BUG: unable to handle kernel paging request in udf_free_inode

9 views
Skip to first unread message

syzbot

unread,
Oct 31, 2021, 7:20:25 AM10/31/21
to syzkaller-upst...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: d25f27432f80 Merge tag 'arm-soc-fixes-5.15-3' of git://git..
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=1683539cb00000
kernel config: https://syzkaller.appspot.com/x/.config?x=9646ff3aa1daf1a8
dashboard link: https://syzkaller.appspot.com/bug?extid=1c559989cf06354d17bc
compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
CC: [ja...@suse.com linux-...@vger.kernel.org]

Unfortunately, I don't have any reproducer for this issue yet.

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+1c5599...@syzkaller.appspotmail.com

BUG: unable to handle page fault for address: ffffed101d6c9d0e
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 23ffef067 P4D 23ffef067 PUD 13fff6067 PMD 0
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 26830 Comm: syz-executor.5 Not tainted 5.15.0-rc7-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:le32_add_cpu include/linux/byteorder/generic.h:151 [inline]
RIP: 0010:udf_free_inode+0xe8/0x350 fs/udf/ialloc.c:40
Code: 2e 97 bc fe 66 41 81 fe 00 40 0f 84 89 01 00 00 e8 5d 90 bc fe 48 8d 7d 20 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 a6
RSP: 0018:ffffc9000473fc70 EFLAGS: 00010212
RAX: dffffc0000000000 RBX: ffff8880873cbb00 RCX: 0000000000000000
RDX: 1ffff1101d6c9d0e RSI: ffffffff82ba5cb3 RDI: ffff8880eb64e870
RBP: ffff8880eb64e850 R08: 0000000000000000 R09: 0000000000008000
R10: ffffffff82ba5ca2 R11: 0000000000004000 R12: ffff888076740000
R13: ffff88807761d8c0 R14: 0000000000008000 R15: ffff888076740678
FS: 00005555571a4400(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffed101d6c9d0e CR3: 0000000019995000 CR4: 0000000000350ee0
Call Trace:
udf_evict_inode+0x348/0x580 fs/udf/inode.c:164
evict+0x2ed/0x6b0 fs/inode.c:588
iput_final fs/inode.c:1664 [inline]
iput.part.0+0x539/0x850 fs/inode.c:1690
iput+0x58/0x70 fs/inode.c:1680
dentry_unlink_inode+0x2b1/0x460 fs/dcache.c:376
__dentry_kill+0x3c0/0x640 fs/dcache.c:582
dentry_kill fs/dcache.c:720 [inline]
dput+0x66b/0xbc0 fs/dcache.c:888
__fput+0x3ad/0x9f0 fs/file_table.c:293
task_work_run+0xdd/0x1a0 kernel/task_work.c:164
tracehook_notify_resume include/linux/tracehook.h:189 [inline]
exit_to_user_mode_loop kernel/entry/common.c:175 [inline]
exit_to_user_mode_prepare+0x27e/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f124f83367b
Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44
RSP: 002b:00007ffe9ecb9180 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007f124f83367b
RDX: 00007f124f989540 RSI: 00000000000f4240 RDI: 0000000000000003
RBP: 0000000000000000 R08: 0000000000000000 R09: 00007f124f9893c0
R10: 00007ffe9ed32090 R11: 0000000000000293 R12: 0000000000092dde
R13: 00000000000003e8 R14: 00007f124f983f60 R15: 0000000000092a2f
Modules linked in:
CR2: ffffed101d6c9d0e
---[ end trace 644a8be848efdff4 ]---
RIP: 0010:le32_add_cpu include/linux/byteorder/generic.h:151 [inline]
RIP: 0010:udf_free_inode+0xe8/0x350 fs/udf/ialloc.c:40
Code: 2e 97 bc fe 66 41 81 fe 00 40 0f 84 89 01 00 00 e8 5d 90 bc fe 48 8d 7d 20 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 a6
RSP: 0018:ffffc9000473fc70 EFLAGS: 00010212
RAX: dffffc0000000000 RBX: ffff8880873cbb00 RCX: 0000000000000000
RDX: 1ffff1101d6c9d0e RSI: ffffffff82ba5cb3 RDI: ffff8880eb64e870
RBP: ffff8880eb64e850 R08: 0000000000000000 R09: 0000000000008000
R10: ffffffff82ba5ca2 R11: 0000000000004000 R12: ffff888076740000
R13: ffff88807761d8c0 R14: 0000000000008000 R15: ffff888076740678
FS: 00005555571a4400(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffed101d6c9d0e CR3: 0000000019995000 CR4: 0000000000350ee0
----------------
Code disassembly (best guess):
0: 2e 97 cs xchg %eax,%edi
2: bc fe 66 41 81 mov $0x814166fe,%esp
7: fe 00 incb (%rax)
9: 40 0f 84 89 01 00 00 rex je 0x199
10: e8 5d 90 bc fe callq 0xfebc9072
15: 48 8d 7d 20 lea 0x20(%rbp),%rdi
19: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax
20: fc ff df
23: 48 89 fa mov %rdi,%rdx
26: 48 c1 ea 03 shr $0x3,%rdx
* 2a: 0f b6 14 02 movzbl (%rdx,%rax,1),%edx <-- trapping instruction
2e: 48 89 f8 mov %rdi,%rax
31: 83 e0 07 and $0x7,%eax
34: 83 c0 03 add $0x3,%eax
37: 38 d0 cmp %dl,%al
39: 7c 08 jl 0x43
3b: 84 d2 test %dl,%dl
3d: 0f .byte 0xf
3e: 85 .byte 0x85
3f: a6 cmpsb %es:(%rdi),%ds:(%rsi)


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Jan 25, 2022, 6:13:20 AM1/25/22
to syzkaller-upst...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages