BUG: unable to handle kernel paging request in dqput (2)

8 views
Skip to first unread message

syzbot

unread,
Sep 11, 2022, 12:38:33 PM9/11/22
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 3f8a27f9e27b Linux 4.19.211
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=12bc5500880000
kernel config: https://syzkaller.appspot.com/x/.config?x=9b9277b418617afe
dashboard link: https://syzkaller.appspot.com/bug?extid=bde637644f8e5de8b629
compiler: gcc version 10.2.1 20210110 (Debian 10.2.1-6)

Unfortunately, I don't have any reproducer for this issue yet.

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+bde637...@syzkaller.appspotmail.com

FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
Quota error (device loop3): qtree_write_dquot: Error -1079867134 occurred while creating quota
BUG: unable to handle kernel paging request at fffffbfff7f4513f
PGD 23fff1067 P4D 23fff1067 PUD 23fff0067 PMD 0
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 8147 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
RIP: 0010:bytes_is_nonzero mm/kasan/kasan.c:167 [inline]
RIP: 0010:memory_is_nonzero mm/kasan/kasan.c:184 [inline]
RIP: 0010:memory_is_poisoned_n mm/kasan/kasan.c:210 [inline]
RIP: 0010:memory_is_poisoned mm/kasan/kasan.c:241 [inline]
RIP: 0010:check_memory_region_inline mm/kasan/kasan.c:257 [inline]
RIP: 0010:check_memory_region+0xc8/0x170 mm/kasan/kasan.c:267
Code: 39 d0 74 0e 80 38 00 74 f2 48 85 c0 0f 85 9c 00 00 00 5b 5d 41 5c c3 48 85 d2 74 f6 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 e8 <80> 38 00 74 f2 eb d8 41 bc 08 00 00 00 48 89 ea 45 29 dc 4e 8d 5c
RSP: 0000:ffff888097a9f9b8 EFLAGS: 00010292
RAX: fffffbfff7f4513f RBX: fffffbfff7f45140 RCX: ffffffff81be289e
RDX: fffffbfff7f45140 RSI: 0000000000000004 RDI: ffffffffbfa289fa
RBP: fffffbfff7f4513f R08: 0000000000000000 R09: fffffbfff7f4513f
R10: ffffffffbfa289fd R11: 0000000000000000 R12: ffffffffbfa289fa
R13: 0000000000000005 R14: fffffbfff7f4513f R15: ffff8880527ff998
FS: 0000555556bb5400(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffbfff7f4513f CR3: 00000000a1537000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
atomic_read include/asm-generic/atomic-instrumented.h:21 [inline]
dqput.part.0+0xae/0x830 fs/quota/dquot.c:765
dqput fs/quota/dquot.c:752 [inline]
dqput_all fs/quota/dquot.c:391 [inline]
__dquot_drop+0x19c/0x270 fs/quota/dquot.c:1568
dquot_drop fs/quota/dquot.c:1593 [inline]
dquot_drop+0x14b/0x1a0 fs/quota/dquot.c:1571
ext4_clear_inode+0x31/0x1d0 fs/ext4/super.c:1178
ext4_evict_inode+0x25b/0x17b0 fs/ext4/inode.c:357
evict+0x2ed/0x760 fs/inode.c:559
dispose_list+0x124/0x1f0 fs/inode.c:594
evict_inodes+0x341/0x430 fs/inode.c:644
generic_shutdown_super+0xb3/0x370 fs/super.c:448
kill_block_super+0x97/0xf0 fs/super.c:1185
deactivate_locked_super+0x94/0x160 fs/super.c:329
deactivate_super+0x174/0x1a0 fs/super.c:360
cleanup_mnt+0x1a8/0x290 fs/namespace.c:1098
task_work_run+0x148/0x1c0 kernel/task_work.c:113
tracehook_notify_resume include/linux/tracehook.h:193 [inline]
exit_to_usermode_loop+0x251/0x2a0 arch/x86/entry/common.c:167
prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline]
syscall_return_slowpath arch/x86/entry/common.c:271 [inline]
do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f4c29cde837
Code: ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff24d8c558 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f4c29cde837
RDX: 00007fff24d8c631 RSI: 000000000000000a RDI: 00007fff24d8c620
RBP: 00007fff24d8c620 R08: 00000000ffffffff R09: 00007fff24d8c3f0
R10: 0000555556bbe8c3 R11: 0000000000000246 R12: 00007f4c29d37466
R13: 00007fff24d8d720 R14: 0000555556bbe850 R15: 00007fff24d8e820
Modules linked in:
CR2: fffffbfff7f4513f
---[ end trace 7c4837e356c16f15 ]---
RIP: 0010:bytes_is_nonzero mm/kasan/kasan.c:167 [inline]
RIP: 0010:memory_is_nonzero mm/kasan/kasan.c:184 [inline]
RIP: 0010:memory_is_poisoned_n mm/kasan/kasan.c:210 [inline]
RIP: 0010:memory_is_poisoned mm/kasan/kasan.c:241 [inline]
RIP: 0010:check_memory_region_inline mm/kasan/kasan.c:257 [inline]
RIP: 0010:check_memory_region+0xc8/0x170 mm/kasan/kasan.c:267
Code: 39 d0 74 0e 80 38 00 74 f2 48 85 c0 0f 85 9c 00 00 00 5b 5d 41 5c c3 48 85 d2 74 f6 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 e8 <80> 38 00 74 f2 eb d8 41 bc 08 00 00 00 48 89 ea 45 29 dc 4e 8d 5c
RSP: 0000:ffff888097a9f9b8 EFLAGS: 00010292
RAX: fffffbfff7f4513f RBX: fffffbfff7f45140 RCX: ffffffff81be289e
RDX: fffffbfff7f45140 RSI: 0000000000000004 RDI: ffffffffbfa289fa
RBP: fffffbfff7f4513f R08: 0000000000000000 R09: fffffbfff7f4513f
R10: ffffffffbfa289fd R11: 0000000000000000 R12: ffffffffbfa289fa
R13: 0000000000000005 R14: fffffbfff7f4513f R15: ffff8880527ff998
FS: 0000555556bb5400(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffbfff7f4513f CR3: 00000000a1537000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 39 d0 cmp %edx,%eax
2: 74 0e je 0x12
4: 80 38 00 cmpb $0x0,(%rax)
7: 74 f2 je 0xfffffffb
9: 48 85 c0 test %rax,%rax
c: 0f 85 9c 00 00 00 jne 0xae
12: 5b pop %rbx
13: 5d pop %rbp
14: 41 5c pop %r12
16: c3 retq
17: 48 85 d2 test %rdx,%rdx
1a: 74 f6 je 0x12
1c: 48 01 ea add %rbp,%rdx
1f: eb 09 jmp 0x2a
21: 48 83 c0 01 add $0x1,%rax
25: 48 39 d0 cmp %rdx,%rax
28: 74 e8 je 0x12
* 2a: 80 38 00 cmpb $0x0,(%rax) <-- trapping instruction
2d: 74 f2 je 0x21
2f: eb d8 jmp 0x9
31: 41 bc 08 00 00 00 mov $0x8,%r12d
37: 48 89 ea mov %rbp,%rdx
3a: 45 29 dc sub %r11d,%r12d
3d: 4e rex.WRX
3e: 8d .byte 0x8d
3f: 5c pop %rsp


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Sep 11, 2022, 1:20:31 PM9/11/22
to syzkaller...@googlegroups.com
syzbot has found a reproducer for the following issue on:

HEAD commit: 3f8a27f9e27b Linux 4.19.211
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=1529bec8880000
kernel config: https://syzkaller.appspot.com/x/.config?x=9b9277b418617afe
dashboard link: https://syzkaller.appspot.com/bug?extid=bde637644f8e5de8b629
compiler: gcc version 10.2.1 20210110 (Debian 10.2.1-6)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=14dcb707080000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=13a95837080000

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+bde637...@syzkaller.appspotmail.com

IPVS: ftp: loaded support on port[0] = 21
EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue
Quota error (device loop0): qtree_write_dquot: Error -1079867134 occurred while creating quota
BUG: unable to handle kernel paging request at fffffbfff7f4513f
PGD 23fff1067 P4D 23fff1067 PUD 23fff0067 PMD 0
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 8085 Comm: syz-executor301 Not tainted 4.19.211-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
RIP: 0010:bytes_is_nonzero mm/kasan/kasan.c:167 [inline]
RIP: 0010:memory_is_nonzero mm/kasan/kasan.c:184 [inline]
RIP: 0010:memory_is_poisoned_n mm/kasan/kasan.c:210 [inline]
RIP: 0010:memory_is_poisoned mm/kasan/kasan.c:241 [inline]
RIP: 0010:check_memory_region_inline mm/kasan/kasan.c:257 [inline]
RIP: 0010:check_memory_region+0xc8/0x170 mm/kasan/kasan.c:267
Code: 39 d0 74 0e 80 38 00 74 f2 48 85 c0 0f 85 9c 00 00 00 5b 5d 41 5c c3 48 85 d2 74 f6 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 e8 <80> 38 00 74 f2 eb d8 41 bc 08 00 00 00 48 89 ea 45 29 dc 4e 8d 5c
RSP: 0018:ffff8880b44e7880 EFLAGS: 00010292
RAX: fffffbfff7f4513f RBX: fffffbfff7f45140 RCX: ffffffff81be289e
RDX: fffffbfff7f45140 RSI: 0000000000000004 RDI: ffffffffbfa289fa
RBP: fffffbfff7f4513f R08: 0000000000000000 R09: fffffbfff7f4513f
R10: ffffffffbfa289fd R11: 0000000000074071 R12: ffffffffbfa289fa
R13: 0000000000000005 R14: fffffbfff7f4513f R15: ffff88808db9ea18
FS: 00005555561dc3c0(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffbfff7f4513f CR3: 000000009292d000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
atomic_read include/asm-generic/atomic-instrumented.h:21 [inline]
dqput.part.0+0xae/0x830 fs/quota/dquot.c:765
dqput fs/quota/dquot.c:752 [inline]
dqput_all fs/quota/dquot.c:391 [inline]
__dquot_drop+0x19c/0x270 fs/quota/dquot.c:1568
dquot_drop fs/quota/dquot.c:1593 [inline]
dquot_drop+0x14b/0x1a0 fs/quota/dquot.c:1571
ext4_clear_inode+0x31/0x1d0 fs/ext4/super.c:1178
ext4_evict_inode+0x25b/0x17b0 fs/ext4/inode.c:357
evict+0x2ed/0x760 fs/inode.c:559
dispose_list+0x124/0x1f0 fs/inode.c:594
evict_inodes+0x341/0x430 fs/inode.c:644
generic_shutdown_super+0xb3/0x370 fs/super.c:448
kill_block_super+0x97/0xf0 fs/super.c:1185
deactivate_locked_super+0x94/0x160 fs/super.c:329
deactivate_super+0x174/0x1a0 fs/super.c:360
cleanup_mnt+0x1a8/0x290 fs/namespace.c:1098
task_work_run+0x148/0x1c0 kernel/task_work.c:113
exit_task_work include/linux/task_work.h:22 [inline]
do_exit+0xbf3/0x2be0 kernel/exit.c:870
do_group_exit+0x125/0x310 kernel/exit.c:967
__do_sys_exit_group kernel/exit.c:978 [inline]
__se_sys_exit_group kernel/exit.c:976 [inline]
__x64_sys_exit_group+0x3a/0x50 kernel/exit.c:976
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7fe418a98619
Code: Bad RIP value.
RSP: 002b:00007ffca8003018 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 00007fe418b0d330 RCX: 00007fe418a98619
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001
RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 00007ffca8003078
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe418b0d330
R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
Modules linked in:
CR2: fffffbfff7f4513f
---[ end trace 800dc7aef8b8983c ]---
RIP: 0010:bytes_is_nonzero mm/kasan/kasan.c:167 [inline]
RIP: 0010:memory_is_nonzero mm/kasan/kasan.c:184 [inline]
RIP: 0010:memory_is_poisoned_n mm/kasan/kasan.c:210 [inline]
RIP: 0010:memory_is_poisoned mm/kasan/kasan.c:241 [inline]
RIP: 0010:check_memory_region_inline mm/kasan/kasan.c:257 [inline]
RIP: 0010:check_memory_region+0xc8/0x170 mm/kasan/kasan.c:267
Code: 39 d0 74 0e 80 38 00 74 f2 48 85 c0 0f 85 9c 00 00 00 5b 5d 41 5c c3 48 85 d2 74 f6 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 e8 <80> 38 00 74 f2 eb d8 41 bc 08 00 00 00 48 89 ea 45 29 dc 4e 8d 5c
RSP: 0018:ffff8880b44e7880 EFLAGS: 00010292
RAX: fffffbfff7f4513f RBX: fffffbfff7f45140 RCX: ffffffff81be289e
RDX: fffffbfff7f45140 RSI: 0000000000000004 RDI: ffffffffbfa289fa
RBP: fffffbfff7f4513f R08: 0000000000000000 R09: fffffbfff7f4513f
R10: ffffffffbfa289fd R11: 0000000000074071 R12: ffffffffbfa289fa
R13: 0000000000000005 R14: fffffbfff7f4513f R15: ffff88808db9ea18
FS: 00005555561dc3c0(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe418a985ef CR3: 000000009292d000 CR4: 00000000003406f0
Reply all
Reply to author
Forward
0 new messages