0 1 0
8 0
inpcb 280 18670 0 18659 24 22 2 13 0
8 1
rttmr 72 8 0 8 7 7 0 1 0
8 0
nd6 48 98 0 94 1 0 1 1 0
8 0
pkpcb 40 66 0 66 21 21 0 1 0
8 0
swfcl 56 4 0 0 1 0 1 1 0
8 0
ppxss 1128 232 0 232 51 50 1 1 0
8 1
art_heap8 4096 1 0 0 1 0 1 1 0
8 0
art_heap4 256 2479 0 2222 35 18 17 17 0
8 0
art_table 32 2480 0 2222 3 0 3 3 0
8 0
art_node 16 548 0 503 1 0 1 1 0
8 0
sysvmsgpl 40 19 0 16 1 0 1 1 0
8 0
semupl 112 1 0 1 1 1 0 1 0
8 0
semapl 112 1570 0 1560 1 0 1 1 0
8 0
shmpl 112 335 0 207 4 0 4 4 0
8 0
dirhash 1024 17 0 0 3 0 3 3 0
8 0
dino1pl 128 20375 0 18975 46 0 46 46 0
8 0
ffsino 240 20375 0 18975 83 0 83 83 0
8 0
nchpl 144 40674 0 39005 65 2 63 63 0
8 1
uvmvnodes 72 7370 0 0 134 0 134 134 0
8 0
vnodes 208 7370 0 0 388 0 388 388 0
8 0
namei 1024 213804 0 213804 4 3 1 1 0
8 1
vmpool 520 8 0 8 4 4 0 1 0
8 0
scsiplug 64 25 0 25 18 18 0 1 0
8 0
scxspl 192 113789 0 113789 28 27 1 7 0
8 1
plimitpl 152 1001 0 994 1 0 1 1 0
8 0
sigapl 432 12261 0 12247 2 0 2 2 0
8 0
futexpl 56 443528 0 443528 3 2 1 1 0
8 1
knotepl 112 3981 0 3962 9 8 1 3 0
8 0
kqueuepl 104 20399 0 20397 2 1 1 2 0
8 0
pipepl 112 15336 0 15317 51 49 2 3 0
8 0
fdescpl 424 12262 0 12247 2 0 2 2 0
8 0
filepl 120 187490 0 187390 71 66 5 11 0
8 1
lockfpl 104 16206 0 16205 1 0 1 1 0
8 0
lockfspl 48 7219 0 7218 1 0 1 1 0
8 0
sessionpl 112 84 0 74 1 0 1 1 0
8 0
pgrppl 48 205 0 195 1 0 1 1 0
8 0
ucredpl 96 64587 0 64579 1 0 1 1 0
8 0
zombiepl 144 12250 0 12250 3 2 1 1 0
8 1
processpl 864 12280 0 12250 4 0 4 4 0
8 0
procpl 632 28331 0 28292 12 8 4 5 0
8 0
sosppl 128 159 0 159 44 44 0 1 0
8 0
sockpl 384 25009 0 24967 54 48 6 23 0
8 0
mcl64k 65536 1298 0 1298 128 127 1 33 0
8 1
mcl16k 16384 171 0 171 53 52 1 1 0
8 1
mcl12k 12288 433 0 433 22 21 1 1 0
8 1
mcl9k 9216 107 0 107 48 47 1 1 0
8 1
mcl8k 8192 619 0 619 11 10 1 1 0
8 1
mcl4k 4096 2700 0 2700 3 2 1 1 0
8 1
mcl2k2 2112 124 0 124 47 46 1 1 0
8 1
mcl2k 2048 82666 0 82621 25 18 7 17 0
8 0
mtagpl 80 681 0 671 8 7 1 2 0
8 0
mbufpl 256 223038 0 222881 82 71 11 28 0
8 0
bufpl 256 36656 0 29286 462 0 462 462 0
8 0
anonpl 16 1187677 0 1174175 376 309 67 77 0
62 0
amapchunkpl 152 58501 0 58370 124 117 7 16 0
158 0
amappl16 192 63761 0 62920 397 354 43 55 0
8 0
amappl15 184 795 0 795 8 8 0 1 0
8 0
amappl14 176 2622 0 2618 2 1 1 1 0
8 0
amappl13 168 2558 0 2556 10 9 1 1 0
8 0
amappl12 160 1187 0 1182 1 0 1 1 0
8 0
amappl11 152 1363 0 1351 1 0 1 1 0
8 0
amappl10 144 1867 0 1866 9 8 1 1 0
8 0
amappl9 136 2442 0 2436 1 0 1 1 0
8 0
amappl8 128 2005 0 1945 4 1 3 3 0
8 1
amappl7 120 2099 0 2091 1 0 1 1 0
8 0
amappl6 112 1242 0 1226 1 0 1 1 0
8 0
amappl5 104 1923 0 1912 1 0 1 1 0
8 0
amappl4 96 11875 0 11844 1 0 1 1 0
8 0
amappl3 88 3937 0 3931 1 0 1 1 0
8 0
amappl2 80 97065 0 96984 4 2 2 3 0
8 0
amappl1 72 236026 0 235607 28 19 9 20 0
8 0
amappl 80 29373 0 29331 2 0 2 2 0
84 0
dma4096 4096 1 0 1 1 1 0 1 0
8 0
dma256 256 6 0 6 1 1 0 1 0
8 0
dma64 64 259 0 259 1 1 0 1 0
8 0
dma32 32 7 0 7 1 1 0 1 0
8 0
dma16 16 17 0 17 1 1 0 1 0
8 0
aobjpl 64 336 0 207 3 0 3 3 0
8 0
uaddrrnd 24 12270 0 12247 1 0 1 1 0
8 0
uaddrbest 32 2 0 0 1 0 1 1 0
8 0
uaddr 24 12270 0 12247 1 0 1 1 0
8 0
vmmpekpl 168 98455 0 98429 2 0 2 2 0
8 0
vmmpepl 168 1459216 0 1457175 791 673 118 122 0 357
23
vmsppl 272 12261 0 12247 5 4 1 2 0
8 0
pdppl 4096 24546 0 24510 6 1 5 6 0
8 0
pvpl 32 3350736 0 3333986 913 742 171 293 0 265
19
pmappl 200 12269 0 12255 1 0 1 1 0
8 0
extentpl 40 41 0 26 1 0 1 1 0
8 0
phpool 112 906 0 310 19 0 19 19 0
8 0


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

Anton Lindqvist

unread,
Sep 16, 2019, 3:21:54 AM9/16/19
to syzbot, syzkaller-o...@googlegroups.com
#syz dup: panic: attempt to execute user address 0x0 in supervisor mode
Reply all
Reply to author
Forward
0 new messages