syzbot


general protection fault in kernel_accept

Status: upstream: reported on 2022/10/29 16:35
Reported-by: syzbot+92b2d219c287819d75fe@syzkaller.appspotmail.com
First crash: 92d, last: 92d
similar bugs (5):
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream general protection fault in kernel_accept (5) 1 128d 124d 23/24 upstream: reported on 2022/09/27 08:49
upstream general protection fault in kernel_accept (3) 1 427d 421d 0/24 auto-closed as invalid on 2022/03/28 23:53
upstream general protection fault in kernel_accept (2) 2 556d 584d 0/24 closed as invalid on 2021/10/04 21:36
upstream general protection fault in kernel_accept C 280 1502d 1663d 12/24 fixed on 2019/03/06 07:43
upstream general protection fault in kernel_accept (4) 3 254d 285d 0/24 auto-closed as invalid on 2022/08/18 19:01

Sample crash report:
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 1058 Comm: kworker/u4:5 Not tainted 5.4.210-syzkaller-00019-g035e4939365c #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022
Workqueue: tipc_rcv tipc_topsrv_accept
RIP: 0010:kernel_accept+0x1be/0x3d0 net/socket.c:3618
Code: 8b 18 48 83 c3 20 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 08 48 89 df e8 00 f1 39 fe 48 8b 1b 48 83 c3 08 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 44 89 ed 74 08 48 89 df e8 e0 f0 39 fe 48 8b 3b e8
RSP: 0018:ffff8881e83b7c88 EFLAGS: 00010202
RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff8881eafd3f00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffffffff83531965 R09: fffffbfff0c0d2a5
R10: fffffbfff0c0d2a5 R11: 1ffffffff0c0d2a4 R12: ffff8881b238f4a0
R13: 0000000000000000 R14: dffffc0000000000 R15: 1ffff1103d076f9e
FS:  0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000001b29ef000 CR4: 00000000003406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 tipc_topsrv_accept+0x8e/0x260 net/tipc/topsrv.c:460
 process_one_work+0x6ca/0xc40 kernel/workqueue.c:2287
 worker_thread+0xae0/0x1440 kernel/workqueue.c:2433
 kthread+0x2d8/0x360 kernel/kthread.c:288
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:352
Modules linked in:
---[ end trace eca438256f3cbbfc ]---
RIP: 0010:kernel_accept+0x1be/0x3d0 net/socket.c:3618
Code: 8b 18 48 83 c3 20 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 08 48 89 df e8 00 f1 39 fe 48 8b 1b 48 83 c3 08 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 44 89 ed 74 08 48 89 df e8 e0 f0 39 fe 48 8b 3b e8
RSP: 0018:ffff8881e83b7c88 EFLAGS: 00010202
RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff8881eafd3f00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffffffff83531965 R09: fffffbfff0c0d2a5
R10: fffffbfff0c0d2a5 R11: 1ffffffff0c0d2a4 R12: ffff8881b238f4a0
R13: 0000000000000000 R14: dffffc0000000000 R15: 1ffff1103d076f9e
FS:  0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000001ed74e000 CR4: 00000000003406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	8b 18                	mov    (%rax),%ebx
   2:	48 83 c3 20          	add    $0x20,%rbx
   6:	48 89 d8             	mov    %rbx,%rax
   9:	48 c1 e8 03          	shr    $0x3,%rax
   d:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
  12:	74 08                	je     0x1c
  14:	48 89 df             	mov    %rbx,%rdi
  17:	e8 00 f1 39 fe       	callq  0xfe39f11c
  1c:	48 8b 1b             	mov    (%rbx),%rbx
  1f:	48 83 c3 08          	add    $0x8,%rbx
  23:	48 89 d8             	mov    %rbx,%rax
  26:	48 c1 e8 03          	shr    $0x3,%rax
* 2a:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1) <-- trapping instruction
  2f:	44 89 ed             	mov    %r13d,%ebp
  32:	74 08                	je     0x3c
  34:	48 89 df             	mov    %rbx,%rdi
  37:	e8 e0 f0 39 fe       	callq  0xfe39f11c
  3c:	48 8b 3b             	mov    (%rbx),%rdi
  3f:	e8                   	.byte 0xe8

Crashes (1):
Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets Title
ci2-android-5-4-kasan 2022/10/29 16:34 android12-5.4 035e4939365c 2a71366b .config console log report info [disk image] [vmlinux] [kernel image] general protection fault in kernel_accept
* Struck through repros no longer work on HEAD.