syzbot


BUG: unable to handle kernel NULL pointer dereference in qlist_free_all (4)

Status: closed as invalid on 2018/02/12 16:58
Subsystems: mm
[Documentation on labels]
First crash: 2560d, last: 2511d
Similar bugs (12)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.19 BUG: unable to handle kernel NULL pointer dereference in qlist_free_all 1 1693d 1693d 0/1 auto-closed as invalid on 2020/08/18 08:06
linux-4.19 BUG: unable to handle kernel NULL pointer dereference in qlist_free_all (2) 8 1060d 1297d 0/1 auto-closed as invalid on 2022/05/13 11:55
upstream BUG: unable to handle kernel NULL pointer dereference in qlist_free_all (6) ext4 syz 7 2071d 2169d 0/28 closed as dup on 2018/12/31 07:50
upstream BUG: unable to handle kernel NULL pointer dereference in qlist_free_all (7) tomoyo 7 1674d 1734d 0/28 closed as invalid on 2020/07/06 10:57
upstream BUG: unable to handle kernel NULL pointer dereference in qlist_free_all (2) kernel 1 2588d 2588d 0/28 closed as invalid on 2017/11/09 10:06
upstream BUG: unable to handle kernel NULL pointer dereference in qlist_free_all (8) kvm 11 1528d 1550d 0/28 auto-closed as invalid on 2021/01/30 15:56
upstream BUG: unable to handle kernel NULL pointer dereference in qlist_free_all fs 1 2623d 2623d 0/28 closed as invalid on 2017/10/18 09:51
linux-4.14 BUG: unable to handle kernel NULL pointer dereference in qlist_free_all 2 1663d 1697d 0/1 auto-closed as invalid on 2020/09/17 07:42
upstream BUG: unable to handle kernel paging request in qlist_free_all (7) kernel 20 1101d 1322d 0/28 auto-closed as invalid on 2022/03/03 13:56
linux-4.14 BUG: unable to handle kernel NULL pointer dereference in qlist_free_all (2) 3 1303d 1328d 0/1 auto-closed as invalid on 2021/09/12 03:17
upstream BUG: unable to handle kernel NULL pointer dereference in qlist_free_all (5) fs 19 2418d 2475d 0/28 closed as invalid on 2018/05/26 17:43
upstream BUG: unable to handle kernel NULL pointer dereference in qlist_free_all (3) mm 8 2561d 2578d 0/28 closed as invalid on 2017/12/05 10:45

Sample crash report:
BUG: unable to handle kernel NULL pointer dereference at 00000000000000fe
IP: qlist_free_all+0x37/0x160 mm/kasan/quarantine.c:163
PGD 1bc5f8067 P4D 1bc5f8067 PUD 1cc098067 PMD 0 
Oops: 0000 [#1] SMP KASAN
Dumping ftrace buffer:
   (ftrace buffer empty)
Modules linked in:
CPU: 0 PID: 4582 Comm: syz-executor4 Not tainted 4.15.0-rc9+ #275
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:qlist_free_all+0x37/0x160 mm/kasan/quarantine.c:163
RSP: 0018:ffff8801bf6dfa68 EFLAGS: 00010246
RAX: ffff8801d93d4cc0 RBX: 0000000000000282 RCX: 0000000000000000
RDX: ffffea000764f500 RSI: ffffea000765791f RDI: 0000000000000282
RBP: ffff8801bf6dfaa0 R08: 1ffff10037edbf1b R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000002 R14: ffff8801d93d4cc0 R15: ffffffff868c8c60
FS:  00007f62467aa700(0000) GS:ffff8801db200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000fe CR3: 00000001d466d001 CR4: 00000000001606f0
DR0: 0000000020000000 DR1: 0000000020000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
 quarantine_reduce+0x141/0x170 mm/kasan/quarantine.c:259
 kasan_kmalloc+0xca/0xe0 mm/kasan/kasan.c:536
 kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:489
 slab_post_alloc_hook mm/slab.h:442 [inline]
 slab_alloc mm/slab.c:3382 [inline]
 kmem_cache_alloc+0x11b/0x760 mm/slab.c:3542
 shmem_alloc_inode+0x1b/0x40 mm/shmem.c:3836
 alloc_inode+0x65/0x180 fs/inode.c:208
 new_inode_pseudo+0x69/0x190 fs/inode.c:890
 new_inode+0x1c/0x40 fs/inode.c:919
 shmem_get_inode+0xe1/0x920 mm/shmem.c:2157
 shmem_mknod+0x5a/0x1b0 mm/shmem.c:2990
 shmem_mkdir+0x29/0x50 mm/shmem.c:3041
 vfs_mkdir+0x390/0x600 fs/namei.c:3800
 SYSC_mkdirat fs/namei.c:3823 [inline]
 SyS_mkdirat fs/namei.c:3807 [inline]
 SYSC_mkdir fs/namei.c:3834 [inline]
 SyS_mkdir+0x220/0x2a0 fs/namei.c:3832
 entry_SYSCALL_64_fastpath+0x29/0xa0
RIP: 0033:0x452ef9
RSP: 002b:00007f62467a9c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000053
RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ef9
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020030ffa
RBP: 0000000000000621 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f83b8
R13: 00000000ffffffff R14: 00007f62467aa6d4 R15: 0000000000000000
Code: 55 48 89 e5 41 57 41 56 41 55 41 54 49 c7 c7 60 8c 8c 86 53 49 89 f4 48 83 ec 10 48 89 7d c8 4d 85 e4 4d 89 e5 0f 84 c8 00 00 00 <49> 63 95 fc 00 00 00 4c 8b 30 48 29 d0 49 83 3f 00 48 89 c6 0f 
RIP: qlist_free_all+0x37/0x160 mm/kasan/quarantine.c:163 RSP: ffff8801bf6dfa68
CR2: 00000000000000fe
---[ end trace cf0b7494701799d3 ]---

Crashes (8):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2018/01/23 02:20 upstream a0ec1ded22e6 228e3d95 .config console log report ci-upstream-kasan-gce
2017/12/18 11:03 upstream 1291a0d5049d d5beb42a .config console log report ci-upstream-kasan-gce
2017/12/18 10:56 upstream 1291a0d5049d d5beb42a .config console log report ci-upstream-kasan-gce-386
2017/12/16 00:16 upstream 7a3c296ae08f ac20b98c .config console log report ci-upstream-kasan-gce-386
2017/12/14 21:33 upstream d455df0bcc00 ac20b98c .config console log report ci-upstream-kasan-gce-386
2017/12/05 11:06 upstream fd6d2e506ce6 de212f1a .config console log report ci-upstream-kasan-gce-386
2017/12/08 20:42 net-next-old 5e54b3c12027 5ad0ce95 .config console log report ci-upstream-net-kasan-gce
2017/12/07 17:59 linux-next e40fd8d6b4d9 5d643f8e .config console log report ci-upstream-next-kasan-gce
* Struck through repros no longer work on HEAD.