Title | Replies (including bot) | Last reply |
---|---|---|
[syzbot] BUG: unable to handle kernel NULL pointer dereference in unlock_page (2) | 0 (2) | 2023/10/27 05:11 |
[PATCH] fs: ntfs3: fix possible NULL-ptr-deref in ni_readpage_cmpr() | 1 (1) | 2023/08/27 16:49 |
syzbot |
sign-in | mailing list | source | docs |
Title | Replies (including bot) | Last reply |
---|---|---|
[syzbot] BUG: unable to handle kernel NULL pointer dereference in unlock_page (2) | 0 (2) | 2023/10/27 05:11 |
[PATCH] fs: ntfs3: fix possible NULL-ptr-deref in ni_readpage_cmpr() | 1 (1) | 2023/08/27 16:49 |
Kernel | Title | Repro | Cause bisect | Fix bisect | Count | Last | Reported | Patched | Status |
---|---|---|---|---|---|---|---|---|---|
upstream | BUG: unable to handle kernel NULL pointer dereference in unlock_page mm fs | 1 | 1604d | 1604d | 15/28 | fixed on 2020/07/17 17:58 |
Created | Duration | User | Patch | Repo | Result |
---|---|---|---|---|---|
2023/08/24 06:27 | 23m | retest repro | git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci | OK log | |
2023/08/22 15:29 | 35m | retest repro | upstream | OK log |
Created | Duration | User | Patch | Repo | Result |
---|---|---|---|---|---|
2023/10/27 01:58 | 3h12m | bisect fix | upstream | OK (1) job log | |
2023/09/23 06:54 | 1h05m | bisect fix | upstream | OK (0) job log log | |
2023/07/19 08:58 | 5h02m | bisect fix | upstream | OK (0) job log log | |
2023/06/08 08:43 | 38m | bisect fix | upstream | OK (0) job log log | |
2023/05/08 21:12 | 1h16m | bisect fix | upstream | OK (0) job log log |
ksys_pread64 fs/read_write.c:665 [inline] __do_sys_pread64 fs/read_write.c:675 [inline] __se_sys_pread64 fs/read_write.c:672 [inline] __arm64_sys_pread64+0xbc/0x11c fs/read_write.c:672 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x140 arch/arm64/kernel/syscall.c:197 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:584 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008 Mem abort info: ESR = 0x0000000096000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault Data abort info: ISV = 0, ISS = 0x00000006 CM = 0, WnR = 0 user pgtable: 4k pages, 48-bit VAs, pgdp=000000010adf6000 [0000000000000008] pgd=0800000106a37003, p4d=0800000106a37003, pud=0800000106a36003, pmd=0000000000000000 Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 3072 Comm: syz-executor288 Not tainted 6.1.0-rc8-syzkaller-33330-ga5541c0811a0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : _compound_head include/linux/page-flags.h:253 [inline] pc : unlock_page+0x18/0xb8 mm/folio-compat.c:20 lr : unlock_page+0x18/0xb8 mm/folio-compat.c:19 sp : ffff80000ff1b910 x29: ffff80000ff1b910 x28: 0000000000000007 x27: fffffc000330a480 x26: 00000000ffffffff x25: 0000000000000000 x24: 0000000000000000 x23: 0000000000000001 x22: 0000000000000000 x21: 00000000fffffff4 x20: ffff0000c95b4880 x19: 0000000000000000 x18: 0000000000000073 x17: 6e69676e45206574 x16: ffff80000dbe6158 x15: ffff0000c4423480 x14: 0000000000000000 x13: 00000000ffffffff x12: ffff0000c4423480 x11: ff808000083f6804 x10: 0000000000000000 x9 : ffff8000083f6804 x8 : ffff0000c4423480 x7 : ffff80000c091ebc x6 : 0000000000000000 x5 : 0000000000000080 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: unlock_page+0x18/0xb8 mm/folio-compat.c:19 ni_readpage_cmpr+0x328/0x7cc fs/ntfs3/frecord.c:2139 ntfs_read_folio+0xd8/0x128 fs/ntfs3/inode.c:697 filemap_read_folio+0xc4/0x468 mm/filemap.c:2407 filemap_create_folio+0xc0/0x1b4 mm/filemap.c:2536 filemap_get_pages+0x388/0x598 mm/filemap.c:2588 filemap_read+0x14c/0x6f4 mm/filemap.c:2675 generic_file_read_iter+0x6c/0x25c mm/filemap.c:2821 ntfs_file_read_iter+0xe4/0x118 fs/ntfs3/file.c:853 call_read_iter include/linux/fs.h:2193 [inline] new_sync_read fs/read_write.c:389 [inline] vfs_read+0x2d4/0x448 fs/read_write.c:470 ksys_pread64 fs/read_write.c:665 [inline] __do_sys_pread64 fs/read_write.c:675 [inline] __se_sys_pread64 fs/read_write.c:672 [inline] __arm64_sys_pread64+0xbc/0x11c fs/read_write.c:672 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x140 arch/arm64/kernel/syscall.c:197 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:584 Code: a9014ff4 910003fd aa0003f3 97fac089 (f9400674) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: a9014ff4 stp x20, x19, [sp, #16] 4: 910003fd mov x29, sp 8: aa0003f3 mov x19, x0 c: 97fac089 bl 0xffffffffffeb0230 * 10: f9400674 ldr x20, [x19, #8] <-- trapping instruction
Time | Kernel | Commit | Syzkaller | Config | Log | Report | Syz repro | C repro | VM info | Assets (help?) | Manager | Title |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2022/12/15 03:23 | git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci | a5541c0811a0 | b18f0a64 | .config | console log | report | syz | C | [disk image] [vmlinux] [kernel image] [mounted in repro] | ci-upstream-gce-arm64 | BUG: unable to handle kernel NULL pointer dereference in unlock_page | |
2023/03/26 23:30 | upstream | 18940c888c85 | fbf0499a | .config | strace log | report | syz | C | [disk image] [vmlinux] [kernel image] [mounted in repro] | ci2-upstream-fs | general protection fault in unlock_page | |
2022/12/15 08:18 | upstream | e2ca6ba6ba01 | b18f0a64 | .config | strace log | report | syz | C | [disk image] [vmlinux] [kernel image] [mounted in repro] | ci2-upstream-fs | general protection fault in unlock_page | |
2023/01/27 11:05 | git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci | 1dc22be1f91f | 9dfcf09c | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-gce-arm64 | BUG: unable to handle kernel NULL pointer dereference in unlock_page | ||
2023/01/18 17:38 | git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci | 9598c377d828 | 42660d9e | .config | console log | report | info | ci-upstream-gce-arm64 | BUG: unable to handle kernel NULL pointer dereference in unlock_page | |||
2023/01/07 18:36 | git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci | ae87308093bc | 1dac8c7a | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-gce-arm64 | BUG: unable to handle kernel NULL pointer dereference in unlock_page | ||
2023/01/03 04:22 | git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci | a5541c0811a0 | ab32d508 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-gce-arm64 | BUG: unable to handle kernel NULL pointer dereference in unlock_page | ||
2022/12/15 03:09 | git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci | a5541c0811a0 | b18f0a64 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-gce-arm64 | BUG: unable to handle kernel NULL pointer dereference in unlock_page | ||
2023/04/04 19:54 | upstream | 148341f0a2f5 | 928dd177 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-kasan-gce-root | general protection fault in unlock_page | ||
2023/03/26 23:10 | upstream | 18940c888c85 | fbf0499a | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci2-upstream-fs | general protection fault in unlock_page | ||
2023/03/23 23:49 | upstream | 9fd6ba5420ba | f94b4a29 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci2-upstream-fs | general protection fault in unlock_page | ||
2023/03/17 23:05 | upstream | 38e04b3e4240 | 7939252e | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci2-upstream-fs | general protection fault in unlock_page | ||
2023/03/17 14:11 | upstream | 38e04b3e4240 | 18b58603 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-kasan-gce-root | general protection fault in unlock_page | ||
2023/02/27 07:11 | upstream | f3a2439f20d9 | ee50e71c | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci2-upstream-fs | general protection fault in unlock_page | ||
2023/04/02 05:26 | linux-next | 4b0f4525dc4f | f325deb0 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-linux-next-kasan-gce-root | general protection fault in unlock_page | ||
2023/03/03 19:10 | linux-next | 1acf39ef8f14 | f8902b57 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-linux-next-kasan-gce-root | general protection fault in unlock_page | ||
2023/03/28 17:17 | git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci | e8d018dd0257 | 48c74771 | .config | console log | report | info | ci-upstream-gce-arm64 | BUG: unable to handle kernel paging request in unlock_page | |||
2023/03/01 19:08 | git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci | 2ebd1fbb946d | f8902b57 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-gce-arm64 | BUG: unable to handle kernel paging request in unlock_page | ||
2023/02/27 22:24 | git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci | 2ebd1fbb946d | e792ae78 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-gce-arm64 | BUG: unable to handle kernel paging request in unlock_page |