syzbot


general protection fault in f2fs_release_page

Status: auto-obsoleted due to no activity on 2023/04/25 16:26
Subsystems: f2fs
[Documentation on labels]
Reported-by: syzbot+3ec18dd4fef0e1880217@syzkaller.appspotmail.com
First crash: 707d, last: 666d
Similar bugs (4)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-54 KASAN: use-after-free Read in f2fs_release_page f2fs 4 597d 697d 0/2 auto-obsoleted due to no activity on 2023/08/01 23:35
android-5-15 KASAN: use-after-free Read in f2fs_release_page f2fs 5 536d 685d 0/2 auto-obsoleted due to no activity on 2023/09/01 18:51
android-5-15 KASAN: use-after-free Read in f2fs_release_page (2) 1 326d 326d 0/2 auto-obsoleted due to no activity on 2024/03/30 07:06
android-5-10 KASAN: global-out-of-bounds Read in f2fs_release_page 2 536d 568d 0/2 auto-obsoleted due to no activity on 2023/09/02 15:33

Sample crash report:
general protection fault, probably for non-canonical address 0xdffffc00000000db: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x00000000000006d8-0x00000000000006df]
CPU: 0 PID: 18144 Comm: syz-executor.2 Not tainted 5.10.158-syzkaller-01202-gd31626cbea61 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
RIP: 0010:f2fs_release_page+0x328/0xb90 fs/f2fs/data.c:3775
Code: 00 4c 03 23 4c 89 e0 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 e7 e8 b8 eb 92 ff bb d8 06 00 00 49 03 1c 24 48 89 d8 48 c1 e8 03 <42> 8a 04 28 84 c0 0f 85 c9 07 00 00 44 8b 33 bb 00 00 00 40 be 00
RSP: 0018:ffffc90006c15a00 EFLAGS: 00010206
RAX: 00000000000000db RBX: 00000000000006d8 RCX: ffff88811c793b40
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc90006c15a48 R08: ffffffff82143630 R09: fffff94000887be1
R10: fffff94000887be1 R11: 1ffffd4000887be0 R12: ffff8881582bd3c8
R13: dffffc0000000000 R14: 8000000000002005 R15: ffffea000443df00
FS:  0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f96a3777000 CR3: 000000016de9e000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 try_to_release_page+0x1bd/0x210 mm/filemap.c:3664
 shrink_page_list+0x240a/0x3c60 mm/vmscan.c:1453
 shrink_inactive_list+0x38f/0xcd0 mm/vmscan.c:2016
 shrink_list mm/vmscan.c:2240 [inline]
 shrink_lruvec+0x499/0xa50 mm/vmscan.c:2558
 shrink_node_memcgs+0x44f/0x9a0 mm/vmscan.c:2749
 shrink_node+0xce1/0x1b30 mm/vmscan.c:2866
 shrink_zones+0x48d/0x960 mm/vmscan.c:3069
 do_try_to_free_pages+0x217/0xa50 mm/vmscan.c:3125
 try_to_free_mem_cgroup_pages+0x3a2/0x840 mm/vmscan.c:3443
 try_charge+0x4a5/0x1020 mm/memcontrol.c:2774
 __mem_cgroup_charge+0x12d/0x720 mm/memcontrol.c:6836
 mem_cgroup_charge include/linux/memcontrol.h:456 [inline]
 __add_to_page_cache_locked+0x2bc/0xb30 mm/filemap.c:854
 add_to_page_cache_lru+0x116/0x2b0 mm/filemap.c:948
 pagecache_get_page+0x62c/0x850 mm/filemap.c:1859
 grab_cache_page_write_begin+0x5c/0xa0 mm/filemap.c:3418
 ext4_da_write_begin+0x5c2/0xf10 fs/ext4/inode.c:3056
 generic_perform_write+0x309/0x5b0 mm/filemap.c:3468
 ext4_buffered_write_iter+0x47c/0x610 fs/ext4/file.c:272
 ext4_file_write_iter+0x192/0x1c70 fs/ext4/file.c:689
 __kernel_write+0x5ad/0x9d0 fs/read_write.c:550
 dump_emit fs/coredump.c:849 [inline]
 dump_user_range+0x25b/0x3b0 fs/coredump.c:902
 elf_core_dump+0x3156/0x3cd0 fs/binfmt_elf.c:2287
 do_coredump+0x1f7c/0x2dc0 fs/coredump.c:811
 get_signal+0xdde/0x1440 kernel/signal.c:2774
 arch_do_signal+0x8e/0x650 arch/x86/kernel/signal.c:805
 exit_to_user_mode_loop+0xa3/0xe0 kernel/entry/common.c:161
 exit_to_user_mode_prepare kernel/entry/common.c:191 [inline]
 irqentry_exit_to_user_mode+0x56/0x80 kernel/entry/common.c:279
 irqentry_exit+0x12/0x60 kernel/entry/common.c:367
 exc_page_fault+0x7e/0x1b0 arch/x86/mm/fault.c:1521
 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:571
RIP: 0033:0x7f6be3a56e97
Code: 38 5d 41 5c c3 48 8d 3d 8d ea 0b 00 e8 72 f8 ff ff 48 8d 3d 8f ea 0b 00 e8 66 f8 ff ff 66 0f 1f 44 00 00 55 89 fd 48 83 ec 10 <64> 8b 04 25 b4 ff ff ff 85 c0 74 2a 89 fe 31 c0 bf 3c 00 00 00 e8
RSP: 002b:00007f6be27ee260 EFLAGS: 00010206
RAX: 0000000000000000 RBX: 00007f6be3bdb050 RCX: 00007f6be3abb0d9
RDX: 00007f6be27ee280 RSI: 00007f6be27ee3b0 RDI: 000000000000000b
RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000
R13: 00007ffea8b0642f R14: 00007f6be280d300 R15: 0000000000022000
Modules linked in:
---[ end trace 1a6004f28ded4c84 ]---
RIP: 0010:f2fs_release_page+0x328/0xb90 fs/f2fs/data.c:3775
Code: 00 4c 03 23 4c 89 e0 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 e7 e8 b8 eb 92 ff bb d8 06 00 00 49 03 1c 24 48 89 d8 48 c1 e8 03 <42> 8a 04 28 84 c0 0f 85 c9 07 00 00 44 8b 33 bb 00 00 00 40 be 00
RSP: 0018:ffffc90006c15a00 EFLAGS: 00010206
RAX: 00000000000000db RBX: 00000000000006d8 RCX: ffff88811c793b40
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc90006c15a48 R08: ffffffff82143630 R09: fffff94000887be1
R10: fffff94000887be1 R11: 1ffffd4000887be0 R12: ffff8881582bd3c8
R13: dffffc0000000000 R14: 8000000000002005 R15: ffffea000443df00
FS:  0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055c58ab21000 CR3: 000000016de9e000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	00 4c 03 23          	add    %cl,0x23(%rbx,%rax,1)
   4:	4c 89 e0             	mov    %r12,%rax
   7:	48 c1 e8 03          	shr    $0x3,%rax
   b:	42 80 3c 28 00       	cmpb   $0x0,(%rax,%r13,1)
  10:	74 08                	je     0x1a
  12:	4c 89 e7             	mov    %r12,%rdi
  15:	e8 b8 eb 92 ff       	callq  0xff92ebd2
  1a:	bb d8 06 00 00       	mov    $0x6d8,%ebx
  1f:	49 03 1c 24          	add    (%r12),%rbx
  23:	48 89 d8             	mov    %rbx,%rax
  26:	48 c1 e8 03          	shr    $0x3,%rax
* 2a:	42 8a 04 28          	mov    (%rax,%r13,1),%al <-- trapping instruction
  2e:	84 c0                	test   %al,%al
  30:	0f 85 c9 07 00 00    	jne    0x7ff
  36:	44 8b 33             	mov    (%rbx),%r14d
  39:	bb 00 00 00 40       	mov    $0x40000000,%ebx
  3e:	be                   	.byte 0xbe

Crashes (3):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2022/12/14 20:17 android12-5.10-lts d31626cbea61 b18f0a64 .config console log report info ci2-android-5-10 general protection fault in f2fs_release_page
2023/01/25 16:23 android12-5.10-lts 416c4356f372 9dfcf09c .config console log report info ci2-android-5-10 KASAN: use-after-free Read in f2fs_release_page
2023/01/16 20:33 android12-5.10-lts 416c4356f372 a63719e7 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in f2fs_release_page
* Struck through repros no longer work on HEAD.