Hello,
syzbot found the following issue on:
HEAD commit: 1989cd3d56e2 Linux 6.1.167
git tree: linux-6.1.y
console output:
https://syzkaller.appspot.com/x/log.txt?x=15e101ca580000
kernel config:
https://syzkaller.appspot.com/x/.config?x=b1adc0bfde2d8a4a
dashboard link:
https://syzkaller.appspot.com/bug?extid=7bb205a21743a78fdd7b
compiler: Debian clang version 21.1.8 (++20251221033036+2078da43e25a-1~exp1~20251221153213.50), Debian LLD 21.1.8
userspace arch: arm64
Unfortunately, I don't have any reproducer for this issue yet.
Downloadable assets:
disk image:
https://storage.googleapis.com/syzbot-assets/edd05d4d1a68/disk-1989cd3d.raw.xz
vmlinux:
https://storage.googleapis.com/syzbot-assets/bdc3181e838d/vmlinux-1989cd3d.xz
kernel image:
https://storage.googleapis.com/syzbot-assets/a78aef5a3a25/Image-1989cd3d.gz.xz
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by:
syzbot+7bb205...@syzkaller.appspotmail.com
__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
invoke_syscall+0x98/0x2b4 arch/arm64/kernel/syscall.c:52
el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140
do_el0_svc+0x58/0x130 arch/arm64/kernel/syscall.c:204
el0_svc+0x58/0x128 arch/arm64/kernel/entry-common.c:637
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
Unable to handle kernel paging request at virtual address dfff800000000001
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
Mem abort info:
ESR = 0x0000000096000006
EC = 0x25: DABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x06: level 2 translation fault
Data abort info:
ISV = 0, ISS = 0x00000006
CM = 0, WnR = 0
[dfff800000000001] address between user and kernel address ranges
Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP
Modules linked in:
CPU: 1 PID: 5418 Comm: syz.2.326 Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/26/2026
pstate: 02400005 (nzcv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
pc : PageTail include/linux/page-flags.h:292 [inline]
pc : folio_flags include/linux/page-flags.h:319 [inline]
pc : folio_test_uptodate include/linux/page-flags.h:719 [inline]
pc : ntfs_lock_new_page+0x64/0x3e0 fs/ntfs3/frecord.c:2163
lr : ntfs_lock_new_page+0x40/0x3e0 fs/ntfs3/frecord.c:2156
sp : ffff8000214f70b0
x29: ffff8000214f70b0 x28: 0000000000000000 x27: 0000000000100cca
x26: 000000000000000f x25: 0000000000000002 x24: 0000000000000001
x23: dfff800000000000 x22: 0000000000000008 x21: 0000000000000012
x20: 0000000000100cca x19: 0000000000000000 x18: ffff800011b9bf60
x17: 0000000000000000 x16: ffff8000082d92bc x15: 0000000000000000
x14: 0000000000000001 x13: 1ffff00002a9820a x12: 0000000000ff0100
x11: ff008000086e669c x10: 0000000000000000 x9 : 565821f97767d500
x8 : 565821f97767d500 x7 : 0000000000000001 x6 : 0000000000000001
x5 : ffff8000214f6498 x4 : ffff800015304cc0 x3 : ffff80000aa4a168
x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
PageTail include/linux/page-flags.h:292 [inline]
folio_flags include/linux/page-flags.h:319 [inline]
folio_test_uptodate include/linux/page-flags.h:719 [inline]
ntfs_lock_new_page+0x64/0x3e0 fs/ntfs3/frecord.c:2163
ni_readpage_cmpr+0x2b8/0x7b4 fs/ntfs3/frecord.c:2229
ntfs_read_folio+0x14c/0x1c0 fs/ntfs3/inode.c:728
filemap_read_folio+0x134/0x384 mm/filemap.c:2490
filemap_create_folio mm/filemap.c:2619 [inline]
filemap_get_pages mm/filemap.c:2672 [inline]
filemap_read+0xcd4/0x2104 mm/filemap.c:2759
generic_file_read_iter+0xf8/0x5c4 mm/filemap.c:2941
ntfs_file_read_iter+0x184/0x1e0 fs/ntfs3/file.c:771
call_read_iter include/linux/fs.h:2259 [inline]
generic_file_splice_read+0x180/0x444 fs/splice.c:308
do_splice_to fs/splice.c:803 [inline]
splice_direct_to_actor+0x2ec/0x954 fs/splice.c:875
do_splice_direct+0x168/0x25c fs/splice.c:1002
do_sendfile+0x478/0xcc8 fs/read_write.c:1255
__do_sys_sendfile64 fs/read_write.c:1323 [inline]
__se_sys_sendfile64 fs/read_write.c:1309 [inline]
__arm64_sys_sendfile64+0x134/0x36c fs/read_write.c:1309
__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
invoke_syscall+0x98/0x2b4 arch/arm64/kernel/syscall.c:52
el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140
do_el0_svc+0x58/0x130 arch/arm64/kernel/syscall.c:204
el0_svc+0x58/0x128 arch/arm64/kernel/entry-common.c:637
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
Code: 91002276 d2d00017 d343fed8 f2fbfff7 (38776b08)
---[ end trace 0000000000000000 ]---
----------------
Code disassembly (best guess):
0: 91002276 add x22, x19, #0x8
4: d2d00017 mov x23, #0x800000000000 // #140737488355328
8: d343fed8 lsr x24, x22, #3
c: f2fbfff7 movk x23, #0xdfff, lsl #48
* 10: 38776b08 ldrb w8, [x24, x23] <-- trapping instruction
---
This report is generated by a bot. It may contain errors.
See
https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at
syzk...@googlegroups.com.
syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title
If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)
If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report
If you want to undo deduplication, reply with:
#syz undup