general protection fault in __sock_release

15 views
Skip to first unread message

syzbot

unread,
Aug 27, 2020, 3:52:24 PM8/27/20
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: f6d5cb9e Linux 4.19.142
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=1072cdd5900000
kernel config: https://syzkaller.appspot.com/x/.config?x=30067df04d3254aa
dashboard link: https://syzkaller.appspot.com/bug?extid=b4e0d2c4da75256c90ca
compiler: gcc (GCC) 10.1.0-syz 20200507
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=12ddd3b9900000

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+b4e0d2...@syzkaller.appspotmail.com

IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
Bluetooth: hci0: command 0x0409 tx timeout
Bluetooth: hci0: command 0x041b tx timeout
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 7583 Comm: syz-executor.0 Not tainted 4.19.142-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__sock_release+0xbb/0x2a0 net/socket.c:579
Code: ff df 48 c1 ea 03 80 3c 02 00 0f 85 c9 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 63 28 49 8d 7c 24 10 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 b2 01 00 00 48 89 df 41 ff 54 24 10 48 8d 7b 20
RSP: 0018:ffff88808463fdf8 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: ffff888082b7b0c0 RCX: 0000000000004724
RDX: 0000000000000002 RSI: 00000000a87acb66 RDI: 0000000000000010
RBP: ffff888082b7b1c8 R08: ffffffff8b40e1a0 R09: 0000000000000000
R10: ffff8880a405c908 R11: 0000000000000000 R12: 0000000000000000
R13: ffff888082b7b0e8 R14: 0000000000000000 R15: ffff8880a943fe20
FS: 0000000002d69940(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055ece9b7f970 CR3: 00000000a7613000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
sock_close+0x15/0x20 net/socket.c:1140
__fput+0x2ce/0x890 fs/file_table.c:278
task_work_run+0x148/0x1c0 kernel/task_work.c:113
tracehook_notify_resume include/linux/tracehook.h:193 [inline]
exit_to_usermode_loop+0x251/0x2a0 arch/x86/entry/common.c:167
prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline]
syscall_return_slowpath arch/x86/entry/common.c:271 [inline]
do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x416f01
Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01
RSP: 002b:00007ffc821c5d80 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000416f01
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 0000000000000003
RBP: 0000000000000000 R08: 0000000001190358 R09: 0000000000000000
R10: 00007ffc821c5e60 R11: 0000000000000293 R12: 0000000001190360
R13: 0000000000000000 R14: ffffffffffffffff R15: 000000000118cf4c
Modules linked in:
---[ end trace 676eed72a99a616d ]---
RIP: 0010:__sock_release+0xbb/0x2a0 net/socket.c:579
Code: ff df 48 c1 ea 03 80 3c 02 00 0f 85 c9 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 63 28 49 8d 7c 24 10 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 b2 01 00 00 48 89 df 41 ff 54 24 10 48 8d 7b 20
RSP: 0018:ffff88808463fdf8 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: ffff888082b7b0c0 RCX: 0000000000004724
RDX: 0000000000000002 RSI: 00000000a87acb66 RDI: 0000000000000010
RBP: ffff888082b7b1c8 R08: ffffffff8b40e1a0 R09: 0000000000000000
R10: ffff8880a405c908 R11: 0000000000000000 R12: 0000000000000000
R13: ffff888082b7b0e8 R14: 0000000000000000 R15: ffff8880a943fe20
FS: 0000000002d69940(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055ece9b7f970 CR3: 00000000a7613000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
syzbot can test patches for this issue, for details see:
https://goo.gl/tpsmEJ#testing-patches

syzbot

unread,
Aug 27, 2020, 5:53:23 PM8/27/20
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: d7e78d08 Linux 4.14.195
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=15049fee900000
kernel config: https://syzkaller.appspot.com/x/.config?x=6608b656f49b4e8c
dashboard link: https://syzkaller.appspot.com/bug?extid=b9e6839090ab52915446
compiler: gcc (GCC) 10.1.0-syz 20200507
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=13d440d1900000

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+b9e683...@syzkaller.appspotmail.com

batman_adv: batadv0: Interface activated: batadv_slave_1
IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 0 PID: 6769 Comm: syz-executor.0 Not tainted 4.14.195-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff88809039a040 task.stack: ffff88808b4f8000
RIP: 0010:__sock_release+0xbb/0x2b0 net/socket.c:602
RSP: 0018:ffff88808b4ffdc0 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: ffff8880827e3500 RCX: 0000000000007cf0
RDX: 0000000000000002 RSI: 0000000000000001 RDI: 0000000000000010
RBP: ffff8880827e3610 R08: ffffffff8a0b8100 R09: 000000000004044e
R10: ffff88809039a8c8 R11: ffff88809039a040 R12: 0000000000000000
R13: ffff8880827e3528 R14: 0000000000000000 R15: ffff888092558d10
FS: 00007fb4e612a700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1010791018 CR3: 00000000928ea000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
sock_close+0x15/0x20 net/socket.c:1139
__fput+0x25f/0x7a0 fs/file_table.c:210
task_work_run+0x11f/0x190 kernel/task_work.c:113
tracehook_notify_resume include/linux/tracehook.h:191 [inline]
exit_to_usermode_loop+0x1ad/0x200 arch/x86/entry/common.c:164
prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45d5b9
RSP: 002b:00007fb4e6129c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9
RAX: 0000000000000000 RBX: 0000000000002ac0 RCX: 000000000045d5b9
RDX: 0000000000000004 RSI: 0000000000000001 RDI: 0000000000000005
RBP: 000000000118cf88 R08: 0000000000000000 R09: 0000000000000000
R10: 00000000200003c0 R11: 0000000000000246 R12: 000000000118cf4c
R13: 00007ffda5447d6f R14: 00007fb4e612a9c0 R15: 000000000118cf4c
Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 d5 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 63 28 49 8d 7c 24 10 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 be 01 00 00 48 89 df 41 ff 54 24 10 48 8d 7b
Bluetooth: hci0 command 0x0409 tx timeout
RIP: __sock_release+0xbb/0x2b0 net/socket.c:602 RSP: ffff88808b4ffdc0
---[ end trace 8049e2730ea3a824 ]---

syzbot

unread,
Oct 9, 2020, 2:19:06 AM10/9/20
to syzkaller...@googlegroups.com
syzbot suspects this issue was fixed by commit:

commit 37d933e8b41b83bb8278815e366aec5a542b7e31
Author: Al Viro <vi...@zeniv.linux.org.uk>
Date: Wed Sep 2 15:30:48 2020 +0000

fix regression in "epoll: Keep a reference on files added to the check list"

bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=115a5777900000
start commit: c37da90e Linux 4.19.143
git tree: linux-4.19.y
kernel config: https://syzkaller.appspot.com/x/.config?x=d162ec57805c4e4d
dashboard link: https://syzkaller.appspot.com/bug?extid=b4e0d2c4da75256c90ca
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=12998395900000

If the result looks correct, please mark the issue as fixed by replying with:

#syz fix: fix regression in "epoll: Keep a reference on files added to the check list"

For information about bisection process see: https://goo.gl/tpsmEJ#bisection

syzbot

unread,
Oct 9, 2020, 9:19:06 AM10/9/20
to syzkaller...@googlegroups.com
syzbot suspects this issue was fixed by commit:

commit c5c6e00f6cc5d3ed0d6464b14e33f2f5c8505888
Author: Al Viro <vi...@zeniv.linux.org.uk>
Date: Wed Sep 2 15:30:48 2020 +0000

fix regression in "epoll: Keep a reference on files added to the check list"

bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=11f753bf900000
start commit: 2f166cdc Linux 4.14.196
git tree: linux-4.14.y
kernel config: https://syzkaller.appspot.com/x/.config?x=e2677667b00dfecb
dashboard link: https://syzkaller.appspot.com/bug?extid=b9e6839090ab52915446
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=164bc621900000
Reply all
Reply to author
Forward
0 new messages