[syzbot] kernel BUG in ext4_es_cache_extent

23 views
Skip to first unread message

syzbot

unread,
Feb 6, 2022, 8:49:22ā€ÆAM2/6/22
to adilger...@dilger.ca, linux...@vger.kernel.org, linux-...@vger.kernel.org, syzkall...@googlegroups.com, ty...@mit.edu
Hello,

syzbot found the following issue on:

HEAD commit: 9f7fb8de5d9b Merge tag 'spi-fix-v5.17-rc2' of git://git.ke..
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=148d0304700000
kernel config: https://syzkaller.appspot.com/x/.config?x=b4a89edfcc8f7c74
dashboard link: https://syzkaller.appspot.com/bug?extid=c7358a3cd05ee786eb31
compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=124e0abfb00000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=1758f610700000

Bisection is inconclusive: the issue happens on the oldest tested release.

bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=12758738700000
final oops: https://syzkaller.appspot.com/x/report.txt?x=11758738700000
console output: https://syzkaller.appspot.com/x/log.txt?x=16758738700000

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+c7358a...@syzkaller.appspotmail.com

loop0: detected capacity change from 0 to 1051
EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0)
EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback.
------------[ cut here ]------------
kernel BUG at fs/ext4/extents_status.c:899!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 3587 Comm: syz-executor288 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:ext4_es_cache_extent+0x4e8/0x550 fs/ext4/extents_status.c:899
Code: 00 48 c7 c7 e0 6c c1 89 c6 05 71 25 6f 0b 01 e8 b0 b6 f6 06 e9 5a ff ff ff e8 94 9d 68 ff 0f 0b e9 d7 fc ff ff e8 88 9d 68 ff <0f> 0b e8 81 9d 68 ff 0f 0b e9 13 fe ff ff e8 25 df af ff e9 c2 fb
RSP: 0018:ffffc90001abee80 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 00000000000013de RCX: 0000000000000000
RDX: ffff88807deb0000 RSI: ffffffff820fd0f8 RDI: 0000000000000003
RBP: ffff888074e6f048 R08: 00000000ffffffff R09: 0000000000000000
R10: ffffffff820fce3c R11: 0000000000000000 R12: 0000000000000001
R13: 00000000ffffffff R14: 1ffff92000357dd1 R15: 00008f1cffffffff
FS: 0000555556ad6300(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f117149e4b0 CR3: 000000007cc1f000 CR4: 0000000000350ee0
Call Trace:
<TASK>
ext4_cache_extents+0x13e/0x2d0 fs/ext4/extents.c:518
ext4_find_extent+0x8f6/0xd10 fs/ext4/extents.c:916
ext4_ext_map_blocks+0x1e2/0x5f30 fs/ext4/extents.c:4098
ext4_map_blocks+0x9ca/0x18a0 fs/ext4/inode.c:563
ext4_getblk+0x553/0x6b0 fs/ext4/inode.c:849
ext4_bread_batch+0x7c/0x550 fs/ext4/inode.c:923
__ext4_find_entry+0x482/0x1050 fs/ext4/namei.c:1600
ext4_lookup_entry fs/ext4/namei.c:1701 [inline]
ext4_lookup fs/ext4/namei.c:1769 [inline]
ext4_lookup+0x4fc/0x730 fs/ext4/namei.c:1760
__lookup_slow+0x24c/0x480 fs/namei.c:1707
lookup_slow fs/namei.c:1724 [inline]
walk_component+0x40f/0x6a0 fs/namei.c:2020
link_path_walk.part.0+0x7ef/0xf70 fs/namei.c:2347
link_path_walk fs/namei.c:2272 [inline]
path_openat+0x266/0x2940 fs/namei.c:3605
do_filp_open+0x1aa/0x400 fs/namei.c:3636
do_sys_openat2+0x16d/0x4d0 fs/open.c:1214
do_sys_open fs/open.c:1230 [inline]
__do_sys_openat fs/open.c:1246 [inline]
__se_sys_openat fs/open.c:1241 [inline]
__x64_sys_openat+0x13f/0x1f0 fs/open.c:1241
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f8e44f22f19
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff98aa3238 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8e44f22f19
RDX: 000000000000c880 RSI: 0000000020000100 RDI: 0000000000000005
RBP: 00007f8e44ee27b0 R08: 0000000800000015 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8e44ee2840
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:ext4_es_cache_extent+0x4e8/0x550 fs/ext4/extents_status.c:899
Code: 00 48 c7 c7 e0 6c c1 89 c6 05 71 25 6f 0b 01 e8 b0 b6 f6 06 e9 5a ff ff ff e8 94 9d 68 ff 0f 0b e9 d7 fc ff ff e8 88 9d 68 ff <0f> 0b e8 81 9d 68 ff 0f 0b e9 13 fe ff ff e8 25 df af ff e9 c2 fb
RSP: 0018:ffffc90001abee80 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 00000000000013de RCX: 0000000000000000
RDX: ffff88807deb0000 RSI: ffffffff820fd0f8 RDI: 0000000000000003
RBP: ffff888074e6f048 R08: 00000000ffffffff R09: 0000000000000000
R10: ffffffff820fce3c R11: 0000000000000000 R12: 0000000000000001
R13: 00000000ffffffff R14: 1ffff92000357dd1 R15: 00008f1cffffffff
FS: 0000555556ad6300(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f117149e4b0 CR3: 000000007cc1f000 CR4: 0000000000350ee0


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
For information about bisection process see: https://goo.gl/tpsmEJ#bisection
syzbot can test patches for this issue, for details see:
https://goo.gl/tpsmEJ#testing-patches

syzbot

unread,
Feb 13, 2022, 9:46:07ā€ÆAM2/13/22
to phin...@gmail.com, syzkall...@googlegroups.com
Hello,

syzbot tried to test the proposed patch but the build/boot failed:

fd05df5de1c
Code: fa fa ff ff 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 20 fb ff ff 48 8b
RSP: 002b:00007ffe0538b4f0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00007fd05eff6320 RCX: 00007fd05df5de1c
RDX: 0000000000000048 RSI: 00007fd05eff6370 RDI: 0000000000000003
RBP: 0000000000000000 R08: 00007ffe0538b544 R09: 000000000000000c
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
R13: 00007fd05eff6370 R14: 0000000000000003 R15: 0000000000000000
</TASK>
device hsr_slave_0 entered promiscuous mode
device hsr_slave_1 entered promiscuous mode
netdevsim netdevsim0 netdevsim0: renamed from eth0
netdevsim netdevsim0 netdevsim1: renamed from eth1
netdevsim netdevsim0 netdevsim2: renamed from eth2
netdevsim netdevsim0 netdevsim3: renamed from eth3
bridge0: port 2(bridge_slave_1) entered blocking state
bridge0: port 2(bridge_slave_1) entered forwarding state
bridge0: port 1(bridge_slave_0) entered blocking state
bridge0: port 1(bridge_slave_0) entered forwarding state
8021q: adding VLAN 0 to HW filter on device bond0
8021q: adding VLAN 0 to HW filter on device team0
hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
8021q: adding VLAN 0 to HW filter on device batadv0
device veth0_vlan entered promiscuous mode
device veth1_vlan entered promiscuous mode
device veth0_macvtap entered promiscuous mode
device veth1_macvtap entered promiscuous mode
batman_adv: batadv0: Interface activated: batadv_slave_0
batman_adv: batadv0: Interface activated: batadv_slave_1
netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0


forked to background, child pid 3169
no interfaces have a carrier
[ 20.191329][ T3170] 8021q: adding VLAN 0 to HW filter on device bond0
[ 20.201096][ T3170] eql: remember to turn off Van-Jacobson compression on your slave devices
Starting sshd: OK

syzkaller
syzkaller login: [ 26.797048][ T3372] sshd (3372) used greatest stack depth: 22896 bytes left
Warning: Permanently added '10.128.1.105' (ECDSA) to the list of known hosts.
2022/02/13 14:45:46 fuzzer started
2022/02/13 14:45:46 connecting to host at 10.128.0.169:45639
2022/02/13 14:45:46 checking machine...
2022/02/13 14:45:46 checking revisions...
2022/02/13 14:45:46 testing simple program...
[ 34.624241][ T3590] cgroup: Unknown subsys name 'net'
[ 34.735576][ T3590] cgroup: Unknown subsys name 'rlimit'
[ 35.956902][ T3594] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 35.964741][ T3594] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 35.972186][ T3594] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 35.979767][ T3594] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 35.987512][ T3594] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3
[ 35.994808][ T3594] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 36.064894][ T3592] chnl_net:caif_netlink_parms(): no params data found
[ 36.099537][ T3592] bridge0: port 1(bridge_slave_0) entered blocking state
[ 36.107248][ T3592] bridge0: port 1(bridge_slave_0) entered disabled state
[ 36.115066][ T3592] device bridge_slave_0 entered promiscuous mode
[ 36.123334][ T3592] bridge0: port 2(bridge_slave_1) entered blocking state
[ 36.130393][ T3592] bridge0: port 2(bridge_slave_1) entered disabled state
[ 36.138384][ T3592] device bridge_slave_1 entered promiscuous mode
[ 36.155856][ T3592] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 36.166366][ T3592] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 36.185758][ T3592] team0: Port device team_slave_0 added
[ 36.192550][ T3592] team0: Port device team_slave_1 added
[ 36.208083][ T3592] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 36.215197][ T3592] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 36.241438][ T3592] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 36.253750][ T3592] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 36.260759][ T3592] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 36.287148][ T3592] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 36.308570][ T3592]
[ 36.310992][ T3592] =============================
[ 36.315830][ T3592] WARNING: suspicious RCU usage
[ 36.320690][ T3592] 5.17.0-rc3-next-20220211-syzkaller #0 Not tainted
[ 36.327271][ T3592] -----------------------------
[ 36.332152][ T3592] net/hsr/hsr_framereg.c:34 suspicious rcu_dereference_check() usage!
[ 36.340283][ T3592]
[ 36.340283][ T3592] other info that might help us debug this:
[ 36.340283][ T3592]
[ 36.350597][ T3592]
[ 36.350597][ T3592] rcu_scheduler_active = 2, debug_locks = 1
[ 36.358658][ T3592] 2 locks held by syz-executor.0/3592:
[ 36.364129][ T3592] #0: ffffffff8d333028 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x3be/0xb80
[ 36.373573][ T3592] #1: ffff88801dbbd5f0 (&hsr->list_lock){+...}-{2:2}, at: hsr_create_self_node+0x225/0x650
[ 36.383685][ T3592]
[ 36.383685][ T3592] stack backtrace:
[ 36.389557][ T3592] CPU: 0 PID: 3592 Comm: syz-executor.0 Not tainted 5.17.0-rc3-next-20220211-syzkaller #0
[ 36.399520][ T3592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 36.409724][ T3592] Call Trace:
[ 36.412980][ T3592] <TASK>
[ 36.415886][ T3592] dump_stack_lvl+0xcd/0x134
[ 36.420456][ T3592] hsr_node_get_first+0x9b/0xb0
[ 36.425287][ T3592] hsr_create_self_node+0x22d/0x650
[ 36.430474][ T3592] hsr_dev_finalize+0x2c1/0x7d0
[ 36.435308][ T3592] hsr_newlink+0x315/0x730
[ 36.439707][ T3592] ? hsr_dellink+0x130/0x130
[ 36.444320][ T3592] ? rtnl_create_link+0x7e8/0xc00
[ 36.449335][ T3592] ? hsr_dellink+0x130/0x130
[ 36.453922][ T3592] __rtnl_newlink+0x107c/0x1760
[ 36.458767][ T3592] ? rtnl_setlink+0x3c0/0x3c0
[ 36.463439][ T3592] ? is_bpf_text_address+0x77/0x170
[ 36.468639][ T3592] ? lock_downgrade+0x6e0/0x6e0
[ 36.473488][ T3592] ? unwind_next_frame+0xee1/0x1ce0
[ 36.478680][ T3592] ? entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 36.484743][ T3592] ? __sanitizer_cov_trace_cmp4+0x1c/0x70
[ 36.490454][ T3592] ? is_bpf_text_address+0x99/0x170
[ 36.495650][ T3592] ? kernel_text_address+0x39/0x80
[ 36.500756][ T3592] ? __kernel_text_address+0x9/0x30
[ 36.505943][ T3592] ? unwind_get_return_address+0x51/0x90
[ 36.511561][ T3592] ? create_prof_cpu_mask+0x20/0x20
[ 36.516751][ T3592] ? arch_stack_walk+0x93/0xe0
[ 36.521632][ T3592] ? kmem_cache_alloc_trace+0x42/0x2c0
[ 36.527089][ T3592] ? rcu_read_lock_sched_held+0x3a/0x70
[ 36.532630][ T3592] rtnl_newlink+0x64/0xa0
[ 36.536947][ T3592] ? __rtnl_newlink+0x1760/0x1760
[ 36.541957][ T3592] rtnetlink_rcv_msg+0x413/0xb80
[ 36.546886][ T3592] ? rtnl_newlink+0xa0/0xa0
[ 36.551384][ T3592] netlink_rcv_skb+0x153/0x420
[ 36.556137][ T3592] ? rtnl_newlink+0xa0/0xa0
[ 36.560626][ T3592] ? netlink_ack+0xa80/0xa80
[ 36.565197][ T3592] ? netlink_deliver_tap+0x1a2/0xc40
[ 36.570470][ T3592] ? netlink_deliver_tap+0x1b1/0xc40
[ 36.575743][ T3592] netlink_unicast+0x539/0x7e0
[ 36.580500][ T3592] ? netlink_attachskb+0x880/0x880
[ 36.585592][ T3592] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 36.591905][ T3592] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 36.598130][ T3592] ? __phys_addr_symbol+0x2c/0x70
[ 36.603144][ T3592] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 36.608850][ T3592] ? __check_object_size+0x16c/0x4f0
[ 36.614126][ T3592] netlink_sendmsg+0x904/0xe00
[ 36.618881][ T3592] ? netlink_unicast+0x7e0/0x7e0
[ 36.623808][ T3592] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 36.630037][ T3592] ? netlink_unicast+0x7e0/0x7e0
[ 36.634958][ T3592] sock_sendmsg+0xcf/0x120
[ 36.639363][ T3592] __sys_sendto+0x21c/0x320
[ 36.643857][ T3592] ? __ia32_sys_getpeername+0xb0/0xb0
[ 36.649218][ T3592] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 36.655202][ T3592] ? __context_tracking_exit+0xb8/0xe0
[ 36.660651][ T3592] ? lock_downgrade+0x6e0/0x6e0
[ 36.665493][ T3592] ? lock_downgrade+0x6e0/0x6e0
[ 36.670345][ T3592] __x64_sys_sendto+0xdd/0x1b0
[ 36.675095][ T3592] ? lockdep_hardirqs_on+0x79/0x100
[ 36.680281][ T3592] ? syscall_enter_from_user_mode+0x21/0x70
[ 36.686163][ T3592] do_syscall_64+0x35/0xb0
[ 36.690564][ T3592] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 36.696446][ T3592] RIP: 0033:0x7fd05df5de1c
[ 36.700844][ T3592] Code: fa fa ff ff 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 20 fb ff ff 48 8b
[ 36.720433][ T3592] RSP: 002b:00007ffe0538b4f0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
[ 36.728828][ T3592] RAX: ffffffffffffffda RBX: 00007fd05eff6320 RCX: 00007fd05df5de1c
[ 36.736789][ T3592] RDX: 0000000000000048 RSI: 00007fd05eff6370 RDI: 0000000000000003
[ 36.744741][ T3592] RBP: 0000000000000000 R08: 00007ffe0538b544 R09: 000000000000000c
[ 36.752693][ T3592] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
[ 36.760648][ T3592] R13: 00007fd05eff6370 R14: 0000000000000003 R15: 0000000000000000
[ 36.768611][ T3592] </TASK>
[ 36.775288][ T3592] device hsr_slave_0 entered promiscuous mode
[ 36.782460][ T3592] device hsr_slave_1 entered promiscuous mode
[ 36.846281][ T3592] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 36.855721][ T3592] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 36.863966][ T3592] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 36.872804][ T3592] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 36.889634][ T3592] bridge0: port 2(bridge_slave_1) entered blocking state
[ 36.896806][ T3592] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 36.904625][ T3592] bridge0: port 1(bridge_slave_0) entered blocking state
[ 36.911712][ T3592] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 36.948739][ T3592] 8021q: adding VLAN 0 to HW filter on device bond0
[ 36.959297][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 36.968456][ T6] bridge0: port 1(bridge_slave_0) entered disabled state
[ 36.976906][ T6] bridge0: port 2(bridge_slave_1) entered disabled state
[ 36.985132][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 36.996979][ T3592] 8021q: adding VLAN 0 to HW filter on device team0
[ 37.006197][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 37.015084][ T6] bridge0: port 1(bridge_slave_0) entered blocking state
[ 37.022166][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 37.032448][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 37.041690][ T3602] bridge0: port 2(bridge_slave_1) entered blocking state
[ 37.048742][ T3602] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 37.060704][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 37.069148][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 37.082695][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 37.091804][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 37.100273][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 37.114560][ T3592] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[ 37.125486][ T3592] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 37.137347][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 37.145897][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 37.154473][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 37.163437][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 37.171735][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 37.179948][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 37.195638][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 37.205746][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 37.213292][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 37.224740][ T3592] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 37.333685][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 37.342498][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 37.358715][ T3592] device veth0_vlan entered promiscuous mode
[ 37.366008][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 37.374769][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 37.383555][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 37.391749][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 37.402854][ T3592] device veth1_vlan entered promiscuous mode
[ 37.418881][ T3592] device veth0_macvtap entered promiscuous mode
[ 37.426142][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 37.434094][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 37.441985][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 37.450204][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 37.459896][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 37.468965][ T3592] device veth1_macvtap entered promiscuous mode
executing program
[ 37.482028][ T3592] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 37.489657][ T1135] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 37.497948][ T1135] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 37.507000][ T1135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 37.517749][ T3592] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 37.526024][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 37.534374][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 37.544068][ T3592] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 37.553376][ T3592] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 37.562153][ T3592] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 37.571436][ T3592] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 37.619483][ T936] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 37.628097][ T936] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 37.641545][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 37.651904][ T936] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 37.659854][ T936] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
2022/02/13 14:45:49 building call list...
[ 37.668407][ T1124] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[ 39.556437][ T3586] can: request_module (can-proto-0) failed.
[ 39.575148][ T3586] can: request_module (can-proto-0) failed.
[ 39.593442][ T3586] can: request_module (can-proto-0) failed.


Error text is too large and was truncated, full error text is at:
https://syzkaller.appspot.com/x/error.txt?x=157dc8bc700000


Tested on:

commit: 6d9bd4ad Add linux-next specific files for 20220211
git tree: linux-next
kernel config: https://syzkaller.appspot.com/x/.config?x=51e19a6010b6f987

syzbot

unread,
Feb 13, 2022, 10:48:11ā€ÆAM2/13/22
to phin...@gmail.com, syzkall...@googlegroups.com
Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
kernel BUG in ext4_es_cache_extent

loop0: detected capacity change from 0 to 1051
EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0)
EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback.
------------[ cut here ]------------
kernel BUG at fs/ext4/extents_status.c:899!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 4058 Comm: syz-executor392 Not tainted 5.17.0-rc3-syzkaller-00316-gb81b1829e7e3 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:ext4_es_cache_extent+0x4e8/0x550 fs/ext4/extents_status.c:899
Code: 00 48 c7 c7 a0 6d c1 89 c6 05 92 13 6f 0b 01 e8 f7 55 f7 06 e9 5a ff ff ff e8 04 86 68 ff 0f 0b e9 d7 fc ff ff e8 f8 85 68 ff <0f> 0b e8 f1 85 68 ff 0f 0b e9 13 fe ff ff e8 c5 d6 af ff e9 c2 fb
RSP: 0018:ffffc90001f1ee80 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 00000000000033de RCX: 0000000000000000
RDX: ffff888017c18000 RSI: ffffffff820ff198 RDI: 0000000000000003
RBP: ffff88807380c868 R08: 00000000ffffffff R09: 0000000000000000
R10: ffffffff820feedc R11: 0000000000000000 R12: 0000000000000001
R13: 00000000ffffffff R14: 1ffff920003e3dd1 R15: 00008f1cffffffff
FS: 0000555556231300(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fffd6730000 CR3: 000000007da29000 CR4: 0000000000350ef0
RIP: 0033:0x7fd5a0be7f09
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fffd672f348 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd5a0be7f09
RDX: 000000000000c880 RSI: 0000000020000100 RDI: 0000000000000005
RBP: 00007fd5a0ba7700 R08: 0000000800000015 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5a0ba7790
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:ext4_es_cache_extent+0x4e8/0x550 fs/ext4/extents_status.c:899
Code: 00 48 c7 c7 a0 6d c1 89 c6 05 92 13 6f 0b 01 e8 f7 55 f7 06 e9 5a ff ff ff e8 04 86 68 ff 0f 0b e9 d7 fc ff ff e8 f8 85 68 ff <0f> 0b e8 f1 85 68 ff 0f 0b e9 13 fe ff ff e8 c5 d6 af ff e9 c2 fb
RSP: 0018:ffffc90001f1ee80 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 00000000000033de RCX: 0000000000000000
RDX: ffff888017c18000 RSI: ffffffff820ff198 RDI: 0000000000000003
RBP: ffff88807380c868 R08: 00000000ffffffff R09: 0000000000000000
R10: ffffffff820feedc R11: 0000000000000000 R12: 0000000000000001
R13: 00000000ffffffff R14: 1ffff920003e3dd1 R15: 00008f1cffffffff
FS: 0000555556231300(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fffd6730000 CR3: 000000007da29000 CR4: 0000000000350ef0


Tested on:

commit: b81b1829 Merge tag 'scsi-fixes' of git://git.kernel.or..
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=17b554e2700000
kernel config: https://syzkaller.appspot.com/x/.config?x=266de9da75c71a45

syzbot

unread,
Feb 13, 2022, 6:39:12ā€ÆPM2/13/22
to adilger...@dilger.ca, linux...@vger.kernel.org, linux-...@vger.kernel.org, phin...@gmail.com, syzkall...@googlegroups.com, ty...@mit.edu
Hello,

syzbot has tested the proposed patch and the reproducer did not trigger any issue:

Reported-and-tested-by: syzbot+c7358a...@syzkaller.appspotmail.com

Tested on:

commit: 754e0b0e Linux 5.17-rc4
git tree: upstream
kernel config: https://syzkaller.appspot.com/x/.config?x=a78b064590b9f912
dashboard link: https://syzkaller.appspot.com/bug?extid=c7358a3cd05ee786eb31
compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
patch: https://syzkaller.appspot.com/x/patch.diff?x=1434b306700000

Note: testing is done by a robot and is best-effort only.
Reply all
Reply to author
Forward
0 new messages