syzbot |
sign-in | mailing list | source | docs |
🐞 Open [994] 🐞 Fixed [3924] 🐞 Invalid [8510] 📈 Kernel Health 📈 Bug Lifetimes 📈 Fuzzing 📈 Crashes |
Kernel | Title | Repro | Cause bisect | Fix bisect | Count | Last | Reported | Patched | Status |
---|---|---|---|---|---|---|---|---|---|
upstream | BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page (2) | 15 | 27d | 137d | 0/23 | upstream: reported on 2022/03/30 17:42 |
BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0010) - not-present page PGD 1ff30067 P4D 1ff30067 PUD 0 Oops: 0010 [#1] PREEMPT SMP KASAN CPU: 1 PID: 6543 Comm: syz-executor.0 Not tainted 5.15.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:0x0 Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6. RSP: 0018:ffffc90002c0f838 EFLAGS: 00010282 RAX: 1ffffffff14be5e3 RBX: 00000000000007ff RCX: ffffffff8a5f2f18 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea0002a2af40 RBP: ffffc90002c0fab0 R08: ffffffff81af9a2c R09: fffff940005455e9 R10: fffff940005455e9 R11: 0000000000000000 R12: ffff88806e055310 R13: 0000000000000001 R14: ffff88803ff28000 R15: ffffea0002a2af40 FS: 00005555561c4400(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffd6 CR3: 000000002e518000 CR4: 00000000003506e0 Call Trace: f2fs_update_meta_page+0x4b/0x380 fs/f2fs/segment.c:2465 do_checkpoint fs/f2fs/checkpoint.c:1515 [inline] f2fs_write_checkpoint+0x2f7a/0x5220 fs/f2fs/checkpoint.c:1676 f2fs_issue_checkpoint+0x361/0x4e0 __sync_filesystem fs/sync.c:39 [inline] sync_filesystem+0x19e/0x200 fs/sync.c:67 generic_shutdown_super+0x6e/0x2b0 fs/super.c:448 kill_block_super+0x79/0xd0 fs/super.c:1395 kill_f2fs_super+0x2f9/0x3c0 fs/f2fs/super.c:4444 deactivate_locked_super+0xa7/0xf0 fs/super.c:335 cleanup_mnt+0x462/0x510 fs/namespace.c:1137 task_work_run+0x146/0x1c0 kernel/task_work.c:164 tracehook_notify_resume include/linux/tracehook.h:189 [inline] exit_to_user_mode_loop kernel/entry/common.c:175 [inline] exit_to_user_mode_prepare+0x209/0x220 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x2e/0x70 kernel/entry/common.c:300 do_syscall_64+0x53/0xd0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f7172903ea7 Code: ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffcb7a79098 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f7172903ea7 RDX: 00007ffcb7a7916b RSI: 0000000000000002 RDI: 00007ffcb7a79160 RBP: 00007ffcb7a79160 R08: 00000000ffffffff R09: 00007ffcb7a78f30 R10: 00005555561c58e3 R11: 0000000000000246 R12: 00007f717295be05 R13: 00007ffcb7a7a220 R14: 00005555561c5810 R15: 00007ffcb7a7a260 Modules linked in: CR2: 0000000000000000 ---[ end trace 692c64bf89712b51 ]--- RIP: 0010:0x0 Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6. RSP: 0018:ffffc90002c0f838 EFLAGS: 00010282 RAX: 1ffffffff14be5e3 RBX: 00000000000007ff RCX: ffffffff8a5f2f18 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea0002a2af40 RBP: ffffc90002c0fab0 R08: ffffffff81af9a2c R09: fffff940005455e9 R10: fffff940005455e9 R11: 0000000000000000 R12: ffff88806e055310 R13: 0000000000000001 R14: ffff88803ff28000 R15: ffffea0002a2af40 FS: 00005555561c4400(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffd6 CR3: 000000002e518000 CR4: 00000000003506e0
Manager | Time | Kernel | Commit | Syzkaller | Config | Log | Report | Syz repro | C repro | VM info | Title |
---|---|---|---|---|---|---|---|---|---|---|---|
ci-upstream-kasan-gce-smack-root | 2021/10/16 04:52 | upstream | 8fe31e0995f0 | 0c5d9412 | .config | log | report | info | BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page | ||
ci-upstream-kasan-gce-smack-root | 2021/10/02 05:17 | upstream | 53d5fc89d66a | db0f5787 | .config | log | report | info | BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page | ||
ci-upstream-kasan-gce-smack-root | 2021/09/28 17:39 | upstream | d33bec7b3dfa | d82cb927 | .config | log | report | info | BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page | ||
ci-upstream-kasan-gce-smack-root | 2021/09/06 16:07 | upstream | 0319b848b155 | 6ca60148 | .config | log | report | info | BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page | ||
ci-upstream-kasan-gce-smack-root | 2021/08/30 04:22 | upstream | 90ac80dcd313 | be2c130d | .config | log | report | info | BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page | ||
ci-upstream-kasan-gce-smack-root | 2021/08/20 00:37 | upstream | f87d64319e6f | b599f2fc | .config | log | report | info | BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page | ||
ci-upstream-kasan-gce-smack-root | 2021/07/25 04:51 | upstream | 6498f6151825 | 4d1b57d4 | .config | log | report | info | BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page | ||
ci-upstream-kasan-gce-smack-root | 2021/07/20 16:31 | upstream | 8cae8cd89f05 | 1b201b48 | .config | log | report | info | BUG: unable to handle kernel NULL pointer dereference in f2fs_update_meta_page |