kernel BUG in ext4_write_inline_data_end

7 views
Skip to first unread message

syzbot

unread,
Mar 4, 2022, 12:11:26 AM3/4/22
to syzkaller-a...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: e1b86e7f5cbb Merge branch 'android12-5.10' into `android12..
git tree: android12-5.10-lts
console output: https://syzkaller.appspot.com/x/log.txt?x=14e12616700000
kernel config: https://syzkaller.appspot.com/x/.config?x=d03a2621289f2222
dashboard link: https://syzkaller.appspot.com/bug?extid=2cc95c8e803bc7c9e5cb
compiler: Debian clang version 11.0.1-2, GNU ld (GNU Binutils for Debian) 2.35.2
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=16fe26be700000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=12f7f36e700000

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+2cc95c...@syzkaller.appspotmail.com

------------[ cut here ]------------
kernel BUG at fs/ext4/inline.c:760!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 1322 Comm: syz-executor206 Not tainted 5.10.102-syzkaller-00171-ge1b86e7f5cbb #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:ext4_write_inline_data_end+0x859/0x870 fs/ext4/ext4.h:3513
Code: 38 c1 0f 8c 8c fc ff ff 4c 89 ff e8 f1 bc c6 ff e9 7f fc ff ff 49 ff cf 4d 89 fe e9 6b fe ff ff e8 0c c3 bb 02 e8 37 c1 8c ff <0f> 0b e8 30 c1 8c ff 0f 0b e8 29 c1 8c ff 0f 0b e8 22 c1 8c ff 0f
RSP: 0018:ffffc90002407640 EFLAGS: 00010293
RAX: ffffffff81e02d99 RBX: 0000000000000000 RCX: ffff88810d40e2c0
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc90002407780 R08: ffffffff81e026f5 R09: ffffed10233d2536
R10: ffffed10233d2536 R11: 0000000000000000 R12: dffffc0000000000
R13: ffff888119e92af0 R14: 0000005c00080000 R15: ffffea0004683c80
FS: 00007ff40a1e9700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff40a1c8718 CR3: 000000010c428000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
ext4_write_end+0x1ef/0xde0 fs/ext4/inode.c:1304
ext4_da_write_end+0xba/0xb70 fs/ext4/inode.c:3112
generic_perform_write+0x413/0x5b0 mm/filemap.c:3479
ext4_buffered_write_iter+0x47c/0x610 fs/ext4/file.c:272
ext4_file_write_iter+0x485/0x1b70 fs/ext4/file.c:522
call_write_iter include/linux/fs.h:1947 [inline]
new_sync_write fs/read_write.c:518 [inline]
vfs_write+0xc02/0xf20 fs/read_write.c:605
ksys_write+0x186/0x2b0 fs/read_write.c:658
__do_sys_write fs/read_write.c:670 [inline]
__se_sys_write fs/read_write.c:667 [inline]
__x64_sys_write+0x7b/0x90 fs/read_write.c:667
do_syscall_64+0x31/0x70 arch/x86/entry/common.c:46
entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7ff40a23ce19
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ff40a1e92f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007ff40a2c24c0 RCX: 00007ff40a23ce19
RDX: 00000000000000a0 RSI: 0000000020000040 RDI: 0000000000000004
RBP: 00007ff40a28f0bc R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff40a28e0b8
R13: 0030656c69662f2e R14: e5d26e84aa4cf3c6 R15: 00007ff40a2c24c8
Modules linked in:
---[ end trace 0751eaa065f9f0f8 ]---
RIP: 0010:ext4_write_inline_data_end+0x859/0x870 fs/ext4/ext4.h:3513
Code: 38 c1 0f 8c 8c fc ff ff 4c 89 ff e8 f1 bc c6 ff e9 7f fc ff ff 49 ff cf 4d 89 fe e9 6b fe ff ff e8 0c c3 bb 02 e8 37 c1 8c ff <0f> 0b e8 30 c1 8c ff 0f 0b e8 29 c1 8c ff 0f 0b e8 22 c1 8c ff 0f
RSP: 0018:ffffc90002407640 EFLAGS: 00010293
RAX: ffffffff81e02d99 RBX: 0000000000000000 RCX: ffff88810d40e2c0
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc90002407780 R08: ffffffff81e026f5 R09: ffffed10233d2536
R10: ffffed10233d2536 R11: 0000000000000000 R12: dffffc0000000000
R13: ffff888119e92af0 R14: 0000005c00080000 R15: ffffea0004683c80
FS: 00007ff40a1e9700(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff40a1ea000 CR3: 000000010c428000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
syzbot can test patches for this issue, for details see:
https://goo.gl/tpsmEJ#testing-patches

syzbot

unread,
Mar 4, 2022, 1:32:28 AM3/4/22
to syzkaller-a...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 8a3679a75730 UPSTREAM: mmc: block: fix read single on reco..
git tree: android12-5.4
console output: https://syzkaller.appspot.com/x/log.txt?x=17d9d585700000
kernel config: https://syzkaller.appspot.com/x/.config?x=bbe0ee1ab44a44aa
dashboard link: https://syzkaller.appspot.com/bug?extid=5a7a005b7fb3843f6adc
compiler: Debian clang version 11.0.1-2, GNU ld (GNU Binutils for Debian) 2.35.2
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=165b1521700000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=16ff0a16700000

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+5a7a00...@syzkaller.appspotmail.com

------------[ cut here ]------------
kernel BUG at fs/ext4/inline.c:760!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 1929 Comm: syz-executor169 Not tainted 5.4.161-syzkaller-00026-g8a3679a75730 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:ext4_write_inline_data_end+0x7da/0x800 fs/ext4/ext4.h:3235
Code: 38 c1 0f 8c bc fc ff ff 48 89 df e8 70 29 d4 ff e9 af fc ff ff 49 ff ce 4c 89 f5 e9 75 fe ff ff e8 8b b2 80 ff e8 a6 0e a7 ff <0f> 0b e8 9f 0e a7 ff 0f 0b e8 98 0e a7 ff 0f 0b e8 91 0e a7 ff 0f
RSP: 0018:ffff8881dc5afa28 EFLAGS: 00010293
RAX: ffffffff81b998ba RBX: 0000009c00080000 RCX: ffff8881e22e0fc0
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffffffff81b99248 R09: ffffed103b806c80
R10: ffffed103b806c80 R11: 0000000000000000 R12: 00000000000000a0
R13: ffff8881dc0364a8 R14: dffffc0000000000 R15: ffffea00077dd700
FS: 00007f5fb2077700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f5fb2056718 CR3: 00000001ecb56000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
ext4_write_end+0x1f7/0xe90 fs/ext4/inode.c:1446
generic_perform_write+0x398/0x510 mm/filemap.c:3322
__generic_file_write_iter+0x239/0x480 mm/filemap.c:3440
ext4_file_write_iter+0x471/0x1050 fs/ext4/file.c:270
call_write_iter include/linux/fs.h:1976 [inline]
new_sync_write fs/read_write.c:483 [inline]
__vfs_write+0x506/0x6b0 fs/read_write.c:496
vfs_write+0x212/0x4e0 fs/read_write.c:558
ksys_write+0x13f/0x240 fs/read_write.c:611
do_syscall_64+0xcb/0x1e0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7f5fb20cae19
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f5fb20772f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007f5fb21504c0 RCX: 00007f5fb20cae19
RDX: 00000000000000a0 RSI: 0000000020000040 RDI: 0000000000000004
RBP: 00007f5fb211d0bc R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5fb211c0b8
R13: 0030656c69662f2e R14: e5d26e84aa4cf3c6 R15: 00007f5fb21504c8
Modules linked in:
---[ end trace 568bf65a9065d607 ]---
RIP: 0010:ext4_write_inline_data_end+0x7da/0x800 fs/ext4/ext4.h:3235
Code: 38 c1 0f 8c bc fc ff ff 48 89 df e8 70 29 d4 ff e9 af fc ff ff 49 ff ce 4c 89 f5 e9 75 fe ff ff e8 8b b2 80 ff e8 a6 0e a7 ff <0f> 0b e8 9f 0e a7 ff 0f 0b e8 98 0e a7 ff 0f 0b e8 91 0e a7 ff 0f
RSP: 0018:ffff8881dc5afa28 EFLAGS: 00010293
RAX: ffffffff81b998ba RBX: 0000009c00080000 RCX: ffff8881e22e0fc0
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffffffff81b99248 R09: ffffed103b806c80
R10: ffffed103b806c80 R11: 0000000000000000 R12: 00000000000000a0
R13: ffff8881dc0364a8 R14: dffffc0000000000 R15: ffffea00077dd700
FS: 00007f5fb2077700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f5fb210c4f0 CR3: 00000001ecb56000 CR4: 00000000003406f0

Tadeusz Struk

unread,
Mar 4, 2022, 10:20:32 AM3/4/22
to syzbot, syzkaller-a...@googlegroups.com
#syz dup: BUG in ext4_ind_remove_space
--
Thanks,
Tadeusz

syzbot

unread,
Mar 4, 2022, 10:20:33 AM3/4/22
to Tadeusz Struk, syzkaller-a...@googlegroups.com, tadeus...@linaro.org
> #syz dup: BUG in ext4_ind_remove_space

can't find the dup bug

syzbot

unread,
Mar 4, 2022, 10:20:34 AM3/4/22
to Tadeusz Struk, syzkaller-a...@googlegroups.com, tadeus...@linaro.org
> #syz dup: BUG in ext4_ind_remove_space

can't find the dup bug

>
> --
> You received this message because you are subscribed to the Google Groups "syzkaller-android-bugs" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to syzkaller-android...@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/msgid/syzkaller-android-bugs/805a8723-94ee-43c0-e975-e47d2b20b1cd%40linaro.org.

Tadeusz Struk

unread,
Mar 4, 2022, 10:25:30 AM3/4/22
to syzbot, syzkaller-a...@googlegroups.com
#syz dup: kernel BUG in ext4_ind_remove_space

On 3/3/22 21:11, syzbot wrote:
--
Thanks,
Tadeusz
Reply all
Reply to author
Forward
0 new messages