On Sun, 25 Jul 2021 23:00:19 -0700
> syzbot found the following issue on:
> 
> HEAD commit:    6498f6151825 Merge tag 'riscv-for-linus-5.14-rc3' of git:/..
> git tree:       upstream
> console output: https://syzkaller.appspot.com/x/log.txt?x=14bbce46300000
> kernel config:  https://syzkaller.appspot.com/x/.config?x=5dc0e3202ae2f574
> dashboard link: https://syzkaller.appspot.com/bug?extid=07ff38c9c93ca170de07
> compiler:       Debian clang version 11.0.1-2, GNU ld (GNU Binutils for 
> Debian) 2.35.1
> 
> Unfortunately, I don't have any reproducer for this issue yet.

Given the code [1], curious about the reasons possible behind this report.

2416 void f2fs_update_meta_page(struct f2fs_sb_info *sbi,
2417                                    void *src, block_t blk_addr)
2418 {
2419    struct page *page = f2fs_grab_meta_page(sbi, blk_addr);
2420
2421    memcpy(page_address(page), src, PAGE_SIZE);
2422    set_page_dirty(page);
2423    f2fs_put_page(page, 1);
2424 }

[1] 
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/fs/f2fs/segment.c?id=6498f6151825#n2422

> 
> IMPORTANT: if you fix the issue, please add the following tag to the commit:
> Reported-by: syzbot+07ff38c9c93ca170d...@syzkaller.appspotmail.com
> 
> BUG: kernel NULL pointer dereference, address: 0000000000000000
> #PF: supervisor instruction fetch in kernel mode
> #PF: error_code(0x0010) - not-present page
> PGD 7395a067 P4D 7395a067 PUD 7395b067 PMD 0 
> Oops: 0010 [#1] PREEMPT SMP KASAN
> CPU: 0 PID: 14793 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS 
> Google 01/01/2011
> RIP: 0010:0x0
> Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
> RSP: 0018:ffffc9000158f858 EFLAGS: 00010286
> RAX: 1ffffffff147d97b RBX: 00000000000005ff RCX: ffffffff8a3ecbd8
> RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea00027e9540
> RBP: ffffc9000158fad0 R08: ffffffff81aa846c R09: fffff940004fd2a9
> R10: fffff940004fd2a9 R11: 0000000000000000 R12: ffff888081491310
> R13: 0000000000000001 R14: ffff88807fa0e000 R15: ffffea00027e9540
> FS:  0000000002a84400(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
> CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> CR2: ffffffffffffffd6 CR3: 0000000073959000 CR4: 00000000001526f0
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
> Call Trace:
>  f2fs_update_meta_page+0x4b/0x380 fs/f2fs/segment.c:2422
>  do_checkpoint fs/f2fs/checkpoint.c:1492 [inline]
>  f2fs_write_checkpoint+0x2f1b/0x5060 fs/f2fs/checkpoint.c:1650
>  f2fs_issue_checkpoint+0x308/0x4a0 fs/f2fs/checkpoint.c:1718
>  __sync_filesystem fs/sync.c:39 [inline]
>  sync_filesystem+0x19e/0x200 fs/sync.c:67
>  generic_shutdown_super+0x6e/0x2b0 fs/super.c:448
>  kill_block_super+0x79/0xd0 fs/super.c:1395
>  kill_f2fs_super+0x2f9/0x3c0 fs/f2fs/super.c:4329
>  deactivate_locked_super+0xa7/0xf0 fs/super.c:335
>  cleanup_mnt+0x462/0x510 fs/namespace.c:1136
>  task_work_run+0x146/0x1c0 kernel/task_work.c:164
>  tracehook_notify_resume include/linux/tracehook.h:189 [inline]
>  exit_to_user_mode_loop kernel/entry/common.c:175 [inline]
>  exit_to_user_mode_prepare+0x201/0x220 kernel/entry/common.c:209
>  __syscall_exit_to_user_mode_work kernel/entry/common.c:291 [inline]
>  syscall_exit_to_user_mode+0x26/0x60 kernel/entry/common.c:302
>  do_syscall_64+0x4c/0xb0 arch/x86/entry/common.c:86
>  entry_SYSCALL_64_after_hwframe+0x44/0xae
> RIP: 0033:0x467a47
> Code: ff d0 48 89 c7 b8 3c 00 00 00 0f 05 48 c7 c1 bc ff ff ff f7 d8 64 89 01 
> 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 
> 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
> RSP: 002b:00007fffa4976ab8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
> RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000467a47
> RDX: 00007fffa4976b8b RSI: 0000000000000002 RDI: 00007fffa4976b80
> RBP: 00007fffa4976b80 R08: 00000000ffffffff R09: 00007fffa4976950
> R10: 0000000002a858e3 R11: 0000000000000246 R12: 00000000004bee90
> R13: 00007fffa4977c50 R14: 0000000002a85810 R15: 00007fffa4977c90
> Modules linked in:
> CR2: 0000000000000000
> ---[ end trace dff6785899946653 ]---
> RIP: 0010:0x0
> Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
> RSP: 0018:ffffc9000158f858 EFLAGS: 00010286
> RAX: 1ffffffff147d97b RBX: 00000000000005ff RCX: ffffffff8a3ecbd8
> RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffea00027e9540
> RBP: ffffc9000158fad0 R08: ffffffff81aa846c R09: fffff940004fd2a9
> R10: fffff940004fd2a9 R11: 0000000000000000 R12: ffff888081491310
> R13: 0000000000000001 R14: ffff88807fa0e000 R15: ffffea00027e9540
> FS:  0000000002a84400(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
> CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> CR2: ffffffffffffffd6 CR3: 0000000073959000 CR4: 00000000001526f0
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
> 
> 
> ---
> This report is generated by a bot. It may contain errors.
> See https://goo.gl/tpsmEJ for more information about syzbot.
> syzbot engineers can be reached at syzkal...@googlegroups.com.
> 
> syzbot will keep track of this issue. See:
> https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
> 


_______________________________________________
Linux-f2fs-devel mailing list
Linux-f2fs-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/linux-f2fs-devel

Reply via email to