From nobody Thu Dec 18 23:23:45 2025 Received: from mail-pf1-f169.google.com (mail-pf1-f169.google.com [209.85.210.169]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 68B02329397 for ; Tue, 16 Dec 2025 18:52:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.169 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1765911154; cv=none; b=FJW6pHroDK5AaC+KgN35iUFIFCAmCs8fdJmcllCfLjNHYDNCu0D7DXo7whYLtwDw7QZ0oqYyuhuEsnmHyicPXjGBaW5HABb86d5ad7xGJGglCLgMY4xLdbIwy52gbm9XVEttxAgP3KPlsqGhdWO9P+8EYHALaLlRfOwVR3Tlwd4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1765911154; c=relaxed/simple; bh=Nce/j4OPhu0+248jgrGHkXAmn+4nYy7iZSFUh66S8GM=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=qPqQfibNP20dZpWI4CtEp9qNp1KBT60Xp6k++kpziPQ5hx4QOk5Y3Y1tDau2lYeYtefuGUx0bpua6nXTy4uSEU4oCE0rZPhJgKvDsNMpqlgZ1JokDsVNYtnX+XqoQ9BcMSRIkl93AZRdVvXaGi2Cr7xfbE7peDKSgZxQKlRSPZ4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=h6q9Zg/h; arc=none smtp.client-ip=209.85.210.169 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="h6q9Zg/h" Received: by mail-pf1-f169.google.com with SMTP id d2e1a72fcca58-7b89c1ce9easo5742074b3a.2 for ; Tue, 16 Dec 2025 10:52:33 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1765911153; x=1766515953; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=ykq7RwzbFDnHLDwmI3Df/wMgjpeIksVlYAA52SJcTZA=; b=h6q9Zg/htXIWaaLI1hH/G+lOgKzZwbiChdpmXT8uytJX6vd5aypGe2zBYfKTcPXDWM FpNYKdMx/l9ymWwo7cJaSsGaVBqLgWHnEjFx1c+8Ti9J3/C0Mwq9TfXVOxTY/NZRaF5W h70b4RXH1Fz2IIPlHBvCEq/5ivHPD5LZsWac9m3Tx2BSzldFvM+HIvS81LH5gs+Dx8tx GNBCZtRVfO8HB48fQJ0LOK9P5LpMitCHNcRmI8OUWY2E9SlhE8aR3wh9pgkNq47lB0MN RVi8cGeIaDmqxwOhzGyGCEo5DywolU4Hw82hzVGdAC/4TxauCp/vlikgvysI6x13GWOV 5Saw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1765911153; x=1766515953; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=ykq7RwzbFDnHLDwmI3Df/wMgjpeIksVlYAA52SJcTZA=; b=TUNF6O00OW3feOKOhjDThCrz/HmZfno7ks93q2/66qNxbYY/t1J4pCxuag7Yw7k3ma EirjAvKdeOauG0A0R9We2WNbgr+16806z4am0H0P9Cob/PeV4g01U30a9tx86SAHUli5 6p5CUVV6ZC+CifiEEN8wkd6m71p0OLA9NQh2EQv00EvkpRxc4Xfq5LsQM+B0fuzlDNQa BKfxlSXvDMIQ4j4pEmQrcyCwrnE/bNNhlQgS29ESlQlnc9PddbmAsmks34ZWgnkC/bq7 ZXbJzOVx3idDxiNVwa/RlVupvSWd468UohH8MDuw1qZM+O1dCaFBqhXNLS+WUJAZ7ZFZ 41gA== X-Gm-Message-State: AOJu0YyKuF9PjIf2bDz2+1UocwGVY8SY6Ua9kAi9n9rMZY6HEL18iJIt Jt6ktpP8JvteuSRLuNG5UANWRpm9Anug1yiTgM92ibBGDYhjoXw9IcrE X-Gm-Gg: AY/fxX5+kUgpEW3ujHLL5HoEX+GkS5f5gfJK94IwgDcqrcxt71mnzzuyRqC2jRsmdw0 MJUl+Avwkk/42AD4hB3lbifVpnryi8zDG1fF5/0MsopomnhhSjDb7syVc6eUnApntSlw9tla0sJ 37HZf82yptvnR9sIm5BY6rB2GHBtaO/a7U+dR5cffaEEUpA+JAOX+SL+Y1Caj5DYy3Xip8D0mMF 5VeHtpKBaB/pi01B4MIES6S0sWoIo8sRx9lCFyyeK1B9p5vxNb6sUWn1/E0hWHU3/1Jw6ifzo5w rEtPbxAeI221TG4V8BAewMi2Ded+b/qOJoIgLeYo1ImlJO9NXDlRDW4zYY90YNP4D0wd1lFMTC8 B2pCefwDQG0LHB5NF9MFZSYV74cN4iJ7GIEoITF1uKi1n44/pu+ecDgPqOlVpAS8WlgCzZixJQ4 CfDZP6newhUbV/SaLrzlxhMtNo1fcV5cYtPVwgpw== X-Google-Smtp-Source: AGHT+IGVwwEIWOOfiq0wiziNtaloZ3g5RFzG1PEu9/2o7ZwdSSwjy0D0m/o071xxpN4FF/OMmYutKw== X-Received: by 2002:a05:6a00:3491:b0:7e8:4471:ae6f with SMTP id d2e1a72fcca58-7f669e7d93amr14886162b3a.59.1765911152634; Tue, 16 Dec 2025 10:52:32 -0800 (PST) Received: from localhost.localdomain ([111.125.240.40]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7fcb5c6d9acsm274041b3a.0.2025.12.16.10.52.29 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 16 Dec 2025 10:52:32 -0800 (PST) From: Prithvi Tambewagh To: syzbot+779d072a1067a8b1a917@syzkaller.appspotmail.com, jlbec@evilplan.org, joseph.qi@linux.alibaba.com, mark@fasheh.com Cc: linux-kernel@vger.kernel.org, ocfs2-devel@lists.linux.dev, syzkaller-bugs@googlegroups.com, Prithvi Tambewagh Subject: Syzbot test for ocfs2: handle OCFS2_SUPER_BLOCK_FL flag in system dinode Date: Wed, 17 Dec 2025 00:22:19 +0530 Message-ID: <20251216185221.31843-1-activprithvi@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <66f24c1c.050a0220.3eed3.0020.GAE@google.com> References: <66f24c1c.050a0220.3eed3.0020.GAE@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" #syz test git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git = d76bb1ebb5587f66b0f8b8099bfbb44722bc08b3 Signed-off-by: Prithvi Tambewagh Reported-by: syzbot+779d072a1067a8b1a917@syzkaller.appspotmail.com Tested-by: syzbot+779d072a1067a8b1a917@syzkaller.appspotmail.com --- fs/ocfs2/inode.c | 14 ++++++++++++-- 1 file changed, 12 insertions(+), 2 deletions(-) diff --git a/fs/ocfs2/inode.c b/fs/ocfs2/inode.c index 12e5d1f73325..f439dc801845 100644 --- a/fs/ocfs2/inode.c +++ b/fs/ocfs2/inode.c @@ -347,7 +347,12 @@ void ocfs2_populate_inode(struct inode *inode, struct = ocfs2_dinode *fe, } else if (fe->i_flags & cpu_to_le32(OCFS2_SUPER_BLOCK_FL)) { /* we can't actually hit this as read_inode can't * handle superblocks today ;-) */ - BUG(); + ocfs2_error(sb, + "System Inode %llu has " + "OCFS2_SUPER_BLOCK_FL set", + (unsigned long long)le64_to_cpu(fe->i_blkno)); + make_bad_inode(inode); + return; } =20 switch (inode->i_mode & S_IFMT) { @@ -555,6 +560,11 @@ static int ocfs2_read_locked_inode(struct inode *inode, =20 ocfs2_populate_inode(inode, fe, 0); =20 + if (is_bad_inode(inode)) { + status =3D -EIO; + goto bail; + } + BUG_ON(args->fi_blkno !=3D le64_to_cpu(fe->i_blkno)); =20 if (buffer_dirty(bh) && !buffer_jbd(bh)) { @@ -576,7 +586,7 @@ static int ocfs2_read_locked_inode(struct inode *inode, if (can_lock) ocfs2_inode_unlock(inode, lock_level); =20 - if (status < 0) + if (status < 0 && !is_bad_inode(inode)) make_bad_inode(inode); =20 brelse(bh); base-commit: d76bb1ebb5587f66b0f8b8099bfbb44722bc08b3 --=20 2.43.0