syzbot


general protection fault in tipc_conn_close (4)

Status: upstream: reported on 2025/07/02 09:35
Subsystems: tipc
[Documentation on labels]
Reported-by: syzbot+c9964a461e912b0e41a6@syzkaller.appspotmail.com
Fix commit: 667eeab4999e tipc: Fix use-after-free in tipc_conn_close().
Patched on: [ci-qemu-gce-upstream-auto ci-qemu-upstream ci-qemu-upstream-386 ci-qemu2-arm32 ci-qemu2-arm64 ci-qemu2-arm64-compat ci-qemu2-arm64-mte ci-snapshot-upstream-root ci-upstream-gce-leak ci-upstream-kasan-badwrites-root ci-upstream-kasan-gce ci-upstream-kasan-gce-386 ci-upstream-kasan-gce-root ci-upstream-kasan-gce-selinux-root ci-upstream-kasan-gce-smack-root ci-upstream-kmsan-gce-386-root ci-upstream-kmsan-gce-root ci-upstream-linux-next-kasan-gce-root ci-upstream-net-kasan-gce ci-upstream-net-this-kasan-gce ci-upstream-rust-kasan-gce ci2-upstream-fs ci2-upstream-kcsan-gce], missing on: [ci-qemu-native-arm64-kvm ci-qemu2-riscv64 ci-upstream-bpf-kasan-gce ci-upstream-bpf-next-kasan-gce ci-upstream-gce-arm64 ci2-upstream-usb]
First crash: 18d, last: 18d
Discussions (2)
Title Replies (including bot) Last reply
[PATCH v1 net] tipc: Fix use-after-free in tipc_conn_close(). 3 (3) 2025/07/08 02:00
[syzbot] [tipc?] general protection fault in tipc_conn_close (4) 0 (1) 2025/07/02 09:35
Similar bugs (15)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-54 general protection fault in tipc_conn_close (2) 2 2 631d 706d 0/2 auto-obsoleted due to no activity on 2024/01/22 16:54
android-5-15 general protection fault in tipc_conn_close (2) 2 4 552d 667d 0/2 auto-obsoleted due to no activity on 2024/04/11 01:35
android-54 general protection fault in tipc_conn_close 19 9 849d 1115d 0/2 auto-obsoleted due to no activity on 2023/07/18 14:57
android-5-10 general protection fault in tipc_conn_close (3) 2 1 671d 671d 0/2 auto-obsoleted due to no activity on 2023/12/14 05:20
android-54 general protection fault in tipc_conn_close (3) 2 1 125d 125d 0/2 auto-obsoleted due to no activity on 2025/06/11 23:15
upstream general protection fault in tipc_conn_close tipc 2 C 3 2704d 2705d 5/29 fixed on 2018/05/08 18:30
android-6-1 general protection fault in tipc_conn_close 2 6 524d 750d 0/2 auto-obsoleted due to no activity on 2024/05/18 20:39
linux-4.19 general protection fault in tipc_conn_close 19 C error 3 1029d 1537d 0/1 upstream: reported C repro on 2021/05/01 19:58
android-5-10 general protection fault in tipc_conn_close 2 1 1159d 1159d 0/2 auto-closed as invalid on 2022/08/12 11:37
android-6-1 general protection fault in tipc_conn_close (2) 2 1 44d 44d 0/2 premoderation: reported on 2025/06/02 08:19
android-5-10 general protection fault in tipc_conn_close (2) 2 6 944d 1030d 0/2 auto-obsoleted due to no activity on 2023/04/11 05:56
upstream general protection fault in tipc_conn_close (3) tipc 2 1 635d 631d 0/29 auto-obsoleted due to no activity on 2024/01/18 09:00
upstream general protection fault in tipc_conn_close (2) tipc 2 21 749d 1320d 0/29 auto-obsoleted due to no activity on 2023/10/06 23:51
android-5-15 general protection fault in tipc_conn_close 19 4 778d 993d 0/2 auto-obsoleted due to no activity on 2023/08/28 21:57
android-5-10 general protection fault in tipc_conn_close (4) 2 2 48d 114d 0/2 premoderation: reported on 2025/03/24 07:09

Sample crash report:
HfR: left promiscuous mode
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
CPU: 0 UID: 0 PID: 16606 Comm: kworker/u10:0 Tainted: G     U              6.16.0-rc3-syzkaller-00306-gaaf724ed6926 #0 PREEMPT(full) 
Tainted: [U]=USER
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Workqueue: netns cleanup_net
RIP: 0010:tipc_conn_close+0x48/0x1c0 net/tipc/topsrv.c:158
Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 5b 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 6b 08 48 8d 7d 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 45 01 00 00 4c 8b 6d 18 49 8d ad d8 03 00 00 48
RSP: 0018:ffffc9000ba3fa58 EFLAGS: 00010206
RAX: dffffc0000000000 RBX: ffff88805234ac00 RCX: 0000000000000007
RDX: 0000000000000003 RSI: ffffffff8b1ed264 RDI: 0000000000000018
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001
R10: ffffffff90a82757 R11: 0000000000000001 R12: ffff8881457a4c58
R13: ffffed1028af4993 R14: ffff88805234ac08 R15: ffff88805234ac00
FS:  0000000000000000(0000) GS:ffff88812475f000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fffbf822d88 CR3: 0000000031fe6000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 tipc_topsrv_stop net/tipc/topsrv.c:708 [inline]
 tipc_topsrv_exit_net+0x146/0x3b0 net/tipc/topsrv.c:730
 ops_exit_list net/core/net_namespace.c:200 [inline]
 ops_undo_list+0x2eb/0xab0 net/core/net_namespace.c:253
 cleanup_net+0x408/0x890 net/core/net_namespace.c:686
 process_one_work+0x9cc/0x1b70 kernel/workqueue.c:3238
 process_scheduled_works kernel/workqueue.c:3321 [inline]
 worker_thread+0x6c8/0xf10 kernel/workqueue.c:3402
 kthread+0x3c5/0x780 kernel/kthread.c:464
 ret_from_fork+0x5d4/0x6f0 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:tipc_conn_close+0x48/0x1c0 net/tipc/topsrv.c:158
Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 5b 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 6b 08 48 8d 7d 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 45 01 00 00 4c 8b 6d 18 49 8d ad d8 03 00 00 48
RSP: 0018:ffffc9000ba3fa58 EFLAGS: 00010206
RAX: dffffc0000000000 RBX: ffff88805234ac00 RCX: 0000000000000007
RDX: 0000000000000003 RSI: ffffffff8b1ed264 RDI: 0000000000000018
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001
R10: ffffffff90a82757 R11: 0000000000000001 R12: ffff8881457a4c58
R13: ffffed1028af4993 R14: ffff88805234ac08 R15: ffff88805234ac00
FS:  0000000000000000(0000) GS:ffff88812475f000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1017b8bf98 CR3: 000000004ec58000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess), 3 bytes skipped:
   0:	48 c1 ea 03          	shr    $0x3,%rdx
   4:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1)
   8:	0f 85 5b 01 00 00    	jne    0x169
   e:	48 b8 00 00 00 00 00 	movabs $0xdffffc0000000000,%rax
  15:	fc ff df
  18:	48 8b 6b 08          	mov    0x8(%rbx),%rbp
  1c:	48 8d 7d 18          	lea    0x18(%rbp),%rdi
  20:	48 89 fa             	mov    %rdi,%rdx
  23:	48 c1 ea 03          	shr    $0x3,%rdx
* 27:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1) <-- trapping instruction
  2b:	0f 85 45 01 00 00    	jne    0x176
  31:	4c 8b 6d 18          	mov    0x18(%rbp),%r13
  35:	49 8d ad d8 03 00 00 	lea    0x3d8(%r13),%rbp
  3c:	48                   	rex.W

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/06/28 18:47 upstream aaf724ed6926 fc9d8ee5 .config console log report info [disk image] [vmlinux] [kernel image] ci-qemu-gce-upstream-auto general protection fault in tipc_conn_close
* Struck through repros no longer work on HEAD.