syzbot


general protection fault in worker_thread (2)

Status: auto-obsoleted due to no activity on 2023/09/29 13:47
Subsystems: io-uring
[Documentation on labels]
Reported-by: syzbot+8aebf783fcc04684a047@syzkaller.appspotmail.com
First crash: 530d, last: 530d
Discussions (2)
Title Replies (including bot) Last reply
[syzbot] Monthly io-uring report (Jun 2023) 0 (1) 2023/06/29 08:54
[syzbot] [io-uring?] general protection fault in worker_thread (2) 0 (1) 2023/06/25 13:54
Similar bugs (5)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream general protection fault in worker_thread kernel 1 793d 789d 0/28 auto-obsoleted due to no activity on 2022/12/30 10:32
android-5-10 KASAN: use-after-free Read in worker_thread 1 113d 113d 0/2 auto-obsoleted due to no activity on 2024/11/09 22:41
android-5-15 KASAN: use-after-free Read in worker_thread missing-backport origin:downstream C unreliable error 87 5d06h 778d 0/2 upstream: reported C repro on 2022/10/16 06:28
upstream KMSAN: uninit-value in worker_thread (3) ext4 2 1158d 1241d 0/28 auto-closed as invalid on 2021/12/30 14:37
android-6-1 KASAN: use-after-free Read in worker_thread missing-backport origin:lts C error 75 5d00h 537d 0/2 upstream: reported C repro on 2023/06/14 05:51
Last patch testing requests (1)
Created Duration User Patch Repo Result
2023/08/21 21:46 26m retest repro upstream OK log

Sample crash report:
general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
CPU: 3 PID: 5205 Comm: kworker/2:4 Not tainted 6.4.0-rc7-syzkaller-00041-ge660abd551f1 #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
RIP: 0010:__lock_acquire+0xe01/0x5f30 kernel/locking/lockdep.c:4956
Code: 00 00 3b 05 a1 ce 59 0f 0f 87 7a 09 00 00 41 be 01 00 00 00 e9 84 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 0f 85 9e 33 00 00 49 81 3c 24 20 78 15 90 0f 84 cd f2
RSP: 0018:ffffc90003d27be0 EFLAGS: 00010006
RAX: dffffc0000000000 RBX: 1ffff920007a4fad RCX: 0000000000000000
RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000018
RBP: ffff88802f9fd6c0 R08: 0000000000000001 R09: 0000000000000001
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000018
R13: 0000000000000000 R14: 0000000000000018 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff88806b900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f896259d440 CR3: 00000000293e8000 CR4: 0000000000350ee0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 lock_acquire kernel/locking/lockdep.c:5705 [inline]
 lock_acquire+0x1b1/0x520 kernel/locking/lockdep.c:5670
 __raw_spin_lock_irq include/linux/spinlock_api_smp.h:119 [inline]
 _raw_spin_lock_irq+0x36/0x50 kernel/locking/spinlock.c:170
 worker_thread+0x16d/0x10c0 kernel/workqueue.c:2502
 kthread+0x344/0x440 kernel/kthread.c:379
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:__lock_acquire+0xe01/0x5f30 kernel/locking/lockdep.c:4956
Code: 00 00 3b 05 a1 ce 59 0f 0f 87 7a 09 00 00 41 be 01 00 00 00 e9 84 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 0f 85 9e 33 00 00 49 81 3c 24 20 78 15 90 0f 84 cd f2
RSP: 0018:ffffc90003d27be0 EFLAGS: 00010006
RAX: dffffc0000000000 RBX: 1ffff920007a4fad RCX: 0000000000000000
RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000018
RBP: ffff88802f9fd6c0 R08: 0000000000000001 R09: 0000000000000001
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000018
R13: 0000000000000000 R14: 0000000000000018 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff88806b900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f896259d440 CR3: 00000000293e8000 CR4: 0000000000350ee0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	00 00                	add    %al,(%rax)
   2:	3b 05 a1 ce 59 0f    	cmp    0xf59cea1(%rip),%eax        # 0xf59cea9
   8:	0f 87 7a 09 00 00    	ja     0x988
   e:	41 be 01 00 00 00    	mov    $0x1,%r14d
  14:	e9 84 00 00 00       	jmpq   0x9d
  19:	48 b8 00 00 00 00 00 	movabs $0xdffffc0000000000,%rax
  20:	fc ff df
  23:	4c 89 e2             	mov    %r12,%rdx
  26:	48 c1 ea 03          	shr    $0x3,%rdx
* 2a:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1) <-- trapping instruction
  2e:	0f 85 9e 33 00 00    	jne    0x33d2
  34:	49 81 3c 24 20 78 15 	cmpq   $0xffffffff90157820,(%r12)
  3b:	90
  3c:	0f                   	.byte 0xf
  3d:	84 cd                	test   %cl,%ch
  3f:	f2                   	repnz

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2023/06/21 13:47 upstream e660abd551f1 79782afc .config console log report syz [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream general protection fault in worker_thread
* Struck through repros no longer work on HEAD.