syzbot


general protection fault in smc_tx_prepared_sends

Status: fixed on 2018/08/28 17:48
Subsystems: net s390
[Documentation on labels]
Reported-by: syzbot+5b2cece1a8ecb2ca77d8@syzkaller.appspotmail.com
Fix commit: 7311d665ca68 net/smc: move sock lock in smc_ioctl()
First crash: 2366d, last: 2325d
Discussions (2)
Title Replies (including bot) Last reply
[PATCH net 0/3] net/smc: fixes 2018-08-08 5 (5) 2018/08/09 02:14
general protection fault in smc_tx_prepared_sends 0 (1) 2018/08/02 12:48

Sample crash report:
8021q: adding VLAN 0 to HW filter on device team0
8021q: adding VLAN 0 to HW filter on device team0
TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] SMP KASAN
CPU: 0 PID: 6294 Comm: syz-executor135 Not tainted 4.18.0-rc7+ #173
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:smc_tx_prepared_sends+0x2c3/0x550 net/smc/smc_tx.h:27
Code: 48 89 f8 48 c1 e8 03 80 3c 10 00 0f 85 11 02 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 76 38 49 8d 7e 20 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e de 01 00 00 41 8b 46 20 49 8d 
RSP: 0018:ffff8801c65df560 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 1ffff10038cbbeae RCX: dffffc0000000000
TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
RDX: 0000000000000004 RSI: 1ffff10038cbbeba RDI: 0000000000000020
RBP: ffff8801c65df738 R08: ffffed0038cbbebb R09: ffffed0038cbbeba
R10: ffffed0038cbbeba R11: ffff8801c65df5d7 R12: ffff8801c65df710
R13: ffff8801c65df5d0 R14: 0000000000000000 R15: ffff8801c65df590
kasan: CONFIG_KASAN_INLINE enabled
FS:  00007f4092621700(0000) GS:ffff8801db000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000063f210 CR3: 00000001af61d000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
kasan: GPF could be caused by NULL-ptr deref or user memory access
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 smc_ioctl+0x36c/0xd90 net/smc/af_smc.c:1565
 sock_do_ioctl+0xe4/0x3e0 net/socket.c:970
 sock_ioctl+0x30d/0x680 net/socket.c:1094
 vfs_ioctl fs/ioctl.c:46 [inline]
 file_ioctl fs/ioctl.c:500 [inline]
 do_vfs_ioctl+0x1de/0x1720 fs/ioctl.c:684
 ksys_ioctl+0xa9/0xd0 fs/ioctl.c:701
 __do_sys_ioctl fs/ioctl.c:708 [inline]
 __se_sys_ioctl fs/ioctl.c:706 [inline]
 __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:706
 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x446969
Code: e8 4c e7 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 08 fc ff c3 66 2e 0f 1f 84 00 00 00 00 
RSP: 002b:00007f4092620db8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00000000006dcc38 RCX: 0000000000446969
RDX: 0000000020000140 RSI: 000000000000894b RDI: 0000000000000004
RBP: 00000000006dcc30 R08: 00007f4092621700 R09: 0000000000000000
R10: 00007f4092621700 R11: 0000000000000246 R12: 00000000006dcc3c
R13: 00007ffcd2e0e13f R14: 00007f40926219c0 R15: 00000000006dcc30
Modules linked in:
Dumping ftrace buffer:
   (ftrace buffer empty)
general protection fault: 0000 [#2] SMP KASAN
---[ end trace de745e9394484ec3 ]---
CPU: 1 PID: 6317 Comm: syz-executor135 Tainted: G      D           4.18.0-rc7+ #173
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:smc_tx_prepared_sends+0x2c3/0x550 net/smc/smc_tx.h:27
RIP: 0010:smc_tx_prepared_sends+0x2c3/0x550 net/smc/smc_tx.h:27
Code: 
Code: 
48 89 f8 48 c1 
48 
e8 03 80 3c 10 
89 
00 0f 85 11 02 00 00 
f8 
48 b8 00 00 00 
48 
00 00 fc ff df 
c1 
4d 8b 76 38 49 8d 
e8 
7e 20 48 89 fa 48 c1 ea 
03 
03 <0f> b6 04 02 84 
80 
c0 74 08 3c 03 0f 8e 
3c 
de 01 00 00 41 
10 
8b 46 20 49 8d 
00 
RSP: 0018:ffff8801a907f560 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 1ffff1003520feae RCX: dffffc0000000000
RDX: 0000000000000004 RSI: 1ffff1003520feba RDI: 0000000000000020
0f 
RBP: ffff8801a907f738 R08: ffffed003520febb R09: ffffed003520feba
R10: ffffed003520feba R11: ffff8801a907f5d7 R12: ffff8801a907f710
R13: ffff8801a907f5d0 R14: 0000000000000000 R15: ffff8801a907f590
85 
FS:  00007f4092621700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4092641e78 CR3: 00000001c66b0000 CR4: 00000000001406e0
11 
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
02 
00 
00 
48 
b8 
00 
00 
 smc_ioctl+0x36c/0xd90 net/smc/af_smc.c:1565
00 
 sock_do_ioctl+0xe4/0x3e0 net/socket.c:970
00 
00 
fc 
ff 
 sock_ioctl+0x30d/0x680 net/socket.c:1094
df 
4d 
 vfs_ioctl fs/ioctl.c:46 [inline]
 file_ioctl fs/ioctl.c:500 [inline]
 do_vfs_ioctl+0x1de/0x1720 fs/ioctl.c:684
8b 
76 
38 
 ksys_ioctl+0xa9/0xd0 fs/ioctl.c:701
49 
 __do_sys_ioctl fs/ioctl.c:708 [inline]
 __se_sys_ioctl fs/ioctl.c:706 [inline]
 __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:706
 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290
8d 
7e 
20 
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
48 
RIP: 0033:0x446969
Code: e8 
89 
4c e7 ff ff 48 
fa 
83 c4 18 c3 0f 
48 
1f 80 00 00 00 
c1 
00 48 89 f8 48 
ea 
89 f7 48 89 d6 48 
03 
89 ca 4d 89 c2 
<0f> 
4d 89 c8 4c 8b 
b6 
4c 24 08 0f 05 
04 
<48> 3d 01 f0 ff 
02 
ff 0f 83 3b 08 fc 
84 
ff c3 66 2e 0f 
c0 
1f 84 00 00 00 
74 
00 
RSP: 002b:00007f4092620db8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00000000006dcc38 RCX: 0000000000446969
RDX: 0000000020000140 RSI: 000000000000894b RDI: 0000000000000004
08 
RBP: 00000000006dcc30 R08: 00007f4092621700 R09: 0000000000000000
R10: 00007f4092621700 R11: 0000000000000246 R12: 00000000006dcc3c
R13: 00007ffcd2e0e13f R14: 00007f40926219c0 R15: 00000000006dcc30
3c 
Modules linked in:
Dumping ftrace buffer:
03 
   (ftrace buffer empty)
---[ end trace de745e9394484ec4 ]---
0f 
RIP: 0010:smc_tx_prepared_sends+0x2c3/0x550 net/smc/smc_tx.h:27
Code: 
8e 
48 89 
de 
f8 48 
01 
c1 e8 
00 
03 80 
00 
3c 10 
41 
00 0f 
8b 
85 11 
46 
02 00 
20 
00 48 
49 
b8 00 
8d 
00 00 
00 00 
RSP: 0018:ffff8801c65df560 EFLAGS: 00010202
fc ff 
df 4d 
RAX: dffffc0000000000 RBX: 1ffff10038cbbeae RCX: dffffc0000000000
8b 76 
RDX: 0000000000000004 RSI: 1ffff10038cbbeba RDI: 0000000000000020
38 49 
RBP: ffff8801c65df738 R08: ffffed0038cbbebb R09: ffffed0038cbbeba
8d 7e 
R10: ffffed0038cbbeba R11: ffff8801c65df5d7 R12: ffff8801c65df710
20 48 
R13: ffff8801c65df5d0 R14: 0000000000000000 R15: ffff8801c65df590
89 fa 48 
FS:  00007f4092621700(0000) GS:ffff8801db000000(0000) knlGS:0000000000000000
c1 ea 
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
03 <0f> 
CR2: 000000000063f210 CR3: 00000001af61d000 CR4: 00000000001406f0
b6 04 
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
02 84 
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
c0 74 

Crashes (7):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2018/08/02 13:08 upstream 6b4703768268 0a7cf4ec .config console log report syz C ci-upstream-kasan-gce-root
2018/08/02 12:36 upstream 6b4703768268 0a7cf4ec .config console log report syz C ci-upstream-kasan-gce
2018/08/03 19:30 upstream 0585df468e8f cc4f6d0a .config console log report ci-upstream-kasan-gce
2018/08/02 10:16 upstream 6b4703768268 0a7cf4ec .config console log report ci-upstream-kasan-gce
2018/08/03 21:16 net-old afb41bb03965 cc4f6d0a .config console log report ci-upstream-net-this-kasan-gce
2018/07/23 18:39 net-next-old 0a78c3803d19 f69c5fcd .config console log report ci-upstream-net-kasan-gce
2018/06/23 06:31 net-next-old 5424ea27390f 89d2e600 .config console log report ci-upstream-net-kasan-gce
* Struck through repros no longer work on HEAD.