[Android 5.10] general protection fault in vfs_link

0 views
Skip to first unread message

syzbot

unread,
Feb 13, 2024, 1:42:18 AMFeb 13
to syzkaller-a...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: fc10db4b1932 Merge android13-5.10 into android13-5.10-lts
git tree: android13-5.10-lts
console+strace: https://syzkaller.appspot.com/x/log.txt?x=15c3ad50180000
kernel config: https://syzkaller.appspot.com/x/.config?x=1a6e39f6bdc97aed
dashboard link: https://syzkaller.appspot.com/bug?extid=9344e72989de4244c44a
compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=11396c42180000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=13314aec180000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/01c7fd8a6413/disk-fc10db4b.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/2f080cce5b47/vmlinux-fc10db4b.xz
kernel image: https://storage.googleapis.com/syzbot-assets/a627e4059e09/bzImage-fc10db4b.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+9344e7...@syzkaller.appspotmail.com

general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
CPU: 0 PID: 286 Comm: syz-executor974 Not tainted 5.10.209-syzkaller-00423-gfc10db4b1932 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
RIP: 0010:vfs_link+0x3c/0x890 fs/namei.c:4175
Code: 89 4d a0 49 89 d4 49 89 f6 48 89 fb 49 bf 00 00 00 00 00 fc ff df e8 43 a0 b6 ff 48 89 5d a8 48 83 c3 30 48 89 d8 48 c1 e8 03 <42> 80 3c 38 00 74 08 48 89 df e8 25 17 f4 ff 48 8b 03 48 89 45 d0
RSP: 0018:ffffc90000967bd0 EFLAGS: 00010206
RAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff88811e28cf00
RDX: 0000000000000000 RSI: ffff8881105c6018 RDI: 0000000000000000
RBP: ffffc90000967c30 R08: dffffc0000000000 R09: ffffed10220b8c19
R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88811c4ceee0
R13: ffffc90000967cc8 R14: ffff8881105c6018 R15: dffffc0000000000
FS: 000055555608d480(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000000 CR3: 000000011e27b000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
incfs_link fs/incfs/vfs.c:604 [inline]
dir_link+0x37f/0x510 fs/incfs/vfs.c:1279
vfs_link+0x68f/0x890 fs/namei.c:4219
do_linkat+0x471/0x8b0 fs/namei.c:4287
__do_sys_linkat fs/namei.c:4311 [inline]
__se_sys_linkat fs/namei.c:4308 [inline]
__x64_sys_linkat+0xbf/0xd0 fs/namei.c:4308
do_syscall_64+0x34/0x70
entry_SYSCALL_64_after_hwframe+0x61/0xc6
RIP: 0033:0x7f24cc713c69
Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffe3ec91ab8 EFLAGS: 00000246 ORIG_RAX: 0000000000000109
RAX: ffffffffffffffda RBX: 00007ffe3ec91ac0 RCX: 00007f24cc713c69
RDX: 0000000000000004 RSI: 0000000020000080 RDI: 0000000000000004
RBP: 00007ffe3ec91ac8 R08: 0000000000000000 R09: 00007f24cc6e3be0
R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffe3ec91d28 R14: 0000000000000001 R15: 0000000000000001
Modules linked in:
---[ end trace cc29ddc6fbc81186 ]---
RIP: 0010:vfs_link+0x3c/0x890 fs/namei.c:4175
Code: 89 4d a0 49 89 d4 49 89 f6 48 89 fb 49 bf 00 00 00 00 00 fc ff df e8 43 a0 b6 ff 48 89 5d a8 48 83 c3 30 48 89 d8 48 c1 e8 03 <42> 80 3c 38 00 74 08 48 89 df e8 25 17 f4 ff 48 8b 03 48 89 45 d0
RSP: 0018:ffffc90000967bd0 EFLAGS: 00010206
RAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff88811e28cf00
RDX: 0000000000000000 RSI: ffff8881105c6018 RDI: 0000000000000000
RBP: ffffc90000967c30 R08: dffffc0000000000 R09: ffffed10220b8c19
R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88811c4ceee0
R13: ffffc90000967cc8 R14: ffff8881105c6018 R15: dffffc0000000000
FS: 000055555608d480(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000000 CR3: 000000011e27b000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 89 4d a0 mov %ecx,-0x60(%rbp)
3: 49 89 d4 mov %rdx,%r12
6: 49 89 f6 mov %rsi,%r14
9: 48 89 fb mov %rdi,%rbx
c: 49 bf 00 00 00 00 00 movabs $0xdffffc0000000000,%r15
13: fc ff df
16: e8 43 a0 b6 ff call 0xffb6a05e
1b: 48 89 5d a8 mov %rbx,-0x58(%rbp)
1f: 48 83 c3 30 add $0x30,%rbx
23: 48 89 d8 mov %rbx,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1) <-- trapping instruction
2f: 74 08 je 0x39
31: 48 89 df mov %rbx,%rdi
34: e8 25 17 f4 ff call 0xfff4175e
39: 48 8b 03 mov (%rbx),%rax
3c: 48 89 45 d0 mov %rax,-0x30(%rbp)


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title

If you want syzbot to run the reproducer, reply with:
#syz test: git://repo/address.git branch-or-commit-hash
If you attach or paste a git patch, syzbot will apply it before testing.

If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)

If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report

If you want to undo deduplication, reply with:
#syz undup

syzbot

unread,
Feb 20, 2024, 10:20:24 AMFeb 20
to syzkaller-a...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 1b3143b9b166 UPSTREAM: net: tls, update curr on splice as ..
git tree: android12-5.4
console+strace: https://syzkaller.appspot.com/x/log.txt?x=128f63d0180000
kernel config: https://syzkaller.appspot.com/x/.config?x=a2dd4b5d39d9fde5
dashboard link: https://syzkaller.appspot.com/bug?extid=e5eaf9353175ccba55df
compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=1744f9e8180000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=11738cf8180000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/13b35a330e2d/disk-1b3143b9.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/770086d9812a/vmlinux-1b3143b9.xz
kernel image: https://storage.googleapis.com/syzbot-assets/2e40ab981be7/bzImage-1b3143b9.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+e5eaf9...@syzkaller.appspotmail.com

kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 368 Comm: syz-executor147 Not tainted 5.4.265-syzkaller-00001-g1b3143b9b166 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
RIP: 0010:vfs_link+0x3b/0x8a0 fs/namei.c:4298
Code: 24 30 49 89 d6 49 89 f5 48 89 fb 48 bd 00 00 00 00 00 fc ff df e8 b5 1c c6 ff 48 89 5c 24 28 48 83 c3 30 48 89 d8 48 c1 e8 03 <80> 3c 28 00 74 08 48 89 df e8 47 ef f5 ff 48 8b 2b 4d 8d 7d 28 4d
RSP: 0018:ffff8881dcb8fbb0 EFLAGS: 00010206
RAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff8881dc858fc0
RDX: 0000000000000000 RSI: ffff8881e83f2518 RDI: 0000000000000000
RBP: dffffc0000000000 R08: dffffc0000000000 R09: ffffed103d07e4b9
R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881e83fe990
R13: ffff8881e83f2518 R14: ffff8881e83fe990 R15: ffff8881e83f2518
FS: 0000555556cda480(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000000 CR3: 00000001dca27000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
incfs_link fs/incfs/vfs.c:603 [inline]
dir_link+0x37f/0x510 fs/incfs/vfs.c:1278
vfs_link+0x69b/0x8a0 fs/namei.c:4342
do_linkat+0x46c/0x8b0 fs/namei.c:4410
__do_sys_linkat fs/namei.c:4434 [inline]
__se_sys_linkat fs/namei.c:4431 [inline]
__x64_sys_linkat+0xb1/0xc0 fs/namei.c:4431
do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x5c/0xc1
Modules linked in:
---[ end trace 52481c0c82d34b71 ]---
RIP: 0010:vfs_link+0x3b/0x8a0 fs/namei.c:4298
Code: 24 30 49 89 d6 49 89 f5 48 89 fb 48 bd 00 00 00 00 00 fc ff df e8 b5 1c c6 ff 48 89 5c 24 28 48 83 c3 30 48 89 d8 48 c1 e8 03 <80> 3c 28 00 74 08 48 89 df e8 47 ef f5 ff 48 8b 2b 4d 8d 7d 28 4d
RSP: 0018:ffff8881dcb8fbb0 EFLAGS: 00010206
RAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff8881dc858fc0
RDX: 0000000000000000 RSI: ffff8881e83f2518 RDI: 0000000000000000
RBP: dffffc0000000000 R08: dffffc0000000000 R09: ffffed103d07e4b9
R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881e83fe990
R13: ffff8881e83f2518 R14: ffff8881e83fe990 R15: ffff8881e83f2518
FS: 0000555556cda480(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000000 CR3: 00000001dca27000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 24 30 and $0x30,%al
2: 49 89 d6 mov %rdx,%r14
5: 49 89 f5 mov %rsi,%r13
8: 48 89 fb mov %rdi,%rbx
b: 48 bd 00 00 00 00 00 movabs $0xdffffc0000000000,%rbp
12: fc ff df
15: e8 b5 1c c6 ff call 0xffc61ccf
1a: 48 89 5c 24 28 mov %rbx,0x28(%rsp)
1f: 48 83 c3 30 add $0x30,%rbx
23: 48 89 d8 mov %rbx,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 80 3c 28 00 cmpb $0x0,(%rax,%rbp,1) <-- trapping instruction
2e: 74 08 je 0x38
30: 48 89 df mov %rbx,%rdi
33: e8 47 ef f5 ff call 0xfff5ef7f
38: 48 8b 2b mov (%rbx),%rbp
3b: 4d 8d 7d 28 lea 0x28(%r13),%r15
3f: 4d rex.WRB

syzbot

unread,
Feb 23, 2024, 4:10:22 PMFeb 23
to syzkaller-a...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 8c0f9174731d ANDROID: abi_gki_aarch64_qcom: Export trace_a..
git tree: android14-6.1
console+strace: https://syzkaller.appspot.com/x/log.txt?x=14fd23d2180000
kernel config: https://syzkaller.appspot.com/x/.config?x=54c503ca94c7e582
dashboard link: https://syzkaller.appspot.com/bug?extid=31c9badf7c59066fac27
compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=10983c30180000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=14df0230180000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/b77b7fb321a7/disk-8c0f9174.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/b57f1215a6cb/vmlinux-8c0f9174.xz
kernel image: https://storage.googleapis.com/syzbot-assets/dfd96af4e025/bzImage-8c0f9174.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+31c9ba...@syzkaller.appspotmail.com

general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
CPU: 1 PID: 296 Comm: syz-executor325 Not tainted 6.1.68-syzkaller-00029-g8c0f9174731d #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
RIP: 0010:vfs_link+0x40/0x7f0 fs/namei.c:4485
Code: 89 cd 49 89 d6 48 89 75 c0 48 89 fb 49 bc 00 00 00 00 00 fc ff df e8 8f cd ac ff 48 89 5d a0 48 83 c3 30 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 71 8a f3 ff 48 8b 03 48 89 45 d0
RSP: 0018:ffffc90000e67ba8 EFLAGS: 00010206
RAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff888108dfd100
RDX: 0000000000000000 RSI: ffffffff86cf9fe0 RDI: 0000000000000000
RBP: ffffc90000e67c10 R08: 0000000000000000 R09: ffffed10200ab3d6
R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
R13: ffff88811f508770 R14: ffff888100559e00 R15: ffff888100559e00
FS: 00005555573cd480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000000 CR3: 000000011ebc1000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
incfs_link fs/incfs/vfs.c:611 [inline]
dir_link+0x347/0x4c0 fs/incfs/vfs.c:1286
vfs_link+0x645/0x7f0 fs/namei.c:4529
do_linkat+0x34d/0x9f0 fs/namei.c:4600
__do_sys_linkat fs/namei.c:4628 [inline]
__se_sys_linkat fs/namei.c:4625 [inline]
__x64_sys_linkat+0xe9/0x100 fs/namei.c:4625
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:81
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f6c1c515c69
Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffec8eda488 EFLAGS: 00000246 ORIG_RAX: 0000000000000109
RAX: ffffffffffffffda RBX: 00007ffec8eda490 RCX: 00007f6c1c515c69
RDX: 0000000000000004 RSI: 0000000020000080 RDI: 0000000000000004
RBP: 00007ffec8eda498 R08: 0000000000000000 R09: 00007f6c1c4e5be0
R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffec8eda6f8 R14: 0000000000000001 R15: 0000000000000001
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:vfs_link+0x40/0x7f0 fs/namei.c:4485
Code: 89 cd 49 89 d6 48 89 75 c0 48 89 fb 49 bc 00 00 00 00 00 fc ff df e8 8f cd ac ff 48 89 5d a0 48 83 c3 30 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 71 8a f3 ff 48 8b 03 48 89 45 d0
RSP: 0018:ffffc90000e67ba8 EFLAGS: 00010206
RAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff888108dfd100
RDX: 0000000000000000 RSI: ffffffff86cf9fe0 RDI: 0000000000000000
RBP: ffffc90000e67c10 R08: 0000000000000000 R09: ffffed10200ab3d6
R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
R13: ffff88811f508770 R14: ffff888100559e00 R15: ffff888100559e00
FS: 00005555573cd480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000000 CR3: 000000011ebc1000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 89 cd mov %ecx,%ebp
2: 49 89 d6 mov %rdx,%r14
5: 48 89 75 c0 mov %rsi,-0x40(%rbp)
9: 48 89 fb mov %rdi,%rbx
c: 49 bc 00 00 00 00 00 movabs $0xdffffc0000000000,%r12
13: fc ff df
16: e8 8f cd ac ff call 0xffaccdaa
1b: 48 89 5d a0 mov %rbx,-0x60(%rbp)
1f: 48 83 c3 30 add $0x30,%rbx
23: 48 89 d8 mov %rbx,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) <-- trapping instruction
2f: 74 08 je 0x39
31: 48 89 df mov %rbx,%rdi
34: e8 71 8a f3 ff call 0xfff38aaa
39: 48 8b 03 mov (%rbx),%rax
3c: 48 89 45 d0 mov %rax,-0x30(%rbp)


syzbot

unread,
Feb 23, 2024, 6:15:24 PMFeb 23
to syzkaller-a...@googlegroups.com
Bug presence analysis results: the bug reproduces only on Android 6.1.

syzbot has run the reproducer on other relevant kernel trees and got
the following results:

android14-6.1 (commit 8c0f9174731d) on 2024/02/23:
general protection fault in vfs_link
Report: https://syzkaller.appspot.com/x/report.txt?x=17b62a9a180000

lts (commit ba6f5fb46511) on 2024/02/23:
Didn't crash.

upstream (commit 603c04e27c3e) on 2024/02/23:
Didn't crash.

More details can be found at:
https://syzkaller.appspot.com/bug?extid=31c9badf7c59066fac27

syzbot

unread,
Feb 24, 2024, 10:03:18 AMFeb 24
to syzkaller-a...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 993bed180178 Merge "Merge branch 'android13-5.15' into bra..
git tree: android13-5.15-lts
console+strace: https://syzkaller.appspot.com/x/log.txt?x=102b1922180000
kernel config: https://syzkaller.appspot.com/x/.config?x=49ce29477ba81e8f
dashboard link: https://syzkaller.appspot.com/bug?extid=8f25cdaf6708f0536ad6
compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=15e6685c180000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=15f332ac180000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/4098d24d4c8b/disk-993bed18.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/94fbc07ac02d/vmlinux-993bed18.xz
kernel image: https://storage.googleapis.com/syzbot-assets/eed14de06c19/bzImage-993bed18.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+8f25cd...@syzkaller.appspotmail.com

general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
CPU: 1 PID: 296 Comm: syz-executor244 Not tainted 5.15.148-syzkaller-00718-g993bed180178 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
RIP: 0010:vfs_link+0x40/0x7f0 fs/namei.c:4519
Code: 89 cd 49 89 d6 48 89 75 c0 48 89 fb 49 bc 00 00 00 00 00 fc ff df e8 ff 3d b2 ff 48 89 5d a0 48 83 c3 30 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 81 4e f4 ff 48 8b 03 48 89 45 d0
RSP: 0018:ffffc9000078fba8 EFLAGS: 00010206
RAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff88811f0a62c0
RDX: 0000000000000000 RSI: ffffffff868f33c0 RDI: 0000000000000000
RBP: ffffc9000078fc10 R08: 0000000000000000 R09: ffffed1021260619
R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
R13: ffff88811bd90990 R14: ffff888109303018 R15: ffff888109303018
FS: 00005555568ff480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000000 CR3: 0000000119047000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
incfs_link fs/incfs/vfs.c:610 [inline]
dir_link+0x347/0x4c0 fs/incfs/vfs.c:1285
vfs_link+0x645/0x7f0 fs/namei.c:4563
do_linkat+0x34d/0x9f0 fs/namei.c:4634
__do_sys_linkat fs/namei.c:4662 [inline]
__se_sys_linkat fs/namei.c:4659 [inline]
__x64_sys_linkat+0xe9/0x100 fs/namei.c:4659
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x61/0xcb
RIP: 0033:0x7f3412d7bc69
Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffeafbb6338 EFLAGS: 00000246 ORIG_RAX: 0000000000000109
RAX: ffffffffffffffda RBX: 00007ffeafbb6340 RCX: 00007f3412d7bc69
RDX: 0000000000000004 RSI: 0000000020000080 RDI: 0000000000000004
RBP: 00007ffeafbb6348 R08: 0000000000000000 R09: 00007f3412d4bbe0
R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffeafbb65a8 R14: 0000000000000001 R15: 0000000000000001
</TASK>
Modules linked in:
---[ end trace 1e0b7e1962694c20 ]---
RIP: 0010:vfs_link+0x40/0x7f0 fs/namei.c:4519
Code: 89 cd 49 89 d6 48 89 75 c0 48 89 fb 49 bc 00 00 00 00 00 fc ff df e8 ff 3d b2 ff 48 89 5d a0 48 83 c3 30 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 81 4e f4 ff 48 8b 03 48 89 45 d0
RSP: 0018:ffffc9000078fba8 EFLAGS: 00010206
RAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff88811f0a62c0
RDX: 0000000000000000 RSI: ffffffff868f33c0 RDI: 0000000000000000
RBP: ffffc9000078fc10 R08: 0000000000000000 R09: ffffed1021260619
R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
R13: ffff88811bd90990 R14: ffff888109303018 R15: ffff888109303018
FS: 00005555568ff480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000000 CR3: 0000000119047000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 89 cd mov %ecx,%ebp
2: 49 89 d6 mov %rdx,%r14
5: 48 89 75 c0 mov %rsi,-0x40(%rbp)
9: 48 89 fb mov %rdi,%rbx
c: 49 bc 00 00 00 00 00 movabs $0xdffffc0000000000,%r12
13: fc ff df
16: e8 ff 3d b2 ff call 0xffb23e1a
1b: 48 89 5d a0 mov %rbx,-0x60(%rbp)
1f: 48 83 c3 30 add $0x30,%rbx
23: 48 89 d8 mov %rbx,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) <-- trapping instruction
2f: 74 08 je 0x39
31: 48 89 df mov %rbx,%rdi
34: e8 81 4e f4 ff call 0xfff44eba
Reply all
Reply to author
Forward
0 new messages