Hello,
syzbot found the following crash on:
HEAD commit: 19bb613a Linux 4.19.37
git tree: linux-4.19.y
console output:
https://syzkaller.appspot.com/x/log.txt?x=1203c698a00000
kernel config:
https://syzkaller.appspot.com/x/.config?x=2f4f1677ff80cdff
dashboard link:
https://syzkaller.appspot.com/bug?extid=319399a566a75d350a52
compiler: gcc (GCC) 9.0.0 20181231 (experimental)
Unfortunately, I don't have any reproducer for this crash yet.
IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by:
syzbot+319399...@syzkaller.appspotmail.com
RDX: 00007f2925550ae0 RSI: 0000000020000100 RDI: 00007f2925550b00
RBP: 0000000000000001 R08: 00007f2925550b40 R09: 00007f2925550ae0
R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003
------------[ cut here ]------------
kernel BUG at fs/btrfs/volumes.c:1068!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 2338 Comm: syz-executor.3 Not tainted 4.19.37 #5
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
RIP: 0010:btrfs_close_one_device fs/btrfs/volumes.c:1068 [inline]
RIP: 0010:close_fs_devices.part.0+0x5bf/0x790 fs/btrfs/volumes.c:1092
Code: 3c 03 0f 8e 44 01 00 00 48 8b 45 c0 c7 80 10 01 00 00 00 00 00 00 48
83 c4 48 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 b1 c0 cc fe <0f> 0b e8 aa c0
cc fe 0f 0b e8 a3 c0 cc fe 0f 0b e9 16 ff ff ff e8
RSP: 0018:ffff88800d35f750 EFLAGS: 00010246
RAX: 0000000000040000 RBX: ffff888080d077c0 RCX: ffffc9000c49a000
RDX: 0000000000040000 RSI: ffffffff829e86cf RDI: 0000000000000007
RBP: ffff88800d35f7c0 R08: ffff888054d52000 R09: ffffed1015d24733
R10: ffffed1015d24732 R11: ffff8880ae923993 R12: 0000000000000000
kobject: 'loop4' (00000000ad7f928b): kobject_uevent_env
R13: dffffc0000000000 R14: ffff8880a8d42000 R15: fffffffffffffff4
kobject: 'loop4' (00000000ad7f928b): fill_kobj_path: path
= '/devices/virtual/block/loop4'
FS: 00007f2925551700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f548e938000 CR3: 00000000954a9000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
close_fs_devices fs/btrfs/volumes.c:1124 [inline]
btrfs_close_devices+0xa0/0x200 fs/btrfs/volumes.c:1110
btrfs_mount_root+0x114f/0x18f0 fs/btrfs/super.c:1619
netlink: 176 bytes leftover after parsing attributes in process
`syz-executor.5'.
mount_fs+0xae/0x331 fs/super.c:1261
vfs_kern_mount.part.0+0x6f/0x410 fs/namespace.c:961
vfs_kern_mount+0x40/0x60 fs/namespace.c:951
btrfs_mount+0x2b4/0x15e2 fs/btrfs/super.c:1670
kobject: 'loop4' (00000000ad7f928b): kobject_uevent_env
kobject: 'loop4' (00000000ad7f928b): fill_kobj_path: path
= '/devices/virtual/block/loop4'
mount_fs+0xae/0x331 fs/super.c:1261
vfs_kern_mount.part.0+0x6f/0x410 fs/namespace.c:961
vfs_kern_mount fs/namespace.c:951 [inline]
do_new_mount fs/namespace.c:2469 [inline]
do_mount+0x53e/0x2bc0 fs/namespace.c:2799
ksys_mount+0xdb/0x150 fs/namespace.c:3015
__do_sys_mount fs/namespace.c:3029 [inline]
__se_sys_mount fs/namespace.c:3026 [inline]
__x64_sys_mount+0xbe/0x150 fs/namespace.c:3026
do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290
kobject: 'loop4' (00000000ad7f928b): kobject_uevent_env
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45b81a
Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f
1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff
ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
RSP: 002b:00007f2925550a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007f2925550b40 RCX: 000000000045b81a
RDX: 00007f2925550ae0 RSI: 0000000020000100 RDI: 00007f2925550b00
RBP: 0000000000000001 R08: 00007f2925550b40 R09: 00007f2925550ae0
R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003
Modules linked in:
---[ end trace 365506de3d630cc2 ]---
kobject: 'loop4' (00000000ad7f928b): fill_kobj_path: path
= '/devices/virtual/block/loop4'
RIP: 0010:btrfs_close_one_device fs/btrfs/volumes.c:1068 [inline]
RIP: 0010:close_fs_devices.part.0+0x5bf/0x790 fs/btrfs/volumes.c:1092
netlink: 176 bytes leftover after parsing attributes in process
`syz-executor.5'.
kobject: 'loop3' (000000001d92e7d4): kobject_uevent_env
kobject: 'loop3' (000000001d92e7d4): fill_kobj_path: path
= '/devices/virtual/block/loop3'
Code: 3c 03 0f 8e 44 01 00 00 48 8b 45 c0 c7 80 10 01 00 00 00 00 00 00 48
83 c4 48 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 b1 c0 cc fe <0f> 0b e8 aa c0
cc fe 0f 0b e8 a3 c0 cc fe 0f 0b e9 16 ff ff ff e8
RSP: 0018:ffff88800d35f750 EFLAGS: 00010246
RAX: 0000000000040000 RBX: ffff888080d077c0 RCX: ffffc9000c49a000
kobject: 'loop4' (00000000ad7f928b): kobject_uevent_env
RDX: 0000000000040000 RSI: ffffffff829e86cf RDI: 0000000000000007
kobject: 'loop4' (00000000ad7f928b): fill_kobj_path: path
= '/devices/virtual/block/loop4'
RBP: ffff88800d35f7c0 R08: ffff888054d52000 R09: ffffed1015d24733
R10: ffffed1015d24732 R11: ffff8880ae923993 R12: 0000000000000000
R13: dffffc0000000000 R14: ffff8880a8d42000 R15: fffffffffffffff4
FS: 00007f2925551700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000ef00d0 CR3: 00000000954a9000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
---
This bug is generated by a bot. It may contain errors.
See
https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at
syzk...@googlegroups.com.
syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.