syzbot


general protection fault in run_is_mapped_full

Status: upstream: reported C repro on 2024/07/13 06:10
Subsystems: ntfs3
[Documentation on labels]
Reported-by: syzbot+9af29acd8f27fbce94bc@syzkaller.appspotmail.com
First crash: 68d, last: 5h45m
Cause bisection: failed (error log, bisect log)
  
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [ntfs3?] general protection fault in run_is_mapped_full 0 (6) 2024/09/02 13:00
Last patch testing requests (5)
Created Duration User Patch Repo Result
2024/08/23 16:04 55m almaz.alexandrovich@paragon-software.com https://github.com/Paragon-Software-Group/linux-ntfs3.git master OK log
2024/07/15 09:44 16m almaz.alexandrovich@paragon-software.com https://github.com/Paragon-Software-Group/linux-ntfs3.git master report log
2024/07/15 09:07 16m almaz.alexandrovich@paragon-software.com https://github.com/Paragon-Software-Group/linux-ntfs3.git eb95678ee930d67d79fc83f0a700245ae7230455 report log
2024/07/15 09:05 17m almaz.alexandrovich@paragon-software.com https://github.com/Paragon-Software-Group/linux-ntfs3.git 2cbbd96820255fff4f0ad1533197370c9ccc570b report log
2024/09/02 13:00 almaz.alexandrovich@paragon-software.com patch https://github.com/Paragon-Software-Group/linux-ntfs3.git master pending

Sample crash report:
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 1 UID: 0 PID: 5175 Comm: syz-executor472 Not tainted 6.10.0-next-20240719-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
RIP: 0010:run_lookup fs/ntfs3/run.c:39 [inline]
RIP: 0010:run_is_mapped_full+0x35/0x480 fs/ntfs3/run.c:173
Code: 41 54 53 48 83 ec 30 41 89 d4 41 89 f6 49 89 fd 49 bf 00 00 00 00 00 fc ff df e8 b6 56 a5 fe 49 8d 5d 08 48 89 d8 48 c1 e8 03 <42> 80 3c 38 00 74 08 48 89 df e8 0c c4 0c ff 48 8b 1b 31 ff 48 89
RSP: 0018:ffffc9000362f758 EFLAGS: 00010202
RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff88807cad0000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc9000362fb18 R08: ffffffff82e4ffda R09: ffffffff82ee5c79
R10: 0000000000000002 R11: ffff88807cad0000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000
FS:  00007faa644076c0(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007faa5c098001 CR3: 000000002d666000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 attr_load_runs fs/ntfs3/attrib.c:69 [inline]
 attr_set_size+0xfdf/0x4300 fs/ntfs3/attrib.c:502
 ntfs_create_inode+0x2604/0x3880 fs/ntfs3/inode.c:1716
 ntfs_symlink+0xde/0x110 fs/ntfs3/namei.c:197
 vfs_symlink+0x137/0x2e0 fs/namei.c:4572
 do_symlinkat+0x222/0x3a0 fs/namei.c:4598
 __do_sys_symlink fs/namei.c:4619 [inline]
 __se_sys_symlink fs/namei.c:4617 [inline]
 __x64_sys_symlink+0x7a/0x90 fs/namei.c:4617
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7faa64472e49
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 b1 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007faa64407218 EFLAGS: 00000246 ORIG_RAX: 0000000000000058
RAX: ffffffffffffffda RBX: 00007faa6451a6d8 RCX: 00007faa64472e49
RDX: 00007faa6444c3e6 RSI: 0000000020000cc0 RDI: 0000000020000dc0
RBP: 00007faa6451a6d0 R08: 00007ffd2e41a847 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007faa644e67d0
R13: 0030656c69662f2e R14: 652e79726f6d656d R15: 00007ffd2e41a848
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:run_lookup fs/ntfs3/run.c:39 [inline]
RIP: 0010:run_is_mapped_full+0x35/0x480 fs/ntfs3/run.c:173
Code: 41 54 53 48 83 ec 30 41 89 d4 41 89 f6 49 89 fd 49 bf 00 00 00 00 00 fc ff df e8 b6 56 a5 fe 49 8d 5d 08 48 89 d8 48 c1 e8 03 <42> 80 3c 38 00 74 08 48 89 df e8 0c c4 0c ff 48 8b 1b 31 ff 48 89
RSP: 0018:ffffc9000362f758 EFLAGS: 00010202
RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff88807cad0000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc9000362fb18 R08: ffffffff82e4ffda R09: ffffffff82ee5c79
R10: 0000000000000002 R11: ffff88807cad0000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000
FS:  00007faa644076c0(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007faa5c098001 CR3: 000000002d666000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	41 54                	push   %r12
   2:	53                   	push   %rbx
   3:	48 83 ec 30          	sub    $0x30,%rsp
   7:	41 89 d4             	mov    %edx,%r12d
   a:	41 89 f6             	mov    %esi,%r14d
   d:	49 89 fd             	mov    %rdi,%r13
  10:	49 bf 00 00 00 00 00 	movabs $0xdffffc0000000000,%r15
  17:	fc ff df
  1a:	e8 b6 56 a5 fe       	call   0xfea556d5
  1f:	49 8d 5d 08          	lea    0x8(%r13),%rbx
  23:	48 89 d8             	mov    %rbx,%rax
  26:	48 c1 e8 03          	shr    $0x3,%rax
* 2a:	42 80 3c 38 00       	cmpb   $0x0,(%rax,%r15,1) <-- trapping instruction
  2f:	74 08                	je     0x39
  31:	48 89 df             	mov    %rbx,%rdi
  34:	e8 0c c4 0c ff       	call   0xff0cc445
  39:	48 8b 1b             	mov    (%rbx),%rbx
  3c:	31 ff                	xor    %edi,%edi
  3e:	48                   	rex.W
  3f:	89                   	.byte 0x89

Crashes (37):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/07/20 17:40 linux-next 41c196e567fb b88348e9 .config console log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-linux-next-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/13 06:09 linux-next 3fe121b62282 eaeb5c15 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-linux-next-kasan-gce-root general protection fault in run_is_mapped_full
2024/08/27 23:52 upstream 3ec3f5fc4a91 6c853ff9 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in run_is_mapped_full
2024/08/24 23:39 upstream d2bafcf224f3 d7d32352 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in run_is_mapped_full
2024/08/24 07:33 upstream 60f0560f53e3 d7d32352 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in run_is_mapped_full
2024/08/21 20:27 upstream b311c1b497e5 db5852f9 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in run_is_mapped_full
2024/08/10 08:02 upstream afdab700f65e 6f4edef4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in run_is_mapped_full
2024/07/27 15:41 upstream 3a7e02c040b1 46eb10b7 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in run_is_mapped_full
2024/07/27 00:12 upstream 2f8c4f506285 46eb10b7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/27 00:12 upstream 2f8c4f506285 46eb10b7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/26 21:18 upstream 2f8c4f506285 3f86dfed .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/26 15:22 upstream 1722389b0d86 3f86dfed .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in run_is_mapped_full
2024/07/25 17:32 upstream c33ffdb70cc6 32fcf98f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/25 17:32 upstream c33ffdb70cc6 32fcf98f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/25 07:58 upstream c33ffdb70cc6 b24754ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/25 07:56 upstream c33ffdb70cc6 b24754ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/25 07:56 upstream c33ffdb70cc6 b24754ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/24 17:14 upstream 786c8248dbd3 d1a1b0ca .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in run_is_mapped_full
2024/07/24 13:16 upstream 786c8248dbd3 57b2edb1 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in run_is_mapped_full
2024/07/24 03:32 upstream 28bbe4ea686a 57b2edb1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/23 23:47 upstream 28bbe4ea686a e50e8da5 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in run_is_mapped_full
2024/07/23 21:50 upstream 28bbe4ea686a 708c10c4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/23 21:50 upstream 28bbe4ea686a 708c10c4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/23 13:36 upstream 66ebbdfdeb09 e50e8da5 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in run_is_mapped_full
2024/07/23 11:38 upstream 66ebbdfdeb09 708c10c4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in run_is_mapped_full
2024/07/23 06:55 upstream 66ebbdfdeb09 708c10c4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in run_is_mapped_full
2024/07/25 15:53 linux-next 864b1099d16f 32fcf98f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/24 16:23 linux-next 9ec6ec93f2c1 b24754ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/24 05:11 linux-next 9ec6ec93f2c1 57b2edb1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/19 23:47 linux-next 41c196e567fb b88348e9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/19 00:33 linux-next 73399b58e5e5 ee4e11c8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/18 07:23 linux-next 73399b58e5e5 03114f55 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/17 08:46 linux-next 797012914d2d 215bec2d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/16 11:07 linux-next 4f40be61af99 b66b37bd .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/16 11:07 linux-next 4f40be61af99 b66b37bd .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root general protection fault in run_is_mapped_full
2024/07/01 15:37 linux-next 74564adfd352 b294e901 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root general protection fault in run_is_mapped_full
2024/09/07 17:45 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci df54f4a16f82 9750182a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: unable to handle kernel paging request in run_is_mapped_full
* Struck through repros no longer work on HEAD.