Hello,
syzbot found the following issue on:
HEAD commit: 3f8a27f9e27b Linux 4.19.211
git tree: linux-4.19.y
console output:
https://syzkaller.appspot.com/x/log.txt?x=15982a10080000
kernel config:
https://syzkaller.appspot.com/x/.config?x=9b9277b418617afe
dashboard link:
https://syzkaller.appspot.com/bug?extid=0c692ad3fdee109cfb82
compiler: gcc version 10.2.1 20210110 (Debian 10.2.1-6)
Unfortunately, I don't have any reproducer for this issue yet.
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by:
syzbot+0c692a...@syzkaller.appspotmail.com
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
MTD: Attempt to mount non-MTD device "/dev/loop4"
general protection fault: 0000 [#1] PREEMPT SMP KASAN
romfs: Mounting image 'rom 5f663c08' through the block layer
CPU: 1 PID: 8849 Comm: kworker/u4:5 Not tainted 4.19.211-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: netns cleanup_net
RIP: 0010:flush_gro_hash net/core/dev.c:6241 [inline]
RIP: 0010:netif_napi_del+0x1fe/0x380 net/core/dev.c:6256
Code: 28 00 0f 85 10 01 00 00 49 39 ec 48 8b 5d 00 75 05 eb 2d 48 89 c3 e8 c1 8d ec fa 48 89 ef e8 a9 bc fa ff 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 d6 00 00 00 49 39 dc 48 8b 03 48 89 dd 75 d3
IPVS: ftp: loaded support on port[0] = 21
RSP: 0018:ffff88809bcef9b8 EFLAGS: 00010203
RAX: 0b1ffffd1ffff952 RBX: 58ffffe8ffffca97 RCX: ffffffff8670b76b
RDX: 0000000000000000 RSI: ffffffff8675f7b7 RDI: 0000000000000001
RBP: ffffe8ffffca9759 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: ffffe8ffffca9758
R13: dffffc0000000000 R14: 0000000000000000 R15: ffffe8ffffca9718
FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4b048a5fc8 CR3: 000000008fa89000 CR4: 00000000003406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'.
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
gro_cells_destroy net/core/gro_cells.c:102 [inline]
gro_cells_destroy+0x10b/0x340 net/core/gro_cells.c:92
ip_tunnel_dev_free+0x15/0x60 net/ipv4/ip_tunnel.c:975
netdev_run_todo+0x6d2/0xab0 net/core/dev.c:9000
ip_tunnel_delete_nets+0x3d8/0x580 net/ipv4/ip_tunnel.c:1089
ops_exit_list+0xf9/0x150 net/core/net_namespace.c:156
cleanup_net+0x3b4/0x8b0 net/core/net_namespace.c:554
process_one_work+0x864/0x1570 kernel/workqueue.c:2153
worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
kthread+0x33f/0x460 kernel/kthread.c:259
ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
Modules linked in:
gfs2: fsid=syz:syz: Trying to join cluster "lock_nolock", "syz:syz"
gfs2: fsid=syz:syz: Now mounting FS...
gfs2: fsid=syz:syz.0: journal 0 mapped with 1 extents
gfs2: fsid=syz:syz.0: jid=0, already locked for use
gfs2: fsid=syz:syz.0: jid=0: Looking at journal...
gfs2: fsid=syz:syz.0: jid=0: Done
gfs2: fsid=syz:syz.0: first mount done, others may mount
gfs2: fsid=syz:syz.0: can't start logd thread: -4
netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'.
gfs2: fsid=syz:syz.0: can't make FS RW: -4
---[ end trace 647e026c6230955e ]---
RIP: 0010:flush_gro_hash net/core/dev.c:6241 [inline]
RIP: 0010:netif_napi_del+0x1fe/0x380 net/core/dev.c:6256
Code: 28 00 0f 85 10 01 00 00 49 39 ec 48 8b 5d 00 75 05 eb 2d 48 89 c3 e8 c1 8d ec fa 48 89 ef e8 a9 bc fa ff 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 d6 00 00 00 49 39 dc 48 8b 03 48 89 dd 75 d3
RSP: 0018:ffff88809bcef9b8 EFLAGS: 00010203
RAX: 0b1ffffd1ffff952 RBX: 58ffffe8ffffca97 RCX: ffffffff8670b76b
RDX: 0000000000000000 RSI: ffffffff8675f7b7 RDI: 0000000000000001
RBP: ffffe8ffffca9759 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: ffffe8ffffca9758
R13: dffffc0000000000 R14: 0000000000000000 R15: ffffe8ffffca9718
FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c00ee7e408 CR3: 00000000b3e61000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 28 00 sub %al,(%rax)
2: 0f 85 10 01 00 00 jne 0x118
8: 49 39 ec cmp %rbp,%r12
b: 48 8b 5d 00 mov 0x0(%rbp),%rbx
f: 75 05 jne 0x16
11: eb 2d jmp 0x40
13: 48 89 c3 mov %rax,%rbx
16: e8 c1 8d ec fa callq 0xfaec8ddc
1b: 48 89 ef mov %rbp,%rdi
1e: e8 a9 bc fa ff callq 0xfffabccc
23: 48 89 d8 mov %rbx,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) <-- trapping instruction
2f: 0f 85 d6 00 00 00 jne 0x10b
35: 49 39 dc cmp %rbx,%r12
38: 48 8b 03 mov (%rbx),%rax
3b: 48 89 dd mov %rbx,%rbp
3e: 75 d3 jne 0x13
---
This report is generated by a bot. It may contain errors.
See
https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at
syzk...@googlegroups.com.
syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.