syzbot


general protection fault in mark_buffer_dirty_inode

Status: auto-closed as invalid on 2019/02/22 14:57
First crash: 2062d, last: 2034d
Similar bugs (4)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.19 general protection fault in mark_buffer_dirty_inode (2) C error 1 457d 457d 0/1 upstream: reported C repro on 2022/11/28 03:52
linux-4.19 general protection fault in mark_buffer_dirty_inode 1 1396d 1396d 0/1 auto-closed as invalid on 2020/08/30 19:17
upstream general protection fault in mark_buffer_dirty_inode (2) udf C 32 297d 455d 22/26 fixed on 2023/06/08 14:41
upstream general protection fault in mark_buffer_dirty_inode exfat 1 1775d 1771d 0/26 auto-closed as invalid on 2019/10/16 22:48

Sample crash report:
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
Dumping ftrace buffer:
   (ftrace buffer empty)
Modules linked in:
CPU: 1 PID: 19004 Comm: syz-executor0 Not tainted 4.9.117-g8b21e85 #19
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff8801b89d1800 task.stack: ffff88019f948000
RIP: 0010:[<ffffffff81236c0b>]  [<ffffffff81236c0b>] __lock_acquire+0xa1b/0x4070 kernel/locking/lockdep.c:3224
RSP: 0018:ffff88019f94f4a0  EFLAGS: 00010006
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000024 RSI: 0000000000000000 RDI: 0000000000000120
RBP: ffff88019f94f650 R08: 0000000000000001 R09: 0000000000000000
R10: ffff8801b89d1800 R11: 0000000000000001 R12: 0000000000000001
R13: 0000000000000000 R14: 0000000000000120 R15: 0000000000000000
FS:  00007f7dbc40d700(0000) GS:ffff8801db300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2c426000 CR3: 00000001d8b97000 CR4: 00000000001606f0
DR0: 0000000020000000 DR1: 0000000020000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Stack:
 ffff8801b89d2118 0000000000000003 ffff88019f94f568 0000000000000046
 0000000000000002 ffff8801b89d20c8 ffffed003713a418 ffff8801b89d1800
 dffffc0000000000 ffff88019f94f538 ffffffff81235687 0000000000000000
Call Trace:
 [<ffffffff8123acd0>] lock_acquire+0x130/0x3e0 kernel/locking/lockdep.c:3756
 [<ffffffff839fbfa6>] __raw_spin_lock include/linux/spinlock_api_smp.h:144 [inline]
 [<ffffffff839fbfa6>] _raw_spin_lock+0x36/0x50 kernel/locking/spinlock.c:151
 [<ffffffff816226d3>] spin_lock include/linux/spinlock.h:302 [inline]
 [<ffffffff816226d3>] mark_buffer_dirty_inode+0x133/0x200 fs/buffer.c:609
 [<ffffffff818bc5e7>] fat_add_entries+0xe47/0x1180 fs/fat/dir.c:1352
 [<ffffffff818dc615>] vfat_add_entry+0x1a85/0x2b60 fs/fat/namei_vfat.c:687
 [<ffffffff818de8a5>] vfat_create+0x105/0x350 fs/fat/namei_vfat.c:792
 [<ffffffff815995d1>] vfs_create2+0x341/0x580 fs/namei.c:2907
 [<ffffffff815ac6d8>] SYSC_mknodat fs/namei.c:3775 [inline]
 [<ffffffff815ac6d8>] SyS_mknodat fs/namei.c:3752 [inline]
 [<ffffffff815ac6d8>] SYSC_mknod fs/namei.c:3798 [inline]
 [<ffffffff815ac6d8>] SyS_mknod+0x368/0x420 fs/namei.c:3796
 [<ffffffff81006316>] do_syscall_64+0x1a6/0x490 arch/x86/entry/common.c:282
 [<ffffffff839fcc13>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb
Code: 25 28 00 00 00 0f 85 17 27 00 00 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 48 b8 00 00 00 00 00 fc ff df 4c 89 f2 48 c1 ea 03 <80> 3c 02 00 0f 85 51 27 00 00 49 81 3e a0 8c e9 84 0f 84 08 f7 
RIP  [<ffffffff81236c0b>] __lock_acquire+0xa1b/0x4070 kernel/locking/lockdep.c:3224
 RSP <ffff88019f94f4a0>
---[ end trace 52eb5eee741e48e5 ]---

Crashes (2):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2018/08/03 18:09 https://android.googlesource.com/kernel/common android-4.9 8b21e85d919c cc4f6d0a .config console log report ci-android-49-kasan-gce-root
2018/07/07 00:48 https://android.googlesource.com/kernel/common android-4.9 03c70feafdb2 9636bc93 .config console log report ci-android-49-kasan-gce-root
* Struck through repros no longer work on HEAD.