syzbot


BUG: unable to handle kernel NULL pointer dereference in unlock_page (2)

Status: auto-obsoleted due to no activity on 2024/01/01 08:00
Subsystems: ntfs3
[Documentation on labels]
Reported-by: syzbot+9d014e6e0df70d97c103@syzkaller.appspotmail.com
First crash: 723d, last: 440d
Cause bisection: failed (error log, bisect log)
  
Fix bisection: fixed by (bisect log) :
commit 013ff63b649475f0ee134e2c8d0c8e65284ede50
Author: Konstantin Komarov <almaz.alexandrovich@paragon-software.com>
Date: Fri Jun 30 12:17:02 2023 +0000

  fs/ntfs3: Add more attributes checks in mi_enum_attr()

  
Discussions (2)
Title Replies (including bot) Last reply
[syzbot] BUG: unable to handle kernel NULL pointer dereference in unlock_page (2) 0 (2) 2023/10/27 05:11
[PATCH] fs: ntfs3: fix possible NULL-ptr-deref in ni_readpage_cmpr() 1 (1) 2023/08/27 16:49
Similar bugs (1)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream BUG: unable to handle kernel NULL pointer dereference in unlock_page mm fs 1 1635d 1635d 15/28 fixed on 2020/07/17 17:58
Last patch testing requests (2)
Created Duration User Patch Repo Result
2023/08/24 06:27 23m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci OK log
2023/08/22 15:29 35m retest repro upstream OK log
Fix bisection attempts (5)
Created Duration User Patch Repo Result
2023/10/27 01:58 3h12m bisect fix upstream OK (1) job log
2023/09/23 06:54 1h05m bisect fix upstream OK (0) job log log
2023/07/19 08:58 5h02m bisect fix upstream OK (0) job log log
2023/06/08 08:43 38m bisect fix upstream OK (0) job log log
2023/05/08 21:12 1h16m bisect fix upstream OK (0) job log log

Sample crash report:
 ksys_pread64 fs/read_write.c:665 [inline]
 __do_sys_pread64 fs/read_write.c:675 [inline]
 __se_sys_pread64 fs/read_write.c:672 [inline]
 __arm64_sys_pread64+0xbc/0x11c fs/read_write.c:672
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall arch/arm64/kernel/syscall.c:52 [inline]
 el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x48/0x140 arch/arm64/kernel/syscall.c:197
 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:584
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008
Mem abort info:
  ESR = 0x0000000096000006
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x06: level 2 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000006
  CM = 0, WnR = 0
user pgtable: 4k pages, 48-bit VAs, pgdp=000000010adf6000
[0000000000000008] pgd=0800000106a37003, p4d=0800000106a37003, pud=0800000106a36003, pmd=0000000000000000
Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP
Modules linked in:
CPU: 1 PID: 3072 Comm: syz-executor288 Not tainted 6.1.0-rc8-syzkaller-33330-ga5541c0811a0 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : _compound_head include/linux/page-flags.h:253 [inline]
pc : unlock_page+0x18/0xb8 mm/folio-compat.c:20
lr : unlock_page+0x18/0xb8 mm/folio-compat.c:19
sp : ffff80000ff1b910
x29: ffff80000ff1b910 x28: 0000000000000007 x27: fffffc000330a480
x26: 00000000ffffffff x25: 0000000000000000 x24: 0000000000000000
x23: 0000000000000001 x22: 0000000000000000 x21: 00000000fffffff4
x20: ffff0000c95b4880 x19: 0000000000000000 x18: 0000000000000073
x17: 6e69676e45206574 x16: ffff80000dbe6158 x15: ffff0000c4423480
x14: 0000000000000000 x13: 00000000ffffffff x12: ffff0000c4423480
x11: ff808000083f6804 x10: 0000000000000000 x9 : ffff8000083f6804
x8 : ffff0000c4423480 x7 : ffff80000c091ebc x6 : 0000000000000000
x5 : 0000000000000080 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 unlock_page+0x18/0xb8 mm/folio-compat.c:19
 ni_readpage_cmpr+0x328/0x7cc fs/ntfs3/frecord.c:2139
 ntfs_read_folio+0xd8/0x128 fs/ntfs3/inode.c:697
 filemap_read_folio+0xc4/0x468 mm/filemap.c:2407
 filemap_create_folio+0xc0/0x1b4 mm/filemap.c:2536
 filemap_get_pages+0x388/0x598 mm/filemap.c:2588
 filemap_read+0x14c/0x6f4 mm/filemap.c:2675
 generic_file_read_iter+0x6c/0x25c mm/filemap.c:2821
 ntfs_file_read_iter+0xe4/0x118 fs/ntfs3/file.c:853
 call_read_iter include/linux/fs.h:2193 [inline]
 new_sync_read fs/read_write.c:389 [inline]
 vfs_read+0x2d4/0x448 fs/read_write.c:470
 ksys_pread64 fs/read_write.c:665 [inline]
 __do_sys_pread64 fs/read_write.c:675 [inline]
 __se_sys_pread64 fs/read_write.c:672 [inline]
 __arm64_sys_pread64+0xbc/0x11c fs/read_write.c:672
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall arch/arm64/kernel/syscall.c:52 [inline]
 el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x48/0x140 arch/arm64/kernel/syscall.c:197
 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:584
Code: a9014ff4 910003fd aa0003f3 97fac089 (f9400674) 
---[ end trace 0000000000000000 ]---
----------------
Code disassembly (best guess):
   0:	a9014ff4 	stp	x20, x19, [sp, #16]
   4:	910003fd 	mov	x29, sp
   8:	aa0003f3 	mov	x19, x0
   c:	97fac089 	bl	0xffffffffffeb0230
* 10:	f9400674 	ldr	x20, [x19, #8] <-- trapping instruction

Crashes (19):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2022/12/15 03:23 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a5541c0811a0 b18f0a64 .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-gce-arm64 BUG: unable to handle kernel NULL pointer dereference in unlock_page
2023/03/26 23:30 upstream 18940c888c85 fbf0499a .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs general protection fault in unlock_page
2022/12/15 08:18 upstream e2ca6ba6ba01 b18f0a64 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs general protection fault in unlock_page
2023/01/27 11:05 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 1dc22be1f91f 9dfcf09c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: unable to handle kernel NULL pointer dereference in unlock_page
2023/01/18 17:38 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 9598c377d828 42660d9e .config console log report info ci-upstream-gce-arm64 BUG: unable to handle kernel NULL pointer dereference in unlock_page
2023/01/07 18:36 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci ae87308093bc 1dac8c7a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: unable to handle kernel NULL pointer dereference in unlock_page
2023/01/03 04:22 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a5541c0811a0 ab32d508 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: unable to handle kernel NULL pointer dereference in unlock_page
2022/12/15 03:09 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a5541c0811a0 b18f0a64 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: unable to handle kernel NULL pointer dereference in unlock_page
2023/04/04 19:54 upstream 148341f0a2f5 928dd177 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in unlock_page
2023/03/26 23:10 upstream 18940c888c85 fbf0499a .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in unlock_page
2023/03/23 23:49 upstream 9fd6ba5420ba f94b4a29 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in unlock_page
2023/03/17 23:05 upstream 38e04b3e4240 7939252e .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in unlock_page
2023/03/17 14:11 upstream 38e04b3e4240 18b58603 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in unlock_page
2023/02/27 07:11 upstream f3a2439f20d9 ee50e71c .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in unlock_page
2023/04/02 05:26 linux-next 4b0f4525dc4f f325deb0 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root general protection fault in unlock_page
2023/03/03 19:10 linux-next 1acf39ef8f14 f8902b57 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root general protection fault in unlock_page
2023/03/28 17:17 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci e8d018dd0257 48c74771 .config console log report info ci-upstream-gce-arm64 BUG: unable to handle kernel paging request in unlock_page
2023/03/01 19:08 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2ebd1fbb946d f8902b57 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: unable to handle kernel paging request in unlock_page
2023/02/27 22:24 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2ebd1fbb946d e792ae78 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: unable to handle kernel paging request in unlock_page
* Struck through repros no longer work on HEAD.