syzbot


general protection fault in debug_check_no_obj_freed (2)

Status: auto-closed as invalid on 2022/05/11 17:22
Reported-by: syzbot+6a8cfe91600a5287f2ab@syzkaller.appspotmail.com
First crash: 937d, last: 833d
Similar bugs (10)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream general protection fault in debug_check_no_obj_freed (2) mm 1 2004d 2003d 0/26 auto-closed as invalid on 2019/04/26 09:49
upstream general protection fault in debug_check_no_obj_freed (7) fs batman 3 303d 350d 0/26 auto-obsoleted due to no activity on 2023/09/24 06:05
linux-4.19 general protection fault in debug_check_no_obj_freed 1 1323d 1323d 0/1 auto-closed as invalid on 2021/01/06 22:10
upstream general protection fault in debug_check_no_obj_freed (4) net 1 1095d 1089d 0/26 auto-closed as invalid on 2021/06/24 04:15
upstream general protection fault in debug_check_no_obj_freed (5) kvm 4 991d 1011d 0/26 auto-closed as invalid on 2021/11/05 02:52
upstream general protection fault in debug_check_no_obj_freed (6) tomoyo 2 898d 895d 0/26 auto-closed as invalid on 2022/02/06 02:57
upstream general protection fault in debug_check_no_obj_freed (3) mm 7 1299d 1310d 0/26 auto-closed as invalid on 2021/01/30 14:32
upstream general protection fault in debug_check_no_obj_freed mm 2 2219d 2217d 0/26 closed as invalid on 2018/07/17 14:23
linux-4.19 BUG: unable to handle kernel paging request in debug_check_no_obj_freed 1 1157d 1157d 0/1 auto-closed as invalid on 2021/06/21 12:27
upstream BUG: unable to handle kernel paging request in debug_check_no_obj_freed (3) ntfs3 1 637d 633d 0/26 auto-obsoleted due to no activity on 2022/10/25 02:48

Sample crash report:
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 4700 Comm: systemd-udevd Not tainted 4.19.211-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__debug_check_no_obj_freed lib/debugobjects.c:777 [inline]
RIP: 0010:debug_check_no_obj_freed+0x1c9/0x490 lib/debugobjects.c:817
Code: 48 b8 00 01 00 00 00 00 ad de 4d 89 60 08 4c 89 c7 49 89 00 e8 a8 d6 ff ff 09 c3 4d 85 f6 74 2c 4d 89 f0 4c 89 c0 48 c1 e8 03 <42> 80 3c 38 00 0f 84 23 ff ff ff 4c 89 c7 4c 89 44 24 38 e8 9f 16
kasan: CONFIG_KASAN_INLINE enabled
RSP: 0018:ffff88809a77f838 EFLAGS: 00010006
kasan: GPF could be caused by NULL-ptr deref or user memory access
RAX: 000000ee0000ee00 RBX: 0000000000000000 RCX: ffffffff814bdebb
RDX: 1ffffffff1a7c84b RSI: 0000000000000004 RDI: ffff88800012cda8
RBP: 0000000000000006 R08: 0000077000077000 R09: 0000000000000000
R10: ffffffff8d3e424b R11: 0000000000000000 R12: dead000000000200
R13: ffff88803c872000 R14: 0000077000077000 R15: dffffc0000000000
FS:  00007f7d8d9b98c0(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f8870c70744 CR3: 000000009a533000 CR4: 00000000003426e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 free_pages_prepare mm/page_alloc.c:1056 [inline]
 __free_pages_ok+0x22d/0xd30 mm/page_alloc.c:1279
 slab_destroy mm/slab.c:1713 [inline]
 slabs_destroy+0x90/0xd0 mm/slab.c:1729
 cache_flusharray mm/slab.c:3490 [inline]
 ___cache_free+0x295/0x3a0 mm/slab.c:3532
 qlink_free mm/kasan/quarantine.c:147 [inline]
 qlist_free_all+0x79/0x140 mm/kasan/quarantine.c:166
 quarantine_reduce+0x1a9/0x230 mm/kasan/quarantine.c:259
 kasan_kmalloc+0xa2/0x160 mm/kasan/kasan.c:538
 slab_post_alloc_hook mm/slab.h:445 [inline]
 slab_alloc mm/slab.c:3397 [inline]
 kmem_cache_alloc+0x110/0x370 mm/slab.c:3557
 getname_flags+0xce/0x590 fs/namei.c:140
 user_path_at_empty+0x2a/0x50 fs/namei.c:2609
 user_path_at include/linux/namei.h:57 [inline]
 vfs_statx+0x113/0x210 fs/stat.c:185
 vfs_lstat include/linux/fs.h:3137 [inline]
 __do_sys_newlstat fs/stat.c:350 [inline]
 __se_sys_newlstat+0x96/0x120 fs/stat.c:344
 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f7d8c82b335
Code: 69 db 2b 00 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 83 ff 01 48 89 f0 77 30 48 89 c7 48 89 d6 b8 06 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 03 f3 c3 90 48 8b 15 31 db 2b 00 f7 d8 64 89
RSP: 002b:00007ffc6856aec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000006
RAX: ffffffffffffffda RBX: 0000559a1ae2d2d0 RCX: 00007f7d8c82b335
RDX: 00007ffc6856af00 RSI: 00007ffc6856af00 RDI: 0000559a1ae2c2d0
RBP: 00007ffc6856afc0 R08: 00007f7d8caea218 R09: 0000000000001010
R10: 00007f7d8cae9b58 R11: 0000000000000246 R12: 0000559a1ae2c2d0
R13: 0000559a1ae2c2ea R14: 0000559a1ae217e5 R15: 0000559a1ae217ea
Modules linked in:

======================================================
----------------
Code disassembly (best guess):
   0:	48 b8 00 01 00 00 00 	movabs $0xdead000000000100,%rax
   7:	00 ad de
   a:	4d 89 60 08          	mov    %r12,0x8(%r8)
   e:	4c 89 c7             	mov    %r8,%rdi
  11:	49 89 00             	mov    %rax,(%r8)
  14:	e8 a8 d6 ff ff       	callq  0xffffd6c1
  19:	09 c3                	or     %eax,%ebx
  1b:	4d 85 f6             	test   %r14,%r14
  1e:	74 2c                	je     0x4c
  20:	4d 89 f0             	mov    %r14,%r8
  23:	4c 89 c0             	mov    %r8,%rax
  26:	48 c1 e8 03          	shr    $0x3,%rax
* 2a:	42 80 3c 38 00       	cmpb   $0x0,(%rax,%r15,1) <-- trapping instruction
  2f:	0f 84 23 ff ff ff    	je     0xffffff58
  35:	4c 89 c7             	mov    %r8,%rdi
  38:	4c 89 44 24 38       	mov    %r8,0x38(%rsp)
  3d:	e8                   	.byte 0xe8
  3e:	9f                   	lahf
  3f:	16                   	(bad)

Crashes (2):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2022/01/11 17:21 linux-4.19.y 3f8a27f9e27b 1884f55a .config console log report info ci2-linux-4-19 general protection fault in debug_check_no_obj_freed
2021/09/29 14:10 linux-4.19.y c2276d585654 e08fe937 .config console log report info ci2-linux-4-19 general protection fault in debug_check_no_obj_freed
* Struck through repros no longer work on HEAD.