From: syzbot <syzbot+3c530d01065fbfab6070@syzkaller.appspotmail.com>
To: linux-kernel@vger.kernel.org, reiserfs-devel@vger.kernel.org,
syzkaller-bugs@googlegroups.com, willy@infradead.org
Subject: [syzbot] BUG: unable to handle kernel paging request in open_xa_dir
Date: Mon, 05 Sep 2022 01:53:29 -0700 [thread overview]
Message-ID: <000000000000b04b4705e7ea36fb@google.com> (raw)
Hello,
syzbot found the following issue on:
HEAD commit: 85413d1e802e Merge branch 'for-next/fixes' into for-kernelci
git tree: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci
console output: https://syzkaller.appspot.com/x/log.txt?x=113a1bc7080000
kernel config: https://syzkaller.appspot.com/x/.config?x=57b9bfeca947ab90
dashboard link: https://syzkaller.appspot.com/bug?extid=3c530d01065fbfab6070
compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2
userspace arch: arm64
Unfortunately, I don't have any reproducer for this issue yet.
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+3c530d01065fbfab6070@syzkaller.appspotmail.com
loop1: detected capacity change from 0 to 65534
Unable to handle kernel paging request at virtual address 0000000081a401ba
Mem abort info:
ESR = 0x0000000096000005
EC = 0x25: DABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x05: level 1 translation fault
Data abort info:
ISV = 0, ISS = 0x00000005
CM = 0, WnR = 0
user pgtable: 4k pages, 48-bit VAs, pgdp=0000000138114000
[0000000081a401ba] pgd=080000013d972003, p4d=080000013d972003, pud=0000000000000000
Internal error: Oops: 96000005 [#1] PREEMPT SMP
Modules linked in:
CPU: 1 PID: 15506 Comm: syz-executor.1 Not tainted 6.0.0-rc3-syzkaller-16800-g85413d1e802e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : d_really_is_negative include/linux/dcache.h:465 [inline]
pc : open_xa_root fs/reiserfs/xattr.c:124 [inline]
pc : open_xa_dir+0x48/0x2a8 fs/reiserfs/xattr.c:152
lr : open_xa_dir+0x34/0x2a8 fs/reiserfs/xattr.c:148
sp : ffff80002214b850
x29: ffff80002214b870 x28: 0000000000000030 x27: ffff0000e44c7d68
x26: 0000000000000000 x25: 0000000000000000 x24: 0000000081a40152
x23: 0000000000000000 x22: 0000000000000002 x21: ffff0000e4530190
x20: 0000000000000002 x19: ffff0000c3f35000 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
x14: 0000000000000002 x13: 0000000000008000 x12: 0000000000040000
x11: 000000000001f773 x10: ffff80001a24a000 x9 : ffff800008795070
x8 : ffff0000fae34b00 x7 : ffff8000086ace88 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000002 x1 : 0000000000000002 x0 : ffff0000e4530190
Call trace:
open_xa_root fs/reiserfs/xattr.c:121 [inline]
open_xa_dir+0x48/0x2a8 fs/reiserfs/xattr.c:152
xattr_lookup+0x34/0x198 fs/reiserfs/xattr.c:395
reiserfs_xattr_get+0x8c/0x680 fs/reiserfs/xattr.c:677
reiserfs_get_acl+0x84/0x1ac fs/reiserfs/xattr_acl.c:214
get_acl+0x104/0x330 fs/posix_acl.c:152
check_acl+0x40/0x168 fs/namei.c:306
acl_permission_check fs/namei.c:351 [inline]
generic_permission+0x270/0x32c fs/namei.c:404
reiserfs_permission+0x4c/0x6c fs/reiserfs/xattr.c:954
do_inode_permission fs/namei.c:458 [inline]
inode_permission+0x128/0x244 fs/namei.c:525
may_open+0x1e4/0x2bc fs/namei.c:3185
do_open fs/namei.c:3555 [inline]
path_openat+0xdd0/0x11c4 fs/namei.c:3691
do_filp_open+0xdc/0x1b8 fs/namei.c:3718
do_sys_openat2+0xb8/0x22c fs/open.c:1311
do_sys_open fs/open.c:1327 [inline]
__do_sys_openat fs/open.c:1343 [inline]
__se_sys_openat fs/open.c:1338 [inline]
__arm64_sys_openat+0xb0/0xe0 fs/open.c:1338
__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
invoke_syscall arch/arm64/kernel/syscall.c:52 [inline]
el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142
do_el0_svc+0x48/0x154 arch/arm64/kernel/syscall.c:206
el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:624
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:642
el0t_64_sync+0x18c/0x190
Code: 390043ff a9007fff f9433e68 f942cd18 (f9403708)
---[ end trace 0000000000000000 ]---
----------------
Code disassembly (best guess):
0: 390043ff strb wzr, [sp, #16]
4: a9007fff stp xzr, xzr, [sp]
8: f9433e68 ldr x8, [x19, #1656]
c: f942cd18 ldr x24, [x8, #1432]
* 10: f9403708 ldr x8, [x24, #104] <-- trapping instruction
---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzkaller@googlegroups.com.
syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
next reply other threads:[~2022-09-05 8:53 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-09-05 8:53 syzbot [this message]
2022-11-23 13:39 ` [syzbot] BUG: unable to handle kernel paging request in open_xa_dir syzbot
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=000000000000b04b4705e7ea36fb@google.com \
--to=syzbot+3c530d01065fbfab6070@syzkaller.appspotmail.com \
--cc=linux-kernel@vger.kernel.org \
--cc=reiserfs-devel@vger.kernel.org \
--cc=syzkaller-bugs@googlegroups.com \
--cc=willy@infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.