syzbot


general protection fault in rose_transmit_link (3)

Status: upstream: reported on 2022/06/30 07:15
Subsystems: hams
[Documentation on labels]
Reported-by: syzbot+677921bcd8c3a67a3df3@syzkaller.appspotmail.com
First crash: 663d, last: 32d
Discussions (7)
Title Replies (including bot) Last reply
[syzbot] Monthly hams report (Mar 2024) 0 (1) 2024/03/22 12:56
KASAN: slab-use-after-free Read in ip_finish_output 2 (2) 2024/03/06 10:07
[syzbot] Monthly hams report (Dec 2023) 0 (1) 2023/12/27 21:01
Re: [syzbot] general protection fault in rose_transmit_link (3) 1 (1) 2023/12/13 13:55
[syzbot] Monthly hams report (Sep 2023) 0 (1) 2023/10/02 09:44
[syzbot] Monthly hams report (Aug 2023) 0 (1) 2023/08/21 20:42
[syzbot] general protection fault in rose_transmit_link (3) 0 (1) 2022/06/30 07:15
Similar bugs (3)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream general protection fault in rose_transmit_link (2) hams 3 789d 806d 0/26 auto-closed as invalid on 2022/05/21 05:59
upstream general protection fault in rose_transmit_link hams 1 1718d 1714d 0/26 auto-closed as invalid on 2019/11/03 18:16
linux-4.19 general protection fault in rose_transmit_link 1 810d 810d 0/1 auto-closed as invalid on 2022/05/29 13:41

Sample crash report:
general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
CPU: 0 PID: 25746 Comm: syz-executor.0 Not tainted 6.4.0-syzkaller-12029-g8139dccd464a #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023
RIP: 0010:rose_transmit_link+0x32/0x5e0 net/rose/rose_link.c:266
Code: 41 55 41 54 49 89 fc 55 48 89 f5 53 48 83 ec 08 e8 83 70 6a f8 48 8d 7d 32 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 ce 04 00 00
RSP: 0018:ffffc9000b66fb40 EFLAGS: 00010206
RAX: dffffc0000000000 RBX: ffff88807ec9d85a RCX: 0000000000000000
RDX: 0000000000000006 RSI: ffffffff891a6eed RDI: 0000000000000032
RBP: 0000000000000000 R08: 0000000000000005 R09: 000000000000001f
R10: 0000000000000013 R11: 0000000000000001 R12: ffff88803b04c3c0
R13: 0000000000000010 R14: 0000000000000013 R15: 0000000000000018
FS:  0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0c9ec403c8 CR3: 00000000449ae000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 rose_write_internal+0x301/0x1810 net/rose/rose_subr.c:198
 rose_release+0x1be/0x570 net/rose/af_rose.c:645
 __sock_release+0xcd/0x290 net/socket.c:654
 sock_close+0x1c/0x20 net/socket.c:1386
 __fput+0x40c/0xad0 fs/file_table.c:384
 task_work_run+0x16f/0x270 kernel/task_work.c:179
 exit_task_work include/linux/task_work.h:38 [inline]
 do_exit+0xa9a/0x29a0 kernel/exit.c:874
 do_group_exit+0xd4/0x2a0 kernel/exit.c:1024
 __do_sys_exit_group kernel/exit.c:1035 [inline]
 __se_sys_exit_group kernel/exit.c:1033 [inline]
 __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1033
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fe800c8c389
Code: Unable to access opcode bytes at 0x7fe800c8c35f.
RSP: 002b:00007fe80192abb8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fe800c8c389
RDX: 00007fe800cdb656 RSI: 0000000000000000 RDI: 000000000000000b
RBP: 000000000000000b R08: 00007ffe343ea080 R09: 0000000000000003
R10: 0000000000000b8d R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffe3429e89f R14: 00007fe80192b300 R15: 0000000000022000
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:rose_transmit_link+0x32/0x5e0 net/rose/rose_link.c:266
Code: 41 55 41 54 49 89 fc 55 48 89 f5 53 48 83 ec 08 e8 83 70 6a f8 48 8d 7d 32 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 ce 04 00 00
RSP: 0018:ffffc9000b66fb40 EFLAGS: 00010206
RAX: dffffc0000000000 RBX: ffff88807ec9d85a RCX: 0000000000000000
RDX: 0000000000000006 RSI: ffffffff891a6eed RDI: 0000000000000032
RBP: 0000000000000000 R08: 0000000000000005 R09: 000000000000001f
R10: 0000000000000013 R11: 0000000000000001 R12: ffff88803b04c3c0
R13: 0000000000000010 R14: 0000000000000013 R15: 0000000000000018
FS:  0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0c9ea86440 CR3: 000000002b1ca000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	41 55                	push   %r13
   2:	41 54                	push   %r12
   4:	49 89 fc             	mov    %rdi,%r12
   7:	55                   	push   %rbp
   8:	48 89 f5             	mov    %rsi,%rbp
   b:	53                   	push   %rbx
   c:	48 83 ec 08          	sub    $0x8,%rsp
  10:	e8 83 70 6a f8       	callq  0xf86a7098
  15:	48 8d 7d 32          	lea    0x32(%rbp),%rdi
  19:	48 b8 00 00 00 00 00 	movabs $0xdffffc0000000000,%rax
  20:	fc ff df
  23:	48 89 fa             	mov    %rdi,%rdx
  26:	48 c1 ea 03          	shr    $0x3,%rdx
* 2a:	0f b6 04 02          	movzbl (%rdx,%rax,1),%eax <-- trapping instruction
  2e:	48 89 fa             	mov    %rdi,%rdx
  31:	83 e2 07             	and    $0x7,%edx
  34:	38 d0                	cmp    %dl,%al
  36:	7f 08                	jg     0x40
  38:	84 c0                	test   %al,%al
  3a:	0f 85 ce 04 00 00    	jne    0x50e

Crashes (27):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2023/07/08 06:41 net 8139dccd464a 668cb1fa .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2023/07/02 10:02 net 3674fbf0451d bfc47836 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2023/06/05 05:09 net 8cde87b007da a4ae4f42 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2023/05/21 02:29 net 67caf26d769e 4bce1a3e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2023/04/10 12:59 net 9a06fe08ae93 71147e29 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2023/04/03 14:43 net 2584024b2355 41147e3e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2023/03/20 07:07 net 6d206b1ea9f4 7939252e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2023/01/31 19:38 net-old de5ca4c3852f 9dfcf09c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2022/08/01 19:31 net-old 5121db6afb99 fef302b1 .config console log report info ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2022/07/01 01:57 net-old 0a18d802d65c 1434eec0 .config console log report info ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2022/06/28 04:19 net-old cb8092d70a6f ef82eb2c .config console log report info ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2022/06/26 06:55 net-old 3b89b511ea0c a371c43c .config console log report info ci-upstream-net-this-kasan-gce general protection fault in rose_transmit_link
2024/03/18 03:45 net-next 237bb5f7f7f5 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in rose_transmit_link
2023/12/21 21:03 net-next 3ab5720881a9 4f9530a3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in rose_transmit_link
2023/12/14 17:29 net-next 00b1b2296b58 3222d10c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in rose_transmit_link
2023/10/31 13:09 net-next 55c900477f5b 58499c95 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in rose_transmit_link
2023/10/19 12:30 net-next b91f2e13c972 342b9c55 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in rose_transmit_link
2023/10/04 22:59 net-next 20f7cce7cf18 b7d7ff54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in rose_transmit_link
2023/10/02 20:17 net-next 436e5f758d6f 50b20e75 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in rose_transmit_link
2023/09/30 19:59 net-next 236f3873b517 8e26a358 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in rose_transmit_link
2023/09/22 02:58 net-next e9cbc89067cc 0b6a67ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in rose_transmit_link
2023/09/20 20:58 net-next b3af9c0e89ca 0b6a67ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in rose_transmit_link
2023/08/14 16:50 net-next 83b5f0253b1e 39990d51 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in rose_transmit_link
2023/02/19 07:04 net-next-old 675f176b4dcc bcdf85f8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in rose_transmit_link
2022/12/11 06:54 net-next-old dd8b3a802b64 67be1ae7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in rose_transmit_link
2023/03/02 07:12 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2ebd1fbb946d f8902b57 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: unable to handle kernel paging request in rose_transmit_link
2022/11/28 11:09 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 6d464646530f 74a66371 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: unable to handle kernel NULL pointer dereference in rose_transmit_link
* Struck through repros no longer work on HEAD.