syzbot


general protection fault in rose_transmit_link (3)

Status: upstream: reported on 2022/06/30 07:15
Labels: hams (incorrect?)
Reported-by: syzbot+677921bcd8c3a67a3df3@syzkaller.appspotmail.com
First crash: 341d, last: 12d
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] general protection fault in rose_transmit_link (3) 0 (1) 2022/06/30 07:15
Similar bugs (3)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream general protection fault in rose_transmit_link (2) 3 467d 485d 0/24 auto-closed as invalid on 2022/05/21 05:59
upstream general protection fault in rose_transmit_link 1 1397d 1393d 0/24 auto-closed as invalid on 2019/11/03 18:16
linux-4.19 general protection fault in rose_transmit_link 1 489d 489d 0/1 auto-closed as invalid on 2022/05/29 13:41

Sample crash report:
general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
CPU: 1 PID: 6559 Comm: syz-executor.0 Not tainted 6.4.0-rc2-syzkaller-00180-g67caf26d769e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023
RIP: 0010:rose_transmit_link+0x32/0x5e0 net/rose/rose_link.c:266
Code: 41 55 41 54 49 89 fc 55 48 89 f5 53 48 83 ec 08 e8 43 23 78 f8 48 8d 7d 32 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 ce 04 00 00
RSP: 0018:ffffc90005a4f948 EFLAGS: 00010206
RAX: dffffc0000000000 RBX: ffff8880964b0c5a RCX: 0000000000000000
RDX: 0000000000000006 RSI: ffffffff890c1f8d RDI: 0000000000000032
RBP: 0000000000000000 R08: 0000000000000005 R09: 000000000000001f
R10: 0000000000000013 R11: ffffffff810055e5 R12: ffff888095ab7b40
R13: 0000000000000010 R14: 0000000000000013 R15: 0000000000000001
FS:  0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200ae080 CR3: 000000004df6c000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 rose_write_internal+0x301/0x1810 net/rose/rose_subr.c:198
 rose_release+0x1be/0x570 net/rose/af_rose.c:645
 __sock_release+0xcd/0x290 net/socket.c:653
 sock_close+0x1c/0x20 net/socket.c:1397
 __fput+0x27c/0xa90 fs/file_table.c:321
 task_work_run+0x16f/0x270 kernel/task_work.c:179
 exit_task_work include/linux/task_work.h:38 [inline]
 do_exit+0xad3/0x2960 kernel/exit.c:871
 do_group_exit+0xd4/0x2a0 kernel/exit.c:1021
 get_signal+0x2315/0x25b0 kernel/signal.c:2874
 arch_do_signal_or_restart+0x79/0x5c0 arch/x86/kernel/signal.c:306
 exit_to_user_mode_loop kernel/entry/common.c:168 [inline]
 exit_to_user_mode_prepare+0x11f/0x240 kernel/entry/common.c:204
 __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline]
 syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:297
 ret_from_fork+0x15/0x30 arch/x86/entry/entry_64.S:301
RIP: 0033:0x7fb4b488d591
Code: Unable to access opcode bytes at 0x7fb4b488d567.
RSP: 002b:00007fb4b55d62f0 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
RAX: 0000000000000000 RBX: 00007fb4b55d6700 RCX: 00007fb4b488d591
RDX: 00007fb4b55d69d0 RSI: 00007fb4b55d62f0 RDI: 00000000003d0f00
RBP: 00007ffea8b34930 R08: 00007fb4b55d6700 R09: 00007fb4b55d6700
R10: 00007fb4b55d69d0 R11: 0000000000000206 R12: 00007ffea8b3479e
R13: 00007ffea8b3479f R14: 00007fb4b55d6300 R15: 0000000000022000
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:rose_transmit_link+0x32/0x5e0 net/rose/rose_link.c:266
Code: 41 55 41 54 49 89 fc 55 48 89 f5 53 48 83 ec 08 e8 43 23 78 f8 48 8d 7d 32 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 ce 04 00 00
RSP: 0018:ffffc90005a4f948 EFLAGS: 00010206
RAX: dffffc0000000000 RBX: ffff8880964b0c5a RCX: 0000000000000000
RDX: 0000000000000006 RSI: ffffffff890c1f8d RDI: 0000000000000032
RBP: 0000000000000000 R08: 0000000000000005 R09: 000000000000001f
R10: 0000000000000013 R11: ffffffff810055e5 R12: ffff888095ab7b40
R13: 0000000000000010 R14: 0000000000000013 R15: 0000000000000001
FS:  0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020115000 CR3: 000000002aa6e000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	41 55                	push   %r13
   2:	41 54                	push   %r12
   4:	49 89 fc             	mov    %rdi,%r12
   7:	55                   	push   %rbp
   8:	48 89 f5             	mov    %rsi,%rbp
   b:	53                   	push   %rbx
   c:	48 83 ec 08          	sub    $0x8,%rsp
  10:	e8 43 23 78 f8       	callq  0xf8782358
  15:	48 8d 7d 32          	lea    0x32(%rbp),%rdi
  19:	48 b8 00 00 00 00 00 	movabs $0xdffffc0000000000,%rax
  20:	fc ff df
  23:	48 89 fa             	mov    %rdi,%rdx
  26:	48 c1 ea 03          	shr    $0x3,%rdx
* 2a:	0f b6 04 02          	movzbl (%rdx,%rax,1),%eax <-- trapping instruction
  2e:	48 89 fa             	mov    %rdi,%rdx
  31:	83 e2 07             	and    $0x7,%edx
  34:	38 d0                	cmp    %dl,%al
  36:	7f 08                	jg     0x40
  38:	84 c0                	test   %al,%al
  3a:	0f 85 ce 04 00 00    	jne    0x50e

Crashes (13):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets Manager Title
2023/05/21 02:29 net 67caf26d769e 4bce1a3e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2023/04/10 12:59 net 9a06fe08ae93 71147e29 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2023/04/03 14:43 net 2584024b2355 41147e3e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2023/03/20 07:07 net 6d206b1ea9f4 7939252e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2023/01/31 19:38 net-old de5ca4c3852f 9dfcf09c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2022/08/01 19:31 net-old 5121db6afb99 fef302b1 .config console log report info ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2022/07/01 01:57 net-old 0a18d802d65c 1434eec0 .config console log report info ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2022/06/28 04:19 net-old cb8092d70a6f ef82eb2c .config console log report info ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2022/06/26 06:55 net-old 3b89b511ea0c a371c43c .config console log report info ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2023/02/19 07:04 net-next-old 675f176b4dcc bcdf85f8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in rose_transmit_link
2022/12/11 06:54 net-next-old dd8b3a802b64 67be1ae7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in rose_transmit_link
2023/03/02 07:12 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2ebd1fbb946d f8902b57 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: unable to handle kernel paging request in rose_transmit_link
2022/11/28 11:09 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 6d464646530f 74a66371 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: unable to handle kernel NULL pointer dereference in rose_transmit_link
* Struck through repros no longer work on HEAD.