syzbot


general protection fault in tipc_conn_close (2)

Status: upstream: reported on 2021/12/04 09:55
Reported-by: syzbot+d28b439975080ea97feb@syzkaller.appspotmail.com
First crash: 335d, last: 15d
similar bugs (5):
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-54 general protection fault in tipc_conn_close 6 2d20h 95d 0/2 upstream: reported on 2022/06/28 01:43
upstream general protection fault in tipc_conn_close C 3 1684d 1685d 6/24 fixed on 2018/05/08 18:30
linux-4.19 general protection fault in tipc_conn_close C error 3 9d22h 517d 0/1 upstream: reported C repro on 2021/05/01 19:58
android-5-10 general protection fault in tipc_conn_close 1 139d 139d 0/2 auto-closed as invalid on 2022/08/12 11:37
android-5-10 general protection fault in tipc_conn_close (2) 1 10d 10d 0/2 premoderation: reported on 2022/09/20 07:58

Sample crash report:
general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
CPU: 0 PID: 8 Comm: kworker/u4:0 Not tainted 6.0.0-rc5-syzkaller-00025-g3245cb65fd91 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
Workqueue: netns cleanup_net
RIP: 0010:tipc_conn_close+0x48/0x1c0 net/tipc/topsrv.c:157
Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 63 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 5d 08 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 4d 01 00 00 4c 8b 6b 18 4d 8d a5 a0 03 00 00 4c
RSP: 0018:ffffc900000d7bb0 EFLAGS: 00010206
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000003 RSI: ffffffff88f2de34 RDI: 0000000000000018
RBP: ffff88807c879c00 R08: 0000000000000001 R09: ffffffff908e494f
R10: 0000000000000001 R11: 0000000000000000 R12: ffff88806f821458
R13: ffffed100df04293 R14: ffff88807c879c08 R15: ffff88807c879c00
FS:  0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005555565bc848 CR3: 000000007d647000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 000000000060000c DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 tipc_topsrv_stop net/tipc/topsrv.c:694 [inline]
 tipc_topsrv_exit_net+0x227/0x5d0 net/tipc/topsrv.c:715
 ops_exit_list+0xb0/0x170 net/core/net_namespace.c:163
 cleanup_net+0x4ea/0xb00 net/core/net_namespace.c:595
 process_one_work+0x991/0x1610 kernel/workqueue.c:2289
 worker_thread+0x665/0x1080 kernel/workqueue.c:2436
 kthread+0x2e4/0x3a0 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:tipc_conn_close+0x48/0x1c0 net/tipc/topsrv.c:157
Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 63 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 5d 08 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 4d 01 00 00 4c 8b 6b 18 4d 8d a5 a0 03 00 00 4c
RSP: 0018:ffffc900000d7bb0 EFLAGS: 00010206
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000003 RSI: ffffffff88f2de34 RDI: 0000000000000018
RBP: ffff88807c879c00 R08: 0000000000000001 R09: ffffffff908e494f
R10: 0000000000000001 R11: 0000000000000000 R12: ffff88806f821458
R13: ffffed100df04293 R14: ffff88807c879c08 R15: ffff88807c879c00
FS:  0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055555629a708 CR3: 000000001754b000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 000000000060000c DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess), 3 bytes skipped:
   0:	48 c1 ea 03          	shr    $0x3,%rdx
   4:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1)
   8:	0f 85 63 01 00 00    	jne    0x171
   e:	48 b8 00 00 00 00 00 	movabs $0xdffffc0000000000,%rax
  15:	fc ff df
  18:	48 8b 5d 08          	mov    0x8(%rbp),%rbx
  1c:	48 8d 7b 18          	lea    0x18(%rbx),%rdi
  20:	48 89 fa             	mov    %rdi,%rdx
  23:	48 c1 ea 03          	shr    $0x3,%rdx
* 27:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1) <-- trapping instruction
  2b:	0f 85 4d 01 00 00    	jne    0x17e
  31:	4c 8b 6b 18          	mov    0x18(%rbx),%r13
  35:	4d 8d a5 a0 03 00 00 	lea    0x3a0(%r13),%r12
  3c:	4c                   	rex.WR

Crashes (10):
Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Title
ci-upstream-kasan-gce 2022/09/16 06:21 upstream 3245cb65fd91 dd9a85ff .config log report info general protection fault in tipc_conn_close
ci-upstream-kasan-gce-root 2022/07/17 09:09 upstream 972a278fe60c 95cb00d1 .config log report info general protection fault in tipc_conn_close
ci-upstream-kasan-gce-root 2022/04/27 21:58 upstream 8f4dd16603ce 8a1f1f07 .config log report info general protection fault in tipc_conn_close
ci-upstream-kasan-gce-selinux-root 2022/04/20 12:42 upstream 559089e0a93d 160a3f31 .config log report info general protection fault in tipc_conn_close
ci-upstream-kasan-gce-root 2022/01/11 04:32 upstream df0cc57e057f ddb0ab8c .config log report info general protection fault in tipc_conn_close
ci-upstream-kasan-gce-smack-root 2021/11/22 02:02 upstream 40c93d7fff6f 4eb20a4e .config log report info general protection fault in tipc_conn_close
ci-upstream-kasan-gce-root 2021/10/30 14:41 upstream f25a5481af12 098b5d53 .config log report info general protection fault in tipc_conn_close
ci-upstream-net-this-kasan-gce 2022/03/17 01:30 net dea2d93a8ba4 dfa9a8ed .config log report info general protection fault in tipc_conn_close
ci-upstream-net-kasan-gce 2022/03/20 19:23 net-next d96657dc9238 e2d91b1d .config log report info general protection fault in tipc_conn_close
ci-upstream-linux-next-kasan-gce-root 2022/05/24 02:00 linux-next cc63e8e92cb8 e7f9308d .config log report info general protection fault in tipc_conn_close
* Struck through repros no longer work on HEAD.