[Android 5.10] KASAN: null-ptr-deref Write in backing_data_changed

12 views
Skip to first unread message

syzbot

unread,
Aug 20, 2023, 3:29:45 AM8/20/23
to syzkaller-a...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 8a427269c016 Merge branch 'android13-5.10' into branch 'an..
git tree: android13-5.10-lts
console+strace: https://syzkaller.appspot.com/x/log.txt?x=17c84307a80000
kernel config: https://syzkaller.appspot.com/x/.config?x=fefd86e1c1b1e951
dashboard link: https://syzkaller.appspot.com/bug?extid=1d95dc0218855a631aef
compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=171cd05ba80000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=14a0700fa80000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/42a188936754/disk-8a427269.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/0d4218277015/vmlinux-8a427269.xz
kernel image: https://storage.googleapis.com/syzbot-assets/a504bff7c461/bzImage-8a427269.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+1d95dc...@syzkaller.appspotmail.com

==================================================================
BUG: KASAN: null-ptr-deref in instrument_atomic_read_write include/linux/instrumented.h:101 [inline]
BUG: KASAN: null-ptr-deref in atomic_inc_return include/asm-generic/atomic-instrumented.h:250 [inline]
BUG: KASAN: null-ptr-deref in ihold+0x20/0x60 fs/inode.c:423
Write of size 4 at addr 0000000000000170 by task syz-executor796/290

CPU: 1 PID: 290 Comm: syz-executor796 Not tainted 5.10.187-syzkaller-00057-g8a427269c016 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack_lvl+0x1e2/0x24b lib/dump_stack.c:118
__kasan_report mm/kasan/report.c:439 [inline]
kasan_report+0x167/0x1c0 mm/kasan/report.c:452
kasan_check_range+0x293/0x2a0 mm/kasan/generic.c:189
__kasan_check_write+0x14/0x20 mm/kasan/shadow.c:37
instrument_atomic_read_write include/linux/instrumented.h:101 [inline]
atomic_inc_return include/asm-generic/atomic-instrumented.h:250 [inline]
ihold+0x20/0x60 fs/inode.c:423
backing_data_changed+0x1d9/0x4f0 fs/fuse/dir.c:193
fuse_dentry_revalidate+0x826/0xe70 fs/fuse/dir.c:302
d_revalidate fs/namei.c:780 [inline]
lookup_dcache fs/namei.c:1505 [inline]
__lookup_hash+0x1b3/0x290 fs/namei.c:1526
do_renameat2+0x624/0x1130 fs/namei.c:4560
__do_sys_rename fs/namei.c:4651 [inline]
__se_sys_rename fs/namei.c:4649 [inline]
__x64_sys_rename+0x86/0x90 fs/namei.c:4649
do_syscall_64+0x34/0x70
entry_SYSCALL_64_after_hwframe+0x61/0xc6
RIP: 0033:0x7fb566e2f739
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fb566dd0218 EFLAGS: 00000246 ORIG_RAX: 0000000000000052
RAX: ffffffffffffffda RBX: 00007fb566ebe3f8 RCX: 00007fb566e2f739
RDX: 00007fb566e2f739 RSI: 0000000020000140 RDI: 0000000020000100
RBP: 00007fb566ebe3f0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb566e8b09c
R13: 000000000000006e R14: 0030656c69662f30 R15: 00007fb566e89098
==================================================================
BUG: kernel NULL pointer dereference, address: 0000000000000170
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 11ea09067 P4D 11ea09067 PUD 11ea0a067 PMD 0
Oops: 0002 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 290 Comm: syz-executor796 Tainted: G B 5.10.187-syzkaller-00057-g8a427269c016 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
RIP: 0010:arch_atomic_inc_return include/linux/atomic-arch-fallback.h:286 [inline]
RIP: 0010:atomic_inc_return include/asm-generic/atomic-instrumented.h:251 [inline]
RIP: 0010:ihold+0x25/0x60 fs/inode.c:423
Code: 00 00 00 00 00 55 48 89 e5 41 56 53 49 89 fe e8 71 a7 b3 ff 49 8d be 70 01 00 00 be 04 00 00 00 e8 30 d8 f0 ff bb 01 00 00 00 <f0> 41 0f c1 9e 70 01 00 00 ff c3 bf 02 00 00 00 89 de e8 f4 aa b3
RSP: 0018:ffffc9000091f8c0 EFLAGS: 00010246
RAX: ffff88811ea61300 RBX: 0000000000000001 RCX: ffff88811ea613c0
RDX: 0000000000000000 RSI: 0000000000000286 RDI: 00000000ffffffff
RBP: ffffc9000091f8d0 R08: ffffffff813e28eb R09: 0000000000000003
R10: fffffbfff0e0fe48 R11: dffffc0000000001 R12: ffffc9000091f960
R13: 1ffff92000123f24 R14: 0000000000000000 R15: ffff88811c0a9200
FS: 00007fb566dd06c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000170 CR3: 000000011e7ba000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
backing_data_changed+0x1d9/0x4f0 fs/fuse/dir.c:193
fuse_dentry_revalidate+0x826/0xe70 fs/fuse/dir.c:302
d_revalidate fs/namei.c:780 [inline]
lookup_dcache fs/namei.c:1505 [inline]
__lookup_hash+0x1b3/0x290 fs/namei.c:1526
do_renameat2+0x624/0x1130 fs/namei.c:4560
__do_sys_rename fs/namei.c:4651 [inline]
__se_sys_rename fs/namei.c:4649 [inline]
__x64_sys_rename+0x86/0x90 fs/namei.c:4649
do_syscall_64+0x34/0x70
entry_SYSCALL_64_after_hwframe+0x61/0xc6
RIP: 0033:0x7fb566e2f739
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fb566dd0218 EFLAGS: 00000246 ORIG_RAX: 0000000000000052
RAX: ffffffffffffffda RBX: 00007fb566ebe3f8 RCX: 00007fb566e2f739
RDX: 00007fb566e2f739 RSI: 0000000020000140 RDI: 0000000020000100
RBP: 00007fb566ebe3f0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb566e8b09c
R13: 000000000000006e R14: 0030656c69662f30 R15: 00007fb566e89098
Modules linked in:
CR2: 0000000000000170
---[ end trace e43da1dc2f7c0628 ]---
RIP: 0010:arch_atomic_inc_return include/linux/atomic-arch-fallback.h:286 [inline]
RIP: 0010:atomic_inc_return include/asm-generic/atomic-instrumented.h:251 [inline]
RIP: 0010:ihold+0x25/0x60 fs/inode.c:423
Code: 00 00 00 00 00 55 48 89 e5 41 56 53 49 89 fe e8 71 a7 b3 ff 49 8d be 70 01 00 00 be 04 00 00 00 e8 30 d8 f0 ff bb 01 00 00 00 <f0> 41 0f c1 9e 70 01 00 00 ff c3 bf 02 00 00 00 89 de e8 f4 aa b3
RSP: 0018:ffffc9000091f8c0 EFLAGS: 00010246
RAX: ffff88811ea61300 RBX: 0000000000000001 RCX: ffff88811ea613c0
RDX: 0000000000000000 RSI: 0000000000000286 RDI: 00000000ffffffff
RBP: ffffc9000091f8d0 R08: ffffffff813e28eb R09: 0000000000000003
R10: fffffbfff0e0fe48 R11: dffffc0000000001 R12: ffffc9000091f960
R13: 1ffff92000123f24 R14: 0000000000000000 R15: ffff88811c0a9200
FS: 00007fb566dd06c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000170 CR3: 000000011e7ba000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: 41 56 push %r14
b: 53 push %rbx
c: 49 89 fe mov %rdi,%r14
f: e8 71 a7 b3 ff call 0xffb3a785
14: 49 8d be 70 01 00 00 lea 0x170(%r14),%rdi
1b: be 04 00 00 00 mov $0x4,%esi
20: e8 30 d8 f0 ff call 0xfff0d855
25: bb 01 00 00 00 mov $0x1,%ebx
* 2a: f0 41 0f c1 9e 70 01 lock xadd %ebx,0x170(%r14) <-- trapping instruction
31: 00 00
33: ff c3 inc %ebx
35: bf 02 00 00 00 mov $0x2,%edi
3a: 89 de mov %ebx,%esi
3c: e8 .byte 0xe8
3d: f4 hlt
3e: aa stos %al,%es:(%rdi)
3f: b3 .byte 0xb3


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

If the bug is already fixed, let syzbot know by replying with:
#syz fix: exact-commit-title

If you want syzbot to run the reproducer, reply with:
#syz test: git://repo/address.git branch-or-commit-hash
If you attach or paste a git patch, syzbot will apply it before testing.

If you want to overwrite bug's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)

If the bug is a duplicate of another bug, reply with:
#syz dup: exact-subject-of-another-report

If you want to undo deduplication, reply with:
#syz undup

syzbot

unread,
Aug 20, 2023, 7:18:46 PM8/20/23
to syzkaller-a...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: c2611a04b92f ANDROID: GKI: update symbol list file for xia..
git tree: android14-6.1
console+strace: https://syzkaller.appspot.com/x/log.txt?x=1442aebba80000
kernel config: https://syzkaller.appspot.com/x/.config?x=c5b8b7a65c87c651
dashboard link: https://syzkaller.appspot.com/bug?extid=123b794611f0e3531e96
compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=119d5acfa80000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=121c3ee3a80000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/61093a06c07e/disk-c2611a04.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/4178a231c0bf/vmlinux-c2611a04.xz
kernel image: https://storage.googleapis.com/syzbot-assets/ca97438b22a6/bzImage-c2611a04.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+123b79...@syzkaller.appspotmail.com

==================================================================
BUG: KASAN: null-ptr-deref in instrument_atomic_read_write include/linux/instrumented.h:102 [inline]
BUG: KASAN: null-ptr-deref in atomic_inc_return include/linux/atomic/atomic-instrumented.h:198 [inline]
BUG: KASAN: null-ptr-deref in ihold+0x20/0x60 fs/inode.c:450
Write of size 4 at addr 0000000000000170 by task syz-executor197/302

CPU: 1 PID: 302 Comm: syz-executor197 Not tainted 6.1.25-syzkaller-00052-gc2611a04b92f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x151/0x1b7 lib/dump_stack.c:106
print_report+0xe1/0x4e0 mm/kasan/report.c:430
kasan_report+0x13c/0x170 mm/kasan/report.c:531
kasan_check_range+0x294/0x2a0 mm/kasan/generic.c:189
__kasan_check_write+0x14/0x20 mm/kasan/shadow.c:37
instrument_atomic_read_write include/linux/instrumented.h:102 [inline]
atomic_inc_return include/linux/atomic/atomic-instrumented.h:198 [inline]
ihold+0x20/0x60 fs/inode.c:450
backing_data_changed+0x1d9/0x4f0 fs/fuse/dir.c:202
fuse_dentry_revalidate+0x826/0xe70 fs/fuse/dir.c:312
d_revalidate fs/namei.c:856 [inline]
lookup_dcache fs/namei.c:1565 [inline]
__lookup_hash+0x1b3/0x290 fs/namei.c:1586
do_renameat2+0x671/0x1480 fs/namei.c:4881
__do_sys_rename fs/namei.c:4976 [inline]
__se_sys_rename fs/namei.c:4974 [inline]
__x64_sys_rename+0x86/0x90 fs/namei.c:4974
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f00dde64739
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f00dde05218 EFLAGS: 00000246 ORIG_RAX: 0000000000000052
RAX: ffffffffffffffda RBX: 00007f00ddef33f8 RCX: 00007f00dde64739
RDX: 00007f00dde64739 RSI: 0000000020000140 RDI: 0000000020000100
RBP: 00007f00ddef33f0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f00ddec009c
R13: 000000000000006e R14: 0030656c69662f30 R15: 00007f00ddebe098
</TASK>
==================================================================
BUG: kernel NULL pointer dereference, address: 0000000000000170
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 121962067 P4D 121962067 PUD 121963067 PMD 0
Oops: 0002 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 302 Comm: syz-executor197 Tainted: G B 6.1.25-syzkaller-00052-gc2611a04b92f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
RIP: 0010:arch_atomic_inc_return include/linux/atomic/atomic-arch-fallback.h:440 [inline]
RIP: 0010:atomic_inc_return include/linux/atomic/atomic-instrumented.h:199 [inline]
RIP: 0010:ihold+0x25/0x60 fs/inode.c:450
Code: 00 00 00 00 00 55 48 89 e5 41 56 53 49 89 fe e8 b1 e1 a9 ff 49 8d be 70 01 00 00 be 04 00 00 00 e8 40 33 f0 ff bb 01 00 00 00 <f0> 41 0f c1 9e 70 01 00 00 ff c3 bf 02 00 00 00 89 de e8 34 e5 a9
RSP: 0018:ffffc90000ec7800 EFLAGS: 00010246
RAX: ffff888109786500 RBX: 0000000000000001 RCX: ffff888109786540
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc90000ec7810 R08: ffffffff81445ad3 R09: fffffbfff0ea42fd
R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90000ec78a0
R13: 1ffff920001d8f0c R14: 0000000000000000 R15: ffff88811307e200
FS: 00007f00dde056c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000170 CR3: 0000000109440000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
backing_data_changed+0x1d9/0x4f0 fs/fuse/dir.c:202
fuse_dentry_revalidate+0x826/0xe70 fs/fuse/dir.c:312
d_revalidate fs/namei.c:856 [inline]
lookup_dcache fs/namei.c:1565 [inline]
__lookup_hash+0x1b3/0x290 fs/namei.c:1586
do_renameat2+0x671/0x1480 fs/namei.c:4881
__do_sys_rename fs/namei.c:4976 [inline]
__se_sys_rename fs/namei.c:4974 [inline]
__x64_sys_rename+0x86/0x90 fs/namei.c:4974
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f00dde64739
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f00dde05218 EFLAGS: 00000246 ORIG_RAX: 0000000000000052
RAX: ffffffffffffffda RBX: 00007f00ddef33f8 RCX: 00007f00dde64739
RDX: 00007f00dde64739 RSI: 0000000020000140 RDI: 0000000020000100
RBP: 00007f00ddef33f0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f00ddec009c
R13: 000000000000006e R14: 0030656c69662f30 R15: 00007f00ddebe098
</TASK>
Modules linked in:
CR2: 0000000000000170
---[ end trace 0000000000000000 ]---
RIP: 0010:arch_atomic_inc_return include/linux/atomic/atomic-arch-fallback.h:440 [inline]
RIP: 0010:atomic_inc_return include/linux/atomic/atomic-instrumented.h:199 [inline]
RIP: 0010:ihold+0x25/0x60 fs/inode.c:450
Code: 00 00 00 00 00 55 48 89 e5 41 56 53 49 89 fe e8 b1 e1 a9 ff 49 8d be 70 01 00 00 be 04 00 00 00 e8 40 33 f0 ff bb 01 00 00 00 <f0> 41 0f c1 9e 70 01 00 00 ff c3 bf 02 00 00 00 89 de e8 34 e5 a9
RSP: 0018:ffffc90000ec7800 EFLAGS: 00010246
RAX: ffff888109786500 RBX: 0000000000000001 RCX: ffff888109786540
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc90000ec7810 R08: ffffffff81445ad3 R09: fffffbfff0ea42fd
R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90000ec78a0
R13: 1ffff920001d8f0c R14: 0000000000000000 R15: ffff88811307e200
FS: 00007f00dde056c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000170 CR3: 0000000109440000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: 41 56 push %r14
b: 53 push %rbx
c: 49 89 fe mov %rdi,%r14
f: e8 b1 e1 a9 ff call 0xffa9e1c5
14: 49 8d be 70 01 00 00 lea 0x170(%r14),%rdi
1b: be 04 00 00 00 mov $0x4,%esi
20: e8 40 33 f0 ff call 0xfff03365
25: bb 01 00 00 00 mov $0x1,%ebx
* 2a: f0 41 0f c1 9e 70 01 lock xadd %ebx,0x170(%r14) <-- trapping instruction
31: 00 00
33: ff c3 inc %ebx
35: bf 02 00 00 00 mov $0x2,%edi
3a: 89 de mov %ebx,%esi
3c: e8 .byte 0xe8
3d: 34 e5 xor $0xe5,%al
3f: a9 .byte 0xa9

syzbot

unread,
Aug 20, 2023, 10:04:37 PM8/20/23
to syzkaller-a...@googlegroups.com
Bug presence analysis results: the bug reproduces only on Android 6.1.

syzbot has run the reproducer on other relevant kernel trees and got
the following results:

android14-6.1 (commit c2611a04b92f) on 2023/08/21:
KASAN: null-ptr-deref Write in backing_data_changed
Report: https://syzkaller.appspot.com/x/report.txt?x=138a06d3a80000

lts (commit b1644a0031cf) on 2023/08/21:
Didn't crash.

upstream (commit 706a74159504) on 2023/08/21:
Didn't crash.

More details can be found at:
https://syzkaller.appspot.com/bug?extid=123b794611f0e3531e96

syzbot

unread,
Aug 22, 2023, 7:33:24 PM8/22/23
to syzkaller-a...@googlegroups.com
syzbot has bisected this issue to:

commit c0f5b9920fddb8e08b9a906ed8d4fb9c46cc19d1
Author: Jiachen Zhang <zhangjiac...@bytedance.com>
Date: Wed Sep 28 12:19:34 2022 +0000

UPSTREAM: fuse: always revalidate rename target dentry

bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=1171f4bda80000
start commit: c2611a04b92f ANDROID: GKI: update symbol list file for xia..
git tree: android14-6.1
final oops: https://syzkaller.appspot.com/x/report.txt?x=1371f4bda80000
console output: https://syzkaller.appspot.com/x/log.txt?x=1571f4bda80000
Reported-by: syzbot+123b79...@syzkaller.appspotmail.com
Fixes: c0f5b9920fdd ("UPSTREAM: fuse: always revalidate rename target dentry")

For information about bisection process see: https://goo.gl/tpsmEJ#bisection

syzbot

unread,
Oct 29, 2023, 5:24:04 AM10/29/23
to syzkaller-a...@googlegroups.com
syzbot suspects this issue was fixed by commit:

commit 63d4231d85e23d4eb29ab2ac10d5eccd0d41e7a9
Author: liujinbao1 <liuji...@xiaomi.corp-partner.google.com>
Date: Thu Oct 12 04:28:06 2023 +0000

ANDROID: fuse-bpf: Add NULL pointer check in fuse_entry_revalidate

bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=10d9a279680000
start commit: c2611a04b92f ANDROID: GKI: update symbol list file for xia..
git tree: android14-6.1
If the result looks correct, please mark the issue as fixed by replying with:

#syz fix: ANDROID: fuse-bpf: Add NULL pointer check in fuse_entry_revalidate

syzbot

unread,
Dec 1, 2023, 12:01:06 AM12/1/23
to syzkaller-a...@googlegroups.com
syzbot suspects this issue was fixed by commit:

commit 44714c920d036214a739510876525841ab6decf1
Author: liujinbao1 <liuji...@xiaomi.corp-partner.google.com>
Date: Thu Oct 12 04:28:06 2023 +0000

ANDROID: fuse-bpf: Add NULL pointer check in fuse_entry_revalidate

bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=15b72eb4e80000
start commit: 8a427269c016 Merge branch 'android13-5.10' into branch 'an..
git tree: android13-5.10-lts

syzbot

unread,
Jan 4, 2024, 7:03:18 AMJan 4
to syzkaller-a...@googlegroups.com
Auto-closing this bug as obsolete.
No recent activity, existing reproducers are no longer triggering the issue.

syzbot

unread,
Feb 8, 2024, 8:32:16 AMFeb 8
to syzkaller-a...@googlegroups.com
Reply all
Reply to author
Forward
0 new messages