syzbot


general protection fault in bdevname (2)

Status: upstream: reported C repro on 2022/03/18 02:52
Reported-by: syzbot+4b1192c620073dc1170a@syzkaller.appspotmail.com
First crash: 770d, last: 55d
Similar bugs (1)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-54 general protection fault in bdevname 1 1103d 1103d 0/2 auto-closed as invalid on 2021/08/17 14:50
Last patch testing requests (5)
Created Duration User Patch Repo Result
2024/03/18 19:14 12m retest repro android12-5.4 report log
2024/01/08 17:28 14m retest repro android12-5.4 report log
2023/10/30 15:17 9m retest repro android12-5.4 report log
2023/08/21 11:59 14m retest repro android12-5.4 report log
2023/06/12 09:18 22m retest repro android12-5.4 report log

Sample crash report:
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 1112 Comm: kmmpd-loop0 Not tainted 5.4.161-syzkaller-00052-g49216514f3a3 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:bdevname+0x2d/0x160 block/partition-generic.c:49
Code: 41 56 41 55 41 54 53 49 89 f6 48 89 fb 49 bc 00 00 00 00 00 fc ff df e8 01 d0 4b ff 48 8d bb 80 00 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 74 05 e8 b7 ea 78 ff 4c 8b ab 80 00 00 00 48 83 c3
RSP: 0018:ffff8881e3567de8 EFLAGS: 00010202
RAX: 0000000000000010 RBX: 0000000000000000 RCX: ffff8881e67b8000
RDX: 0000000000000000 RSI: ffff8881ecd65450 RDI: 0000000000000080
RBP: ffff8881dc417ab0 R08: ffffffff81c0abf9 R09: ffffed103e14b231
R10: ffffed103e14b231 R11: 0000000000000000 R12: dffffc0000000000
R13: 000000000000000a R14: ffff8881ecd65450 R15: 0000000000000005
FS:  0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020011600 CR3: 00000001defdc000 CR4: 00000000003406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 kmmpd+0x1dc/0x9c0 fs/ext4/mmp.c:158
 kthread+0x30f/0x330 kernel/kthread.c:288
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:352
Modules linked in:
---[ end trace 763cde391e6b0cda ]---
RIP: 0010:bdevname+0x2d/0x160 block/partition-generic.c:49
Code: 41 56 41 55 41 54 53 49 89 f6 48 89 fb 49 bc 00 00 00 00 00 fc ff df e8 01 d0 4b ff 48 8d bb 80 00 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 74 05 e8 b7 ea 78 ff 4c 8b ab 80 00 00 00 48 83 c3
RSP: 0018:ffff8881e3567de8 EFLAGS: 00010202
RAX: 0000000000000010 RBX: 0000000000000000 RCX: ffff8881e67b8000
RDX: 0000000000000000 RSI: ffff8881ecd65450 RDI: 0000000000000080
RBP: ffff8881dc417ab0 R08: ffffffff81c0abf9 R09: ffffed103e14b231
R10: ffffed103e14b231 R11: 0000000000000000 R12: dffffc0000000000
R13: 000000000000000a R14: ffff8881ecd65450 R15: 0000000000000005
FS:  0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020011600 CR3: 00000001defdc000 CR4: 00000000003406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	41 56                	push   %r14
   2:	41 55                	push   %r13
   4:	41 54                	push   %r12
   6:	53                   	push   %rbx
   7:	49 89 f6             	mov    %rsi,%r14
   a:	48 89 fb             	mov    %rdi,%rbx
   d:	49 bc 00 00 00 00 00 	movabs $0xdffffc0000000000,%r12
  14:	fc ff df
  17:	e8 01 d0 4b ff       	callq  0xff4bd01d
  1c:	48 8d bb 80 00 00 00 	lea    0x80(%rbx),%rdi
  23:	48 89 f8             	mov    %rdi,%rax
  26:	48 c1 e8 03          	shr    $0x3,%rax
* 2a:	42 80 3c 20 00       	cmpb   $0x0,(%rax,%r12,1) <-- trapping instruction
  2f:	74 05                	je     0x36
  31:	e8 b7 ea 78 ff       	callq  0xff78eaed
  36:	4c 8b ab 80 00 00 00 	mov    0x80(%rbx),%r13
  3d:	48                   	rex.W
  3e:	83                   	.byte 0x83
  3f:	c3                   	retq

Crashes (6):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2022/03/18 02:51 android12-5.4 49216514f3a3 e2d91b1d .config console log report syz C ci2-android-5-4-kasan general protection fault in bdevname
2024/03/02 19:35 android12-5.4 50cb39f34248 25905f5d .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-4-kasan general protection fault in bdevname
2023/11/03 07:10 android12-5.4 2ac128c04e33 c4ac074c .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-4-kasan general protection fault in bdevname
2023/04/03 09:18 android12-5.4 0e0b8c9892c8 41147e3e .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-4-kasan general protection fault in bdevname
2022/12/22 13:22 android12-5.4 a8aad8851131 9da18ae8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-4-kasan general protection fault in bdevname
2022/11/29 19:19 android12-5.4 df2b5549c0ec 579a3740 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-4-kasan general protection fault in bdevname
* Struck through repros no longer work on HEAD.