syzbot


general protection fault in debug_check_no_obj_freed (7)

Status: auto-obsoleted due to no activity on 2023/09/24 06:05
Subsystems: fs batman
[Documentation on labels]
Reported-by: syzbot+97566d38c4fd36681b16@syzkaller.appspotmail.com
First crash: 361d, last: 310d
Similar bugs (10)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream general protection fault in debug_check_no_obj_freed (2) mm 1 2012d 2010d 0/26 auto-closed as invalid on 2019/04/26 09:49
linux-4.19 general protection fault in debug_check_no_obj_freed (2) 2 840d 944d 0/1 auto-closed as invalid on 2022/05/11 17:22
linux-4.19 general protection fault in debug_check_no_obj_freed 1 1330d 1330d 0/1 auto-closed as invalid on 2021/01/06 22:10
upstream general protection fault in debug_check_no_obj_freed (4) net 1 1102d 1096d 0/26 auto-closed as invalid on 2021/06/24 04:15
upstream general protection fault in debug_check_no_obj_freed (5) kvm 4 998d 1018d 0/26 auto-closed as invalid on 2021/11/05 02:52
upstream general protection fault in debug_check_no_obj_freed (6) tomoyo 2 905d 902d 0/26 auto-closed as invalid on 2022/02/06 02:57
upstream general protection fault in debug_check_no_obj_freed (3) mm 7 1306d 1318d 0/26 auto-closed as invalid on 2021/01/30 14:32
upstream general protection fault in debug_check_no_obj_freed mm 2 2226d 2224d 0/26 closed as invalid on 2018/07/17 14:23
linux-4.19 BUG: unable to handle kernel paging request in debug_check_no_obj_freed 1 1164d 1164d 0/1 auto-closed as invalid on 2021/06/21 12:27
upstream BUG: unable to handle kernel paging request in debug_check_no_obj_freed (3) ntfs3 1 644d 640d 0/26 auto-obsoleted due to no activity on 2022/10/25 02:48

Sample crash report:
general protection fault, probably for non-canonical address 0xe0ce3c3ae0000340: 0000 [#1] PREEMPT SMP KASAN
KASAN: maybe wild-memory-access in range [0x067201d700001a00-0x067201d700001a07]
CPU: 1 PID: 6656 Comm: syz-executor.1 Not tainted 6.4.0-rc7-syzkaller-00234-g547cc9be86f4 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023
RIP: 0010:__debug_check_no_obj_freed lib/debugobjects.c:1012 [inline]
RIP: 0010:debug_check_no_obj_freed+0x1d7/0x420 lib/debugobjects.c:1054
Code: 39 00 0f 85 0f 02 00 00 48 89 45 08 4d 89 30 4c 89 c7 4d 89 68 08 e8 d8 cb ff ff 48 85 ed 74 2c 49 89 e8 4c 89 c0 48 c1 e8 03 <42> 80 3c 38 00 0f 84 2e ff ff ff 4c 89 c7 4c 89 44 24 38 e8 81 4d
RSP: 0018:ffffc900037cf908 EFLAGS: 00010012
RAX: 00ce403ae0000340 RBX: ffff88803ec9bba0 RCX: ffffffff816652c4
RDX: 1ffffffff23fc3e9 RSI: 0000000000000004 RDI: ffff88819e541360
RBP: 067201d700001a00 R08: 067201d700001a00 R09: ffff888100000000
R10: fffff520006f9f0f R11: 0000000000094001 R12: 0000000000000009
R13: dead000000000122 R14: dead000000000100 R15: dffffc0000000000
FS:  0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055556ffffdc0 CR3: 000000007a3a9000 CR4: 0000000000350ee0
Call Trace:
 <TASK>
 slab_free_hook mm/slub.c:1756 [inline]
 slab_free_freelist_hook+0xeb/0x1c0 mm/slub.c:1807
 slab_free mm/slub.c:3786 [inline]
 kmem_cache_free+0xe9/0x480 mm/slub.c:3808
 pgtable_pte_page_dtor include/linux/mm.h:2785 [inline]
 ___pte_free_tlb+0x1d/0x1a0 arch/x86/mm/pgtable.c:55
 __pte_free_tlb arch/x86/include/asm/pgalloc.h:61 [inline]
 free_pte_range mm/memory.c:193 [inline]
 free_pmd_range mm/memory.c:211 [inline]
 free_pud_range mm/memory.c:245 [inline]
 free_p4d_range mm/memory.c:279 [inline]
 free_pgd_range+0x497/0xbf0 mm/memory.c:359
 free_pgtables+0x68a/0x930 mm/memory.c:404
 exit_mmap+0x29e/0x930 mm/mmap.c:3118
 __mmput+0x128/0x4c0 kernel/fork.c:1351
 mmput+0x60/0x70 kernel/fork.c:1373
 exit_mm kernel/exit.c:567 [inline]
 do_exit+0x9b0/0x29b0 kernel/exit.c:861
 do_group_exit+0xd4/0x2a0 kernel/exit.c:1024
 __do_sys_exit_group kernel/exit.c:1035 [inline]
 __se_sys_exit_group kernel/exit.c:1033 [inline]
 __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1033
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fb218e8c389
Code: Unable to access opcode bytes at 0x7fb218e8c35f.
RSP: 002b:00007fffb8e89478 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 000000005652a400 RCX: 00007fb218e8c389
RDX: 00007fb218e45391 RSI: 0000000000000000 RDI: 000000000000000b
RBP: 000000000000000b R08: 00007fffb8e89960 R09: 000000005652a400
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fffb8e89bb0
R13: 0000000000000000 R14: 0000000000000020 R15: ffffffffffffffff
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:__debug_check_no_obj_freed lib/debugobjects.c:1012 [inline]
RIP: 0010:debug_check_no_obj_freed+0x1d7/0x420 lib/debugobjects.c:1054
Code: 39 00 0f 85 0f 02 00 00 48 89 45 08 4d 89 30 4c 89 c7 4d 89 68 08 e8 d8 cb ff ff 48 85 ed 74 2c 49 89 e8 4c 89 c0 48 c1 e8 03 <42> 80 3c 38 00 0f 84 2e ff ff ff 4c 89 c7 4c 89 44 24 38 e8 81 4d
RSP: 0018:ffffc900037cf908 EFLAGS: 00010012

RAX: 00ce403ae0000340 RBX: ffff88803ec9bba0 RCX: ffffffff816652c4
RDX: 1ffffffff23fc3e9 RSI: 0000000000000004 RDI: ffff88819e541360
RBP: 067201d700001a00 R08: 067201d700001a00 R09: ffff888100000000
R10: fffff520006f9f0f R11: 0000000000094001 R12: 0000000000000009
R13: dead000000000122 R14: dead000000000100 R15: dffffc0000000000
FS:  0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055556ffffdc0 CR3: 000000007a3a9000 CR4: 0000000000350ee0
----------------
Code disassembly (best guess):
   0:	39 00                	cmp    %eax,(%rax)
   2:	0f 85 0f 02 00 00    	jne    0x217
   8:	48 89 45 08          	mov    %rax,0x8(%rbp)
   c:	4d 89 30             	mov    %r14,(%r8)
   f:	4c 89 c7             	mov    %r8,%rdi
  12:	4d 89 68 08          	mov    %r13,0x8(%r8)
  16:	e8 d8 cb ff ff       	callq  0xffffcbf3
  1b:	48 85 ed             	test   %rbp,%rbp
  1e:	74 2c                	je     0x4c
  20:	49 89 e8             	mov    %rbp,%r8
  23:	4c 89 c0             	mov    %r8,%rax
  26:	48 c1 e8 03          	shr    $0x3,%rax
* 2a:	42 80 3c 38 00       	cmpb   $0x0,(%rax,%r15,1) <-- trapping instruction
  2f:	0f 84 2e ff ff ff    	je     0xffffff63
  35:	4c 89 c7             	mov    %r8,%rdi
  38:	4c 89 44 24 38       	mov    %r8,0x38(%rsp)
  3d:	e8                   	.byte 0xe8
  3e:	81                   	.byte 0x81
  3f:	4d                   	rex.WRB

Crashes (3):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2023/06/26 06:05 upstream 547cc9be86f4 09ffe269 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in debug_check_no_obj_freed
2023/05/29 15:50 upstream e338142b39cf cf184559 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in debug_check_no_obj_freed
2023/05/05 20:20 linux-next 83e5775d7afd 4cec9341 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root general protection fault in debug_check_no_obj_freed
* Struck through repros no longer work on HEAD.