public inbox for netdev@vger.kernel.org
 help / color / mirror / Atom feed
* [syzbot] [net?] general protection fault in lec_arp_clear_vccs
@ 2025-09-16 12:39 syzbot
  2026-02-16  2:35 ` syzbot
  0 siblings, 1 reply; 2+ messages in thread
From: syzbot @ 2025-09-16 12:39 UTC (permalink / raw)
  To: davem, edumazet, horms, kuba, linux-kernel, netdev, pabeni,
	syzkaller-bugs

Hello,

syzbot found the following issue on:

HEAD commit:    2690cb089502 dpaa2-switch: fix buffer pool seeding for con..
git tree:       net
console output: https://syzkaller.appspot.com/x/log.txt?x=106c1934580000
kernel config:  https://syzkaller.appspot.com/x/.config?x=4d8792ecb6308d0f
dashboard link: https://syzkaller.appspot.com/bug?extid=72e3ea390c305de0e259
compiler:       Debian clang version 20.1.8 (++20250708063551+0c9f909b7976-1~exp1~20250708183702.136), Debian LLD 20.1.8

Unfortunately, I don't have any reproducer for this issue yet.

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/bd85e520a303/disk-2690cb08.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/10d3787341cc/vmlinux-2690cb08.xz
kernel image: https://storage.googleapis.com/syzbot-assets/c1556e02902a/bzImage-2690cb08.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+72e3ea390c305de0e259@syzkaller.appspotmail.com

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 0 UID: 0 PID: 27966 Comm: syz.1.7437 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
RIP: 0010:lec_arp_clear_vccs+0xad/0x380 net/atm/lec.c:1263
Code: e8 03 80 3c 28 00 74 08 4c 89 e7 e8 9d e0 76 f7 4c 89 74 24 18 49 8b 2c 24 4c 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 ef e8 75 e0 76 f7 4d 8b 75 00 4d 8d a7 18
RSP: 0018:ffffc9001c217bd0 EFLAGS: 00010046
RAX: 0000000000000000 RBX: ffff8880528ad400 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: ffffffff8be33be0 RDI: ffff8880528ad400
RBP: ffff88802e2c2000 R08: ffffffff8e8e2db3 R09: 1ffffffff1d1c5b6
R10: dffffc0000000000 R11: fffffbfff1d1c5b7 R12: ffff88807df10638
R13: 0000000000000000 R14: ffff8880528ad430 R15: ffff88807df10000
FS:  000055555dcab500(0000) GS:ffff888125c15000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f2733b056c0 CR3: 000000007e312000 CR4: 00000000003526f0
Call Trace:
 <TASK>
 lec_vcc_close net/atm/lec.c:2183 [inline]
 lec_push+0x3cb/0x1860 net/atm/lec.c:594
 vcc_destroy_socket net/atm/common.c:183 [inline]
 vcc_release+0x157/0x460 net/atm/common.c:205
 svc_release+0x6b/0xb0 net/atm/svc.c:95
 __sock_release net/socket.c:649 [inline]
 sock_close+0xc3/0x240 net/socket.c:1439
 __fput+0x449/0xa70 fs/file_table.c:468
 task_work_run+0x1d1/0x260 kernel/task_work.c:227
 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
 exit_to_user_mode_loop+0xec/0x110 kernel/entry/common.c:43
 exit_to_user_mode_prepare include/linux/irq-entry-common.h:225 [inline]
 syscall_exit_to_user_mode_work include/linux/entry-common.h:175 [inline]
 syscall_exit_to_user_mode include/linux/entry-common.h:210 [inline]
 do_syscall_64+0x2bd/0x3b0 arch/x86/entry/syscall_64.c:100
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f114b78eba9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff6f7d2028 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4
RAX: 0000000000000000 RBX: 00007f114b9d7da0 RCX: 00007f114b78eba9
RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003
RBP: 00007f114b9d7da0 R08: 0000000000000000 R09: 0000000d6f7d231f
R10: 000000000003fd58 R11: 0000000000000246 R12: 00000000000a243d
R13: 00007fff6f7d2120 R14: ffffffffffffffff R15: 00007fff6f7d2140
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:lec_arp_clear_vccs+0xad/0x380 net/atm/lec.c:1263
Code: e8 03 80 3c 28 00 74 08 4c 89 e7 e8 9d e0 76 f7 4c 89 74 24 18 49 8b 2c 24 4c 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 ef e8 75 e0 76 f7 4d 8b 75 00 4d 8d a7 18
RSP: 0018:ffffc9001c217bd0 EFLAGS: 00010046
RAX: 0000000000000000 RBX: ffff8880528ad400 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: ffffffff8be33be0 RDI: ffff8880528ad400
RBP: ffff88802e2c2000 R08: ffffffff8e8e2db3 R09: 1ffffffff1d1c5b6
R10: dffffc0000000000 R11: fffffbfff1d1c5b7 R12: ffff88807df10638
R13: 0000000000000000 R14: ffff8880528ad430 R15: ffff88807df10000
FS:  000055555dcab500(0000) GS:ffff888125c15000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f2733b056c0 CR3: 000000007e312000 CR4: 00000000003526f0
----------------
Code disassembly (best guess):
   0:	e8 03 80 3c 28       	call   0x283c8008
   5:	00 74 08 4c          	add    %dh,0x4c(%rax,%rcx,1)
   9:	89 e7                	mov    %esp,%edi
   b:	e8 9d e0 76 f7       	call   0xf776e0ad
  10:	4c 89 74 24 18       	mov    %r14,0x18(%rsp)
  15:	49 8b 2c 24          	mov    (%r12),%rbp
  19:	4c 89 e8             	mov    %r13,%rax
  1c:	48 c1 e8 03          	shr    $0x3,%rax
  20:	48 b9 00 00 00 00 00 	movabs $0xdffffc0000000000,%rcx
  27:	fc ff df
* 2a:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1) <-- trapping instruction
  2e:	74 08                	je     0x38
  30:	4c 89 ef             	mov    %r13,%rdi
  33:	e8 75 e0 76 f7       	call   0xf776e0ad
  38:	4d 8b 75 00          	mov    0x0(%r13),%r14
  3c:	4d                   	rex.WRB
  3d:	8d                   	.byte 0x8d
  3e:	a7                   	cmpsl  %es:(%rdi),%ds:(%rsi)
  3f:	18                   	.byte 0x18


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzkaller@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title

If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)

If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report

If you want to undo deduplication, reply with:
#syz undup

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [syzbot] [net?] general protection fault in lec_arp_clear_vccs
  2025-09-16 12:39 [syzbot] [net?] general protection fault in lec_arp_clear_vccs syzbot
@ 2026-02-16  2:35 ` syzbot
  0 siblings, 0 replies; 2+ messages in thread
From: syzbot @ 2026-02-16  2:35 UTC (permalink / raw)
  To: davem, edumazet, horms, kuba, linux-kernel, netdev, pabeni,
	syzkaller-bugs

syzbot has found a reproducer for the following issue on:

HEAD commit:    37a93dd5c49b Merge tag 'net-next-7.0' of git://git.kernel...
git tree:       net-next
console output: https://syzkaller.appspot.com/x/log.txt?x=17972ffa580000
kernel config:  https://syzkaller.appspot.com/x/.config?x=17f5c46dd78c01cf
dashboard link: https://syzkaller.appspot.com/bug?extid=72e3ea390c305de0e259
compiler:       Debian clang version 21.1.8 (++20251221033036+2078da43e25a-1~exp1~20251221153213.50), Debian LLD 21.1.8
syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=1756015a580000
C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=145a2722580000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/05288cb3a544/disk-37a93dd5.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/8b208672ebc8/vmlinux-37a93dd5.xz
kernel image: https://storage.googleapis.com/syzbot-assets/cb0ca59bc74a/bzImage-37a93dd5.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+72e3ea390c305de0e259@syzkaller.appspotmail.com

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 0 UID: 0 PID: 8024 Comm: syz.3.396 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
RIP: 0010:lec_arp_clear_vccs+0xad/0x380 net/atm/lec.c:1263
Code: e8 03 80 3c 28 00 74 08 4c 89 e7 e8 5d f6 62 f7 4c 89 74 24 18 49 8b 2c 24 4c 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 ef e8 35 f6 62 f7 4d 8b 75 00 4d 8d a7 30
RSP: 0018:ffffc9000cc67bc8 EFLAGS: 00010046
RAX: 0000000000000000 RBX: ffff88807efa2400 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: ffffffff8c2764e0 RDI: ffff88807efa2400
RBP: ffff888057c3c000 R08: ffffffff8ef0f2f3 R09: 1ffffffff1de1e5e
R10: dffffc0000000000 R11: fffffbfff1de1e5f R12: ffff88803352e650
R13: 0000000000000000 R14: ffff88807efa2430 R15: ffff88803352e000
FS:  0000555590f50500(0000) GS:ffff8881254b0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffef315f148 CR3: 00000000722fa000 CR4: 00000000003526f0
Call Trace:
 <TASK>
 lec_vcc_close net/atm/lec.c:2183 [inline]
 lec_push+0x3cb/0x19d0 net/atm/lec.c:594
 vcc_destroy_socket net/atm/common.c:183 [inline]
 vcc_release+0x15f/0x580 net/atm/common.c:205
 __sock_release net/socket.c:662 [inline]
 sock_close+0xc3/0x240 net/socket.c:1455
 __fput+0x44f/0xa70 fs/file_table.c:469
 task_work_run+0x1d9/0x270 kernel/task_work.c:233
 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
 __exit_to_user_mode_loop kernel/entry/common.c:67 [inline]
 exit_to_user_mode_loop+0xed/0x480 kernel/entry/common.c:98
 __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline]
 syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline]
 syscall_exit_to_user_mode include/linux/entry-common.h:325 [inline]
 do_syscall_64+0x32d/0xf80 arch/x86/entry/syscall_64.c:100
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f005119bf79
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff437a3bc8 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4
RAX: 0000000000000000 RBX: 00007f0051417da0 RCX: 00007f005119bf79
RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003
RBP: 00007f0051417da0 R08: 00007f0051416128 R09: 0000000000000000
R10: 000000000003fd6c R11: 0000000000000246 R12: 000000000002c374
R13: 00007f0051415fac R14: 000000000002c122 R15: 00007fff437a3cd0
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:lec_arp_clear_vccs+0xad/0x380 net/atm/lec.c:1263
Code: e8 03 80 3c 28 00 74 08 4c 89 e7 e8 5d f6 62 f7 4c 89 74 24 18 49 8b 2c 24 4c 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 ef e8 35 f6 62 f7 4d 8b 75 00 4d 8d a7 30
RSP: 0018:ffffc9000cc67bc8 EFLAGS: 00010046
RAX: 0000000000000000 RBX: ffff88807efa2400 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: ffffffff8c2764e0 RDI: ffff88807efa2400
RBP: ffff888057c3c000 R08: ffffffff8ef0f2f3 R09: 1ffffffff1de1e5e
R10: dffffc0000000000 R11: fffffbfff1de1e5f R12: ffff88803352e650
R13: 0000000000000000 R14: ffff88807efa2430 R15: ffff88803352e000
FS:  0000555590f50500(0000) GS:ffff8881254b0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffef315f148 CR3: 00000000722fa000 CR4: 00000000003526f0
----------------
Code disassembly (best guess):
   0:	e8 03 80 3c 28       	call   0x283c8008
   5:	00 74 08 4c          	add    %dh,0x4c(%rax,%rcx,1)
   9:	89 e7                	mov    %esp,%edi
   b:	e8 5d f6 62 f7       	call   0xf762f66d
  10:	4c 89 74 24 18       	mov    %r14,0x18(%rsp)
  15:	49 8b 2c 24          	mov    (%r12),%rbp
  19:	4c 89 e8             	mov    %r13,%rax
  1c:	48 c1 e8 03          	shr    $0x3,%rax
  20:	48 b9 00 00 00 00 00 	movabs $0xdffffc0000000000,%rcx
  27:	fc ff df
* 2a:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1) <-- trapping instruction
  2e:	74 08                	je     0x38
  30:	4c 89 ef             	mov    %r13,%rdi
  33:	e8 35 f6 62 f7       	call   0xf762f66d
  38:	4d 8b 75 00          	mov    0x0(%r13),%r14
  3c:	4d                   	rex.WRB
  3d:	8d                   	.byte 0x8d
  3e:	a7                   	cmpsl  %es:(%rdi),%ds:(%rsi)
  3f:	30                   	.byte 0x30


---
If you want syzbot to run the reproducer, reply with:
#syz test: git://repo/address.git branch-or-commit-hash
If you attach or paste a git patch, syzbot will apply it before testing.

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2026-02-16  2:35 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-09-16 12:39 [syzbot] [net?] general protection fault in lec_arp_clear_vccs syzbot
2026-02-16  2:35 ` syzbot

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox