general protection fault in ext4_xattr_set_entry

14 views
Skip to first unread message

syzbot

unread,
Dec 12, 2022, 2:21:51 PM12/12/22
to syzkaller-a...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 7048384c9872 Revert "net: macb: Specify PHY PM management ..
git tree: android13-5.15-lts
console+strace: https://syzkaller.appspot.com/x/log.txt?x=11eb3913880000
kernel config: https://syzkaller.appspot.com/x/.config?x=e2b117a8214c7c29
dashboard link: https://syzkaller.appspot.com/bug?extid=2dacb8f015bf1420155f
compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=133ed3eb880000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=1348423b880000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/7c86dd44b0fe/disk-7048384c.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/d8642546089a/vmlinux-7048384c.xz
kernel image: https://storage.googleapis.com/syzbot-assets/e31d92b43c74/bzImage-7048384c.xz
mounted in repro: https://storage.googleapis.com/syzbot-assets/8127c5549cd2/mount_0.gz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+2dacb8...@syzkaller.appspotmail.com

EXT4-fs (loop0): mounted filesystem without journal. Opts: nouser_xattr,acl,debug_want_extra_isize=0x0000000000000080,lazytime,nobh,quota,,errors=continue. Quota mode: writeback.
general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
CPU: 1 PID: 410 Comm: syz-executor331 Not tainted 5.15.77-syzkaller-00764-g7048384c9872 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
RIP: 0010:ext4_xattr_inode_create fs/ext4/xattr.c:1429 [inline]
RIP: 0010:ext4_xattr_inode_lookup_create fs/ext4/xattr.c:1537 [inline]
RIP: 0010:ext4_xattr_set_entry+0x276a/0x3950 fs/ext4/xattr.c:1665
Code: 8b 1b 48 83 c3 68 48 89 d8 48 c1 e8 03 42 80 3c 38 00 74 08 48 89 df e8 e4 01 b4 ff 48 8b 1b 48 83 c3 30 48 89 d8 48 c1 e8 03 <42> 80 3c 38 00 74 08 48 89 df e8 c7 01 b4 ff 4c 8b 23 48 8b 44 24
RSP: 0018:ffffc9000033efa0 EFLAGS: 00010206
RAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff8881069b3b40
RDX: dffffc0000000000 RSI: 0000000000000000 RDI: ffffffff868f1994
RBP: ffffc9000033f230 R08: ffffffff816d6a71 R09: ffffed1020e77803
R10: ffffed1020e77803 R11: 1ffff11020e77802 R12: ffffc9000033f154
R13: ffffffff868f1940 R14: ffff88811cdd4020 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7712701498 CR3: 000000010d5b3000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
ext4_xattr_block_set+0x8f8/0x3820 fs/ext4/xattr.c:1971
ext4_xattr_move_to_block fs/ext4/xattr.c:2603 [inline]
ext4_xattr_make_inode_space fs/ext4/xattr.c:2672 [inline]
ext4_expand_extra_isize_ea+0x1591/0x1f30 fs/ext4/xattr.c:2764
__ext4_expand_extra_isize+0x29e/0x3d0 fs/ext4/inode.c:5826
ext4_try_to_expand_extra_isize fs/ext4/inode.c:5869 [inline]
__ext4_mark_inode_dirty+0x4bf/0x7a0 fs/ext4/inode.c:5947
ext4_dirty_inode+0xbc/0x100 fs/ext4/inode.c:5979
__mark_inode_dirty+0x1f9/0x9d0 fs/fs-writeback.c:2431
mark_inode_dirty_sync include/linux/fs.h:2429 [inline]
iput+0x155/0x7d0 fs/inode.c:1686
dentry_unlink_inode+0x349/0x430 fs/dcache.c:376
__dentry_kill+0x3e2/0x5d0 fs/dcache.c:582
shrink_dentry_list+0x379/0x4d0 fs/dcache.c:1176
shrink_dcache_parent+0xcd/0x350
do_one_tree fs/dcache.c:1657 [inline]
shrink_dcache_for_umount+0x7c/0x1a0 fs/dcache.c:1674
generic_shutdown_super+0x69/0x2d0 fs/super.c:447
kill_block_super+0x80/0xe0 fs/super.c:1395
deactivate_locked_super+0xb0/0x100 fs/super.c:335
deactivate_super+0xa5/0xd0 fs/super.c:366
cleanup_mnt+0x45f/0x510 fs/namespace.c:1143
__cleanup_mnt+0x19/0x20 fs/namespace.c:1150
task_work_run+0x147/0x1b0 kernel/task_work.c:164
exit_task_work include/linux/task_work.h:32 [inline]
do_exit+0x67e/0x24d0 kernel/exit.c:828
do_group_exit+0x13a/0x300 kernel/exit.c:925
__do_sys_exit_group kernel/exit.c:936 [inline]
__se_sys_exit_group kernel/exit.c:934 [inline]
__x64_sys_exit_group+0x3f/0x40 kernel/exit.c:934
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x61/0xcb
RIP: 0033:0x7f77126bca99
Code: Unable to access opcode bytes at RIP 0x7f77126bca6f.
RSP: 002b:00007fffd6a19668 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 00007f7712732330 RCX: 00007f77126bca99
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001
RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 00007f771272ce40
R10: 00007f771272ce40 R11: 0000000000000246 R12: 00007f7712732330
R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
</TASK>
Modules linked in:
---[ end trace 504599ef89a0a0ad ]---
RIP: 0010:ext4_xattr_inode_create fs/ext4/xattr.c:1429 [inline]
RIP: 0010:ext4_xattr_inode_lookup_create fs/ext4/xattr.c:1537 [inline]
RIP: 0010:ext4_xattr_set_entry+0x276a/0x3950 fs/ext4/xattr.c:1665
Code: 8b 1b 48 83 c3 68 48 89 d8 48 c1 e8 03 42 80 3c 38 00 74 08 48 89 df e8 e4 01 b4 ff 48 8b 1b 48 83 c3 30 48 89 d8 48 c1 e8 03 <42> 80 3c 38 00 74 08 48 89 df e8 c7 01 b4 ff 4c 8b 23 48 8b 44 24
RSP: 0018:ffffc9000033efa0 EFLAGS: 00010206
RAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff8881069b3b40
RDX: dffffc0000000000 RSI: 0000000000000000 RDI: ffffffff868f1994
RBP: ffffc9000033f230 R08: ffffffff816d6a71 R09: ffffed1020e77803
R10: ffffed1020e77803 R11: 1ffff11020e77802 R12: ffffc9000033f154
R13: ffffffff868f1940 R14: ffff88811cdd4020 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7712701498 CR3: 000000010d5b3000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 8b 1b mov (%rbx),%ebx
2: 48 83 c3 68 add $0x68,%rbx
6: 48 89 d8 mov %rbx,%rax
9: 48 c1 e8 03 shr $0x3,%rax
d: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1)
12: 74 08 je 0x1c
14: 48 89 df mov %rbx,%rdi
17: e8 e4 01 b4 ff callq 0xffb40200
1c: 48 8b 1b mov (%rbx),%rbx
1f: 48 83 c3 30 add $0x30,%rbx
23: 48 89 d8 mov %rbx,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1) <-- trapping instruction
2f: 74 08 je 0x39
31: 48 89 df mov %rbx,%rdi
34: e8 c7 01 b4 ff callq 0xffb40200
39: 4c 8b 23 mov (%rbx),%r12
3c: 48 rex.W
3d: 8b .byte 0x8b
3e: 44 rex.R
3f: 24 .byte 0x24


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
syzbot can test patches for this issue, for details see:
https://goo.gl/tpsmEJ#testing-patches

Jun Nie

unread,
Dec 13, 2022, 4:36:44 AM12/13/22
to syzkaller-android-bugs

syzbot

unread,
Dec 13, 2022, 3:14:21 PM12/13/22
to jun...@linaro.org, syzkaller-a...@googlegroups.com
Hello,

syzbot has tested the proposed patch and the reproducer did not trigger any issue:

Reported-and-tested-by: syzbot+2dacb8...@syzkaller.appspotmail.com

Tested on:

commit: 8715c6d3 Merge tag 'for-6.2/dm-changes' of git://git.k..
git tree: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
console output: https://syzkaller.appspot.com/x/log.txt?x=1172d93f880000
kernel config: https://syzkaller.appspot.com/x/.config?x=fe515946bfa6de8
dashboard link: https://syzkaller.appspot.com/bug?extid=2dacb8f015bf1420155f
compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2

Note: no patches were applied.
Note: testing is done by a robot and is best-effort only.

Jun Nie

unread,
Dec 13, 2022, 8:15:05 PM12/13/22
to syzkaller-android-bugs
#syz test: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git stable-linux-5.15.y

syzbot

unread,
Dec 13, 2022, 9:39:20 PM12/13/22
to jun...@linaro.org, syzkaller-a...@googlegroups.com
Hello,

syzbot tried to test the proposed patch but the build/boot failed:

failed to checkout kernel repo git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/stable-linux-5.15.y: failed to run ["git" "fetch" "--force" "0868be847ce161f9c35b963900df0c8d1c583200" "stable-linux-5.15.y"]: exit status 128
fatal: couldn't find remote ref stable-linux-5.15.y



Tested on:

commit: [unknown
git tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git stable-linux-5.15.y

Jun Nie

unread,
Dec 13, 2022, 9:40:49 PM12/13/22
to syzkaller-android-bugs

syzbot

unread,
Dec 13, 2022, 10:00:19 PM12/13/22
to jun...@linaro.org, syzkaller-a...@googlegroups.com
Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
general protection fault in ext4_xattr_set_entry

general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
CPU: 1 PID: 453 Comm: syz-executor.0 Not tainted 5.15.82-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
RIP: 0010:ext4_xattr_inode_create fs/ext4/xattr.c:1429 [inline]
RIP: 0010:ext4_xattr_inode_lookup_create fs/ext4/xattr.c:1537 [inline]
RIP: 0010:ext4_xattr_set_entry+0x276a/0x3950 fs/ext4/xattr.c:1665
Code: 8b 1b 48 83 c3 68 48 89 d8 48 c1 e8 03 42 80 3c 38 00 74 08 48 89 df e8 54 f1 b4 ff 48 8b 1b 48 83 c3 30 48 89 d8 48 c1 e8 03 <42> 80 3c 38 00 74 08 48 89 df e8 37 f1 b4 ff 4c 8b 23 48 8b 44 24
RSP: 0018:ffffc9000039f120 EFLAGS: 00010206
RAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff888106bf0000
RDX: dffffc0000000000 RSI: 0000000000000000 RDI: ffffffff860f0374
RBP: ffffc9000039f3b0 R08: ffffffff816c7cf1 R09: ffffed102188d003
R10: ffffed102188d003 R11: 1ffff1102188d002 R12: ffffc9000039f2d4
R13: ffffffff860f0320 R14: ffff88810d250820 R15: dffffc0000000000
FS: 00005555571d5400(0000) GS:ffff8881f7300000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005555571de728 CR3: 000000011ecf3000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
ext4_xattr_block_set+0x8f8/0x3820 fs/ext4/xattr.c:1971
ext4_xattr_move_to_block fs/ext4/xattr.c:2603 [inline]
ext4_xattr_make_inode_space fs/ext4/xattr.c:2672 [inline]
ext4_expand_extra_isize_ea+0x1591/0x1f30 fs/ext4/xattr.c:2764
__ext4_expand_extra_isize+0x29e/0x3d0 fs/ext4/inode.c:5795
ext4_try_to_expand_extra_isize fs/ext4/inode.c:5838 [inline]
__ext4_mark_inode_dirty+0x4bf/0x7a0 fs/ext4/inode.c:5916
ext4_dirty_inode+0xbc/0x100 fs/ext4/inode.c:5948
__mark_inode_dirty+0x1f9/0x9d0 fs/fs-writeback.c:2439
mark_inode_dirty_sync include/linux/fs.h:2382 [inline]
iput+0x155/0x7d0 fs/inode.c:1686
dentry_unlink_inode+0x349/0x430 fs/dcache.c:376
__dentry_kill+0x3e2/0x5d0 fs/dcache.c:582
shrink_dentry_list+0x379/0x4d0 fs/dcache.c:1176
shrink_dcache_parent+0xcd/0x350
do_one_tree fs/dcache.c:1657 [inline]
shrink_dcache_for_umount+0x7c/0x1a0 fs/dcache.c:1674
generic_shutdown_super+0x69/0x2e0 fs/super.c:447
kill_block_super+0x80/0xe0 fs/super.c:1396
deactivate_locked_super+0xb0/0x100 fs/super.c:335
deactivate_super+0xa5/0xd0 fs/super.c:366
cleanup_mnt+0x45f/0x510 fs/namespace.c:1143
__cleanup_mnt+0x19/0x20 fs/namespace.c:1150
task_work_run+0x147/0x1b0 kernel/task_work.c:164
tracehook_notify_resume include/linux/tracehook.h:189 [inline]
exit_to_user_mode_loop+0xfd/0x110 kernel/entry/common.c:175
exit_to_user_mode_prepare kernel/entry/common.c:207 [inline]
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x79/0xc0 kernel/entry/common.c:300
do_syscall_64+0x50/0xd0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x61/0xcb
RIP: 0033:0x7f8516e23547
Code: ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffcd49ab848 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f8516e23547
RDX: 00007ffcd49ab919 RSI: 000000000000000a RDI: 00007ffcd49ab910
RBP: 00007ffcd49ab910 R08: 00000000ffffffff R09: 00007ffcd49ab6e0
R10: 00005555571d6793 R11: 0000000000000246 R12: 00007f8516e7cb24
R13: 00007ffcd49ac9d0 R14: 00005555571d66f0 R15: 00007ffcd49aca10
</TASK>
Modules linked in:
---[ end trace bbe24e05c12a4dcf ]---
RIP: 0010:ext4_xattr_inode_create fs/ext4/xattr.c:1429 [inline]
RIP: 0010:ext4_xattr_inode_lookup_create fs/ext4/xattr.c:1537 [inline]
RIP: 0010:ext4_xattr_set_entry+0x276a/0x3950 fs/ext4/xattr.c:1665
Code: 8b 1b 48 83 c3 68 48 89 d8 48 c1 e8 03 42 80 3c 38 00 74 08 48 89 df e8 54 f1 b4 ff 48 8b 1b 48 83 c3 30 48 89 d8 48 c1 e8 03 <42> 80 3c 38 00 74 08 48 89 df e8 37 f1 b4 ff 4c 8b 23 48 8b 44 24
RSP: 0018:ffffc9000039f120 EFLAGS: 00010206
RAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff888106bf0000
RDX: dffffc0000000000 RSI: 0000000000000000 RDI: ffffffff860f0374
RBP: ffffc9000039f3b0 R08: ffffffff816c7cf1 R09: ffffed102188d003
R10: ffffed102188d003 R11: 1ffff1102188d002 R12: ffffc9000039f2d4
R13: ffffffff860f0320 R14: ffff88810d250820 R15: dffffc0000000000
FS: 00005555571d5400(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000561561fcf048 CR3: 000000011ecf3000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 8b 1b mov (%rbx),%ebx
2: 48 83 c3 68 add $0x68,%rbx
6: 48 89 d8 mov %rbx,%rax
9: 48 c1 e8 03 shr $0x3,%rax
d: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1)
12: 74 08 je 0x1c
14: 48 89 df mov %rbx,%rdi
17: e8 54 f1 b4 ff callq 0xffb4f170
1c: 48 8b 1b mov (%rbx),%rbx
1f: 48 83 c3 30 add $0x30,%rbx
23: 48 89 d8 mov %rbx,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1) <-- trapping instruction
2f: 74 08 je 0x39
31: 48 89 df mov %rbx,%rdi
34: e8 37 f1 b4 ff callq 0xffb4f170
39: 4c 8b 23 mov (%rbx),%r12
3c: 48 rex.W
3d: 8b .byte 0x8b
3e: 44 rex.R
3f: 24 .byte 0x24


Tested on:

commit: d9790301 Linux 5.15.82
git tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git linux-5.15.y
console output: https://syzkaller.appspot.com/x/log.txt?x=171b1077880000
kernel config: https://syzkaller.appspot.com/x/.config?x=9ef2c55407de3053
dashboard link: https://syzkaller.appspot.com/bug?extid=2dacb8f015bf1420155f
compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2

Jun Nie

unread,
Dec 14, 2022, 3:21:07 AM12/14/22
to syzbot, syzkaller-a...@googlegroups.com
0001-ext4-remove-deprecated-noacl-nouser_xattr-options.patch

syzbot

unread,
Dec 14, 2022, 9:48:23 AM12/14/22
to jun...@linaro.org, syzkaller-a...@googlegroups.com
Hello,

syzbot tried to test the proposed patch but the build/boot failed:

fs/ext4/super.c:1707:3: error: use of undeclared identifier 'Opt_noacl'; did you mean 'Opt_acl'?


Tested on:

commit: fd6d6684 Linux 5.15.83
dashboard link: https://syzkaller.appspot.com/bug?extid=2dacb8f015bf1420155f
compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2
patch: https://syzkaller.appspot.com/x/patch.diff?x=12054400480000

Jun Nie

unread,
Dec 14, 2022, 10:16:32 PM12/14/22
to syzbot, syzkaller-a...@googlegroups.com
0001-ext4-remove-deprecated-noacl-nouser_xattr-options.patch

syzbot

unread,
Dec 15, 2022, 6:18:17 AM12/15/22
to jun...@linaro.org, syzkaller-a...@googlegroups.com
Hello,

syzbot has tested the proposed patch and the reproducer did not trigger any issue:

Reported-and-tested-by: syzbot+2dacb8...@syzkaller.appspotmail.com

Tested on:

commit: fd6d6684 Linux 5.15.83
git tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git linux-5.15.y
console output: https://syzkaller.appspot.com/x/log.txt?x=1521b59d880000
kernel config: https://syzkaller.appspot.com/x/.config?x=b94c9bedb5f5c75
dashboard link: https://syzkaller.appspot.com/bug?extid=2dacb8f015bf1420155f
compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2
patch: https://syzkaller.appspot.com/x/patch.diff?x=1766eb13880000

Jun Nie

unread,
Dec 29, 2022, 3:31:02 AM12/29/22
to syzbot, syzkaller-a...@googlegroups.com
0001-ext4-optimize-ea_inode-block-expansion.patch

Jun Nie

unread,
Dec 29, 2022, 5:07:36 AM12/29/22
to syzbot, syzkaller-a...@googlegroups.com
0001-ext4-optimize-ea_inode-block-expansion.patch

syzbot

unread,
Dec 29, 2022, 9:00:24 AM12/29/22
to jun...@linaro.org, syzkaller-a...@googlegroups.com
Hello,

syzbot has tested the proposed patch and the reproducer did not trigger any issue:

Reported-and-tested-by: syzbot+2dacb8...@syzkaller.appspotmail.com

Tested on:

commit: 1b929c02 Linux 6.2-rc1
console output: https://syzkaller.appspot.com/x/log.txt?x=10eff298480000
kernel config: https://syzkaller.appspot.com/x/.config?x=727ecac914cdec33
dashboard link: https://syzkaller.appspot.com/bug?extid=2dacb8f015bf1420155f
compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2
patch: https://syzkaller.appspot.com/x/patch.diff?x=14884ac0480000

Jun Nie

unread,
Dec 29, 2022, 10:14:01 PM12/29/22
to syzbot, syzkaller-a...@googlegroups.com
ext4-attr.diff

Jun Nie

unread,
Dec 29, 2022, 10:34:04 PM12/29/22
to syzbot, syzkaller-a...@googlegroups.com
#syz test: https://android.googlesource.com/kernel/common android13-5.15-lts
ext4-attr-5.15.diff

syzbot

unread,
Dec 30, 2022, 5:15:22 AM12/30/22
to jun...@linaro.org, syzkaller-a...@googlegroups.com
Hello,

syzbot has tested the proposed patch and the reproducer did not trigger any issue:

Reported-and-tested-by: syzbot+2dacb8...@syzkaller.appspotmail.com

Tested on:

commit: bff687b3 Merge tag 'block-6.2-2022-12-29' of git://git..
console output: https://syzkaller.appspot.com/x/log.txt?x=1201b940480000
kernel config: https://syzkaller.appspot.com/x/.config?x=727ecac914cdec33
dashboard link: https://syzkaller.appspot.com/bug?extid=2dacb8f015bf1420155f
compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2
patch: https://syzkaller.appspot.com/x/patch.diff?x=178d7238480000

syzbot

unread,
Dec 30, 2022, 5:29:25 AM12/30/22
to jun...@linaro.org, syzkaller-a...@googlegroups.com
Hello,

syzbot has tested the proposed patch and the reproducer did not trigger any issue:

Reported-and-tested-by: syzbot+2dacb8...@syzkaller.appspotmail.com

Tested on:

commit: c73b4619 ANDROID: abi preservation for fscrypt change ..
git tree: android13-5.15-lts
console output: https://syzkaller.appspot.com/x/log.txt?x=131b1870480000
kernel config: https://syzkaller.appspot.com/x/.config?x=57041d0cd45b9364
dashboard link: https://syzkaller.appspot.com/bug?extid=2dacb8f015bf1420155f
compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2
patch: https://syzkaller.appspot.com/x/patch.diff?x=1223a1e4480000
Reply all
Reply to author
Forward
0 new messages