syzbot


BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page

Status: auto-closed as invalid on 2022/02/13 04:53
Subsystems: f2fs
[Documentation on labels]
Reported-by: syzbot+07ff38c9c93ca170de07@syzkaller.appspotmail.com
First crash: 1009d, last: 922d
Discussions (2)
Title Replies (including bot) Last reply
[syzbot] BUG: unable to handle kernel NULL pointer dereference in folio_mark_dirty 7 (8) 2021/12/12 09:15
[syzbot] BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page 0 (1) 2021/07/26 06:00
Similar bugs (2)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page (2) f2fs 26 552d 756d 0/26 auto-obsoleted due to no activity on 2023/02/17 11:21
linux-5.15 BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page origin:lts-only C 1 21h16m 16d 0/3 upstream: reported C repro on 2024/04/08 10:35

Sample crash report:
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 1ff30067 P4D 1ff30067 PUD 0 
Oops: 0010 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 6543 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:0x0
Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
RSP: 0018:ffffc90002c0f838 EFLAGS: 00010282
RAX: 1ffffffff14be5e3 RBX: 00000000000007ff RCX: ffffffff8a5f2f18
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea0002a2af40
RBP: ffffc90002c0fab0 R08: ffffffff81af9a2c R09: fffff940005455e9
R10: fffff940005455e9 R11: 0000000000000000 R12: ffff88806e055310
R13: 0000000000000001 R14: ffff88803ff28000 R15: ffffea0002a2af40
FS:  00005555561c4400(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 000000002e518000 CR4: 00000000003506e0
Call Trace:
 f2fs_update_meta_page+0x4b/0x380 fs/f2fs/segment.c:2465
 do_checkpoint fs/f2fs/checkpoint.c:1515 [inline]
 f2fs_write_checkpoint+0x2f7a/0x5220 fs/f2fs/checkpoint.c:1676
 f2fs_issue_checkpoint+0x361/0x4e0
 __sync_filesystem fs/sync.c:39 [inline]
 sync_filesystem+0x19e/0x200 fs/sync.c:67
 generic_shutdown_super+0x6e/0x2b0 fs/super.c:448
 kill_block_super+0x79/0xd0 fs/super.c:1395
 kill_f2fs_super+0x2f9/0x3c0 fs/f2fs/super.c:4444
 deactivate_locked_super+0xa7/0xf0 fs/super.c:335
 cleanup_mnt+0x462/0x510 fs/namespace.c:1137
 task_work_run+0x146/0x1c0 kernel/task_work.c:164
 tracehook_notify_resume include/linux/tracehook.h:189 [inline]
 exit_to_user_mode_loop kernel/entry/common.c:175 [inline]
 exit_to_user_mode_prepare+0x209/0x220 kernel/entry/common.c:207
 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
 syscall_exit_to_user_mode+0x2e/0x70 kernel/entry/common.c:300
 do_syscall_64+0x53/0xd0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f7172903ea7
Code: ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffcb7a79098 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f7172903ea7
RDX: 00007ffcb7a7916b RSI: 0000000000000002 RDI: 00007ffcb7a79160
RBP: 00007ffcb7a79160 R08: 00000000ffffffff R09: 00007ffcb7a78f30
R10: 00005555561c58e3 R11: 0000000000000246 R12: 00007f717295be05
R13: 00007ffcb7a7a220 R14: 00005555561c5810 R15: 00007ffcb7a7a260
Modules linked in:
CR2: 0000000000000000
---[ end trace 692c64bf89712b51 ]---
RIP: 0010:0x0
Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
RSP: 0018:ffffc90002c0f838 EFLAGS: 00010282
RAX: 1ffffffff14be5e3 RBX: 00000000000007ff RCX: ffffffff8a5f2f18
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea0002a2af40
RBP: ffffc90002c0fab0 R08: ffffffff81af9a2c R09: fffff940005455e9
R10: fffff940005455e9 R11: 0000000000000000 R12: ffff88806e055310
R13: 0000000000000001 R14: ffff88803ff28000 R15: ffffea0002a2af40
FS:  00005555561c4400(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 000000002e518000 CR4: 00000000003506e0

Crashes (8):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2021/10/16 04:52 upstream 8fe31e0995f0 0c5d9412 .config console log report info ci-upstream-kasan-gce-smack-root BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page
2021/10/02 05:17 upstream 53d5fc89d66a db0f5787 .config console log report info ci-upstream-kasan-gce-smack-root BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page
2021/09/28 17:39 upstream d33bec7b3dfa d82cb927 .config console log report info ci-upstream-kasan-gce-smack-root BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page
2021/09/06 16:07 upstream 0319b848b155 6ca60148 .config console log report info ci-upstream-kasan-gce-smack-root BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page
2021/08/30 04:22 upstream 90ac80dcd313 be2c130d .config console log report info ci-upstream-kasan-gce-smack-root BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page
2021/08/20 00:37 upstream f87d64319e6f b599f2fc .config console log report info ci-upstream-kasan-gce-smack-root BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page
2021/07/25 04:51 upstream 6498f6151825 4d1b57d4 .config console log report info ci-upstream-kasan-gce-smack-root BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page
2021/07/20 16:31 upstream 8cae8cd89f05 1b201b48 .config console log report info ci-upstream-kasan-gce-smack-root BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page
* Struck through repros no longer work on HEAD.