general protection fault in ipvlan_hard_header

17 views
Skip to first unread message

syzbot

unread,
Sep 7, 2021, 8:41:29 AM9/7/21
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: b172b44fcb17 Linux 4.19.206
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=14602715300000
kernel config: https://syzkaller.appspot.com/x/.config?x=b9ba3521ce0be3cd
dashboard link: https://syzkaller.appspot.com/bug?extid=5807993d4dad21237fc5
compiler: gcc version 10.2.1 20210110 (Debian 10.2.1-6)

Unfortunately, I don't have any reproducer for this issue yet.

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+580799...@syzkaller.appspotmail.com

SQUASHFS error: Unable to read metadata cache entry [e000099]
SQUASHFS error: Unable to read inode 0xe0000000126
(syz-executor.3,25694,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "/dev/loop#" or missing value
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 25701 Comm: syz-executor.4 Not tainted 4.19.206-syzkaller #0
(syz-executor.3,25694,0):ocfs2_fill_super:1225 ERROR: status = -22
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:ipvlan_hard_header+0x114/0x150 drivers/net/ipvlan/ipvlan_main.c:448
Code: 5c 41 5d 41 5e 41 5f c3 45 31 e4 eb e4 e8 b4 d1 1e fd 48 8d bd 68 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 75 2d 4c 8b a5 68 03 00 00 e9 32 ff ff ff e8 75 a4 54
RSP: 0018:ffff888224966c30 EFLAGS: 00010207
RAX: dffffc0000000000 RBX: ffff88800e08d240 RCX: ffffc9000e76d000
RDX: 000000002000006c RSI: ffffffff8443c10c RDI: 0000000100000367
RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000048
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: ffff8880b4cd2b80 R14: ffff88800e08d3b8 R15: 0000000000000048
FS: 00007f4cb649f700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200092c0 CR3: 0000000233dc8000 CR4: 00000000001426e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
dev_hard_header include/linux/netdevice.h:2886 [inline]
neigh_resolve_output+0x4fa/0x910 net/core/neighbour.c:1369
neigh_output include/net/neighbour.h:501 [inline]
ip6_finish_output2+0x113d/0x2290 net/ipv6/ip6_output.c:120
ip6_finish_output+0x89b/0x10f0 net/ipv6/ip6_output.c:192
NF_HOOK_COND include/linux/netfilter.h:278 [inline]
ip6_output+0x205/0x770 net/ipv6/ip6_output.c:209
dst_output include/net/dst.h:455 [inline]
NF_HOOK include/linux/netfilter.h:289 [inline]
ndisc_send_skb+0xa24/0x1720 net/ipv6/ndisc.c:491
ndisc_send_ns+0x51d/0x840 net/ipv6/ndisc.c:633
ndisc_solicit+0x2cd/0x500 net/ipv6/ndisc.c:725
neigh_probe+0xcc/0x110 net/core/neighbour.c:916
__neigh_event_send+0x387/0xf70 net/core/neighbour.c:1074
neigh_event_send include/net/neighbour.h:436 [inline]
neigh_resolve_output+0x6d8/0x910 net/core/neighbour.c:1358
neigh_output include/net/neighbour.h:501 [inline]
ip6_finish_output2+0x113d/0x2290 net/ipv6/ip6_output.c:120
ip6_finish_output+0x89b/0x10f0 net/ipv6/ip6_output.c:192
NF_HOOK_COND include/linux/netfilter.h:278 [inline]
ip6_output+0x205/0x770 net/ipv6/ip6_output.c:209
dst_output include/net/dst.h:455 [inline]
ip6_local_out+0xaf/0x170 net/ipv6/output_core.c:160
ip6_send_skb+0xb3/0x300 net/ipv6/ip6_output.c:1741
ip6_push_pending_frames+0xbd/0xe0 net/ipv6/ip6_output.c:1761
rawv6_push_pending_frames net/ipv6/raw.c:618 [inline]
rawv6_sendmsg+0x2a81/0x36a0 net/ipv6/raw.c:959
inet_sendmsg+0x132/0x5a0 net/ipv4/af_inet.c:798
sock_sendmsg_nosec net/socket.c:651 [inline]
sock_sendmsg+0xc3/0x120 net/socket.c:661
___sys_sendmsg+0x3b3/0x8e0 net/socket.c:2227
__sys_sendmmsg+0x195/0x470 net/socket.c:2322
__do_sys_sendmmsg net/socket.c:2351 [inline]
__se_sys_sendmmsg net/socket.c:2348 [inline]
__x64_sys_sendmmsg+0x99/0x100 net/socket.c:2348
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x4665f9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f4cb649f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665f9
RDX: 03fffffffffffe9f RSI: 00000000200092c0 RDI: 0000000000000004
team0: No ports can be present during mode change
RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c038
R13: 00007fffaabac50f R14: 00007f4cb649f300 R15: 0000000000022000
Modules linked in:
---[ end trace 6f4f9a73a9f80081 ]---
RIP: 0010:ipvlan_hard_header+0x114/0x150 drivers/net/ipvlan/ipvlan_main.c:448
Code: 5c 41 5d 41 5e 41 5f c3 45 31 e4 eb e4 e8 b4 d1 1e fd 48 8d bd 68 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 75 2d 4c 8b a5 68 03 00 00 e9 32 ff ff ff e8 75 a4 54
RSP: 0018:ffff888224966c30 EFLAGS: 00010207
RAX: dffffc0000000000 RBX: ffff88800e08d240 RCX: ffffc9000e76d000
RDX: 000000002000006c RSI: ffffffff8443c10c RDI: 0000000100000367
RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000048
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'.
R13: ffff8880b4cd2b80 R14: ffff88800e08d3b8 R15: 0000000000000048
FS: 00007f4cb649f700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200092c0 CR3: 0000000233dc8000 CR4: 00000000001426e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 5c pop %rsp
1: 41 5d pop %r13
3: 41 5e pop %r14
5: 41 5f pop %r15
7: c3 retq
8: 45 31 e4 xor %r12d,%r12d
b: eb e4 jmp 0xfffffff1
d: e8 b4 d1 1e fd callq 0xfd1ed1c6
12: 48 8d bd 68 03 00 00 lea 0x368(%rbp),%rdi
19: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax
20: fc ff df
23: 48 89 fa mov %rdi,%rdx
26: 48 c1 ea 03 shr $0x3,%rdx
* 2a: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction
2e: 75 2d jne 0x5d
30: 4c 8b a5 68 03 00 00 mov 0x368(%rbp),%r12
37: e9 32 ff ff ff jmpq 0xffffff6e
3c: e8 .byte 0xe8
3d: 75 a4 jne 0xffffffe3
3f: 54 push %rsp


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Jan 5, 2022, 7:41:17 AM1/5/22
to syzkaller...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages