[reiserfs?] general protection fault in do_journal_end

5 views
Skip to first unread message

syzbot

unread,
Jan 5, 2023, 7:44:43 AM1/5/23
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: c4215ee4771b Linux 4.14.302
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=1342253a480000
kernel config: https://syzkaller.appspot.com/x/.config?x=4a9988fe055c9527
dashboard link: https://syzkaller.appspot.com/bug?extid=0b1d8fe60d804bd14009
compiler: gcc version 10.2.1 20210110 (Debian 10.2.1-6)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=161ae704480000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=150ee094480000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/c93ba055d204/disk-c4215ee4.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/bfbc929a33c1/vmlinux-c4215ee4.xz
kernel image: https://storage.googleapis.com/syzbot-assets/444658051770/bzImage-c4215ee4.xz
mounted in repro: https://storage.googleapis.com/syzbot-assets/87642872655f/mount_0.gz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+0b1d8f...@syzkaller.appspotmail.com

REISERFS (device loop0): Using r5 hash to sort names
REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage.
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 0 PID: 7974 Comm: syz-executor173 Not tainted 4.14.302-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
task: ffff8880954244c0 task.stack: ffff888095880000
RIP: 0010:constant_test_bit arch/x86/include/asm/bitops.h:328 [inline]
RIP: 0010:set_buffer_uptodate include/linux/buffer_head.h:144 [inline]
RIP: 0010:do_journal_end+0x111f/0x4310 fs/reiserfs/journal.c:4090
RSP: 0018:ffff888095887ab8 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffffc90001ad4000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffea00022a3d40
RBP: ffff88808aadf000 R08: ffffea00022a3d40 R09: 0000000000000003
R10: 0000000000000000 R11: ffff8880954244c0 R12: 0000000000000000
R13: ffffc90001ad4058 R14: ffffc90001ad4048 R15: ffff888095887bf0
FS: 0000555556519300(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f72fe6384e8 CR3: 00000000a2054000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
reiserfs_sync_fs+0xbb/0xd0 fs/reiserfs/super.c:78
__sync_filesystem fs/sync.c:39 [inline]
sync_filesystem fs/sync.c:64 [inline]
sync_filesystem+0xe2/0x230 fs/sync.c:48
generic_shutdown_super+0x70/0x370 fs/super.c:432
kill_block_super+0x95/0xe0 fs/super.c:1161
deactivate_locked_super+0x6c/0xd0 fs/super.c:319
deactivate_super+0x7f/0xa0 fs/super.c:350
cleanup_mnt+0x186/0x2c0 fs/namespace.c:1183
task_work_run+0x11f/0x190 kernel/task_work.c:113
exit_task_work include/linux/task_work.h:22 [inline]
do_exit+0xa44/0x2850 kernel/exit.c:868
do_group_exit+0x100/0x2e0 kernel/exit.c:965
SYSC_exit_group kernel/exit.c:976 [inline]
SyS_exit_group+0x19/0x20 kernel/exit.c:974
do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x5e/0xd3
RIP: 0033:0x7f72fe5f3ae9
RSP: 002b:00007ffc741acf58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 00007f72fe66a350 RCX: 00007f72fe5f3ae9
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001
RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 00007f72fe664e40
R10: 000080001d00c0d0 R11: 0000000000000246 R12: 00007f72fe66a350
R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
Code: 00 0f 85 4e 2d 00 00 48 8b 7b 18 b9 08 00 00 00 e8 b7 22 e0 ff 48 89 c2 48 89 44 24 60 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 11 2d 00 00 48 8b 5c 24 60 48 8b 03 a8 01 75
RIP: constant_test_bit arch/x86/include/asm/bitops.h:328 [inline] RSP: ffff888095887ab8
RIP: set_buffer_uptodate include/linux/buffer_head.h:144 [inline] RSP: ffff888095887ab8
RIP: do_journal_end+0x111f/0x4310 fs/reiserfs/journal.c:4090 RSP: ffff888095887ab8
---[ end trace cc32eb3455db95fa ]---
----------------
Code disassembly (best guess):
0: 00 0f add %cl,(%rdi)
2: 85 4e 2d test %ecx,0x2d(%rsi)
5: 00 00 add %al,(%rax)
7: 48 8b 7b 18 mov 0x18(%rbx),%rdi
b: b9 08 00 00 00 mov $0x8,%ecx
10: e8 b7 22 e0 ff callq 0xffe022cc
15: 48 89 c2 mov %rax,%rdx
18: 48 89 44 24 60 mov %rax,0x60(%rsp)
1d: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax
24: fc ff df
27: 48 c1 ea 03 shr $0x3,%rdx
* 2b: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction
2f: 0f 85 11 2d 00 00 jne 0x2d46
35: 48 8b 5c 24 60 mov 0x60(%rsp),%rbx
3a: 48 8b 03 mov (%rbx),%rax
3d: a8 01 test $0x1,%al
3f: 75 .byte 0x75


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
syzbot can test patches for this issue, for details see:
https://goo.gl/tpsmEJ#testing-patches
Reply all
Reply to author
Forward
0 new messages