general protection fault in hsr_netdev_notify

8 views
Skip to first unread message

syzbot

unread,
Jan 16, 2020, 1:51:12 AM1/16/20
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: c04fc6fa Linux 4.14.165
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=1124fc35e00000
kernel config: https://syzkaller.appspot.com/x/.config?x=d36f53294bbc71f0
dashboard link: https://syzkaller.appspot.com/bug?extid=d7aafaf3717aff7dcf60
compiler: gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+d7aafa...@syzkaller.appspotmail.com

bond0 (unregistering): Releasing backup interface bond_slave_1
device bond_slave_1 left promiscuous mode
bond0 (unregistering): Releasing backup interface bond_slave_0
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 0 PID: 2836 Comm: kworker/u4:5 Not tainted 4.14.165-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Workqueue: netns cleanup_net
task: ffff88809eaba280 task.stack: ffff88809e9f8000
RIP: 0010:hsr_netdev_notify+0x465/0x8f0 net/hsr/hsr_main.c:64
RSP: 0018:ffff88809e9ff680 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff88809eabab00
RDX: 0000000000000002 RSI: ffffffff888ef760 RDI: ffff8880a48fdba0
RBP: ffff88809e9ff6c0 R08: ffff88809eaba280 R09: 0000000000000004
R10: 0000000000000000 R11: ffff88809eaba280 R12: ffff8880595fed90
R13: ffff888061159140 R14: dffffc0000000000 R15: ffff8880595fed80
FS: 0000000000000000(0000) GS:ffff8880aec00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff04a1b6000 CR3: 00000000a6818000 CR4: 00000000001426f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
notifier_call_chain+0x111/0x1b0 kernel/notifier.c:93
__raw_notifier_call_chain kernel/notifier.c:394 [inline]
raw_notifier_call_chain+0x2e/0x40 kernel/notifier.c:401
call_netdevice_notifiers_info+0x56/0x70 net/core/dev.c:1671
call_netdevice_notifiers+0x61/0x80 net/core/dev.c:1687
__bond_release_one+0xfb9/0x14c0 drivers/net/bonding/bond_main.c:1937
bond_slave_netdev_event drivers/net/bonding/bond_main.c:3093 [inline]
bond_netdev_event+0x7ad/0x8e0 drivers/net/bonding/bond_main.c:3191
notifier_call_chain+0x111/0x1b0 kernel/notifier.c:93
__raw_notifier_call_chain kernel/notifier.c:394 [inline]
raw_notifier_call_chain+0x2e/0x40 kernel/notifier.c:401
call_netdevice_notifiers_info+0x56/0x70 net/core/dev.c:1671
call_netdevice_notifiers net/core/dev.c:1687 [inline]
rollback_registered_many+0x70d/0xb60 net/core/dev.c:7214
unregister_netdevice_many.part.0+0x1b/0x1e0 net/core/dev.c:8268
unregister_netdevice_many net/core/dev.c:8267 [inline]
default_device_exit_batch+0x31e/0x3d0 net/core/dev.c:8729
ops_exit_list.isra.0+0xfc/0x150 net/core/net_namespace.c:145
cleanup_net+0x3ba/0x870 net/core/net_namespace.c:484
process_one_work+0x863/0x1600 kernel/workqueue.c:2114
worker_thread+0x5d9/0x1050 kernel/workqueue.c:2248
kthread+0x319/0x430 kernel/kthread.c:232
ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404
Code: 03 0f 8e 7e 03 00 00 83 7b 20 04 75 b6 e8 74 ae fb fa 48 8d 43 10 48
89 c2 48 89 45 c0 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00
0f 85 37 04 00 00 48 b8 00 00 00 00 00 fc ff df 4c
RIP: hsr_netdev_notify+0x465/0x8f0 net/hsr/hsr_main.c:64 RSP:
ffff88809e9ff680
---[ end trace 9a8b6c448334ed30 ]---


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Jan 24, 2020, 5:32:09 AM1/24/20
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: d183c8e2 Linux 4.19.98
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=17fa3335e00000
kernel config: https://syzkaller.appspot.com/x/.config?x=270360e13b071d92
dashboard link: https://syzkaller.appspot.com/bug?extid=afccaef692966acb0102
compiler: gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+afccae...@syzkaller.appspotmail.com

bond0 (unregistering): Releasing backup interface bond_slave_1
device bond_slave_1 left promiscuous mode
bond0 (unregistering): Releasing backup interface bond_slave_0
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 26 Comm: kworker/u4:2 Not tainted 4.19.98-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: netns cleanup_net
RIP: 0010:hsr_netdev_notify+0x525/0xa40 net/hsr/hsr_main.c:64
Code: e6 e8 bf 0f 20 fa 41 83 fc 04 75 a5 e8 34 0e 20 fa 48 8d 43 10 48 89 c2 48 89 45 b8 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 8e 04 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b
RSP: 0018:ffff8880a99af5a0 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff874b0731
RDX: 0000000000000002 RSI: ffffffff874b073c RDI: 0000000000000005
RBP: ffff8880a99af5e8 R08: ffff8880a99a0700 R09: fffffbfff1341ea5
R10: fffffbfff1341ea4 R11: ffffffff89a0f527 R12: 0000000000000001
R13: ffff88808a3c9dc0 R14: dffffc0000000000 R15: ffff888048d4b290
FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c4446bb000 CR3: 0000000081e06000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
notifier_call_chain+0xc2/0x230 kernel/notifier.c:93
__raw_notifier_call_chain kernel/notifier.c:394 [inline]
raw_notifier_call_chain+0x2e/0x40 kernel/notifier.c:401
call_netdevice_notifiers_info+0x3f/0x90 net/core/dev.c:1748
call_netdevice_notifiers+0x79/0xa0 net/core/dev.c:1766
__bond_release_one+0x11af/0x16a0 drivers/net/bonding/bond_main.c:1956
bond_slave_netdev_event drivers/net/bonding/bond_main.c:3113 [inline]
bond_netdev_event+0x9b5/0xb30 drivers/net/bonding/bond_main.c:3225
notifier_call_chain+0xc2/0x230 kernel/notifier.c:93
__raw_notifier_call_chain kernel/notifier.c:394 [inline]
raw_notifier_call_chain+0x2e/0x40 kernel/notifier.c:401
call_netdevice_notifiers_info+0x3f/0x90 net/core/dev.c:1748
call_netdevice_notifiers net/core/dev.c:1766 [inline]
rollback_registered_many+0x894/0xda0 net/core/dev.c:8200
unregister_netdevice_many.part.0+0x1b/0x1f0 net/core/dev.c:9312
unregister_netdevice_many net/core/dev.c:9311 [inline]
default_device_exit_batch+0x34e/0x410 net/core/dev.c:9783
ops_exit_list.isra.0+0xfc/0x150 net/core/net_namespace.c:156
cleanup_net+0x404/0x960 net/core/net_namespace.c:553
process_one_work+0x989/0x1750 kernel/workqueue.c:2153
worker_thread+0x98/0xe40 kernel/workqueue.c:2296
kthread+0x354/0x420 kernel/kthread.c:246
ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
Modules linked in:
---[ end trace 8da7e0944ca65894 ]---
RIP: 0010:hsr_netdev_notify+0x525/0xa40 net/hsr/hsr_main.c:64
Code: e6 e8 bf 0f 20 fa 41 83 fc 04 75 a5 e8 34 0e 20 fa 48 8d 43 10 48 89 c2 48 89 45 b8 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 8e 04 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b
RSP: 0018:ffff8880a99af5a0 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff874b0731
RDX: 0000000000000002 RSI: ffffffff874b073c RDI: 0000000000000005
RBP: ffff8880a99af5e8 R08: ffff8880a99a0700 R09: fffffbfff1341ea5
R10: fffffbfff1341ea4 R11: ffffffff89a0f527 R12: 0000000000000001
R13: ffff88808a3c9dc0 R14: dffffc0000000000 R15: ffff888048d4b290
FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c4446bb000 CR3: 00000000a9406000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400


syzbot

unread,
Sep 12, 2020, 5:35:09 PM9/12/20
to syzkaller...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.

syzbot

unread,
Feb 14, 2021, 11:37:17 PM2/14/21
to syzkaller...@googlegroups.com
syzbot has found a reproducer for the following issue on:

HEAD commit: 811218ec Linux 4.19.172
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=135e6df4d00000
kernel config: https://syzkaller.appspot.com/x/.config?x=c1cb1d27398c8808
dashboard link: https://syzkaller.appspot.com/bug?extid=afccaef692966acb0102
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=10140d02d00000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=16bbf498d00000

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+afccae...@syzkaller.appspotmail.com

bond0 (unregistering): Releasing backup interface bond_slave_1
device bond_slave_1 left promiscuous mode
bond0 (unregistering): Releasing backup interface bond_slave_0
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 384 Comm: kworker/u4:4 Not tainted 4.19.172-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: netns cleanup_net
RIP: 0010:hsr_netdev_notify+0x37f/0x9f0 syzkaller/managers/linux-4-19/kernel/net/hsr/hsr_main.c:65
Code: e8 06 f8 7a f9 41 83 ff 04 75 a4 e8 8b f6 7a f9 48 8d 45 10 48 89 c2 48 89 44 24 10 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 fe 05 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b
RSP: 0018:ffff8880b4c5f540 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: ffff888094d59140 RCX: ffffffff87e7632a
RDX: 0000000000000002 RSI: ffffffff87e76335 RDI: 0000000000000005
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000004
R10: 0000000000000005 R11: 0000000000000000 R12: ffff8880a33df590
R13: dffffc0000000000 R14: dffffc0000000000 R15: 0000000000000001
FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f50e879b000 CR3: 00000000a176c000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
notifier_call_chain+0xc0/0x230 syzkaller/managers/linux-4-19/kernel/kernel/notifier.c:93
call_netdevice_notifiers_info syzkaller/managers/linux-4-19/kernel/net/core/dev.c:1744 [inline]
call_netdevice_notifiers+0x99/0x110 syzkaller/managers/linux-4-19/kernel/net/core/dev.c:1762
__bond_release_one+0x11af/0x1630 syzkaller/managers/linux-4-19/kernel/drivers/net/bonding/bond_main.c:1982
bond_slave_netdev_event syzkaller/managers/linux-4-19/kernel/drivers/net/bonding/bond_main.c:3154 [inline]
bond_netdev_event+0xb61/0xe50 syzkaller/managers/linux-4-19/kernel/drivers/net/bonding/bond_main.c:3266
notifier_call_chain+0xc0/0x230 syzkaller/managers/linux-4-19/kernel/kernel/notifier.c:93
call_netdevice_notifiers syzkaller/managers/linux-4-19/kernel/net/core/dev.c:1762 [inline]
rollback_registered_many+0x83e/0xe70 syzkaller/managers/linux-4-19/kernel/net/core/dev.c:8188
unregister_netdevice_many.part.0+0x1a/0x300 syzkaller/managers/linux-4-19/kernel/net/core/dev.c:9316
unregister_netdevice_many syzkaller/managers/linux-4-19/kernel/net/core/dev.c:9315 [inline]
default_device_exit_batch+0x2fa/0x3c0 syzkaller/managers/linux-4-19/kernel/net/core/dev.c:9787
ops_exit_list+0xf9/0x150 syzkaller/managers/linux-4-19/kernel/net/core/net_namespace.c:156
cleanup_net+0x3b4/0x8b0 syzkaller/managers/linux-4-19/kernel/net/core/net_namespace.c:553
process_one_work+0x864/0x1570 syzkaller/managers/linux-4-19/kernel/kernel/workqueue.c:2155
worker_thread+0x64c/0x1130 syzkaller/managers/linux-4-19/kernel/kernel/workqueue.c:2298
kthread+0x33f/0x460 syzkaller/managers/linux-4-19/kernel/kernel/kthread.c:259
ret_from_fork+0x24/0x30 syzkaller/managers/linux-4-19/kernel/arch/x86/entry/entry_64.S:415
Modules linked in:
---[ end trace 181810338eedf0c2 ]---
RIP: 0010:hsr_netdev_notify+0x37f/0x9f0 syzkaller/managers/linux-4-19/kernel/net/hsr/hsr_main.c:65
Code: e8 06 f8 7a f9 41 83 ff 04 75 a4 e8 8b f6 7a f9 48 8d 45 10 48 89 c2 48 89 44 24 10 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 fe 05 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b
RSP: 0018:ffff8880b4c5f540 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: ffff888094d59140 RCX: ffffffff87e7632a
RDX: 0000000000000002 RSI: ffffffff87e76335 RDI: 0000000000000005
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000004
R10: 0000000000000005 R11: 0000000000000000 R12: ffff8880a33df590
R13: dffffc0000000000 R14: dffffc0000000000 R15: 0000000000000001
FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f50e879b000 CR3: 00000000a176c000 CR4: 00000000001406e0
Reply all
Reply to author
Forward
0 new messages