syzbot


KASAN: null-ptr-deref Read in step_into

Status: upstream: reported C repro on 2024/04/06 11:08
Bug presence: origin:lts-only
[Documentation on labels]
Reported-by: syzbot+e7800a34320e23078af9@syzkaller.appspotmail.com
First crash: 27d, last: 12d
Bug presence (2)
Date Name Commit Repro Result
2024/04/06 linux-6.1.y (ToT) 347385861c50 C [report] KASAN: null-ptr-deref Read in step_into
2024/04/06 upstream (ToT) f2f80ac80987 C Didn't crash
Similar bugs (6)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-5.15 general protection fault in step_into origin:lts-only C 18 3d09h 20d 0/3 upstream: reported C repro on 2024/04/13 08:21
upstream BUG: unable to handle kernel paging request in step_into ntfs3 C error done 5 118d 485d 0/26 upstream: reported C repro on 2023/01/04 08:32
android-5-10 general protection fault in step_into C done 152 4d07h 355d 0/2 upstream: reported C repro on 2023/05/14 14:12
android-5-15 general protection fault in step_into origin:downstream C done 68 1d12h 355d 0/2 upstream: reported C repro on 2023/05/14 14:01
android-6-1 general protection fault in step_into origin:downstream C done 65 12d 355d 0/2 upstream: reported C repro on 2023/05/14 14:12
upstream general protection fault in step_into fs 1 1342d 1338d 0/26 auto-closed as invalid on 2020/11/28 01:59

Sample crash report:
loop0: detected capacity change from 0 to 4096
ntfs: volume version 3.1.
ntfs: (device loop0): ntfs_lookup(): ntfs_lookup_ino_by_name() failed with error code -67.
==================================================================
BUG: KASAN: null-ptr-deref in traverse_mounts fs/namei.c:1431 [inline]
BUG: KASAN: null-ptr-deref in handle_mounts fs/namei.c:1543 [inline]
BUG: KASAN: null-ptr-deref in step_into+0x15c/0xd1c fs/namei.c:1836
Read of size 4 at addr 0000000000000043 by task syz-executor884/4220

CPU: 1 PID: 4220 Comm: syz-executor884 Not tainted 6.1.84-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call trace:
 dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106
 print_report+0xe4/0x4c0 mm/kasan/report.c:398
 kasan_report+0xd4/0x130 mm/kasan/report.c:495
 kasan_check_range+0x264/0x2a4 mm/kasan/generic.c:189
 __kasan_check_read+0x2c/0x3c mm/kasan/shadow.c:31
 traverse_mounts fs/namei.c:1431 [inline]
 handle_mounts fs/namei.c:1543 [inline]
 step_into+0x15c/0xd1c fs/namei.c:1836
 walk_component+0x1d4/0x36c fs/namei.c:2004
 lookup_last fs/namei.c:2455 [inline]
 path_lookupat+0x13c/0x3d0 fs/namei.c:2479
 filename_lookup+0x1d4/0x4e0 fs/namei.c:2508
 user_path_at_empty+0x5c/0x84 fs/namei.c:2907
 user_path_at include/linux/namei.h:57 [inline]
 do_utimes_path fs/utimes.c:94 [inline]
 do_utimes+0x118/0x264 fs/utimes.c:144
 __do_sys_utimensat fs/utimes.c:163 [inline]
 __se_sys_utimensat fs/utimes.c:147 [inline]
 __arm64_sys_utimensat+0x144/0x238 fs/utimes.c:147
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206
 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
==================================================================
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000043
Mem abort info:
  ESR = 0x0000000096000021
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x21: alignment fault
Data abort info:
  ISV = 0, ISS = 0x00000021
  CM = 0, WnR = 0
user pgtable: 4k pages, 48-bit VAs, pgdp=0000000109d52000
[0000000000000043] pgd=080000011d7cf003, p4d=080000011d7cf003, pud=080000010bb9b003, pmd=0000000000000000
Internal error: Oops: 0000000096000021 [#1] PREEMPT SMP
Modules linked in:
CPU: 1 PID: 4220 Comm: syz-executor884 Tainted: G    B              6.1.84-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : traverse_mounts fs/namei.c:1431 [inline]
pc : handle_mounts fs/namei.c:1543 [inline]
pc : step_into+0x15c/0xd1c fs/namei.c:1836
lr : traverse_mounts fs/namei.c:1431 [inline]
lr : handle_mounts fs/namei.c:1543 [inline]
lr : step_into+0x15c/0xd1c fs/namei.c:1836
sp : ffff80001dca77a0
x29: ffff80001dca78c0 x28: dfff800000000000 x27: 1ffff00003b94f46
x26: 0000000000000043 x25: 0000000000000001 x24: ffff80001dca7860
x23: ffff80001dca7878 x22: ffff80001dca7a58 x21: 1ffff00003b94f0f
x20: 1ffff00003b94f4b x19: ffff80001dca7a20 x18: 1fffe0003686f976
x17: 0000000000000000 x16: ffff8000121561d4 x15: 0000000000000000
x14: 00000000ffffffff x13: 0000000000000001 x12: 0000000000000001
x11: 0000000000ff0100 x10: 0000000000000000 x9 : 0000000000000000
x8 : 0000000000000000 x7 : 0000000000000000 x6 : ffff800012220d5c
x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff8000081aebac
x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 traverse_mounts fs/namei.c:1431 [inline]
 handle_mounts fs/namei.c:1543 [inline]
 step_into+0x15c/0xd1c fs/namei.c:1836
 walk_component+0x1d4/0x36c fs/namei.c:2004
 lookup_last fs/namei.c:2455 [inline]
 path_lookupat+0x13c/0x3d0 fs/namei.c:2479
 filename_lookup+0x1d4/0x4e0 fs/namei.c:2508
 user_path_at_empty+0x5c/0x84 fs/namei.c:2907
 user_path_at include/linux/namei.h:57 [inline]
 do_utimes_path fs/utimes.c:94 [inline]
 do_utimes+0x118/0x264 fs/utimes.c:144
 __do_sys_utimensat fs/utimes.c:163 [inline]
 __se_sys_utimensat fs/utimes.c:147 [inline]
 __arm64_sys_utimensat+0x144/0x238 fs/utimes.c:147
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206
 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
Code: f9406ffa 52800081 aa1a03e0 97fbde04 (88dfff5a) 
---[ end trace 0000000000000000 ]---
----------------
Code disassembly (best guess):
   0:	f9406ffa 	ldr	x26, [sp, #216]
   4:	52800081 	mov	w1, #0x4                   	// #4
   8:	aa1a03e0 	mov	x0, x26
   c:	97fbde04 	bl	0xffffffffffef781c
* 10:	88dfff5a 	ldar	w26, [x26] <-- trapping instruction

Crashes (7):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/04/06 11:07 linux-6.1.y 347385861c50 ca620dd8 .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-6-1-kasan-arm64 KASAN: null-ptr-deref Read in step_into
2024/04/14 17:05 linux-6.1.y cd5d98c0556c c8349e48 .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-6-1-kasan general protection fault in step_into
2024/04/20 20:48 linux-6.1.y 6741e066ec76 af24b050 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: null-ptr-deref Read in step_into
2024/04/13 20:53 linux-6.1.y cd5d98c0556c c8349e48 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: null-ptr-deref Read in step_into
2024/04/15 06:58 linux-6.1.y cd5d98c0556c c8349e48 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan general protection fault in step_into
2024/04/14 22:18 linux-6.1.y cd5d98c0556c c8349e48 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan general protection fault in step_into
2024/04/14 05:34 linux-6.1.y cd5d98c0556c c8349e48 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan general protection fault in step_into
* Struck through repros no longer work on HEAD.