syzbot


BUG: unable to handle kernel paging request in __ext4_expand_extra_isize

Status: fixed on 2019/12/13 00:31
Subsystems: ext4
[Documentation on labels]
Reported-by: syzbot+33d7ea72e47de3bdf4e1@syzkaller.appspotmail.com
Fix commit: 4ea99936a163 ext4: add more paranoia checking in ext4_expand_extra_isize handling
First crash: 2015d, last: 1658d
Discussions (9)
Title Replies (including bot) Last reply
[PATCH 4.19 000/321] 4.19.88-stable review 352 (352) 2020/02/09 12:41
[PATCH 4.4 00/76] 4.4.211-stable review 81 (81) 2020/01/22 20:52
[PATCH 4.9 00/97] 4.9.211-stable review 102 (102) 2020/01/22 20:52
[PATCH 3.16 00/63] 3.16.81-rc1 review 68 (68) 2020/01/10 16:01
[PATCH 4.14 000/209] 4.14.158-stable review 223 (223) 2019/12/10 00:52
[PATCH 5.4 00/46] 5.4.2-stable review 58 (58) 2019/12/06 13:05
[PATCH 5.3 000/135] 5.3.15-stable review 140 (140) 2019/12/04 19:13
[PATCH] ext4: add more paranoia checking in ext4_expand_extra_isize handling 6 (6) 2019/11/19 04:36
BUG: unable to handle kernel paging request in __ext4_expand_extra_isize 0 (1) 2019/10/21 05:24
Similar bugs (1)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.19 BUG: unable to handle kernel paging request in __ext4_expand_extra_isize 1 1614d 1614d 0/1 auto-closed as invalid on 2020/03/13 17:51

Sample crash report:
BUG: unable to handle page fault for address: ffffed1018000000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 21fff0067 P4D 21fff0067 PUD 12fff9067 PMD 0 
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 8818 Comm: syz-executor.4 Not tainted 5.4.0-rc1 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:memory_is_nonzero mm/kasan/generic.c:121 [inline]
RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:135 [inline]
RIP: 0010:memory_is_poisoned mm/kasan/generic.c:166 [inline]
RIP: 0010:check_memory_region_inline mm/kasan/generic.c:182 [inline]
RIP: 0010:check_memory_region+0x9c/0x1a0 mm/kasan/generic.c:192
Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 10 01 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 a7 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 53 80
RSP: 0018:ffff888067037ae8 EFLAGS: 00010287
RAX: ffffed1018000000 RBX: ffffed101ffc3ab0 RCX: ffffffff81f9c14b
RDX: 0000000000000001 RSI: 000000003fffffe0 RDI: ffff8880bfe1d5a0
RBP: ffff888067037b00 R08: ffffed101ffc3ab0 R09: 0000000007fffff8
R10: ffffed101ffc3aaf R11: ffff8880ffe1d57f R12: ffffed1017fc3ab4
R13: 0000000000000004 R14: 0000000000000000 R15: ffff888089bf3950
FS:  00000000010e7940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffed1018000000 CR3: 00000000677f3000 CR4: 00000000001426f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 memset+0x24/0x40 mm/kasan/common.c:105
 memset include/linux/string.h:344 [inline]
 __ext4_expand_extra_isize+0x1ab/0x290 fs/ext4/inode.c:5924
 ext4_try_to_expand_extra_isize fs/ext4/inode.c:5976 [inline]
 ext4_mark_inode_dirty+0x74e/0x9b0 fs/ext4/inode.c:6052
 ext4_unlink fs/ext4/namei.c:3195 [inline]
 ext4_unlink+0xce6/0x10e0 fs/ext4/namei.c:3140
 vfs_unlink+0x2d7/0x620 fs/namei.c:3991
 do_unlinkat+0x3f7/0x6d0 fs/namei.c:4055
 __do_sys_unlink fs/namei.c:4102 [inline]
 __se_sys_unlink fs/namei.c:4100 [inline]
 __x64_sys_unlink+0x42/0x50 fs/namei.c:4100
 do_syscall_64+0xfa/0x760 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x459777
Code: 00 66 90 b8 58 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffe12e0a798 EFLAGS: 00000246 ORIG_RAX: 0000000000000057
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459777
RDX: 00007ffe12e0a7b0 RSI: 00007ffe12e0a7b0 RDI: 00007ffe12e0a840
RBP: 0000000000000877 R08: 0000000000000000 R09: 0000000000000010
R10: 000000000000000a R11: 0000000000000246 R12: 00007ffe12e0b8d0
R13: 00000000010e8940 R14: 0000000000000000 R15: 00007ffe12e0b8d0
Modules linked in:
CR2: ffffed1018000000
---[ end trace bdf4c1ab65ec2470 ]---
RIP: 0010:memory_is_nonzero mm/kasan/generic.c:121 [inline]
RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:135 [inline]
RIP: 0010:memory_is_poisoned mm/kasan/generic.c:166 [inline]
RIP: 0010:check_memory_region_inline mm/kasan/generic.c:182 [inline]
RIP: 0010:check_memory_region+0x9c/0x1a0 mm/kasan/generic.c:192
Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 10 01 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 a7 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 53 80
RSP: 0018:ffff888067037ae8 EFLAGS: 00010287
RAX: ffffed1018000000 RBX: ffffed101ffc3ab0 RCX: ffffffff81f9c14b
RDX: 0000000000000001 RSI: 000000003fffffe0 RDI: ffff8880bfe1d5a0
RBP: ffff888067037b00 R08: ffffed101ffc3ab0 R09: 0000000007fffff8
R10: ffffed101ffc3aaf R11: ffff8880ffe1d57f R12: ffffed1017fc3ab4
R13: 0000000000000004 R14: 0000000000000000 R15: ffff888089bf3950
FS:  00000000010e7940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffed1018000000 CR3: 00000000677f3000 CR4: 00000000001426f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400

Crashes (6):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2019/10/01 08:51 upstream 54ecb8f7028c c7a4fb99 .config console log report ci-upstream-kasan-gce-root
2019/09/15 17:22 upstream 1609d7604b84 32d59357 .config console log report ci-upstream-kasan-gce-root
2019/09/07 20:20 upstream 1e3778cb223e a60cb4cd .config console log report ci-upstream-kasan-gce-root
2019/03/16 05:41 upstream 6c83d0d5eb62 bab43553 .config console log report ci-upstream-kasan-gce-smack-root
2018/11/19 06:52 upstream c67a98c00ea3 adf636a8 .config console log report ci-upstream-kasan-gce-root
2018/10/09 15:17 upstream 64c5e530ac2c 8b311eaf .config console log report ci-upstream-kasan-gce-smack-root
* Struck through repros no longer work on HEAD.