syzbot


general protection fault in tipc_conn_close (2)

Status: upstream: reported on 2021/12/04 09:55
Labels: tipc (incorrect?)
Reported-by: syzbot+d28b439975080ea97feb@syzkaller.appspotmail.com
First crash: 580d, last: 9d18h
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] general protection fault in tipc_conn_close (2) 0 (1) 2021/12/04 09:55
Similar bugs (6)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-54 general protection fault in tipc_conn_close 9 74d 339d 0/2 upstream: reported on 2022/06/28 01:43
upstream general protection fault in tipc_conn_close tipc C 3 1928d 1929d 6/24 fixed on 2018/05/08 18:30
linux-4.19 general protection fault in tipc_conn_close C error 3 254d 762d 0/1 upstream: reported C repro on 2021/05/01 19:58
android-5-10 general protection fault in tipc_conn_close 1 384d 384d 0/2 auto-closed as invalid on 2022/08/12 11:37
android-5-10 general protection fault in tipc_conn_close (2) 6 169d 255d 0/2 auto-obsoleted due to no activity on 2023/04/11 05:56
android-5-15 general protection fault in tipc_conn_close 4 2d23h 217d 0/2 premoderation: reported on 2022/10/28 00:49

Sample crash report:
general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
CPU: 0 PID: 7828 Comm: kworker/u4:13 Not tainted 6.3.0-rc6-syzkaller-00183-ga7a55e27ad72 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
Workqueue: netns cleanup_net
RIP: 0010:tipc_conn_close+0x48/0x1c0 net/tipc/topsrv.c:158
Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 63 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 5d 08 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 4d 01 00 00 4c 8b 6b 18 4d 8d a5 a0 03 00 00 4c
RSP: 0018:ffffc90005e77bb0 EFLAGS: 00010206
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000003 RSI: ffffffff89a3d1b4 RDI: 0000000000000018
RBP: ffff888025bd1400 R08: 0000000000000001 R09: ffffffff914d2b8f
R10: 0000000000000001 R11: 0000000000000000 R12: ffff88806ad2c458
R13: ffffed100d5a5893 R14: ffff888025bd1408 R15: ffff888025bd1400
FS:  0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020215000 CR3: 000000007b0aa000 CR4: 00000000003506f0
Call Trace:
 <TASK>
 tipc_topsrv_stop net/tipc/topsrv.c:708 [inline]
 tipc_topsrv_exit_net+0x146/0x3b0 net/tipc/topsrv.c:730
 ops_exit_list+0xb0/0x170 net/core/net_namespace.c:169
 cleanup_net+0x4ee/0xb10 net/core/net_namespace.c:613
 process_one_work+0x991/0x15c0 kernel/workqueue.c:2390
 worker_thread+0x669/0x1090 kernel/workqueue.c:2537
 kthread+0x2e8/0x3a0 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:tipc_conn_close+0x48/0x1c0 net/tipc/topsrv.c:158
Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 63 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 5d 08 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 4d 01 00 00 4c 8b 6b 18 4d 8d a5 a0 03 00 00 4c
RSP: 0018:ffffc90005e77bb0 EFLAGS: 00010206
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000003 RSI: ffffffff89a3d1b4 RDI: 0000000000000018
RBP: ffff888025bd1400 R08: 0000000000000001 R09: ffffffff914d2b8f
R10: 0000000000000001 R11: 0000000000000000 R12: ffff88806ad2c458
R13: ffffed100d5a5893 R14: ffff888025bd1408 R15: ffff888025bd1400
FS:  0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000002006a000 CR3: 000000007b0aa000 CR4: 00000000003506f0
----------------
Code disassembly (best guess), 3 bytes skipped:
   0:	48 c1 ea 03          	shr    $0x3,%rdx
   4:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1)
   8:	0f 85 63 01 00 00    	jne    0x171
   e:	48 b8 00 00 00 00 00 	movabs $0xdffffc0000000000,%rax
  15:	fc ff df
  18:	48 8b 5d 08          	mov    0x8(%rbp),%rbx
  1c:	48 8d 7b 18          	lea    0x18(%rbx),%rdi
  20:	48 89 fa             	mov    %rdi,%rdx
  23:	48 c1 ea 03          	shr    $0x3,%rdx
* 27:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1) <-- trapping instruction
  2b:	0f 85 4d 01 00 00    	jne    0x17e
  31:	4c 8b 6b 18          	mov    0x18(%rbx),%r13
  35:	4d 8d a5 a0 03 00 00 	lea    0x3a0(%r13),%r12
  3c:	4c                   	rex.WR

Crashes (18):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets Manager Title
2023/04/16 05:48 upstream a7a55e27ad72 ec410564 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce general protection fault in tipc_conn_close
2023/04/10 08:27 upstream 09a9639e56c0 71147e29 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce general protection fault in tipc_conn_close
2023/03/21 10:39 upstream 17214b70a159 03fb9538 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce general protection fault in tipc_conn_close
2022/10/06 22:53 upstream ffb39098bf87 8a212197 .config console log report info [disk image] [vmlinux] ci-upstream-kasan-gce general protection fault in tipc_conn_close
2022/09/16 06:21 upstream 3245cb65fd91 dd9a85ff .config console log report info [disk image] [vmlinux] ci-upstream-kasan-gce general protection fault in tipc_conn_close
2022/07/17 09:09 upstream 972a278fe60c 95cb00d1 .config console log report info ci-upstream-kasan-gce-root general protection fault in tipc_conn_close
2022/04/27 21:58 upstream 8f4dd16603ce 8a1f1f07 .config console log report info ci-upstream-kasan-gce-root general protection fault in tipc_conn_close
2022/04/20 12:42 upstream 559089e0a93d 160a3f31 .config console log report info ci-upstream-kasan-gce-selinux-root general protection fault in tipc_conn_close
2022/01/11 04:32 upstream df0cc57e057f ddb0ab8c .config console log report info ci-upstream-kasan-gce-root general protection fault in tipc_conn_close
2021/11/22 02:02 upstream 40c93d7fff6f 4eb20a4e .config console log report info ci-upstream-kasan-gce-smack-root general protection fault in tipc_conn_close
2021/10/30 14:41 upstream f25a5481af12 098b5d53 .config console log report info ci-upstream-kasan-gce-root general protection fault in tipc_conn_close
2023/02/21 16:44 upstream 89f5349e0673 ec0a9fe9 .config console log report info ci-qemu-upstream-386 general protection fault in tipc_conn_close
2022/11/01 06:00 upstream b229b6ca5abb a1d8560a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 general protection fault in tipc_conn_close
2023/05/24 02:36 net 3632679d9e4f 4bce1a3e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in tipc_conn_close
2022/03/17 01:30 net-old dea2d93a8ba4 dfa9a8ed .config console log report info ci-upstream-net-this-kasan-gce general protection fault in tipc_conn_close
2023/04/06 08:54 net-next b536f32b5b03 08707520 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in tipc_conn_close
2022/03/20 19:23 net-next-old d96657dc9238 e2d91b1d .config console log report info ci-upstream-net-kasan-gce general protection fault in tipc_conn_close
2022/05/24 02:00 linux-next cc63e8e92cb8 e7f9308d .config console log report info ci-upstream-linux-next-kasan-gce-root general protection fault in tipc_conn_close
* Struck through repros no longer work on HEAD.