syzbot


general protection fault in do_xmote

Status: upstream: reported C repro on 2022/10/01 14:25
Subsystems: cluster (incorrect?)
Reported-by: syzbot+ececff266234ba40fe13@syzkaller.appspotmail.com
First crash: 180d, last: 56d

Cause bisection: failed (error log, bisect log)

Fix bisection: fixed by (bisect log) [merge commit]:
commit b7ee88128242b3460b0016a7e42207c9799f73b7
Author: Linus Torvalds <torvalds@linux-foundation.org>
Date: Wed Feb 22 22:00:53 2023 +0000

  Merge tag 'gfs2-v6.2-rc5-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/gfs2/linux-gfs2


Sample crash report:
Unable to handle kernel NULL pointer dereference at virtual address 00000000000004b8
Mem abort info:
  ESR = 0x0000000096000006
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x06: level 2 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000006
  CM = 0, WnR = 0
user pgtable: 4k pages, 48-bit VAs, pgdp=000000010e483000
[00000000000004b8] pgd=080000010ba99003, p4d=080000010ba99003, pud=080000010bad2003, pmd=0000000000000000
Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 50 Comm: kworker/0:1H Not tainted 6.1.0-rc8-syzkaller-33330-ga5541c0811a0 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022
Workqueue: glock_workqueue glock_work_func
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : is_system_glock fs/gfs2/glock.c:725 [inline]
pc : do_xmote+0x6f4/0xa98 fs/gfs2/glock.c:835
lr : do_xmote+0x6f0/0xa98 fs/gfs2/glock.c:832
sp : ffff80000f723cb0
x29: ffff80000f723cb0 x28: ffff80000d2fb000 x27: 0000000000000003
x26: ffff80000c216c20 x25: ffff0000cadca000 x24: ffff0000cadca000
x23: 0000000000000012 x22: 0000000000005044 x21: 0000000000000000
x20: 0000000000000000 x19: ffff0000c9aac4d0 x18: 00000000000000c0
x17: ffff80000dda8198 x16: ffff80000dbe6158 x15: ffff0000c108cec0
x14: 00000000000000b8 x13: 00000000ffffffff x12: ffff0000c108cec0
x11: ff8080000927557c x10: 0000000000000000 x9 : ffff80000927557c
x8 : 0000000000000000 x7 : ffff8000095a18c8 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000001 x1 : 0000000000004000 x0 : 0000000000000000
Call trace:
 is_system_glock fs/gfs2/glock.c:723 [inline]
 do_xmote+0x6f4/0xa98 fs/gfs2/glock.c:835
 run_queue+0x294/0x3c4 fs/gfs2/glock.c:914
 glock_work_func+0x190/0x288 fs/gfs2/glock.c:1082
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863
Code: 97c0c52d 17fffefa 97c0c52b f9438f08 (f9425d08) 
---[ end trace 0000000000000000 ]---
----------------
Code disassembly (best guess):
   0:	97c0c52d 	bl	0xffffffffff0314b4
   4:	17fffefa 	b	0xfffffffffffffbec
   8:	97c0c52b 	bl	0xffffffffff0314b4
   c:	f9438f08 	ldr	x8, [x24, #1816]
* 10:	f9425d08 	ldr	x8, [x8, #1208] <-- trapping instruction

Crashes (16):
Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets Title
ci-upstream-gce-arm64 2022/12/13 12:16 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a5541c0811a0 67be1ae7 .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] BUG: unable to handle kernel NULL pointer dereference in do_xmote
ci2-upstream-fs 2022/12/13 11:41 upstream 764822972d64 67be1ae7 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] general protection fault in do_xmote
ci2-upstream-fs 2023/01/31 20:51 upstream 22b8077d0fce b68fb8d6 .config console log report info [disk image] [vmlinux] [kernel image] general protection fault in do_xmote
ci2-upstream-fs 2022/12/13 10:57 upstream 764822972d64 67be1ae7 .config console log report info [disk image] [vmlinux] [kernel image] general protection fault in do_xmote
ci2-upstream-fs 2022/12/09 13:21 upstream f3e8416619ce 1034e5fa .config console log report info [disk image] [vmlinux] [kernel image] general protection fault in do_xmote
ci2-upstream-fs 2022/11/01 06:50 upstream b229b6ca5abb a1d8560a .config console log report info [disk image] [vmlinux] [kernel image] general protection fault in do_xmote
ci2-upstream-fs 2022/10/19 19:41 upstream 493ffd6605b2 b31320fc .config console log report info [disk image] [vmlinux] general protection fault in do_xmote
ci2-upstream-fs 2022/10/02 21:54 upstream a962b54e162c feb56351 .config console log report info [disk image] [vmlinux] general protection fault in do_xmote
ci2-upstream-fs 2022/10/02 08:31 upstream b357fd1c2afc feb56351 .config console log report info [disk image] [vmlinux] general protection fault in do_xmote
ci-qemu-upstream 2022/09/29 10:20 upstream c3e0e1e23c70 a41a2080 .config console log report info general protection fault in do_xmote
ci-qemu-upstream-386 2022/11/03 02:18 upstream 200204f56f3b b7c72847 .config console log report info general protection fault in do_xmote
ci-qemu-upstream-386 2022/11/01 13:08 upstream 200204f56f3b a1d8560a .config console log report info general protection fault in do_xmote
ci-qemu-upstream-386 2022/11/01 00:25 upstream 200204f56f3b 43f72c2d .config console log report info general protection fault in do_xmote
ci-qemu-upstream-386 2022/10/28 08:56 upstream 200204f56f3b 8168b69e .config console log report info general protection fault in do_xmote
ci-qemu-upstream-386 2022/10/26 02:29 upstream 4dc12f37a8e9 1984aebd .config console log report info general protection fault in do_xmote
ci-qemu-upstream-386 2022/09/29 10:27 upstream c3e0e1e23c70 a41a2080 .config console log report info general protection fault in do_xmote
* Struck through repros no longer work on HEAD.