syzbot


general protection fault in dev_alloc_name_ns (2)

Status: auto-closed as invalid on 2022/02/25 05:51
Reported-by: syzbot+@syzkaller.appspotmail.com
First crash: 418d, last: 370d
similar bugs (1):
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream general protection fault in dev_alloc_name_ns 2 514d 522d 0/24 closed as invalid on 2021/10/04 21:36

Sample crash report:
general protection fault, probably for non-canonical address 0xdffffc8000008002: 0000 [#1] PREEMPT SMP KASAN
KASAN: probably user-memory-access in range [0x0000040000040010-0x0000040000040017]
CPU: 0 PID: 18243 Comm: syz-executor.1 Not tainted 5.15.0-rc4-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__dev_alloc_name net/core/dev.c:1109 [inline]
RIP: 0010:dev_alloc_name_ns+0x1ef/0x6b0 net/core/dev.c:1154
Code: 8f 57 fa 49 8d 47 10 48 89 44 24 18 48 c1 e8 03 80 3c 28 00 0f 85 56 04 00 00 4d 8b 67 10 49 8d 7c 24 10 48 89 f8 48 c1 e8 03 <80> 3c 28 00 0f 85 58 04 00 00 49 8b 44 24 10 48 8d 58 f0 49 39 dc
RSP: 0018:ffffc90005006f68 EFLAGS: 00010202
RAX: 0000008000008002 RBX: 0000000000000000 RCX: ffffc9000b749000
RDX: 0000000000040000 RSI: ffffffff871e6ec8 RDI: 0000040000040010
RBP: dffffc0000000000 R08: 0000000000000000 R09: 000000000000006f
R10: ffffffff871e7063 R11: 0000000000000072 R12: 0000040000040000
R13: ffff8880147f8000 R14: ffff88807a149000 R15: ffff88807ee4010e
FS:  00007f7af3857700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffda6d3d720 CR3: 0000000024c90000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 dev_get_valid_name+0x67/0x160 net/core/dev.c:1189
 register_netdevice+0x361/0x1500 net/core/dev.c:10218
 br_dev_newlink+0x23/0x110 net/bridge/br_netlink.c:1443
 __rtnl_newlink+0x106d/0x1750 net/core/rtnetlink.c:3458
 rtnl_newlink+0x64/0xa0 net/core/rtnetlink.c:3506
 rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5572
 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2510
 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
 netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1345
 netlink_sendmsg+0x86d/0xdb0 net/netlink/af_netlink.c:1935
 sock_sendmsg_nosec net/socket.c:704 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:724
 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2409
 ___sys_sendmsg+0xf3/0x170 net/socket.c:2463
 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2492
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f7af63018d9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f7af3857188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f7af6406020 RCX: 00007f7af63018d9
RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005
RBP: 00007f7af635bcb4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffc92b428df R14: 00007f7af3857300 R15: 0000000000022000
Modules linked in:
---[ end trace fb159d9165bb5df7 ]---
RIP: 0010:__dev_alloc_name net/core/dev.c:1109 [inline]
RIP: 0010:dev_alloc_name_ns+0x1ef/0x6b0 net/core/dev.c:1154
Code: 8f 57 fa 49 8d 47 10 48 89 44 24 18 48 c1 e8 03 80 3c 28 00 0f 85 56 04 00 00 4d 8b 67 10 49 8d 7c 24 10 48 89 f8 48 c1 e8 03 <80> 3c 28 00 0f 85 58 04 00 00 49 8b 44 24 10 48 8d 58 f0 49 39 dc
RSP: 0018:ffffc90005006f68 EFLAGS: 00010202
RAX: 0000008000008002 RBX: 0000000000000000 RCX: ffffc9000b749000
RDX: 0000000000040000 RSI: ffffffff871e6ec8 RDI: 0000040000040010
RBP: dffffc0000000000 R08: 0000000000000000 R09: 000000000000006f
R10: ffffffff871e7063 R11: 0000000000000072 R12: 0000040000040000
R13: ffff8880147f8000 R14: ffff88807a149000 R15: ffff88807ee4010e
FS:  00007f7af3857700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff9ad082718 CR3: 0000000024c90000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess), 1 bytes skipped:
   0:	57                   	push   %rdi
   1:	fa                   	cli
   2:	49 8d 47 10          	lea    0x10(%r15),%rax
   6:	48 89 44 24 18       	mov    %rax,0x18(%rsp)
   b:	48 c1 e8 03          	shr    $0x3,%rax
   f:	80 3c 28 00          	cmpb   $0x0,(%rax,%rbp,1)
  13:	0f 85 56 04 00 00    	jne    0x46f
  19:	4d 8b 67 10          	mov    0x10(%r15),%r12
  1d:	49 8d 7c 24 10       	lea    0x10(%r12),%rdi
  22:	48 89 f8             	mov    %rdi,%rax
  25:	48 c1 e8 03          	shr    $0x3,%rax
* 29:	80 3c 28 00          	cmpb   $0x0,(%rax,%rbp,1) <-- trapping instruction
  2d:	0f 85 58 04 00 00    	jne    0x48b
  33:	49 8b 44 24 10       	mov    0x10(%r12),%rax
  38:	48 8d 58 f0          	lea    -0x10(%rax),%rbx
  3c:	49 39 dc             	cmp    %rbx,%r12

Crashes (2):
Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Title
ci-upstream-net-this-kasan-gce 2021/10/10 18:52 net 732b74d64704 838e7e2c .config log report info general protection fault in dev_alloc_name_ns
ci-upstream-linux-next-kasan-gce-root 2021/11/27 05:50 linux-next f81e94e91878 63eeac02 .config log report info general protection fault in dev_alloc_name_ns
* Struck through repros no longer work on HEAD.