general protection fault in dbUpdatePMap

6 views
Skip to first unread message

syzbot

unread,
Oct 25, 2022, 10:29:44 AM10/25/22
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 3f8a27f9e27b Linux 4.19.211
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=167fe18c880000
kernel config: https://syzkaller.appspot.com/x/.config?x=9b9277b418617afe
dashboard link: https://syzkaller.appspot.com/bug?extid=751cba74665739bb4479
compiler: gcc version 10.2.1 20210110 (Debian 10.2.1-6)

Unfortunately, I don't have any reproducer for this issue yet.

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/98c0bdb4abb3/disk-3f8a27f9.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/ea228ff02669/vmlinux-3f8a27f9.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+751cba...@syzkaller.appspotmail.com

ERROR: (device loop4): dbAllocNext: Corrupt dmap page
ERROR: (device loop4): dbAllocNext: Corrupt dmap page
ERROR: (device loop4): dbAllocNext: Corrupt dmap page
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 1986 Comm: jfsCommit Not tainted 4.19.211-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022
RIP: 0010:dbUpdatePMap+0x4b0/0x1070 fs/jfs/jfs_dmap.c:471
Code: d7 ec fe 84 db 0f 85 96 08 00 00 e8 ca d5 ec fe 48 8b 44 24 10 48 b9 00 00 00 00 00 fc ff df 48 8d 78 30 48 89 f8 48 c1 e8 03 <80> 3c 08 00 0f 85 b9 09 00 00 48 8b 44 24 10 44 8b 6c 24 28 48 8b
RSP: 0018:ffff8880b0adfc70 EFLAGS: 00010206
RAX: 0000000000000006 RBX: 0000000000000000 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: ffffffff8275afa6 RDI: 0000000000000030
RBP: ffff88804744a4d0 R08: ffffc90001401100 R09: 0000000000000000
R10: 0000000000000006 R11: 0000000000000000 R12: 0000000000000ecc
R13: 0000000000000020 R14: ffffc90001401100 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f3bae9dafb8 CR3: 000000009efa3000 CR4: 00000000003406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
txAllocPMap fs/jfs/jfs_txnmgr.c:2470 [inline]
txUpdateMap+0xd0c/0x1000 fs/jfs/jfs_txnmgr.c:2408
txLazyCommit fs/jfs/jfs_txnmgr.c:2709 [inline]
jfs_lazycommit+0x525/0x9d0 fs/jfs/jfs_txnmgr.c:2777
kthread+0x33f/0x460 kernel/kthread.c:259
ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
Modules linked in:
---[ end trace c527e9b83588922b ]---
RIP: 0010:dbUpdatePMap+0x4b0/0x1070 fs/jfs/jfs_dmap.c:471
Code: d7 ec fe 84 db 0f 85 96 08 00 00 e8 ca d5 ec fe 48 8b 44 24 10 48 b9 00 00 00 00 00 fc ff df 48 8d 78 30 48 89 f8 48 c1 e8 03 <80> 3c 08 00 0f 85 b9 09 00 00 48 8b 44 24 10 44 8b 6c 24 28 48 8b
RSP: 0018:ffff8880b0adfc70 EFLAGS: 00010206
RAX: 0000000000000006 RBX: 0000000000000000 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: ffffffff8275afa6 RDI: 0000000000000030
RBP: ffff88804744a4d0 R08: ffffc90001401100 R09: 0000000000000000
R10: 0000000000000006 R11: 0000000000000000 R12: 0000000000000ecc
R13: 0000000000000020 R14: ffffc90001401100 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f3bae9dafb8 CR3: 000000009efa3000 CR4: 00000000003406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: d7 xlat %ds:(%rbx)
1: ec in (%dx),%al
2: fe 84 db 0f 85 96 08 incb 0x896850f(%rbx,%rbx,8)
9: 00 00 add %al,(%rax)
b: e8 ca d5 ec fe callq 0xfeecd5da
10: 48 8b 44 24 10 mov 0x10(%rsp),%rax
15: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx
1c: fc ff df
1f: 48 8d 78 30 lea 0x30(%rax),%rdi
23: 48 89 f8 mov %rdi,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 80 3c 08 00 cmpb $0x0,(%rax,%rcx,1) <-- trapping instruction
2e: 0f 85 b9 09 00 00 jne 0x9ed
34: 48 8b 44 24 10 mov 0x10(%rsp),%rax
39: 44 8b 6c 24 28 mov 0x28(%rsp),%r13d
3e: 48 rex.W
3f: 8b .byte 0x8b


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Oct 25, 2022, 11:36:52 AM10/25/22
to syzkaller...@googlegroups.com
syzbot has found a reproducer for the following issue on:

HEAD commit: 3f8a27f9e27b Linux 4.19.211
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=165f9622880000
kernel config: https://syzkaller.appspot.com/x/.config?x=9b9277b418617afe
dashboard link: https://syzkaller.appspot.com/bug?extid=751cba74665739bb4479
compiler: gcc version 10.2.1 20210110 (Debian 10.2.1-6)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=102f834a880000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=12cf17d2880000
mounted in repro: https://storage.googleapis.com/syzbot-assets/3b175a6a875a/mount_0.gz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+751cba...@syzkaller.appspotmail.com

IPVS: ftp: loaded support on port[0] = 21
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 1985 Comm: jfsCommit Not tainted 4.19.211-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022
RIP: 0010:dbUpdatePMap+0x4b0/0x1070 fs/jfs/jfs_dmap.c:471
Code: d7 ec fe 84 db 0f 85 96 08 00 00 e8 ca d5 ec fe 48 8b 44 24 10 48 b9 00 00 00 00 00 fc ff df 48 8d 78 30 48 89 f8 48 c1 e8 03 <80> 3c 08 00 0f 85 b9 09 00 00 48 8b 44 24 10 44 8b 6c 24 28 48 8b
RSP: 0018:ffff8880b0a9fc70 EFLAGS: 00010206
RAX: 0000000000000006 RBX: 0000000000000000 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: ffffffff8275afa6 RDI: 0000000000000030
RBP: ffff88808d3844d0 R08: ffffc90001401100 R09: 0000000000000000
R10: 0000000000000006 R11: 0000000000000000 R12: 0000000000000ecc
R13: 0000000000000020 R14: ffffc90001401100 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000561ead463800 CR3: 00000000a0ef1000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
txAllocPMap fs/jfs/jfs_txnmgr.c:2470 [inline]
txUpdateMap+0xd0c/0x1000 fs/jfs/jfs_txnmgr.c:2408
txLazyCommit fs/jfs/jfs_txnmgr.c:2709 [inline]
jfs_lazycommit+0x525/0x9d0 fs/jfs/jfs_txnmgr.c:2777
kthread+0x33f/0x460 kernel/kthread.c:259
ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
Modules linked in:
---[ end trace f7732bbb7966abda ]---
RIP: 0010:dbUpdatePMap+0x4b0/0x1070 fs/jfs/jfs_dmap.c:471
Code: d7 ec fe 84 db 0f 85 96 08 00 00 e8 ca d5 ec fe 48 8b 44 24 10 48 b9 00 00 00 00 00 fc ff df 48 8d 78 30 48 89 f8 48 c1 e8 03 <80> 3c 08 00 0f 85 b9 09 00 00 48 8b 44 24 10 44 8b 6c 24 28 48 8b
RSP: 0018:ffff8880b0a9fc70 EFLAGS: 00010206
RAX: 0000000000000006 RBX: 0000000000000000 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: ffffffff8275afa6 RDI: 0000000000000030
RBP: ffff88808d3844d0 R08: ffffc90001401100 R09: 0000000000000000
R10: 0000000000000006 R11: 0000000000000000 R12: 0000000000000ecc
R13: 0000000000000020 R14: ffffc90001401100 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000561ead4d89c8 CR3: 00000000a99ff000 CR4: 00000000003406e0
Reply all
Reply to author
Forward
0 new messages