syzbot


general protection fault in update_sit_entry

Status: upstream: reported C repro on 2024/10/11 17:04
Bug presence: origin:lts-only
[Documentation on labels]
Reported-by: syzbot+731f6e02febb1c3865b4@syzkaller.appspotmail.com
First crash: 54d, last: 10d
Bug presence (2)
Date Name Commit Repro Result
2024/11/06 linux-5.15.y (ToT) 72244eab0dad C [report] BUG: unable to handle kernel paging request in update_sit_entry
2024/11/06 upstream (ToT) 2e1b3cc9d7f7 C Didn't crash
Similar bugs (3)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.14 general protection fault in update_sit_entry f2fs C 9 641d 754d 0/1 upstream: reported C repro on 2022/11/12 02:17
android-5-10 general protection fault in update_sit_entry C 4 5d19h 5d19h 0/2 upstream: reported C repro on 2024/11/29 11:40
android-5-15 general protection fault in update_sit_entry origin:downstream C 7 3d16h 11d 0/2 upstream: reported C repro on 2024/11/24 02:28
Last patch testing requests (1)
Created Duration User Patch Repo Result
2024/10/27 13:36 1h07m retest repro linux-5.15.y report log

Sample crash report:
F2FS-fs (loop0): Start checkpoint disabled!
F2FS-fs (loop0): Try to recover 1th superblock, ret: 0
F2FS-fs (loop0): Mounted with checkpoint version = 48b305e6
Unable to handle kernel paging request at virtual address dfff800000000006
Mem abort info:
  ESR = 0x0000000096000006
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x06: level 2 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000006
  CM = 0, WnR = 0
[dfff800000000006] address between user and kernel address ranges
Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP
Modules linked in:
CPU: 1 PID: 4026 Comm: syz-executor373 Not tainted 5.15.170-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : f2fs_test_and_set_bit fs/f2fs/f2fs.h:2768 [inline]
pc : update_sit_entry+0x52c/0xe88 fs/f2fs/segment.c:2305
lr : f2fs_block_unit_discard fs/f2fs/f2fs.h:4395 [inline]
lr : update_sit_entry+0x3e4/0xe88 fs/f2fs/segment.c:2304
sp : ffff80001d0d7050
x29: ffff80001d0d7090 x28: 1fffe0001ac0702d x27: dfff800000000000
x26: 0000000000000000 x25: 0000000000000006 x24: 0000000000000037
x23: 0000000000000004 x22: 000000000000000a x21: ffff0000d6038168
x20: ffff0000d6038000 x19: 0000000000000000 x18: 0000000000000000
x17: 0000000000000000 x16: ffff80000a429280 x15: 00000000ffffffff
x14: ffff0000cad951c0 x13: 0000000000ff0100 x12: ffffffffffffffff
x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000037
x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000080 x4 : 0000000000000000 x3 : ffff80000804605c
x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 f2fs_test_and_set_bit fs/f2fs/f2fs.h:2768 [inline]
 update_sit_entry+0x52c/0xe88 fs/f2fs/segment.c:2305
 f2fs_allocate_data_block+0xcb4/0x27d0 fs/f2fs/segment.c:3447
 __allocate_data_block+0x4a0/0x9bc fs/f2fs/data.c:1373
 f2fs_map_blocks+0x1298/0x31f8 fs/f2fs/data.c:1593
 expand_inode_data+0x474/0x858 fs/f2fs/file.c:1709
 f2fs_fallocate+0x350/0x898 fs/f2fs/file.c:1805
 vfs_fallocate+0x478/0x5b4 fs/open.c:308
 ioctl_preallocate+0x2a0/0x34c fs/ioctl.c:294
 do_vfs_ioctl+0x1d00/0x2a38 fs/ioctl.c:853
 __do_sys_ioctl fs/ioctl.c:872 [inline]
 __se_sys_ioctl fs/ioctl.c:860 [inline]
 __arm64_sys_ioctl+0xe4/0x1c8 fs/ioctl.c:860
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181
 el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:608
 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626
 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584
Code: f9400308 f85f03a9 8b090118 d343ff19 (38fb6b28) 
---[ end trace 67f06aa8c33aa623 ]---
----------------
Code disassembly (best guess):
   0:	f9400308 	ldr	x8, [x24]
   4:	f85f03a9 	ldur	x9, [x29, #-16]
   8:	8b090118 	add	x24, x8, x9
   c:	d343ff19 	lsr	x25, x24, #3
* 10:	38fb6b28 	ldrsb	w8, [x25, x27] <-- trapping instruction

Crashes (11):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/11/04 12:20 linux-5.15.y 72244eab0dad f00eed24 .config console log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-5-15-kasan-arm64 BUG: unable to handle kernel paging request in update_sit_entry
2024/10/12 22:07 linux-5.15.y 3a5928702e71 084d8178 .config console log report syz / log [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-5-15-kasan general protection fault in update_sit_entry
2024/11/25 05:29 linux-5.15.y 0a51d2d4527b 68da6d95 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan general protection fault in update_sit_entry
2024/11/19 02:58 linux-5.15.y 0a51d2d4527b 571351cb .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan general protection fault in update_sit_entry
2024/11/19 02:55 linux-5.15.y 0a51d2d4527b 571351cb .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan general protection fault in update_sit_entry
2024/11/19 02:53 linux-5.15.y 0a51d2d4527b 571351cb .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan general protection fault in update_sit_entry
2024/11/15 22:50 linux-5.15.y d98fd109f827 cfe3a04a .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan general protection fault in update_sit_entry
2024/10/11 17:03 linux-5.15.y 3a5928702e71 cd942402 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan general protection fault in update_sit_entry
2024/11/04 09:16 linux-5.15.y 72244eab0dad f00eed24 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan-arm64 BUG: unable to handle kernel paging request in update_sit_entry
2024/11/04 09:14 linux-5.15.y 72244eab0dad f00eed24 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan-arm64 BUG: unable to handle kernel paging request in update_sit_entry
2024/11/04 09:12 linux-5.15.y 72244eab0dad f00eed24 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan-arm64 BUG: unable to handle kernel paging request in update_sit_entry
* Struck through repros no longer work on HEAD.