kernel BUG at fs/reiserfs/lock.c:LINE!

12 views
Skip to first unread message

syzbot

unread,
Apr 21, 2019, 9:05:08 AM4/21/19
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: c98875d9 Linux 4.19.36
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=11985ea0a00000
kernel config: https://syzkaller.appspot.com/x/.config?x=5e40ac5fbcc6366d
dashboard link: https://syzkaller.appspot.com/bug?extid=48047f9b249207f449ce
compiler: gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+48047f...@syzkaller.appspotmail.com

RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0
R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003
REISERFS warning (device loop3): reiserfs_fill_super: Cannot allocate
memory for journal device name
------------[ cut here ]------------
kernel BUG at fs/reiserfs/lock.c:44!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 21413 Comm: syz-executor.3 Not tainted 4.19.36 #4
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
RIP: 0010:reiserfs_write_unlock+0xeb/0x110 fs/reiserfs/lock.c:44
Code: 5d c3 e8 28 d7 89 ff 48 8d 7b 28 48 c7 83 a8 00 00 00 00 00 00 00 e8
64 6f 0c 05 e8 0f d7 89 ff 5b 41 5c 5d c3 e8 05 d7 89 ff <0f> 0b e8 4e 38
c0 ff eb a1 e8 67 38 c0 ff e9 33 ff ff ff e8 5d 38
RSP: 0018:ffff888054da7a88 EFLAGS: 00010246
RAX: 0000000000040000 RBX: ffff8880a564d200 RCX: ffffc9000c4b2000
RDX: 0000000000040000 RSI: ffffffff81e16e0b RDI: ffff8880a564d2a8
RBP: ffff888054da7a98 R08: 0000000000000065 R09: ffffed1015d24fe9
R10: ffffed1015d24fe8 R11: ffff8880ae927f47 R12: 00000000ffffffea
R13: ffff88805457a480 R14: ffff888054da7c38 R15: ffff8880a564d200
FS: 00007fe38d5a6700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000070d158 CR3: 0000000092901000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
reiserfs_fill_super+0x2b51/0x2eb0 fs/reiserfs/super.c:2219
mount_bdev+0x307/0x3c0 fs/super.c:1158
get_super_block+0x35/0x40 fs/reiserfs/super.c:2605
mount_fs+0xae/0x331 fs/super.c:1261
vfs_kern_mount.part.0+0x6f/0x410 fs/namespace.c:961
vfs_kern_mount fs/namespace.c:951 [inline]
do_new_mount fs/namespace.c:2469 [inline]
do_mount+0x53e/0x2bc0 fs/namespace.c:2799
ksys_mount+0xdb/0x150 fs/namespace.c:3015
__do_sys_mount fs/namespace.c:3029 [inline]
__se_sys_mount fs/namespace.c:3026 [inline]
__x64_sys_mount+0xbe/0x150 fs/namespace.c:3026
do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45b69a
Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f
1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff
ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
RSP: 002b:00007fe38d5a5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007fe38d5a5b40 RCX: 000000000045b69a
RDX: 00007fe38d5a5ae0 RSI: 0000000020000100 RDI: 00007fe38d5a5b00
RBP: 0000000000000000 R08: 00007fe38d5a5b40 R09: 00007fe38d5a5ae0
R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
R13: 00000000004c782d R14: 00000000004dd880 R15: 0000000000000003
Modules linked in:
---[ end trace 81ee0397643ce9e9 ]---
RIP: 0010:reiserfs_write_unlock+0xeb/0x110 fs/reiserfs/lock.c:44
Code: 5d c3 e8 28 d7 89 ff 48 8d 7b 28 48 c7 83 a8 00 00 00 00 00 00 00 e8
64 6f 0c 05 e8 0f d7 89 ff 5b 41 5c 5d c3 e8 05 d7 89 ff <0f> 0b e8 4e 38
c0 ff eb a1 e8 67 38 c0 ff e9 33 ff ff ff e8 5d 38
RSP: 0018:ffff888054da7a88 EFLAGS: 00010246
RAX: 0000000000040000 RBX: ffff8880a564d200 RCX: ffffc9000c4b2000
RDX: 0000000000040000 RSI: ffffffff81e16e0b RDI: ffff8880a564d2a8
RBP: ffff888054da7a98 R08: 0000000000000065 R09: ffffed1015d24fe9
R10: ffffed1015d24fe8 R11: ffff8880ae927f47 R12: 00000000ffffffea
R13: ffff88805457a480 R14: ffff888054da7c38 R15: ffff8880a564d200
FS: 00007fe38d5a6700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000
kobject: 'loop3' (000000000e133252): kobject_uevent_env
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
kobject: 'loop3' (000000000e133252): fill_kobj_path: path
= '/devices/virtual/block/loop3'
CR2: 0000000000738000 CR3: 0000000092901000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Feb 1, 2020, 6:28:09 AM2/1/20
to syzkaller...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.

syzbot

unread,
Feb 3, 2020, 5:04:14 PM2/3/20
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: 9fa690a2 Linux 4.14.169
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=124570f6e00000
kernel config: https://syzkaller.appspot.com/x/.config?x=eb55b601e76e3476
dashboard link: https://syzkaller.appspot.com/bug?extid=0359fb081a66176b67d5
compiler: gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+0359fb...@syzkaller.appspotmail.com

kernel BUG at fs/reiserfs/lock.c:44!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 0 PID: 15602 Comm: syz-executor.5 Not tainted 4.14.169-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff88809855e5c0 task.stack: ffff888051be0000
RIP: 0010:reiserfs_write_unlock+0xd5/0x100 fs/reiserfs/lock.c:44
RSP: 0018:ffff888051be7af0 EFLAGS: 00010246
RAX: 0000000000040000 RBX: ffff888075ac5240 RCX: ffffc90005e2c000
RDX: 0000000000040000 RSI: ffffffff81be1ec5 RDI: ffff888075ac52e8
RBP: ffff888051be7af8 R08: 0000000000000065 R09: ffff88809855ee60
R10: 0000000000000000 R11: 0000000000000000 R12: ffff888075ac5240
R13: ffff88808b7c4840 R14: ffff888051be7c00 R15: ffff888051be7c80
FS: 00007ffaf5494700(0000) GS:ffff8880aec00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000fae258 CR3: 00000000812c6000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
reiserfs_fill_super+0x2b46/0x2b60 fs/reiserfs/super.c:2221
mount_bdev+0x2be/0x370 fs/super.c:1134
get_super_block+0x35/0x40 fs/reiserfs/super.c:2607
mount_fs+0x97/0x2a1 fs/super.c:1237
vfs_kern_mount.part.0+0x5e/0x3d0 fs/namespace.c:1046
vfs_kern_mount fs/namespace.c:1036 [inline]
do_new_mount fs/namespace.c:2549 [inline]
do_mount+0x417/0x27d0 fs/namespace.c:2879
SYSC_mount fs/namespace.c:3095 [inline]
SyS_mount+0xab/0x120 fs/namespace.c:3072
do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45ddea
RSP: 002b:00007ffaf5493a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007ffaf54946d4 RCX: 000000000045ddea
RDX: 00007ffaf5493ae0 RSI: 00000000200000c0 RDI: 00007ffaf5493b00
RBP: 000000000075bf20 R08: 00007ffaf5493b40 R09: 00007ffaf5493ae0
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000003
R13: 0000000000000bb1 R14: 00000000004cc8da R15: 0000000000000040
Code: 9e ff 5b 5d c3 e8 fc f5 9e ff 48 8d 7b 28 48 c7 83 a8 00 00 00 00 00 00 00 e8 d8 42 aa 04 e8 e3 f5 9e ff 5b 5d c3 e8 db f5 9e ff <0f> 0b e8 54 86 c9 ff eb b5 e8 6d 86 c9 ff e9 47 ff ff ff e8 63
RIP: reiserfs_write_unlock+0xd5/0x100 fs/reiserfs/lock.c:44 RSP: ffff888051be7af0
---[ end trace 900c9bdbfe65943f ]---

syzbot

unread,
Jun 2, 2020, 6:04:10 PM6/2/20
to syzkaller...@googlegroups.com
Reply all
Reply to author
Forward
0 new messages