[moderation] [arm?] Internal error in __switch_to

0 views
Skip to first unread message

syzbot

unread,
Jun 3, 2024, 7:49:29 PMJun 3
to syzkaller-upst...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 4a4be1ad3a6e Revert "vfs: Delete the associated dentry whe..
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=13ea49c2980000
kernel config: https://syzkaller.appspot.com/x/.config?x=bd6024aedb15e15c
dashboard link: https://syzkaller.appspot.com/bug?extid=6fa2d54872b1be42c821
compiler: aarch64-linux-gnu-gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40
userspace arch: arm64
CC: [catalin...@arm.com linux-ar...@lists.infradead.org linux-...@vger.kernel.org wi...@kernel.org]

Unfortunately, I don't have any reproducer for this issue yet.

Downloadable assets:
disk image (non-bootable): https://storage.googleapis.com/syzbot-assets/384ffdcca292/non_bootable_disk-4a4be1ad.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/75957361122b/vmlinux-4a4be1ad.xz
kernel image: https://storage.googleapis.com/syzbot-assets/6c766b0ec377/Image-4a4be1ad.gz.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+6fa2d5...@syzkaller.appspotmail.com

Internal error: Oops - FPAC: 0000000072000000 [#1] PREEMPT SMP
Modules linked in:
CPU: 1 PID: 4177 Comm: syz-executor.1 Not tainted 6.10.0-rc1-syzkaller-00027-g4a4be1ad3a6e #0
Hardware name: linux,dummy-virt (DT)
pstate: 804000c9 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : __switch_to+0xe8/0x124 arch/arm64/kernel/process.c:556
lr : 0xb20f800081976ad8
sp : ffff800088f839a0
x29: ff7f800088f839a0 x28: fdf00000041c8000 x27: 0000000020c15000
x26: 0000000000000001 x25: fdf00000041c86a0 x24: ffff8000825e3308
x23: 308f8000819779a4 x22: fdf00000041c8000 x21: fff000007f8ee340
x20: 0000000000000080 x19: f070000002e54980 x18: 0000000000000014
x17: fff07ffffd331000 x16: ffff800080008000 x15: 00000000054b9281
x14: 000000000000033d x13: 0000000000000000 x12: ffff8000825e0028
x11: 0000000000000001 x10: 2fb59b7b3b1fcaed x9 : 637defc0ebb07af4
x8 : fdf00000041c91d8 x7 : 0000000000000004 x6 : 0000000000000190
x5 : 00000000000f0510 x4 : 0000000000f0000f x3 : 000000000000ffff
x2 : 92000d3ab474591d x1 : fdf00000041c8000 x0 : f0f0000002e54900
Call trace:
__switch_to+0xe8/0x124 arch/arm64/kernel/process.c:556
Code: aa1403e0 979a7ac0 a94153f3 a8c27bfd (d50323bf)
---[ end trace 0000000000000000 ]---
----------------
Code disassembly (best guess):
0: aa1403e0 mov x0, x20
4: 979a7ac0 bl 0xfffffffffe69eb04
8: a94153f3 ldp x19, x20, [sp, #16]
c: a8c27bfd ldp x29, x30, [sp], #32
* 10: d50323bf autiasp <-- trapping instruction


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title

If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)

If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report

If you want to undo deduplication, reply with:
#syz undup
Reply all
Reply to author
Forward
0 new messages