kernel BUG in iomap_read_inline_data

6 views
Skip to first unread message

syzbot

unread,
Nov 28, 2022, 12:50:45 PM11/28/22
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 3f8a27f9e27b Linux 4.19.211
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=1059b3bb880000
kernel config: https://syzkaller.appspot.com/x/.config?x=9b9277b418617afe
dashboard link: https://syzkaller.appspot.com/bug?extid=bcecad5667aa0b8b55d8
compiler: gcc version 10.2.1 20210110 (Debian 10.2.1-6)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=15a48d75880000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=15fd673d880000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/98c0bdb4abb3/disk-3f8a27f9.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/ea228ff02669/vmlinux-3f8a27f9.xz
mounted in repro: https://storage.googleapis.com/syzbot-assets/d524bc35c420/mount_0.gz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+bcecad...@syzkaller.appspotmail.com

gfs2: fsid=syz:syz.0: jid=0, already locked for use
gfs2: fsid=syz:syz.0: jid=0: Looking at journal...
gfs2: fsid=syz:syz.0: jid=0: Done
gfs2: fsid=syz:syz.0: first mount done, others may mount
------------[ cut here ]------------
kernel BUG at fs/iomap.c:277!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 8129 Comm: syz-executor287 Not tainted 4.19.211-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
RIP: 0010:iomap_read_inline_data.isra.0+0x2b4/0x320 fs/iomap.c:277
Code: e8 f1 fb a4 ff e8 96 b3 42 ff eb 99 e8 e5 fb a4 ff 48 8b 1c 24 48 83 eb 01 e9 b8 fd ff ff e8 d3 fb a4 ff 0f 0b e8 cc fb a4 ff <0f> 0b e8 25 d8 da ff e9 b3 fe ff ff e8 1b d8 da ff e9 40 ff ff ff
RSP: 0018:ffff888091c5f060 EFLAGS: 00010293
RAX: ffff8880b164e000 RBX: 0000000000000f18 RCX: ffffffff81bd881a
RDX: 0000000000000000 RSI: ffffffff81bd89a4 RDI: 0000000000000006
RBP: ffffea0002236f40 R08: ffff888091c5f1e8 R09: 00000040000000c0
R10: 0000000000000006 R11: 0000000000000000 R12: 00000040000000c0
R13: ffff888091c5f1e8 R14: ffffea0002236f48 R15: ffff888091c5f218
FS: 0000555556976300(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000558604d56848 CR3: 00000000aa812000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
iomap_readpage_actor+0xa95/0xdb0 fs/iomap.c:320
iomap_apply+0x18b/0x290 fs/iomap.c:87
iomap_readpage+0x131/0x3f0 fs/iomap.c:393
__gfs2_readpage+0x23e/0x2c0 fs/gfs2/aops.c:516
do_read_cache_page+0x533/0x1170 mm/filemap.c:2828
gfs2_internal_read+0xed/0x4d0 fs/gfs2/aops.c:590
read_rindex_entry+0x1ea/0x13d0 fs/gfs2/rgrp.c:910
gfs2_ri_update+0x73/0x580 fs/gfs2/rgrp.c:1006
gfs2_rindex_update+0x3ba/0x430 fs/gfs2/rgrp.c:1056
init_inodes+0x1061/0x1cf0 fs/gfs2/ops_fstype.c:819
fill_super+0x18a6/0x2550 fs/gfs2/ops_fstype.c:1153
gfs2_mount+0x4c0/0x5a0 fs/gfs2/ops_fstype.c:1316
mount_fs+0xa3/0x310 fs/super.c:1261
vfs_kern_mount.part.0+0x68/0x470 fs/namespace.c:961
vfs_kern_mount fs/namespace.c:951 [inline]
do_new_mount fs/namespace.c:2492 [inline]
do_mount+0x115c/0x2f50 fs/namespace.c:2822
ksys_mount+0xcf/0x130 fs/namespace.c:3038
__do_sys_mount fs/namespace.c:3052 [inline]
__se_sys_mount fs/namespace.c:3049 [inline]
__x64_sys_mount+0xba/0x150 fs/namespace.c:3049
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f1a2a9a9dea
Code: 83 c4 08 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffec359db58 EFLAGS: 00000282 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f1a2a9a9dea
RDX: 00000000200124c0 RSI: 0000000020012500 RDI: 00007ffec359db60
RBP: 00007ffec359db60 R08: 00007ffec359dba0 R09: 0000000000012511
R10: 0000000000000819 R11: 0000000000000282 R12: 0000000000000004
R13: 00005555569762c0 R14: 00007ffec359dba0 R15: 0000000000000000
Modules linked in:
---[ end trace 89cd7189b8b97422 ]---
RIP: 0010:iomap_read_inline_data.isra.0+0x2b4/0x320 fs/iomap.c:277
Code: e8 f1 fb a4 ff e8 96 b3 42 ff eb 99 e8 e5 fb a4 ff 48 8b 1c 24 48 83 eb 01 e9 b8 fd ff ff e8 d3 fb a4 ff 0f 0b e8 cc fb a4 ff <0f> 0b e8 25 d8 da ff e9 b3 fe ff ff e8 1b d8 da ff e9 40 ff ff ff
RSP: 0018:ffff888091c5f060 EFLAGS: 00010293
RAX: ffff8880b164e000 RBX: 0000000000000f18 RCX: ffffffff81bd881a
RDX: 0000000000000000 RSI: ffffffff81bd89a4 RDI: 0000000000000006
RBP: ffffea0002236f40 R08: ffff888091c5f1e8 R09: 00000040000000c0
R10: 0000000000000006 R11: 0000000000000000 R12: 00000040000000c0
R13: ffff888091c5f1e8 R14: ffffea0002236f48 R15: ffff888091c5f218
FS: 0000555556976300(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f9e4003c0d8 CR3: 00000000aa812000 CR4: 00000000003406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
syzbot can test patches for this issue, for details see:
https://goo.gl/tpsmEJ#testing-patches
Reply all
Reply to author
Forward
0 new messages