general protection fault in free_netdev

10 views
Skip to first unread message

syzbot

unread,
Jul 1, 2020, 6:57:22 AM7/1/20
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: 399849e4 Linux 4.19.131
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=1608625b100000
kernel config: https://syzkaller.appspot.com/x/.config?x=eada6d424d8bae1d
dashboard link: https://syzkaller.appspot.com/bug?extid=4fd6ac432e87be87c935
compiler: gcc (GCC) 10.1.0-syz 20200507

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+4fd6ac...@syzkaller.appspotmail.com

kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 8416 Comm: syz-executor.1 Not tainted 4.19.131-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:netif_free_tx_queues net/core/dev.c:8568 [inline]
RIP: 0010:free_netdev+0x41/0x410 net/core/dev.c:9227
Code: d2 be 0a 24 00 00 48 c7 c7 80 2d 2a 88 e8 57 aa 92 fb 48 8d bb 00 04 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 86 03 00 00 48 8b bb 00 04 00 00 e8 49 e0 d8 fb
RSP: 0018:ffff888062cf79b8 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000080 RSI: 00000000ffffffff RDI: 0000000000000400
RBP: ffff88809e075680 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000005 R11: 0000000000000000 R12: 00000000fffffff4
R13: ffff88809e075a90 R14: ffff88809ad0e000 R15: ffff88805ac09d08
FS: 00007fc750b3d700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000565245af3b08 CR3: 000000009dd59000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
ip6gre_init_net+0x54b/0x620 net/ipv6/ip6_gre.c:1613
ops_init+0xb3/0x410 net/core/net_namespace.c:129
setup_net+0x2c2/0x720 net/core/net_namespace.c:315
copy_net_ns+0x1f7/0x335 net/core/net_namespace.c:438
create_new_namespaces+0x3f6/0x7b0 kernel/nsproxy.c:107
copy_namespaces+0x325/0x3c0 kernel/nsproxy.c:165
copy_process.part.0+0x3e13/0x7f40 kernel/fork.c:1900
copy_process kernel/fork.c:1694 [inline]
_do_fork+0x22f/0xf30 kernel/fork.c:2207
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45cb29
Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fc750b3cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00000000004db560 RCX: 000000000045cb29
RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0c75e43cfae22dd4
RBP: 000000000078bf00 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
R13: 000000000000007c R14: 00000000004c34ba R15: 00007fc750b3d6d4
Modules linked in:
---[ end trace 7d944d426a972da8 ]---
RIP: 0010:netif_free_tx_queues net/core/dev.c:8568 [inline]
RIP: 0010:free_netdev+0x41/0x410 net/core/dev.c:9227
Code: d2 be 0a 24 00 00 48 c7 c7 80 2d 2a 88 e8 57 aa 92 fb 48 8d bb 00 04 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 86 03 00 00 48 8b bb 00 04 00 00 e8 49 e0 d8 fb
RSP: 0018:ffff888062cf79b8 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000080 RSI: 00000000ffffffff RDI: 0000000000000400
RBP: ffff88809e075680 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000005 R11: 0000000000000000 R12: 00000000fffffff4
R13: ffff88809e075a90 R14: ffff88809ad0e000 R15: ffff88805ac09d08
FS: 00007fc750b3d700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f9431f6a010 CR3: 000000009dd59000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Jul 3, 2020, 12:33:19 AM7/3/20
to syzkaller...@googlegroups.com
syzbot has found a reproducer for the following crash on:

HEAD commit: 399849e4 Linux 4.19.131
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=1250fc97100000
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=1000f8a3100000

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+4fd6ac...@syzkaller.appspotmail.com

IPVS: ftp: loaded support on port[0] = 21
IPVS: ftp: loaded support on port[0] = 21
IPVS: ftp: loaded support on port[0] = 21
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 32438 Comm: syz-executor.0 Not tainted 4.19.131-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:netif_free_tx_queues net/core/dev.c:8568 [inline]
RIP: 0010:free_netdev+0x41/0x410 net/core/dev.c:9227
Code: d2 be 0a 24 00 00 48 c7 c7 80 2d 2a 88 e8 57 aa 92 fb 48 8d bb 00 04 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 86 03 00 00 48 8b bb 00 04 00 00 e8 49 e0 d8 fb
RSP: 0018:ffff88805ee67c28 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000080 RSI: 00000000ffffffff RDI: 0000000000000400
RBP: ffff8880a1267280 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000005 R11: 0000000000000000 R12: 00000000fffffff4
R13: ffff8880a1267690 R14: ffff888091e07240 R15: ffff88806061a9c8
FS: 00007f5baccdc700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555e5a9a68d8 CR3: 00000000a03dd000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
ip6gre_init_net+0x54b/0x620 net/ipv6/ip6_gre.c:1613
ops_init+0xb3/0x410 net/core/net_namespace.c:129
setup_net+0x2c2/0x720 net/core/net_namespace.c:315
copy_net_ns+0x1f7/0x335 net/core/net_namespace.c:438
create_new_namespaces+0x3f6/0x7b0 kernel/nsproxy.c:107
unshare_nsproxy_namespaces+0xbd/0x1f0 kernel/nsproxy.c:206
ksys_unshare+0x36c/0x9a0 kernel/fork.c:2530
__do_sys_unshare kernel/fork.c:2598 [inline]
__se_sys_unshare kernel/fork.c:2596 [inline]
__x64_sys_unshare+0x2d/0x40 kernel/fork.c:2596
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45cb29
Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007f5baccdbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 000000000050ba20 RCX: 000000000045cb29
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000
RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
R13: 0000000000000c8f R14: 00000000004ceebe R15: 00007f5baccdc6d4
Modules linked in:
---[ end trace d1c594e68ab16a23 ]---
RIP: 0010:netif_free_tx_queues net/core/dev.c:8568 [inline]
RIP: 0010:free_netdev+0x41/0x410 net/core/dev.c:9227
Code: d2 be 0a 24 00 00 48 c7 c7 80 2d 2a 88 e8 57 aa 92 fb 48 8d bb 00 04 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 86 03 00 00 48 8b bb 00 04 00 00 e8 49 e0 d8 fb
RSP: 0018:ffff88805ee67c28 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000080 RSI: 00000000ffffffff RDI: 0000000000000400
RBP: ffff8880a1267280 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000005 R11: 0000000000000000 R12: 00000000fffffff4
IPVS: ftp: loaded support on port[0] = 21
R13: ffff8880a1267690 R14: ffff888091e07240 R15: ffff88806061a9c8
FS: 00007f5baccdc700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000b90004 CR3: 00000000a03dd000 CR4: 00000000001406f0

syzbot

unread,
Jul 5, 2020, 12:04:21 PM7/5/20
to syzkaller...@googlegroups.com
syzbot has found a reproducer for the following crash on:

HEAD commit: 399849e4 Linux 4.19.131
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=12320a5b100000
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=14f581e3100000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=1585f66d100000

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+4fd6ac...@syzkaller.appspotmail.com

IPVS: ftp: loaded support on port[0] = 21
IPVS: ftp: loaded support on port[0] = 21
IPVS: ftp: loaded support on port[0] = 21
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 8729 Comm: syz-executor631 Not tainted 4.19.131-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:netif_free_tx_queues net/core/dev.c:8568 [inline]
RIP: 0010:free_netdev+0x41/0x410 net/core/dev.c:9227
Code: d2 be 0a 24 00 00 48 c7 c7 80 2d 2a 88 e8 57 aa 92 fb 48 8d bb 00 04 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 86 03 00 00 48 8b bb 00 04 00 00 e8 49 e0 d8 fb
RSP: 0018:ffff88809376fc28 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000080 RSI: 00000000ffffffff RDI: 0000000000000400
RBP: ffff88809e144d00 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000005 R11: 0000000000000000 R12: 00000000fffffff4
R13: ffff88809e145110 R14: ffff888094382dc0 R15: ffff888093b0b248
FS: 00007fe3debb7700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe3debb6db8 CR3: 00000000a2cbd000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
ip6gre_init_net+0x54b/0x620 net/ipv6/ip6_gre.c:1613
ops_init+0xb3/0x410 net/core/net_namespace.c:129
setup_net+0x2c2/0x720 net/core/net_namespace.c:315
copy_net_ns+0x1f7/0x335 net/core/net_namespace.c:438
create_new_namespaces+0x3f6/0x7b0 kernel/nsproxy.c:107
unshare_nsproxy_namespaces+0xbd/0x1f0 kernel/nsproxy.c:206
ksys_unshare+0x36c/0x9a0 kernel/fork.c:2530
__do_sys_unshare kernel/fork.c:2598 [inline]
__se_sys_unshare kernel/fork.c:2596 [inline]
__x64_sys_unshare+0x2d/0x40 kernel/fork.c:2596
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x446d69
Code: e8 dc e6 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b 06 fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fe3debb6cf8 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 00000000006dcc38 RCX: 0000000000446d69
RDX: 0000000000446d69 RSI: 0000000000000000 RDI: 0000000040040000
RBP: 00000000006dcc30 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006dcc3c
R13: 00007ffd9168a67f R14: 00007fe3debb79c0 R15: 0000000000000001
Modules linked in:
IPVS: ftp: loaded support on port[0] = 21
IPVS: ftp: loaded support on port[0] = 21
---[ end trace 9c073ebdf09cf198 ]---
RIP: 0010:netif_free_tx_queues net/core/dev.c:8568 [inline]
RIP: 0010:free_netdev+0x41/0x410 net/core/dev.c:9227
Code: d2 be 0a 24 00 00 48 c7 c7 80 2d 2a 88 e8 57 aa 92 fb 48 8d bb 00 04 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 86 03 00 00 48 8b bb 00 04 00 00 e8 49 e0 d8 fb
IPVS: ftp: loaded support on port[0] = 21
RSP: 0018:ffff88809376fc28 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000080 RSI: 00000000ffffffff RDI: 0000000000000400
IPVS: ftp: loaded support on port[0] = 21
RBP: ffff88809e144d00 R08: 0000000000000001 R09: 0000000000000000
IPVS: ftp: loaded support on port[0] = 21
R10: 0000000000000005 R11: 0000000000000000 R12: 00000000fffffff4
R13: ffff88809e145110 R14: ffff888094382dc0 R15: ffff888093b0b248
FS: 00007fe3debb7700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
IPVS: ftp: loaded support on port[0] = 21
CR2: 0000000000000000 CR3: 00000000a2cbd000 CR4: 00000000001406f0

syzbot

unread,
Aug 30, 2020, 2:49:09 PM8/30/20
to syzkaller...@googlegroups.com
syzbot suspects this issue was fixed by commit:

commit abcf95e000b4d469baa33df3565d4a235ecd164a
Author: Wei Yongjun <weiyo...@huawei.com>
Date: Mon Jul 13 15:59:50 2020 +0000

ip6_gre: fix null-ptr-deref in ip6gre_init_net()

bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=1115dad5900000
start commit: 20b3a3df Linux 4.19.134
git tree: linux-4.19.y
kernel config: https://syzkaller.appspot.com/x/.config?x=7c76c572c403b9ac
dashboard link: https://syzkaller.appspot.com/bug?extid=4fd6ac432e87be87c935
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=11e07390900000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=10174b08900000

If the result looks correct, please mark the issue as fixed by replying with:

#syz fix: ip6_gre: fix null-ptr-deref in ip6gre_init_net()

For information about bisection process see: https://goo.gl/tpsmEJ#bisection
Reply all
Reply to author
Forward
0 new messages