kernel BUG at fs/ext4/super.c:LINE!

6 views
Skip to first unread message

syzbot

unread,
Oct 5, 2019, 7:20:08 AM10/5/19
to syzkaller-a...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: ed203b32 BACKPORT: block: annotate refault stalls from IO ..
git tree: android-4.14
console output: https://syzkaller.appspot.com/x/log.txt?x=15a74797600000
kernel config: https://syzkaller.appspot.com/x/.config?x=18f58950bb3393bd
dashboard link: https://syzkaller.appspot.com/bug?extid=3c6c3e07a9dd8faec92b
compiler: gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+3c6c3e...@syzkaller.appspotmail.com

EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps
superblock
EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps
superblock
EXT4-fs (loop4): INFO: recovery required on readonly filesystem
EXT4-fs (loop4): write access will be enabled during recovery
------------[ cut here ]------------
kernel BUG at fs/ext4/super.c:4629!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI
Modules linked in:
CPU: 1 PID: 24139 Comm: syz-executor.4 Not tainted 4.14.146+ #0
task: 00000000adc89cb0 task.stack: 000000006be06d98
RIP: 0010:ext4_get_dev_journal fs/ext4/super.c:4629 [inline]
RIP: 0010:ext4_load_journal fs/ext4/super.c:4762 [inline]
RIP: 0010:ext4_fill_super+0xa2d7/0xb210 fs/ext4/super.c:4176
RSP: 0018:ffff8881a4017a80 EFLAGS: 00010246
RAX: 0000000000040000 RBX: ffff88819e708400 RCX: 0000000000040000
RDX: ffffffff8182bb37 RSI: ffffc90000519000 RDI: ffff88819e70845c
RBP: ffff8881a4017cd0 R08: 000000000000003d R09: ffffed103b723cb1
R10: ffffed103b723cb0 R11: ffff8881db91e587 R12: 0000000000000000
R13: 0000000000000000 R14: ffff8881c9735500 R15: ffff8881c9736600
FS: 00007ff37883f700(0000) GS:ffff8881db900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff3787dbdb8 CR3: 00000001c92be002 CR4: 00000000001606a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
mount_bdev+0x2b6/0x360 fs/super.c:1149
mount_fs+0x277/0x312 fs/super.c:1255
vfs_kern_mount.part.0+0xc7/0x4a0 fs/namespace.c:1056
vfs_kern_mount fs/namespace.c:1038 [inline]
do_new_mount fs/namespace.c:2573 [inline]
do_mount+0x3f6/0x26a0 fs/namespace.c:2903
SYSC_mount fs/namespace.c:3119 [inline]
SyS_mount+0xa8/0x120 fs/namespace.c:3096
do_syscall_64+0x19b/0x520 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45c4aa
RSP: 002b:00007ff37883ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007ff37883eb40 RCX: 000000000045c4aa
RDX: 00007ff37883eae0 RSI: 0000000020000000 RDI: 00007ff37883eb00
RBP: 0000000000001000 R08: 00007ff37883eb40 R09: 00007ff37883eae0
R10: 0000000000000005 R11: 0000000000000206 R12: 0000000000000004
R13: 00000000004c8dfa R14: 00000000004e0260 R15: 00000000ffffffff
Code: c2 20 75 ef 8a 4c 89 f7 48 89 c1 48 c7 c6 80 36 ef 8a e8 5d 99 fe ff
c7 85 a0 fe ff ff ea ff ff ff e9 56 c7 ff ff e8 b9 5d ae ff <0f> 0b e8 42
27 d1 ff e9 4f f7 ff ff e8 18 27 d1 ff e9 76 f8 ff
RIP: ext4_get_dev_journal fs/ext4/super.c:4629 [inline] RSP:
ffff8881a4017a80
RIP: ext4_load_journal fs/ext4/super.c:4762 [inline] RSP: ffff8881a4017a80
RIP: ext4_fill_super+0xa2d7/0xb210 fs/ext4/super.c:4176 RSP:
ffff8881a4017a80
---[ end trace 19150b171fb67b05 ]---


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Feb 2, 2020, 5:20:09 AM2/2/20
to syzkaller-a...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages