general protection fault in __find_get_block

5 views
Skip to first unread message

syzbot

unread,
Aug 21, 2020, 3:08:22 AM8/21/20
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: a834132b Linux 4.19.140
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=12f07051900000
kernel config: https://syzkaller.appspot.com/x/.config?x=cf0941721f5dace0
dashboard link: https://syzkaller.appspot.com/bug?extid=b3c44bf723c975e1dca8
compiler: gcc (GCC) 10.1.0-syz 20200507

Unfortunately, I don't have any reproducer for this issue yet.

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+b3c44b...@syzkaller.appspotmail.com

kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 6496 Comm: syz-executor.4 Not tainted 4.19.140-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:constant_test_bit arch/x86/include/asm/bitops.h:317 [inline]
RIP: 0010:buffer_mapped include/linux/buffer_head.h:126 [inline]
RIP: 0010:__find_get_block_slow fs/buffer.c:216 [inline]
RIP: 0010:__find_get_block+0x6f2/0xde0 fs/buffer.c:1295
Code: 48 8d 7b 08 48 89 f8 48 c1 e8 03 80 3c 28 00 0f 85 d1 06 00 00 48 8b 5b 08 49 39 df 74 58 e8 a5 e9 b1 ff 48 89 d8 48 c1 e8 03 <80> 3c 28 00 0f 85 62 06 00 00 48 8b 03 31 ff 48 c1 e8 05 41 89 c6
RSP: 0018:ffff88805ffb7788 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff81b7c694
RDX: 0000000000000000 RSI: ffffffff81b7c66b RDI: ffff888000410350
RBP: dffffc0000000000 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: 000000000000281d R14: 0000000000000000 R15: ffff888000410348
FS: 000000000339e940(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000033afad8 CR3: 000000005ff72000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__getblk_gfp+0x28/0x70 fs/buffer.c:1317
sb_getblk include/linux/buffer_head.h:333 [inline]
ext4_getblk+0x162/0x4f0 fs/ext4/inode.c:992
ext4_bread+0x7c/0x210 fs/ext4/inode.c:1035
__ext4_read_dirblock+0x34/0x9d0 fs/ext4/namei.c:111
htree_dirblock_to_tree+0xaa/0x5e0 fs/ext4/namei.c:995
ext4_htree_fill_tree+0x239/0xb60 fs/ext4/namei.c:1114
ext4_dx_readdir fs/ext4/dir.c:582 [inline]
ext4_readdir+0x14b2/0x2d30 fs/ext4/dir.c:125
iterate_dir+0x473/0x5c0 fs/readdir.c:51
__do_sys_getdents fs/readdir.c:268 [inline]
__se_sys_getdents+0x175/0x2d0 fs/readdir.c:249
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45b82b
Code: 02 74 b6 31 f6 eb b9 0f 1f 84 00 00 00 00 00 41 57 41 56 48 63 ff 41 55 41 54 b8 4e 00 00 00 55 53 48 89 f3 48 83 ec 08 0f 05 <48> 3d 00 f0 ff ff 77 55 4c 8d 24 06 49 89 c5 4c 39 e6 73 33 90 0f
RSP: 002b:00007fffaddbad60 EFLAGS: 00000206 ORIG_RAX: 000000000000004e
RAX: ffffffffffffffda RBX: 00000000033a7ad0 RCX: 000000000045b82b
RDX: 0000000000008000 RSI: 00000000033a7ad0 RDI: 0000000000000004
RBP: 00000000033a7ad0 R08: 0000000000000000 R09: 0000000000000053
R10: 000000000000004c R11: 0000000000000206 R12: ffffffffffffffd4
R13: 0000000000000016 R14: 0000000000000000 R15: 00007fffaddbcff0
Modules linked in:
---[ end trace d1bfd5e259ec2134 ]---
RIP: 0010:constant_test_bit arch/x86/include/asm/bitops.h:317 [inline]
RIP: 0010:buffer_mapped include/linux/buffer_head.h:126 [inline]
RIP: 0010:__find_get_block_slow fs/buffer.c:216 [inline]
RIP: 0010:__find_get_block+0x6f2/0xde0 fs/buffer.c:1295
Code: 48 8d 7b 08 48 89 f8 48 c1 e8 03 80 3c 28 00 0f 85 d1 06 00 00 48 8b 5b 08 49 39 df 74 58 e8 a5 e9 b1 ff 48 89 d8 48 c1 e8 03 <80> 3c 28 00 0f 85 62 06 00 00 48 8b 03 31 ff 48 c1 e8 05 41 89 c6
RSP: 0018:ffff88805ffb7788 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff81b7c694
RDX: 0000000000000000 RSI: ffffffff81b7c66b RDI: ffff888000410350
RBP: dffffc0000000000 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: 000000000000281d R14: 0000000000000000 R15: ffff888000410348
FS: 000000000339e940(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000033afad8 CR3: 000000005ff72000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Dec 19, 2020, 2:08:06 AM12/19/20
to syzkaller...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages