[syzbot] linux-next boot error: WARNING in jbd2_journal_add_journal_head

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

syzbot found the following issue on:

HEAD commit:    395a61741f7e Add linux-next specific files for 20220210
git tree:       linux-next
console output: https://syzkaller.appspot.com/x/log.txt?x=15273c74700000
kernel config:  https://syzkaller.appspot.com/x/.config?x=addf1551553641e4
dashboard link: https://syzkaller.appspot.com/bug?extid=8b01515f1a28478eb4bd
compiler:       gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+8b01515f1a28478eb4bd@xxxxxxxxxxxxxxxxxxxxxxxxx

debug_vm_pgtable: [debug_vm_pgtable         ]: Validating architecture page table helpers
Key type ._fscrypt registered
Key type .fscrypt registered
Key type fscrypt-provisioning registered
kAFS: Red Hat AFS client v0.1 registering.
Btrfs loaded, crc32c=crc32c-intel, assert=on, zoned=yes, fsverity=yes
Key type big_key registered
Key type encrypted registered
AppArmor: AppArmor sha1 policy hashing enabled
ima: No TPM chip found, activating TPM-bypass!
Loading compiled-in module X.509 certificates
Loaded X.509 cert 'Build time autogenerated kernel key: 6faad590106e97e953b70d9fe8fe9023f99ac2db'
ima: Allocated hash algorithm: sha256
ima: No architecture policies found
evm: Initialising EVM extended attributes:
evm: security.selinux (disabled)
evm: security.SMACK64 (disabled)
evm: security.SMACK64EXEC (disabled)
evm: security.SMACK64TRANSMUTE (disabled)
evm: security.SMACK64MMAP (disabled)
evm: security.apparmor
evm: security.ima
evm: security.capability
evm: HMAC attrs: 0x1
PM:   Magic number: 10:298:72
usb usb24-port4: hash matches
printk: console [netcon0] enabled
netconsole: network logging started
gtp: GTP module loaded (pdp ctx size 104 bytes)
rdma_rxe: loaded
cfg80211: Loading compiled-in X.509 certificates for regulatory database
cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
ALSA device list:
  #0: Dummy 1
  #1: Loopback 1
  #2: Virtual MIDI Card 1
md: Waiting for all devices to be available before autodetect
md: If you don't use raid, use raid=noautodetect
md: Autodetecting RAID arrays.
md: autorun ...
md: ... autorun DONE.
EXT4-fs (sda1): mounted filesystem with ordered data mode. Quota mode: none.
VFS: Mounted root (ext4 filesystem) readonly on device 8:1.
devtmpfs: mounted
Freeing unused kernel image (initmem) memory: 2716K
Write protecting the kernel read-only data: 172032k
Freeing unused kernel image (text/rodata gap) memory: 2016K
Freeing unused kernel image (rodata/data gap) memory: 996K
Run /sbin/init as init process
------------[ cut here ]------------
WARNING: CPU: 1 PID: 1 at mm/slub.c:3246 kmem_cache_alloc+0x329/0x3d0 mm/slub.c:3251
Modules linked in:
CPU: 1 PID: 1 Comm: init Not tainted 5.17.0-rc3-next-20220210-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:kmem_cache_alloc+0x329/0x3d0 mm/slub.c:3246
Code: 5d 3e 7e 48 8b 05 a7 5b bc 0b e8 b2 35 9f ff 85 c0 74 2d 65 ff 0d b7 5d 3e 7e 0f 85 93 fe ff ff e8 5b 33 3c ff e9 89 fe ff ff <0f> 0b e9 0a fd ff ff b9 01 00 00 00 bb 01 00 00 00 e9 ce fe ff ff
RSP: 0018:ffffc90000c675c8 EFLAGS: 00010202
RAX: 0000000000000000 RBX: ffff88801b4740e8 RCX: 0000000000000000
RDX: ffff888011898000 RSI: 0000000000000d40 RDI: ffff888018aa9c80
RBP: ffff888018aa9c80 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff823295f6 R11: 0000000000000000 R12: 0000000000000d40
R13: ffff88801b4740e8 R14: 0000000000000100 R15: ffff88807f34a000
FS:  00007fab10ea9800(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff6395be300 CR3: 000000007f201000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 kmem_cache_zalloc include/linux/slab.h:705 [inline]
 journal_alloc_journal_head fs/jbd2/journal.c:2864 [inline]
 jbd2_journal_add_journal_head+0x1cb/0x5c0 fs/jbd2/journal.c:2933
 jbd2_journal_get_write_access+0x112/0x190 fs/jbd2/transaction.c:1240
 __ext4_journal_get_write_access+0x1ba/0x440 fs/ext4/ext4_jbd2.c:235
 ext4_reserve_inode_write+0x187/0x270 fs/ext4/inode.c:5699
 __ext4_mark_inode_dirty+0x17b/0x8d0 fs/ext4/inode.c:5865
 ext4_dirty_inode+0xd4/0x110 fs/ext4/inode.c:5902
 __mark_inode_dirty+0x45b/0xfe0 fs/fs-writeback.c:2370
 generic_update_time fs/inode.c:1856 [inline]
 inode_update_time fs/inode.c:1869 [inline]
 touch_atime+0x63d/0x700 fs/inode.c:1941
 pick_link fs/namei.c:1796 [inline]
 step_into+0x89e/0x1d80 fs/namei.c:1876
 walk_component+0x171/0x6a0 fs/namei.c:2026
 link_path_walk.part.0+0x7ef/0xf70 fs/namei.c:2347
 link_path_walk fs/namei.c:2271 [inline]
 path_lookupat+0xc8/0x860 fs/namei.c:2498
 filename_lookup+0x1c6/0x590 fs/namei.c:2528
 user_path_at_empty+0x42/0x60 fs/namei.c:2851
 user_path_at include/linux/namei.h:57 [inline]
 do_faccessat+0x127/0x850 fs/open.c:424
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fab11035a67
Code: 77 01 c3 48 8b 15 11 f4 0c 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 15 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 e1 f3 0c 00 f7 d8 64 89 02 b8
RSP: 002b:00007ffd5ca3e9c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000015
RAX: ffffffffffffffda RBX: 0000000000000b71 RCX: 00007fab11035a67
RDX: 0000000000000000 RSI: 0000000000000006 RDI: 00007fab111cc285
RBP: 0000000000000008 R08: 0000000000000000 R09: 00007fab110d3288
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000b71
 </TASK>


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzkaller@xxxxxxxxxxxxxxxx.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.



[Index of Archives]     [Linux Kernel]     [Linux USB Development]     [Yosemite News]     [Linux SCSI]

  Powered by Linux