syzbot


WARNING in __ext4_journal_start_sb

Status: upstream: reported C repro on 2024/04/27 20:56
Subsystems: ext4
[Documentation on labels]
Reported-by: syzbot+85d8bf8b2759214b194b@syzkaller.appspotmail.com
First crash: 300d, last: 9d00h
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [ext4?] WARNING in __ext4_journal_start_sb 0 (1) 2024/04/27 20:56
Similar bugs (1)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-5.15 WARNING in __ext4_journal_start_sb 1 5d09h 5d09h 0/3 upstream: reported on 2025/02/12 17:46
Last patch testing requests (5)
Created Duration User Patch Repo Result
2025/02/09 02:31 27m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci report log
2024/12/05 05:13 26m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci report log
2024/09/26 04:20 30m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci report log
2024/07/17 17:31 33m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci report log
2024/05/07 21:13 25m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci report log

Sample crash report:
------------[ cut here ]------------
WARNING: CPU: 0 PID: 16935 at fs/ext4/ext4_jbd2.c:73 __ext4_journal_start_sb+0x434/0x924 fs/ext4/ext4_jbd2.c:105
Modules linked in:
CPU: 0 UID: 0 PID: 16935 Comm: syz-executor218 Not tainted 6.13.0-rc7-syzkaller-g1950a0af2d55 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : __ext4_journal_start_sb+0x434/0x924 fs/ext4/ext4_jbd2.c:105
lr : ext4_journal_check_start fs/ext4/ext4_jbd2.c:73 [inline]
lr : __ext4_journal_start_sb+0x430/0x924 fs/ext4/ext4_jbd2.c:105
sp : ffff8000a30571f0
x29: ffff8000a3057200 x28: 1fffe000192db0c7 x27: dfff800000000000
x26: 0000000070810011 x25: ffff0000c96d8638 x24: ffff0000c96d8000
x23: 0000000000000001 x22: 0000000000000000 x21: 0000000000000000
x20: ffffffffffffffe2 x19: 1fffe000192db0c7 x18: ffff8000a3057790
x17: 0000000000000000 x16: ffff80008046281c x15: 0000000000000001
x14: 1ffff00011f70fe8 x13: ffff8000a3058000 x12: 0000000000000003
x11: 0000000000000001 x10: 0000000000ff0100 x9 : 0000000000000000
x8 : ffff0000ca7b1e40 x7 : ffff80008051c198 x6 : 0000000000000008
x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
Call trace:
 __ext4_journal_start_sb+0x434/0x924 fs/ext4/ext4_jbd2.c:105 (P)
 ext4_sample_last_mounted fs/ext4/file.c:856 [inline]
 ext4_file_open+0x504/0x760 fs/ext4/file.c:884
 do_dentry_open+0xc0c/0x168c fs/open.c:945
 vfs_open+0x48/0x2d4 fs/open.c:1075
 do_open fs/namei.c:3828 [inline]
 path_openat+0x2300/0x2b14 fs/namei.c:3987
 do_filp_open+0x1e8/0x404 fs/namei.c:4014
 do_open_execat+0x144/0x3dc fs/exec.c:902
 open_exec+0x48/0x6c fs/exec.c:939
 bm_register_write+0x9c8/0x1188 fs/binfmt_misc.c:833
 vfs_write+0x3b0/0xcf4 fs/read_write.c:677
 ksys_write+0x15c/0x26c fs/read_write.c:731
 __do_sys_write fs/read_write.c:742 [inline]
 __se_sys_write fs/read_write.c:739 [inline]
 __arm64_sys_write+0x7c/0x90 fs/read_write.c:739
 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
 invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744
 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762
 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600
irq event stamp: 100
hardirqs last  enabled at (99): [<ffff80008b6cd25c>] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline]
hardirqs last  enabled at (99): [<ffff80008b6cd25c>] _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194
hardirqs last disabled at (100): [<ffff80008b6a8d44>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:488
softirqs last  enabled at (8): [<ffff800080129934>] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32
softirqs last disabled at (6): [<ffff800080129900>] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19
---[ end trace 0000000000000000 ]---
binfmt_misc: register: failed to install interpreter file ./file2

Crashes (3):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/01/25 05:37 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 1950a0af2d55 9fbd772e .config console log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-gce-arm64 WARNING in __ext4_journal_start_sb
2024/04/23 20:50 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 6a71d2909427 21339d7b .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-gce-arm64 WARNING in __ext4_journal_start_sb
2025/01/25 03:52 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 1950a0af2d55 9fbd772e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING in __ext4_journal_start_sb
* Struck through repros no longer work on HEAD.