general protection fault in get_unique_tuple

13 views
Skip to first unread message

syzbot

unread,
Jan 17, 2020, 2:37:10 PM1/17/20
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: db5b9190 Linux 4.19.96
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=15ee2b3ee00000
kernel config: https://syzkaller.appspot.com/x/.config?x=7a24894346f71303
dashboard link: https://syzkaller.appspot.com/bug?extid=ea457f8ee3588ebd4fd0
compiler: gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+ea457f...@syzkaller.appspotmail.com

general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 18677 Comm: syz-executor.3 Not tainted 4.19.96-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
RIP: 0010:__read_once_size include/linux/compiler.h:193 [inline]
RIP: 0010:__nf_nat_l4proto_find net/netfilter/nf_nat_core.c:73 [inline]
RIP: 0010:get_unique_tuple+0x27a/0x1d40 net/netfilter/nf_nat_core.c:336
binder: 18682:18684 unknown command 184549376
Code: c1 e9 03 80 3c 11 00 0f 85 cb 17 00 00 4a 8b 14 e5 40 df ce 89 4c 8d
24 c2 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 0f
85 97 17 00 00 49 8b 04 24 48 89 85 08 ff ff ff e8
RSP: 0018:ffff888040e5ed70 EFLAGS: 00010246
binder: 18682:18684 ioctl c0306201 20000080 returned -22
RAX: dffffc0000000000 RBX: ffff888040e5ef28 RCX: 1ffffffff139dc0d
RDX: 0000000000000000 RSI: ffffffff85fd93a7 RDI: ffffffff89cee068
RBP: ffff888040e5eec8 R08: ffff888095bee1c0 R09: ffffed1015d24733
R10: ffffed1015d24732 R11: ffff8880ae923993 R12: 0000000000000000
R13: 0000000000000001 R14: ffff888086d52940 R15: ffff888040e5ef78
FS: 00007f7f73867700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f650f1da028 CR3: 000000009f427000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
nf_nat_setup_info+0x212/0x9e0 net/netfilter/nf_nat_core.c:431
binder: 18688:18689 unknown command -357829025
binder: 18688:18689 ioctl c0306201 20000080 returned -22
__nf_nat_alloc_null_binding+0x164/0x1d0 net/netfilter/nf_nat_core.c:490
nfnetlink_parse_nat_setup+0x3ca/0x450 net/netfilter/nf_nat_core.c:882
ctnetlink_parse_nat_setup+0xc5/0x660
net/netfilter/nf_conntrack_netlink.c:1518
ctnetlink_setup_nat net/netfilter/nf_conntrack_netlink.c:1588 [inline]
ctnetlink_create_conntrack+0x4ea/0x1300
net/netfilter/nf_conntrack_netlink.c:1981
ctnetlink_new_conntrack+0x527/0xe50
net/netfilter/nf_conntrack_netlink.c:2111
nfnetlink_rcv_msg+0xd0d/0xfcf net/netfilter/nfnetlink.c:228
netlink_rcv_skb+0x17d/0x460 net/netlink/af_netlink.c:2454
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1543
sclass=netlink_route_socket pig=18693 comm=syz-executor.1
nfnetlink_rcv+0x1c0/0x460 net/netfilter/nfnetlink.c:560
netlink_unicast_kernel net/netlink/af_netlink.c:1317 [inline]
netlink_unicast+0x53a/0x730 net/netlink/af_netlink.c:1343
netlink_sendmsg+0x8ae/0xd70 net/netlink/af_netlink.c:1908
sock_sendmsg_nosec net/socket.c:622 [inline]
sock_sendmsg+0xd7/0x130 net/socket.c:632
___sys_sendmsg+0x803/0x920 net/socket.c:2115
__sys_sendmsg+0x105/0x1d0 net/socket.c:2153
__do_sys_sendmsg net/socket.c:2162 [inline]
__se_sys_sendmsg net/socket.c:2160 [inline]
__x64_sys_sendmsg+0x78/0xb0 net/socket.c:2160
do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45aff9
Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7
48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff
ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007f7f73866c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f7f738676d4 RCX: 000000000045aff9
RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
R13: 00000000000008bd R14: 00000000004c9d78 R15: 000000000075bf2c
Modules linked in:
---[ end trace 9e13ec521b979845 ]---
RIP: 0010:__read_once_size include/linux/compiler.h:193 [inline]
RIP: 0010:__nf_nat_l4proto_find net/netfilter/nf_nat_core.c:73 [inline]
RIP: 0010:get_unique_tuple+0x27a/0x1d40 net/netfilter/nf_nat_core.c:336
Code: c1 e9 03 80 3c 11 00 0f 85 cb 17 00 00 4a 8b 14 e5 40 df ce 89 4c 8d
24 c2 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 0f
85 97 17 00 00 49 8b 04 24 48 89 85 08 ff ff ff e8
RSP: 0018:ffff888040e5ed70 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff888040e5ef28 RCX: 1ffffffff139dc0d
RDX: 0000000000000000 RSI: ffffffff85fd93a7 RDI: ffffffff89cee068
RBP: ffff888040e5eec8 R08: ffff888095bee1c0 R09: ffffed1015d24733
R10: ffffed1015d24732 R11: ffff8880ae923993 R12: 0000000000000000
R13: 0000000000000001 R14: ffff888086d52940 R15: ffff888040e5ef78
FS: 00007f7f73867700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000075c000 CR3: 000000009f427000 CR4: 00000000001406f0
DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Jan 17, 2020, 2:55:09 PM1/17/20
to syzkaller...@googlegroups.com
syzbot has found a reproducer for the following crash on:

HEAD commit: db5b9190 Linux 4.19.96
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=10df95e1e00000
kernel config: https://syzkaller.appspot.com/x/.config?x=7a24894346f71303
dashboard link: https://syzkaller.appspot.com/bug?extid=ea457f8ee3588ebd4fd0
compiler: gcc (GCC) 9.0.0 20181231 (experimental)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=12ffc235e00000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=121a9b3ee00000

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+ea457f...@syzkaller.appspotmail.com

audit: type=1400 audit(1579290687.965:36): avc: denied { map } for
pid=8143 comm="syz-executor329" path="/root/syz-executor329460063"
dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023
tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
kasan: CONFIG_KASAN_INLINE enabled
audit: type=1400 audit(1579290687.965:37): avc: denied { create } for
pid=8143 comm="syz-executor329"
scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023
tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023
tclass=netlink_netfilter_socket permissive=1
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 8143 Comm: syz-executor329 Not tainted 4.19.96-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
RIP: 0010:__read_once_size include/linux/compiler.h:193 [inline]
RIP: 0010:__nf_nat_l4proto_find net/netfilter/nf_nat_core.c:73 [inline]
RIP: 0010:get_unique_tuple+0x27a/0x1d40 net/netfilter/nf_nat_core.c:336
Code: c1 e9 03 80 3c 11 00 0f 85 cb 17 00 00 4a 8b 14 e5 40 df ce 89 4c 8d
24 c2 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 0f
85 97 17 00 00 49 8b 04 24 48 89 85 08 ff ff ff e8
RSP: 0018:ffff88809f99ed70 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff88809f99ef28 RCX: 1ffffffff139dc0d
RDX: 0000000000000000 RSI: ffffffff85fd93a7 RDI: ffffffff89cee068
RBP: ffff88809f99eec8 R08: ffff888094b94700 R09: ffffed1015d04733
R10: ffffed1015d04732 R11: ffff8880ae823993 R12: 0000000000000000
R13: 0000000000000001 R14: ffff88809ae3f380 R15: ffff88809f99ef78
FS: 00000000010a3880(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200002c6 CR3: 000000009af38000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
audit: type=1400 audit(1579290687.965:38): avc: denied { write } for
pid=8143 comm="syz-executor329"
scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023
tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023
tclass=netlink_netfilter_socket permissive=1
nf_nat_setup_info+0x212/0x9e0 net/netfilter/nf_nat_core.c:431
__nf_nat_alloc_null_binding+0x164/0x1d0 net/netfilter/nf_nat_core.c:490
nfnetlink_parse_nat_setup+0x3ca/0x450 net/netfilter/nf_nat_core.c:882
ctnetlink_parse_nat_setup+0xc5/0x660
net/netfilter/nf_conntrack_netlink.c:1518
ctnetlink_setup_nat net/netfilter/nf_conntrack_netlink.c:1588 [inline]
ctnetlink_create_conntrack+0x4ea/0x1300
net/netfilter/nf_conntrack_netlink.c:1981
ctnetlink_new_conntrack+0x527/0xe50
net/netfilter/nf_conntrack_netlink.c:2111
nfnetlink_rcv_msg+0xd0d/0xfcf net/netfilter/nfnetlink.c:228
netlink_rcv_skb+0x17d/0x460 net/netlink/af_netlink.c:2454
nfnetlink_rcv+0x1c0/0x460 net/netfilter/nfnetlink.c:560
netlink_unicast_kernel net/netlink/af_netlink.c:1317 [inline]
netlink_unicast+0x53a/0x730 net/netlink/af_netlink.c:1343
netlink_sendmsg+0x8ae/0xd70 net/netlink/af_netlink.c:1908
sock_sendmsg_nosec net/socket.c:622 [inline]
sock_sendmsg+0xd7/0x130 net/socket.c:632
___sys_sendmsg+0x803/0x920 net/socket.c:2115
__sys_sendmsg+0x105/0x1d0 net/socket.c:2153
__do_sys_sendmsg net/socket.c:2162 [inline]
__se_sys_sendmsg net/socket.c:2160 [inline]
__x64_sys_sendmsg+0x78/0xb0 net/socket.c:2160
do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x440599
Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7
48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff
ff 0f 83 fb 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffd5258cf28 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 0000000000440599
RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003
RBP: 00000000006ca018 R08: 0000000000000000 R09: 00000000004002c8
R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000401e20
R13: 0000000000401eb0 R14: 0000000000000000 R15: 0000000000000000
Modules linked in:
---[ end trace 9e3e9bec6421706e ]---
RIP: 0010:__read_once_size include/linux/compiler.h:193 [inline]
RIP: 0010:__nf_nat_l4proto_find net/netfilter/nf_nat_core.c:73 [inline]
RIP: 0010:get_unique_tuple+0x27a/0x1d40 net/netfilter/nf_nat_core.c:336
Code: c1 e9 03 80 3c 11 00 0f 85 cb 17 00 00 4a 8b 14 e5 40 df ce 89 4c 8d
24 c2 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 0f
85 97 17 00 00 49 8b 04 24 48 89 85 08 ff ff ff e8
RSP: 0018:ffff88809f99ed70 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff88809f99ef28 RCX: 1ffffffff139dc0d
RDX: 0000000000000000 RSI: ffffffff85fd93a7 RDI: ffffffff89cee068
RBP: ffff88809f99eec8 R08: ffff888094b94700 R09: ffffed1015d04733
R10: ffffed1015d04732 R11: ffff8880ae823993 R12: 0000000000000000
R13: 0000000000000001 R14: ffff88809ae3f380 R15: ffff88809f99ef78
FS: 00000000010a3880(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200002c6 CR3: 000000009af38000 CR4: 00000000001406f0

syzbot

unread,
Jan 19, 2020, 7:16:10 PM1/19/20
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: c1141b3a Linux 4.14.166
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=17241495e00000
kernel config: https://syzkaller.appspot.com/x/.config?x=a99b4b74c4c01851
dashboard link: https://syzkaller.appspot.com/bug?extid=50f6e139c84dede73ce4
compiler: gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+50f6e1...@syzkaller.appspotmail.com

kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 0 PID: 11208 Comm: syz-executor.3 Not tainted 4.14.166-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff8880a45de5c0 task.stack: ffff888051f00000
RIP: 0010:__read_once_size include/linux/compiler.h:183 [inline]
RIP: 0010:__nf_nat_l4proto_find net/netfilter/nf_nat_core.c:54 [inline]
RIP: 0010:get_unique_tuple+0x230/0x19e0 net/netfilter/nf_nat_core.c:313
RSP: 0018:ffff888051f06ea0 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff888051f07028 RCX: 1ffffffff1167624
RDX: 0000000000000000 RSI: ffffffff87f872a0 RDI: ffffffff88b3b120
RBP: ffff888051f06fc8 R08: 0000000000000000 R09: ffff8880a45deeb0
R10: ffff8880a45dee90 R11: ffff8880a45de5c0 R12: 0000000000000000
R13: 0000000000000070 R14: ffff888051f0704e R15: ffff888051f07078
FS: 00007f6de93ba700(0000) GS:ffff8880aec00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffd3c133f88 CR3: 0000000091615000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
nf_nat_setup_info+0x1bd/0x7f0 net/netfilter/nf_nat_core.c:407
__nf_nat_alloc_null_binding+0x13f/0x180 net/netfilter/nf_nat_core.c:466
nfnetlink_parse_nat_setup+0x34a/0x3b0 net/netfilter/nf_nat_core.c:782
ctnetlink_parse_nat_setup+0x76/0x4a0 net/netfilter/nf_conntrack_netlink.c:1421
ctnetlink_setup_nat net/netfilter/nf_conntrack_netlink.c:1491 [inline]
ctnetlink_create_conntrack+0x468/0x10c0 net/netfilter/nf_conntrack_netlink.c:1840
ctnetlink_new_conntrack+0x4af/0xcc0 net/netfilter/nf_conntrack_netlink.c:1964
nfnetlink_rcv_msg+0xa08/0xc00 net/netfilter/nfnetlink.c:214
netlink_rcv_skb+0x14f/0x3c0 net/netlink/af_netlink.c:2432
nfnetlink_rcv+0x1ab/0x1650 net/netfilter/nfnetlink.c:515
netlink_unicast_kernel net/netlink/af_netlink.c:1286 [inline]
netlink_unicast+0x44d/0x650 net/netlink/af_netlink.c:1312
netlink_sendmsg+0x7c4/0xc60 net/netlink/af_netlink.c:1877
sock_sendmsg_nosec net/socket.c:646 [inline]
sock_sendmsg+0xce/0x110 net/socket.c:656
___sys_sendmsg+0x70a/0x840 net/socket.c:2062
__sys_sendmsg+0xb9/0x140 net/socket.c:2096
SYSC_sendmsg net/socket.c:2107 [inline]
SyS_sendmsg+0x2d/0x50 net/socket.c:2103
do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45b349
RSP: 002b:00007f6de93b9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f6de93ba6d4 RCX: 000000000045b349
RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
R13: 00000000000008d3 R14: 00000000004ca28a R15: 000000000075bf2c
Code: 48 c1 e9 03 80 3c 11 00 0f 85 91 14 00 00 4a 8b 14 e5 a0 ad b3 88 4c 8d 24 c2 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 0f 85 81 14 00 00 49 8b 04 24 48 89 85 30 ff ff ff
RIP: __read_once_size include/linux/compiler.h:183 [inline] RSP: ffff888051f06ea0
RIP: __nf_nat_l4proto_find net/netfilter/nf_nat_core.c:54 [inline] RSP: ffff888051f06ea0
RIP: get_unique_tuple+0x230/0x19e0 net/netfilter/nf_nat_core.c:313 RSP: ffff888051f06ea0
---[ end trace 37ba3293073f1f98 ]---

syzbot

unread,
Jan 19, 2020, 7:35:09 PM1/19/20
to syzkaller...@googlegroups.com
syzbot has found a reproducer for the following crash on:

HEAD commit: c1141b3a Linux 4.14.166
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=15a41495e00000
kernel config: https://syzkaller.appspot.com/x/.config?x=a99b4b74c4c01851
dashboard link: https://syzkaller.appspot.com/bug?extid=50f6e139c84dede73ce4
compiler: gcc (GCC) 9.0.0 20181231 (experimental)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=143fc8bee00000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=1251c135e00000

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+50f6e1...@syzkaller.appspotmail.com

audit: type=1400 audit(1579480319.733:36): avc: denied { map } for pid=7379 comm="syz-executor404" path="/root/syz-executor404510055" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
kasan: CONFIG_KASAN_INLINE enabled
audit: type=1400 audit(1579480319.733:37): avc: denied { create } for pid=7379 comm="syz-executor404" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
kasan: GPF could be caused by NULL-ptr deref or user memory access
audit: type=1400 audit(1579480319.733:38): avc: denied { write } for pid=7379 comm="syz-executor404" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
general protection fault: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 0 PID: 7379 Comm: syz-executor404 Not tainted 4.14.166-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff8880862a4440 task.stack: ffff888080618000
RIP: 0010:__read_once_size include/linux/compiler.h:183 [inline]
RIP: 0010:__nf_nat_l4proto_find net/netfilter/nf_nat_core.c:54 [inline]
RIP: 0010:get_unique_tuple+0x230/0x19e0 net/netfilter/nf_nat_core.c:313
RSP: 0018:ffff88808061eea0 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff88808061f028 RCX: 1ffffffff1167624
RDX: 0000000000000000 RSI: ffffffff87f872a0 RDI: ffffffff88b3b120
RBP: ffff88808061efc8 R08: 0000000000000000 R09: ffff8880862a4d30
R10: ffff8880862a4d10 R11: ffff8880862a4440 R12: 0000000000000000
R13: 0000000000000070 R14: ffff88808061f04e R15: ffff88808061f078
FS: 0000000001303880(0000) GS:ffff8880aec00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000280 CR3: 000000009d7b8000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
nf_nat_setup_info+0x1bd/0x7f0 net/netfilter/nf_nat_core.c:407
__nf_nat_alloc_null_binding+0x13f/0x180 net/netfilter/nf_nat_core.c:466
nfnetlink_parse_nat_setup+0x34a/0x3b0 net/netfilter/nf_nat_core.c:782
ctnetlink_parse_nat_setup+0x76/0x4a0 net/netfilter/nf_conntrack_netlink.c:1421
ctnetlink_setup_nat net/netfilter/nf_conntrack_netlink.c:1491 [inline]
ctnetlink_create_conntrack+0x468/0x10c0 net/netfilter/nf_conntrack_netlink.c:1840
ctnetlink_new_conntrack+0x4af/0xcc0 net/netfilter/nf_conntrack_netlink.c:1964
nfnetlink_rcv_msg+0xa08/0xc00 net/netfilter/nfnetlink.c:214
netlink_rcv_skb+0x14f/0x3c0 net/netlink/af_netlink.c:2432
nfnetlink_rcv+0x1ab/0x1650 net/netfilter/nfnetlink.c:515
netlink_unicast_kernel net/netlink/af_netlink.c:1286 [inline]
netlink_unicast+0x44d/0x650 net/netlink/af_netlink.c:1312
netlink_sendmsg+0x7c4/0xc60 net/netlink/af_netlink.c:1877
sock_sendmsg_nosec net/socket.c:646 [inline]
sock_sendmsg+0xce/0x110 net/socket.c:656
___sys_sendmsg+0x70a/0x840 net/socket.c:2062
__sys_sendmsg+0xb9/0x140 net/socket.c:2096
SYSC_sendmsg net/socket.c:2107 [inline]
SyS_sendmsg+0x2d/0x50 net/socket.c:2103
do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x4401a9
RSP: 002b:00007fff853f0f38 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 00000000004401a9
RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003
RBP: 00000000006ca018 R08: 0000000000000000 R09: 00000000004002c8
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000401a30
R13: 0000000000401ac0 R14: 0000000000000000 R15: 0000000000000000
Code: 48 c1 e9 03 80 3c 11 00 0f 85 91 14 00 00 4a 8b 14 e5 a0 ad b3 88 4c 8d 24 c2 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 0f 85 81 14 00 00 49 8b 04 24 48 89 85 30 ff ff ff
RIP: __read_once_size include/linux/compiler.h:183 [inline] RSP: ffff88808061eea0
RIP: __nf_nat_l4proto_find net/netfilter/nf_nat_core.c:54 [inline] RSP: ffff88808061eea0
RIP: get_unique_tuple+0x230/0x19e0 net/netfilter/nf_nat_core.c:313 RSP: ffff88808061eea0
---[ end trace cdba84fba277e7a2 ]---

syzbot

unread,
Nov 4, 2020, 7:54:05 AM11/4/20
to syzkaller...@googlegroups.com
syzbot suspects this issue was fixed by commit:

commit 289fe546ea16c2dcb57c5198c5a7b7387604530e
Author: Will McVicker <willmc...@google.com>
Date: Mon Aug 24 19:38:32 2020 +0000

netfilter: ctnetlink: add a range check for l3/l4 protonum

bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=15dc6852500000
start commit: 1bab61d3 Linux 4.19.124
git tree: linux-4.19.y
kernel config: https://syzkaller.appspot.com/x/.config?x=e95e3ce854b90b1b
dashboard link: https://syzkaller.appspot.com/bug?extid=ea457f8ee3588ebd4fd0
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=131e48d2100000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=1495535e100000

If the result looks correct, please mark the issue as fixed by replying with:

#syz fix: netfilter: ctnetlink: add a range check for l3/l4 protonum

For information about bisection process see: https://goo.gl/tpsmEJ#bisection
Reply all
Reply to author
Forward
0 new messages