Hello,
syzbot found the following issue on:
HEAD commit: 9d5c0b3a8e1a Linux 4.14.295
git tree: linux-4.14.y
console output:
https://syzkaller.appspot.com/x/log.txt?x=130a5edf080000
kernel config:
https://syzkaller.appspot.com/x/.config?x=746c079015a92425
dashboard link:
https://syzkaller.appspot.com/bug?extid=e8292622c22824b10ab1
compiler: gcc version 10.2.1 20210110 (Debian 10.2.1-6)
Unfortunately, I don't have any reproducer for this issue yet.
Downloadable assets:
disk image:
https://storage.googleapis.com/syzbot-assets/ed6fcf5895a2/disk-9d5c0b3a.raw.xz
vmlinux:
https://storage.googleapis.com/syzbot-assets/341aa3534116/vmlinux-9d5c0b3a.xz
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by:
syzbot+e82926...@syzkaller.appspotmail.com
JFS: discard option not supported on device
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 0 PID: 10413 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022
task: ffff8880b37ca1c0 task.stack: ffff888047fa0000
RIP: 0010:lbmStartIO+0x14a/0x490 fs/jfs/jfs_logmgr.c:2143
RSP: 0018:ffff888047fa7738 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: ffff8880a2014000 RCX: 0000000000000003
RDX: 000000000000001c RSI: ffffffff8305a8ab RDI: 00000000000000e0
RBP: ffff8880aec07e40 R08: 0000000000000001 R09: ffff8880aec07e40
R10: ffff8880aec07ec7 R11: 0000000000000000 R12: ffff8880a1a49b00
audit: type=1800 audit(1664541178.158:7): pid=10409 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=14024 res=0
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS: 00007f0a6fd11700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2e825000 CR3: 00000000a3bbe000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
lbmWrite+0x254/0x380 fs/jfs/jfs_logmgr.c:2092
lmGCwrite+0x3d4/0x4d0 fs/jfs/jfs_logmgr.c:806
lmGroupCommit+0x21d/0x640 fs/jfs/jfs_logmgr.c:708
txCommit+0x947/0x3580 fs/jfs/jfs_txnmgr.c:1313
jfs_commit_inode+0x1f0/0x320 fs/jfs/inode.c:120
jfs_fsync+0xf6/0x1e0 fs/jfs/file.c:50
vfs_fsync_range+0x103/0x260 fs/sync.c:196
generic_write_sync include/linux/fs.h:2684 [inline]
generic_file_write_iter+0x410/0x650 mm/filemap.c:3212
call_write_iter include/linux/fs.h:1780 [inline]
do_iter_readv_writev+0x4cf/0x5f0 fs/read_write.c:675
do_iter_write+0x152/0x550 fs/read_write.c:954
vfs_writev+0x125/0x290 fs/read_write.c:999
do_pwritev fs/read_write.c:1088 [inline]
SYSC_pwritev2 fs/read_write.c:1147 [inline]
SyS_pwritev2+0x195/0x230 fs/read_write.c:1138
do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x7f0a7139d5a9
RSP: 002b:00007f0a6fd11168 EFLAGS: 00000246 ORIG_RAX: 0000000000000148
RAX: ffffffffffffffda RBX: 00007f0a714bef80 RCX: 00007f0a7139d5a9
RDX: 0000000000000001 RSI: 0000000020000340 RDI: 0000000000000003
RBP: 00007f0a713f8580 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffdea3cc7bf R14: 00007f0a6fd11300 R15: 0000000000022000
Code: 48 c1 ea 03 80 3c 02 00 0f 85 06 03 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 6c 24 20 49 8d bd e0 00 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 d5 02 00 00 4d 8b ad e0 00 00 00 4d 39 ee 74
RIP: lbmStartIO+0x14a/0x490 fs/jfs/jfs_logmgr.c:2143 RSP: ffff888047fa7738
---[ end trace 6d6c9267a69172cf ]---
----------------
Code disassembly (best guess):
0: 48 c1 ea 03 shr $0x3,%rdx
4: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1)
8: 0f 85 06 03 00 00 jne 0x314
e: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax
15: fc ff df
18: 4d 8b 6c 24 20 mov 0x20(%r12),%r13
1d: 49 8d bd e0 00 00 00 lea 0xe0(%r13),%rdi
24: 48 89 fa mov %rdi,%rdx
27: 48 c1 ea 03 shr $0x3,%rdx
* 2b: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction
2f: 0f 85 d5 02 00 00 jne 0x30a
35: 4d 8b ad e0 00 00 00 mov 0xe0(%r13),%r13
3c: 4d 39 ee cmp %r13,%r14
3f: 74 .byte 0x74
---
This report is generated by a bot. It may contain errors.
See
https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at
syzk...@googlegroups.com.
syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.