general protection fault in tipc_conn_close

8 views
Skip to first unread message

syzbot

unread,
Jun 27, 2022, 9:43:23 PM6/27/22
to syzkaller-a...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 9ce4508d6de9 ANDROID: ABI: Update symbols to unisoc whitel..
git tree: android12-5.4
console output: https://syzkaller.appspot.com/x/log.txt?x=175a9790080000
kernel config: https://syzkaller.appspot.com/x/.config?x=94979c591be989b1
dashboard link: https://syzkaller.appspot.com/bug?extid=2e73e8bea611626e2aeb
compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2

Unfortunately, I don't have any reproducer for this issue yet.

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+2e73e8...@syzkaller.appspotmail.com

kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 30992 Comm: kworker/u4:0 Not tainted 5.4.190-syzkaller-00046-g9ce4508d6de9 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: netns cleanup_net
RIP: 0010:tipc_conn_close+0x4a/0x130 net/tipc/topsrv.c:158
Code: 24 08 49 89 de 49 c1 ee 03 41 80 3c 2e 00 74 08 48 89 df e8 e8 28 7e fd 48 89 1c 24 48 8b 1b 48 83 c3 18 48 89 d8 48 c1 e8 03 <80> 3c 28 00 74 08 48 89 df e8 c8 28 7e fd 48 8b 1b 4c 8d bb 38 02
RSP: 0018:ffff8881e43c7c30 EFLAGS: 00010206
RAX: 0000000000000003 RBX: 0000000000000018 RCX: ffff8881f32c0000
RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8881c54adc00
RBP: dffffc0000000000 R08: ffffffff821c60b4 R09: ffffed103c878f87
R10: ffffed103c878f87 R11: 1ffff1103c878f86 R12: ffff8881c54adc00
R13: ffff8881ec360018 R14: 1ffff11038a95b81 R15: ffff8881ec36001c
FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020404030 CR3: 00000001ec391000 CR4: 00000000003406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
tipc_topsrv_stop net/tipc/topsrv.c:694 [inline]
tipc_topsrv_exit_net+0x148/0x330 net/tipc/topsrv.c:715
ops_exit_list net/core/net_namespace.c:172 [inline]
cleanup_net+0x654/0xca0 net/core/net_namespace.c:602
process_one_work+0x6ca/0xc40 kernel/workqueue.c:2287
worker_thread+0xae0/0x1440 kernel/workqueue.c:2433
kthread+0x2d8/0x360 kernel/kthread.c:288
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:352
Modules linked in:
---[ end trace e8fcf31344953dea ]---
RIP: 0010:tipc_conn_close+0x4a/0x130 net/tipc/topsrv.c:158
Code: 24 08 49 89 de 49 c1 ee 03 41 80 3c 2e 00 74 08 48 89 df e8 e8 28 7e fd 48 89 1c 24 48 8b 1b 48 83 c3 18 48 89 d8 48 c1 e8 03 <80> 3c 28 00 74 08 48 89 df e8 c8 28 7e fd 48 8b 1b 4c 8d bb 38 02
RSP: 0018:ffff8881e43c7c30 EFLAGS: 00010206
RAX: 0000000000000003 RBX: 0000000000000018 RCX: ffff8881f32c0000
RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8881c54adc00
RBP: dffffc0000000000 R08: ffffffff821c60b4 R09: ffffed103c878f87
R10: ffffed103c878f87 R11: 1ffff1103c878f86 R12: ffff8881c54adc00
R13: ffff8881ec360018 R14: 1ffff11038a95b81 R15: ffff8881ec36001c
FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f6b82b56090 CR3: 00000001bdb91000 CR4: 00000000003406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 24 08 and $0x8,%al
2: 49 89 de mov %rbx,%r14
5: 49 c1 ee 03 shr $0x3,%r14
9: 41 80 3c 2e 00 cmpb $0x0,(%r14,%rbp,1)
e: 74 08 je 0x18
10: 48 89 df mov %rbx,%rdi
13: e8 e8 28 7e fd callq 0xfd7e2900
18: 48 89 1c 24 mov %rbx,(%rsp)
1c: 48 8b 1b mov (%rbx),%rbx
1f: 48 83 c3 18 add $0x18,%rbx
23: 48 89 d8 mov %rbx,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 80 3c 28 00 cmpb $0x0,(%rax,%rbp,1) <-- trapping instruction
2e: 74 08 je 0x38
30: 48 89 df mov %rbx,%rdi
33: e8 c8 28 7e fd callq 0xfd7e2900
38: 48 8b 1b mov (%rbx),%rbx
3b: 4c rex.WR
3c: 8d .byte 0x8d
3d: bb .byte 0xbb
3e: 38 02 cmp %al,(%rdx)


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Jul 18, 2023, 10:57:44 AM7/18/23
to syzkaller-a...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages