[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANX2M5Yphi3JcCsMf3HgPPkk9XCfOKO85gyMdxQf3_O74yc1Hg@mail.gmail.com>
Date: Sat, 23 Jul 2022 15:07:09 -0700
From: Dipanjan Das <mail.dipanjan.das@...il.com>
To: davem@...emloft.net, ast@...nel.org, daniel@...earbox.net,
kafai@...com, songliubraving@...com, yhs@...com, andriin@...com,
sashal@...nel.org, edumazet@...gle.com, gregkh@...uxfoundation.org,
steffen.klassert@...unet.com, netdev@...r.kernel.org,
linux-kernel@...r.kernel.org, bpf@...r.kernel.org
Cc: syzkaller@...glegroups.com, fleischermarius@...glemail.com,
its.priyanka.bose@...il.com
Subject: general protection fault in sock_def_error_report
Hi,
We would like to report the following bug which has been found by our
modified version of syzkaller.
======================================================
description: general protection fault in sock_def_error_report
affected file: net/core/sock.c
kernel version: 5.4.206
kernel commit: 6584107915561f860b7b05dcca5c903dd62a308d
git tree: upstream
kernel config: https://syzkaller.appspot.com/text?tag=KernelConfig&x=1aab6d4187ddf667
crash reproducer: We could only generate the syz-repro for this bug.
The corresponding C-repro does not trigger the bug. The syz-repo can
be run as: `syz-execprog -executor=./syz-executor -repeat=0 -procs=16
-cover=0 repro.syz`
======================================================
Crash log:
======================================================
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 5480 Comm: syz-executor.2 Tainted: G OE 5.4.206+ #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.13.0-1ubuntu1.1 04/01/2014
RIP: 0010:__wake_up_common+0x198/0x650 kernel/sched/wait.c:86
Code: 18 48 39 1c 24 0f 85 eb 01 00 00 8b 44 24 10 48 83 c4 28 5b 5d
41 5c 41 5d 41 5e 41 5f c3 49 8d 54 24 18 48 89 d0 48 c1 e8 03 <80> 3c
28 00 0f 85 c1 02 00 00 49 8b 44 24 18 4d 89 e0 48 83 e8 18
RSP: 0018:ffff8880b25ff4b0 EFLAGS: 00010802
RAX: 1bd5a00000000020 RBX: 0000000000000002 RCX: ffffc900080f5000
RDX: dead000000000100 RSI: ffffffff81c30ef8 RDI: 0000000000000001
RBP: dffffc0000000000 R08: ffff88809f932380 R09: ffffed101637d55d
R10: 00000000000000a0 R11: ffff88809f932380 R12: dead0000000000e8
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000008
FS: 00007f53462e4700(0000) GS:ffff88811a000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f75554d1098 CR3: 00000000b1a27004 CR4: 0000000000160ef0
Call Trace:
__wake_up_common_lock+0xd0/0x130 kernel/sched/wait.c:123
sock_def_error_report+0x16a/0x590 net/core/sock.c:2817
tcp_disconnect+0x14b9/0x1dc0 net/ipv4/tcp.c:2701
__inet_stream_connect+0xb44/0xe60 net/ipv4/af_inet.c:707
tcp_sendmsg_fastopen net/ipv4/tcp.c:1176 [inline]
tcp_sendmsg_locked+0x22b9/0x3220 net/ipv4/tcp.c:1218
tcp_sendmsg+0x2b/0x40 net/ipv4/tcp.c:1445
inet_sendmsg+0x99/0xe0 net/ipv4/af_inet.c:807
smc_sendmsg+0x31f/0x3f0 net/smc/af_smc.c:1566
sock_sendmsg_nosec net/socket.c:637 [inline]
sock_sendmsg+0xd3/0x130 net/socket.c:657
____sys_sendmsg+0x304/0x7e0 net/socket.c:2286
___sys_sendmsg+0x11d/0x1b0 net/socket.c:2340
__sys_sendmmsg+0x195/0x480 net/socket.c:2443
__do_sys_sendmmsg net/socket.c:2472 [inline]
__se_sys_sendmmsg net/socket.c:2469 [inline]
__x64_sys_sendmmsg+0x99/0x100 net/socket.c:2469
do_syscall_64+0xf6/0x7b0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f53483544ed
Code: 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48
89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d
01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f53462e3be8 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
RAX: ffffffffffffffda RBX: 00007f5348473040 RCX: 00007f53483544ed
RDX: 0000000000000001 RSI: 0000000020001a80 RDI: 0000000000000003
RBP: 00007f53483c02e1 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000020000084 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffcd7ac395f R14: 00007f5348473040 R15: 00007f53462e3d80
Modules linked in: uio_ivshmem(OE) uio(E)
---[ end trace d3594c146e1822a7 ]---
RIP: 0010:__wake_up_common+0x198/0x650 kernel/sched/wait.c:86
Code: 18 48 39 1c 24 0f 85 eb 01 00 00 8b 44 24 10 48 83 c4 28 5b 5d
41 5c 41 5d 41 5e 41 5f c3 49 8d 54 24 18 48 89 d0 48 c1 e8 03 <80> 3c
28 00 0f 85 c1 02 00 00 49 8b 44 24 18 4d 89 e0 48 83 e8 18
RSP: 0018:ffff8880b25ff4b0 EFLAGS: 00010802
RAX: 1bd5a00000000020 RBX: 0000000000000002 RCX: ffffc900080f5000
RDX: dead000000000100 RSI: ffffffff81c30ef8 RDI: 0000000000000001
RBP: dffffc0000000000 R08: ffff88809f932380 R09: ffffed101637d55d
R10: 00000000000000a0 R11: ffff88809f932380 R12: dead0000000000e8
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000008
FS: 00007f53462e4700(0000) GS:ffff88811a000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f75554d1098 CR3: 00000000b1a27004 CR4: 0000000000160ef0
----------------
Code disassembly (best guess):
0: 18 48 39 sbb %cl,0x39(%rax)
3: 1c 24 sbb $0x24,%al
5: 0f 85 eb 01 00 00 jne 0x1f6
b: 8b 44 24 10 mov 0x10(%rsp),%eax
f: 48 83 c4 28 add $0x28,%rsp
13: 5b pop %rbx
14: 5d pop %rbp
15: 41 5c pop %r12
17: 41 5d pop %r13
19: 41 5e pop %r14
1b: 41 5f pop %r15
1d: c3 retq
1e: 49 8d 54 24 18 lea 0x18(%r12),%rdx
23: 48 89 d0 mov %rdx,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 80 3c 28 00 cmpb $0x0,(%rax,%rbp,1) <-- trapping instruction
2e: 0f 85 c1 02 00 00 jne 0x2f5
34: 49 8b 44 24 18 mov 0x18(%r12),%rax
39: 4d 89 e0 mov %r12,%r8
3c: 48 83 e8 18 sub $0x18,%rax
--
Thanks and Regards,
Dipanjan
Download attachment "repro.syz" of type "application/octet-stream" (349 bytes)
Powered by blists - more mailing lists