syzbot


general protection fault in kernel_accept (4)

Status: auto-closed as invalid on 2022/08/18 19:01
Reported-by: syzbot+@syzkaller.appspotmail.com
First crash: 234d, last: 203d
similar bugs (5):
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream general protection fault in kernel_accept (5) 1 78d 74d 23/24 upstream: reported on 2022/09/27 08:49
android-54 general protection fault in kernel_accept 1 41d 41d 0/2 upstream: reported on 2022/10/29 16:35
upstream general protection fault in kernel_accept (3) 1 376d 370d 0/24 auto-closed as invalid on 2022/03/28 23:53
upstream general protection fault in kernel_accept (2) 2 506d 533d 0/24 closed as invalid on 2021/10/04 21:36
upstream general protection fault in kernel_accept C 280 1451d 1612d 12/24 fixed on 2019/03/06 07:43

Sample crash report:
general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 0 PID: 18718 Comm: kworker/u4:0 Not tainted 5.18.0-rc7-syzkaller-00121-g3d7285a335ed #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: tipc_rcv tipc_topsrv_accept
RIP: 0010:kernel_accept+0x1e5/0x410 net/socket.c:3418
Code: 48 8b 18 48 83 c3 20 48 89 d8 48 c1 e8 03 80 3c 28 00 74 08 48 89 df e8 39 90 b9 f9 48 8b 1b 48 83 c3 08 48 89 d8 48 c1 e8 03 <80> 3c 28 00 74 08 48 89 df e8 1d 90 b9 f9 48 8b 3b e8 c5 f2 5c f9
RSP: 0018:ffffc90003ccfb18 EFLAGS: 00010202
RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff888023aa5880
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: dffffc0000000000 R08: ffffffff881d6c6f R09: fffffbfff1f6442b
R10: fffffbfff1f6442b R11: 1ffffffff1f6442a R12: 0000000000000000
R13: 1ffff110060f1184 R14: 0000000000000000 R15: 1ffff92000799f78
FS:  0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055eef3721000 CR3: 0000000044618000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 00000000fffffffa DR6: 00000000ffff0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 tipc_topsrv_accept+0xd4/0x2c0 net/tipc/topsrv.c:460
 process_one_work+0x81c/0xd10 kernel/workqueue.c:2289
 worker_thread+0xb14/0x1330 kernel/workqueue.c:2436
 kthread+0x266/0x300 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:kernel_accept+0x1e5/0x410 net/socket.c:3418
Code: 48 8b 18 48 83 c3 20 48 89 d8 48 c1 e8 03 80 3c 28 00 74 08 48 89 df e8 39 90 b9 f9 48 8b 1b 48 83 c3 08 48 89 d8 48 c1 e8 03 <80> 3c 28 00 74 08 48 89 df e8 1d 90 b9 f9 48 8b 3b e8 c5 f2 5c f9
RSP: 0018:ffffc90003ccfb18 EFLAGS: 00010202
RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff888023aa5880
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: dffffc0000000000 R08: ffffffff881d6c6f R09: fffffbfff1f6442b
R10: fffffbfff1f6442b R11: 1ffffffff1f6442a R12: 0000000000000000
R13: 1ffff110060f1184 R14: 0000000000000000 R15: 1ffff92000799f78
FS:  0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f34f936b998 CR3: 000000002494d000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 00000000fffffffa DR6: 00000000ffff0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	48 8b 18             	mov    (%rax),%rbx
   3:	48 83 c3 20          	add    $0x20,%rbx
   7:	48 89 d8             	mov    %rbx,%rax
   a:	48 c1 e8 03          	shr    $0x3,%rax
   e:	80 3c 28 00          	cmpb   $0x0,(%rax,%rbp,1)
  12:	74 08                	je     0x1c
  14:	48 89 df             	mov    %rbx,%rdi
  17:	e8 39 90 b9 f9       	callq  0xf9b99055
  1c:	48 8b 1b             	mov    (%rbx),%rbx
  1f:	48 83 c3 08          	add    $0x8,%rbx
  23:	48 89 d8             	mov    %rbx,%rax
  26:	48 c1 e8 03          	shr    $0x3,%rax
* 2a:	80 3c 28 00          	cmpb   $0x0,(%rax,%rbp,1) <-- trapping instruction
  2e:	74 08                	je     0x38
  30:	48 89 df             	mov    %rbx,%rdi
  33:	e8 1d 90 b9 f9       	callq  0xf9b99055
  38:	48 8b 3b             	mov    (%rbx),%rdi
  3b:	e8 c5 f2 5c f9       	callq  0xf95cf305

Crashes (3):
Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Title
ci-upstream-kasan-gce-smack-root 2022/05/20 18:57 upstream 3d7285a335ed bd37ad7e .config log report info general protection fault in kernel_accept
ci-upstream-kasan-gce 2022/05/19 09:31 upstream f993aed406ea 50c53f39 .config log report info general protection fault in kernel_accept
ci-upstream-kasan-gce-root 2022/04/19 17:17 upstream b2d229d4ddb1 c334415e .config log report info general protection fault in kernel_accept
* Struck through repros no longer work on HEAD.