syzbot


general protection fault in n_tty_receive_buf_common (2)

Status: upstream: reported on 2024/07/25 04:27
Subsystems: serial
[Documentation on labels]
Reported-by: syzbot+2dda672e146ff12ccb02@syzkaller.appspotmail.com
First crash: 592d, last: 1d05h
Discussions (7)
Title Replies (including bot) Last reply
[syzbot] Monthly serial report (Jul 2025) 0 (1) 2025/07/24 09:32
[syzbot] Monthly serial report (May 2025) 0 (1) 2025/05/22 12:58
[syzbot] Monthly serial report (Feb 2025) 0 (1) 2025/02/17 12:44
[syzbot] Monthly serial report (Jan 2025) 0 (1) 2025/01/17 10:36
[syzbot] Monthly serial report (Nov 2024) 0 (1) 2024/11/18 10:38
[syzbot] Monthly serial report (Sep 2024) 0 (1) 2024/09/14 10:58
[syzbot] [serial?] general protection fault in n_tty_receive_buf_common (2) 0 (1) 2024/07/25 04:27
Similar bugs (5)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream KMSAN: uninit-value in n_tty_receive_buf_common (2) serial 7 C 591 820d 1402d 0/29 auto-obsoleted due to no activity on 2023/09/27 16:27
linux-6.1 general protection fault in n_tty_receive_buf_common 2 1 349d 349d 0/3 auto-obsoleted due to no activity on 2025/02/10 03:23
android-6-1 general protection fault in n_tty_receive_buf_common 2 1 602d 602d 0/2 auto-obsoleted due to no activity on 2024/05/22 15:27
upstream general protection fault in n_tty_receive_buf_common serial 2 48 2529d 2912d 0/29 closed as dup on 2018/07/17 10:20
android-6-1 general protection fault in n_tty_receive_buf_common (2) 2 4 381d 452d 0/2 auto-obsoleted due to no activity on 2024/12/29 18:01

Sample crash report:
Oops: general protection fault, probably for non-canonical address 0xdffffc000000044c: 0000 [#1] SMP KASAN PTI
KASAN: probably user-memory-access in range [0x0000000000002260-0x0000000000002267]
CPU: 0 UID: 0 PID: 13 Comm: kworker/u8:1 Not tainted syzkaller #0 PREEMPT_{RT,(full)} 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
Workqueue: events_unbound flush_to_ldisc
RIP: 0010:n_tty_receive_buf_common+0x166/0x12f0 drivers/tty/n_tty.c:1702
Code: e9 03 48 89 8c 24 a0 00 00 00 48 81 c3 e8 03 00 00 31 ed 4c 89 7c 24 38 48 89 5c 24 70 48 89 6c 24 28 48 8b 84 24 08 01 00 00 <42> 80 3c 28 00 74 0d 48 8b bc 24 f8 00 00 00 e8 46 73 20 fd 4c 89
RSP: 0018:ffffc90000127850 EFLAGS: 00010246
RAX: 000000000000044c RBX: ffff888040b4e3e8 RCX: 000000000000000b
RDX: 1ffff11008169c6a RSI: 000000000000000b RDI: ffff888040b4e5c8
RBP: 0000000000000000 R08: 0000000000000003 R09: 0000000000000004
R10: dffffc0000000000 R11: fffff52000024ef8 R12: ffff888031f1bde0
R13: dffffc0000000000 R14: 0000000000000000 R15: ffff888040b4e6a0
FS:  0000000000000000(0000) GS:ffff888126bc9000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000020000028e030 CR3: 0000000036dd2000 CR4: 00000000003526f0
DR0: ffffffffffffffff DR1: 00000000000001f8 DR2: 0000000000000083
DR3: ffffffffefffff15 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 tty_port_default_receive_buf+0x6e/0xa0 drivers/tty/tty_port.c:37
 receive_buf drivers/tty/tty_buffer.c:445 [inline]
 flush_to_ldisc+0x24a/0x6e0 drivers/tty/tty_buffer.c:495
 process_one_work kernel/workqueue.c:3263 [inline]
 process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
 kthread+0x711/0x8a0 kernel/kthread.c:463
 ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:n_tty_receive_buf_common+0x166/0x12f0 drivers/tty/n_tty.c:1702
Code: e9 03 48 89 8c 24 a0 00 00 00 48 81 c3 e8 03 00 00 31 ed 4c 89 7c 24 38 48 89 5c 24 70 48 89 6c 24 28 48 8b 84 24 08 01 00 00 <42> 80 3c 28 00 74 0d 48 8b bc 24 f8 00 00 00 e8 46 73 20 fd 4c 89
RSP: 0018:ffffc90000127850 EFLAGS: 00010246
RAX: 000000000000044c RBX: ffff888040b4e3e8 RCX: 000000000000000b
RDX: 1ffff11008169c6a RSI: 000000000000000b RDI: ffff888040b4e5c8
RBP: 0000000000000000 R08: 0000000000000003 R09: 0000000000000004
R10: dffffc0000000000 R11: fffff52000024ef8 R12: ffff888031f1bde0
R13: dffffc0000000000 R14: 0000000000000000 R15: ffff888040b4e6a0
FS:  0000000000000000(0000) GS:ffff888126bc9000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fb6571f9d58 CR3: 0000000023058000 CR4: 00000000003526f0
DR0: ffffffffffffffff DR1: 00000000000001f8 DR2: 0000000000000083
DR3: ffffffffefffff15 DR6: 00000000ffff0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	e9 03 48 89 8c       	jmp    0x8c894808
   5:	24 a0                	and    $0xa0,%al
   7:	00 00                	add    %al,(%rax)
   9:	00 48 81             	add    %cl,-0x7f(%rax)
   c:	c3                   	ret
   d:	e8 03 00 00 31       	call   0x31000015
  12:	ed                   	in     (%dx),%eax
  13:	4c 89 7c 24 38       	mov    %r15,0x38(%rsp)
  18:	48 89 5c 24 70       	mov    %rbx,0x70(%rsp)
  1d:	48 89 6c 24 28       	mov    %rbp,0x28(%rsp)
  22:	48 8b 84 24 08 01 00 	mov    0x108(%rsp),%rax
  29:	00
* 2a:	42 80 3c 28 00       	cmpb   $0x0,(%rax,%r13,1) <-- trapping instruction
  2f:	74 0d                	je     0x3e
  31:	48 8b bc 24 f8 00 00 	mov    0xf8(%rsp),%rdi
  38:	00
  39:	e8 46 73 20 fd       	call   0xfd207384
  3e:	4c                   	rex.WR
  3f:	89                   	.byte 0x89

Crashes (21):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/10/16 04:45 upstream 1f4a222b0e33 19568248 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root general protection fault in n_tty_receive_buf_common
2025/10/16 02:08 upstream 1f4a222b0e33 19568248 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce general protection fault in n_tty_receive_buf_common
2025/10/07 19:35 upstream 971199ad2a0f 8ef35d49 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root general protection fault in n_tty_receive_buf_common
2025/09/30 16:28 upstream 30d4efb2f5a5 65a0eece .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root general protection fault in n_tty_receive_buf_common
2025/05/08 22:36 upstream d76bb1ebb558 dbf35fa1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root general protection fault in n_tty_receive_buf_common
2025/02/03 10:13 upstream 69e858e0b8b2 568559e4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in n_tty_receive_buf_common
2025/01/28 01:53 upstream 9c5968db9e62 18070896 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root general protection fault in n_tty_receive_buf_common
2025/01/10 04:27 upstream 643e2e259c2b 67d7ec0a .config console log report info [disk image] [vmlinux] [kernel image] ci-qemu-gce-upstream-auto general protection fault in n_tty_receive_buf_common
2024/12/07 09:54 upstream b5f217084ab3 9ac0fdc6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce general protection fault in n_tty_receive_buf_common
2024/11/06 08:47 upstream 2e1b3cc9d7f7 3a465482 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in n_tty_receive_buf_common
2024/08/28 01:55 upstream 3ec3f5fc4a91 6c853ff9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root general protection fault in n_tty_receive_buf_common
2024/08/26 07:11 upstream 5be63fc19fca d7d32352 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root general protection fault in n_tty_receive_buf_common
2024/07/25 04:26 upstream 786c8248dbd3 b24754ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root general protection fault in n_tty_receive_buf_common
2024/06/12 13:14 upstream 2ef5971ff345 4d75f4f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in n_tty_receive_buf_common
2024/04/15 03:06 upstream fe46a7dd189e c8349e48 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root general protection fault in n_tty_receive_buf_common
2024/04/13 12:25 upstream fe46a7dd189e c8349e48 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root general protection fault in n_tty_receive_buf_common
2024/03/04 06:26 upstream 58c806d867bf 25905f5d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce general protection fault in n_tty_receive_buf_common
2024/11/03 11:53 upstream 3e5e6c9900c3 f00eed24 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 general protection fault in n_tty_receive_buf_common
2024/09/03 18:53 upstream 67784a74e258 512328ba .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 general protection fault in n_tty_receive_buf_common
2025/07/12 12:59 upstream 379f604cc3dc 3cda49cf .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream general protection fault in n_tty_receive_buf_common
2025/02/07 08:38 upstream bb066fe812d6 53657d1b .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream general protection fault in n_tty_receive_buf_common
* Struck through repros no longer work on HEAD.