syzbot


general protection fault in tomoyo_socket_sendmsg_permission

Status: fixed on 2021/04/09 19:46
Subsystems: usb
[Documentation on labels]
Reported-by: syzbot+95ce4b142579611ef0a9@syzkaller.appspotmail.com
Fix commit: 9380afd6df70 usbip: fix stub_dev usbip_sockfd_store() races leading to gpf 718ad9693e36 usbip: fix vhci_hcd attach_store() races leading to gpf 46613c9dfa96 usbip: fix vudc usbip_sockfd_store races leading to gpf
First crash: 1510d, last: 1415d
Discussions (15)
Title Replies (including bot) Last reply
[PATCH 4.14 00/68] 4.14.231-rc1 review 77 (77) 2021/07/28 12:56
[PATCH 4.9 00/47] 4.9.267-rc1 review 51 (51) 2021/04/16 11:50
[PATCH 4.9 00/78] 4.9.262-rc1 review 85 (85) 2021/03/28 20:37
[PATCH 5.10 000/290] 5.10.24-rc1 review 317 (317) 2021/03/22 08:15
[PATCH 5.11 000/306] 5.11.7-rc1 review 313 (313) 2021/03/19 09:50
[PATCH 4.19 000/120] 4.19.181-rc1 review 137 (137) 2021/03/19 09:41
[PATCH 0/6] usbip fixes to crashes found by syzbot 34 (34) 2021/03/18 13:39
[PATCH 4.14 00/95] 4.14.226-rc1 review 105 (105) 2021/03/18 12:00
[PATCH 5.4 000/168] 5.4.106-rc1 review 175 (175) 2021/03/17 03:00
[PATCH 4.4 00/75] 4.4.262-rc1 review 80 (80) 2021/03/16 12:07
[PATCH] usb: usbip: serialize attach/detach operations 30 (30) 2021/03/05 14:44
Re: general protection fault in tomoyo_socket_sendmsg_permission 14 (14) 2021/02/13 10:10
Re: general protection fault in tomoyo_socket_sendmsg_permission 1 (1) 2021/01/29 05:48
Re: general protection fault in tomoyo_socket_sendmsg_permission 2 (2) 2021/01/28 06:09
general protection fault in tomoyo_socket_sendmsg_permission 1 (2) 2020/11/13 10:49

Sample crash report:
general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
CPU: 1 PID: 10318 Comm: vhci_tx Not tainted 5.11.0-rc4-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:tomoyo_socket_sendmsg_permission+0x80/0x340 security/tomoyo/network.c:762
Code: c7 40 0c f3 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 84 24 a0 00 00 00 31 c0 e8 ab b6 ea fd 48 8d 7d 18 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 7d 02 00 00 48 b8 00 00 00 00 00 fc ff df 4c
RSP: 0018:ffffc90001a3fad0 EFLAGS: 00010216
RAX: 0000000000000003 RBX: 1ffff92000347f5b RCX: 0000000000000000
RDX: ffff888021119bc0 RSI: ffffffff838813d5 RDI: 0000000000000018
RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff85936ab6
R10: ffffffff83bcd86e R11: 0000000000000001 R12: dffffc0000000000
R13: ffffc90001a3fce8 R14: ffffc90001a3fce8 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff8880b9f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005634dfdda4f8 CR3: 00000000129bc000 CR4: 0000000000350ee0
Call Trace:
 security_socket_sendmsg+0x50/0xb0 security/security.c:2141
 sock_sendmsg+0x3f/0x120 net/socket.c:669
 vhci_send_cmd_submit+0x897/0xf90 drivers/usb/usbip/vhci_tx.c:139
 vhci_tx_loop+0xfc/0x370 drivers/usb/usbip/vhci_tx.c:241
 kthread+0x3b1/0x4a0 kernel/kthread.c:292
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296
Modules linked in:
---[ end trace 05b64fd85c2d7502 ]---
RIP: 0010:tomoyo_socket_sendmsg_permission+0x80/0x340 security/tomoyo/network.c:762
Code: c7 40 0c f3 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 84 24 a0 00 00 00 31 c0 e8 ab b6 ea fd 48 8d 7d 18 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 7d 02 00 00 48 b8 00 00 00 00 00 fc ff df 4c
RSP: 0018:ffffc90001a3fad0 EFLAGS: 00010216
RAX: 0000000000000003 RBX: 1ffff92000347f5b RCX: 0000000000000000
RDX: ffff888021119bc0 RSI: ffffffff838813d5 RDI: 0000000000000018
RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff85936ab6
R10: ffffffff83bcd86e R11: 0000000000000001 R12: dffffc0000000000
R13: ffffc90001a3fce8 R14: ffffc90001a3fce8 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff8880b9f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005634dfda4160 CR3: 00000000129bc000 CR4: 0000000000350ee0

Crashes (17):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2021/01/24 05:53 upstream e1ae4b0be158 52e37319 .config console log report info ci-upstream-kasan-gce-root general protection fault in tomoyo_socket_sendmsg_permission
2021/01/23 23:02 upstream e1ae4b0be158 52e37319 .config console log report info ci-upstream-kasan-gce-selinux-root general protection fault in tomoyo_socket_sendmsg_permission
2021/02/11 17:14 upstream 291009f656e8 a52ee10a .config console log report info ci-upstream-kasan-gce-386 general protection fault in tomoyo_socket_sendmsg_permission
2021/01/25 02:50 linux-next bc085f8fc88f 52e37319 .config console log report info ci-upstream-linux-next-kasan-gce-root general protection fault in tomoyo_socket_sendmsg_permission
2021/01/12 22:42 upstream e609571b5ffa 0cdd6185 .config console log report info ci-upstream-kasan-gce
2021/01/12 04:50 upstream a0d54b4f5b21 2c1f2513 .config console log report info ci-upstream-kasan-gce-selinux-root
2021/01/04 01:50 upstream e71ba9452f0b 79264ae3 .config console log report info ci-upstream-kasan-gce-root
2020/12/22 12:59 upstream 8653b778e454 04201c06 .config console log report info ci-upstream-kasan-gce
2020/12/16 10:30 upstream d635a69dd498 f213e07e .config console log report info ci-upstream-kasan-gce
2020/12/15 00:42 upstream 2c85ebc57b3e 97183ed7 .config console log report info ci-upstream-kasan-gce
2020/12/14 13:04 upstream 6bff9bb8a292 b22a7ec3 .config console log report info ci-upstream-kasan-gce
2020/12/14 11:34 upstream 6bff9bb8a292 b22a7ec3 .config console log report info ci-upstream-kasan-gce
2020/12/09 12:13 upstream 7d8761ba27fc 40cc414d .config console log report info ci-upstream-kasan-gce
2020/12/07 08:28 upstream 7059c2c00a21 c521566d .config console log report info ci-upstream-kasan-gce
2021/02/07 01:19 upstream 1e0d27fce010 0655e081 .config console log report info ci-qemu2-arm64 BUG: unable to handle kernel paging request in tomoyo_socket_sendmsg_permission
2020/11/09 06:58 upstream 9dbc1c03eeb5 64069d48 .config console log report info ci-upstream-kasan-gce-386
2020/11/28 20:44 linux-next 6174f05255e6 76b4dcc7 .config console log report info ci-upstream-linux-next-kasan-gce-root
* Struck through repros no longer work on HEAD.