Hello,
syzbot found the following crash on:
HEAD commit: 9257d67bbd0d split tests into multiple make targets
git tree: openbsd
console output:
https://syzkaller.appspot.com/x/log.txt?x=17882943400000
kernel config:
https://syzkaller.appspot.com/x/.config?x=906264fb5874384d
dashboard link:
https://syzkaller.appspot.com/bug?extid=0361ed02deed123667cb
compiler:
Unfortunately, I don't have any reproducer for this crash yet.
IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by:
syzbot+0361ed...@syzkaller.appspotmail.com
panic: malformed IPv4 option passed to ip_optcopy
Stopped at db_enter+0xa: popq %rbp
TID PID UID PRFLAGS PFLAGS CPU COMMAND
*198503 95839 0 0 0x4000000 0 syz-executor0
db_enter() at db_enter+0xa sys/arch/amd64/amd64/db_interface.c:399
panic() at panic+0x147 sys/kern/subr_prf.c:208
ip_optcopy(ffffff002c650c00,ffff800000171290) at ip_optcopy
ip_output(ffffff0036f13e38,ffffff002c650c00,ffffff002665407c,22,1366,2edbb98aab4e2460)
at
ip_output+0xbd5 sys/netinet/ip_output.c:501
rip_output(0,9,ffffff003c249ae0,ffffff003ebc0400) at rip_output+0x187
sys/netinet/raw_ip.c:293
rip_usrreq(b52,ffffff003c249ae0,ffffff003ebc0400,ffffff002c650c00,0,2edbb98aab4e2460)
at
rip_usrreq+0x3ed sys/netinet/raw_ip.c:472
sosend(ffffff003033c010,ffff800014ad7c38,1366,ffff800014ad7c38,ffff800014ad7c58,2edbb98aab4e2460)
at
sosend+0x462 sys/kern/uipc_socket.c:513
sendit(ffff800014ad7c38,ffff800014af9f80,ffff800014af9e90,ffff800014af9f98,6)
at
sendit+0x3f3 sys/kern/uipc_syscalls.c:662
sys_sendmsg(ffff800014afa020,ffff800014ad7c38,ffff800014a16300) at
sys_sendmsg+0x155 sys/kern/uipc_syscalls.c:567
syscall(0) at syscall+0x3e4
Xsyscall(6,0,ffffffffffffffd3,0,3,58c8bfe010) at Xsyscall+0x128
end of kernel
end trace frame: 0x5b01f04b40, count: 4
https://www.openbsd.org/ddb.html describes the minimum info required in bug
reports. Insufficient info makes it difficult to find and fix bugs.
ddb>
ddb> set $lines = 0
ddb> show panic
malformed IPv4 option passed to ip_optcopy
ddb> trace
db_enter() at db_enter+0xa sys/arch/amd64/amd64/db_interface.c:399
panic() at panic+0x147 sys/kern/subr_prf.c:208
ip_optcopy(ffffff002c650c00,ffff800000171290) at ip_optcopy
ip_output(ffffff0036f13e38,ffffff002c650c00,ffffff002665407c,22,1366,2edbb98aab4e2460)
at
ip_output+0xbd5 sys/netinet/ip_output.c:501
rip_output(0,9,ffffff003c249ae0,ffffff003ebc0400) at rip_output+0x187
sys/netinet/raw_ip.c:293
rip_usrreq(b52,ffffff003c249ae0,ffffff003ebc0400,ffffff002c650c00,0,2edbb98aab4e2460)
at
rip_usrreq+0x3ed sys/netinet/raw_ip.c:472
sosend(ffffff003033c010,ffff800014ad7c38,1366,ffff800014ad7c38,ffff800014ad7c58,2edbb98aab4e2460)
at
sosend+0x462 sys/kern/uipc_socket.c:513
sendit(ffff800014ad7c38,ffff800014af9f80,ffff800014af9e90,ffff800014af9f98,6)
at
sendit+0x3f3 sys/kern/uipc_syscalls.c:662
sys_sendmsg(ffff800014afa020,ffff800014ad7c38,ffff800014a16300) at
sys_sendmsg+0x155 sys/kern/uipc_syscalls.c:567
syscall(0) at syscall+0x3e4
Xsyscall(6,0,ffffffffffffffd3,0,3,58c8bfe010) at Xsyscall+0x128
end of kernel
end trace frame: 0x5b01f04b40, count: -11
ddb> show registers
rdi 0xffffffff81e39300 kprintf_mutex
rsi 0xffffffff81804899 db_enter+0x9
rbp 0xffff800014af9a50
rbx 0xffff800014af9af0
rdx 0xffff8000014cc000
rcx 0x181d __ALIGN_SIZE+0x81d
rax 0xffff8000014cc000
r8 0xffff800014af9a20
r9 0
r10 0x549ae4707eb168ee
r11 0xffffffff81782140 x86_bus_space_io_read_1
r12 0x3000000008
r13 0xffff800014af9a60
r14 0x100
r15 0xffffffff81c1e7e5 apollo_udma100_tim+0xc2a1
rip 0xffffffff8180489a db_enter+0xa
cs 0x8
rflags 0x206
rsp 0xffff800014af9a50
ss 0x10
db_enter+0xa: popq %rbp
ddb> show proc
PROC (syz-executor0) pid=198503 stat=onproc
flags process=0 proc=4000000<THREAD>
pri=82, usrpri=82, nice=20
forw=0xffffffffffffffff, list=0xffff800014ad6270,0xffffffff81ebb720
process=0xffff800014a16300 user=0xffff800014af5000,
vmspace=0xffffff003f12bd68
estcpu=36, cpticks=0, pctcpu=0.0
user=0, sys=0, intr=0
ddb> ps
PID TID PPID UID S FLAGS WAIT COMMAND
95839 198222 53460 0 2 0 syz-executor0
*95839 198503 53460 0 7 0x4000000 syz-executor0
60515 56902 21320 0 3 0x80 nanosleep syz-executor1
60515 137267 21320 0 3 0x4000080 fifor syz-executor1
60515 318807 21320 0 3 0x4000080 fsleep syz-executor1
6619 458131 1 0 3 0x100083 ttyin getty
95640 451836 0 0 3 0x14200 bored sosplice
53460 363435 63439 0 3 0x82 nanosleep syz-executor0
21320 409260 63439 0 3 0x82 nanosleep syz-executor1
63439 189682 51201 0 3 0x82 thrsleep syz-fuzzer
63439 56557 51201 0 3 0x4000082 thrsleep syz-fuzzer
63439 375081 51201 0 3 0x4000082 thrsleep syz-fuzzer
63439 473130 51201 0 3 0x4000082 thrsleep syz-fuzzer
63439 150235 51201 0 3 0x4000082 kqread syz-fuzzer
63439 449211 51201 0 3 0x4000082 thrsleep syz-fuzzer
63439 137638 51201 0 3 0x4000082 thrsleep syz-fuzzer
51201 19715 35897 0 3 0x10008a pause ksh
35897 119779 2816 0 3 0x92 select sshd
2816 192089 1 0 3 0x80 select sshd
51839 101917 68736 73 3 0x100090 kqread syslogd
68736 381567 1 0 3 0x100082 netio syslogd
19809 469682 1 77 3 0x100090 poll dhclient
11850 436572 1 0 3 0x80 poll dhclient
6937 78176 0 0 2 0x14200 zerothread
64113 431846 0 0 3 0x14200 aiodoned aiodoned
49527 180082 0 0 3 0x14200 syncer update
83896 368155 0 0 3 0x14200 cleaner cleaner
2669 8447 0 0 3 0x14200 reaper reaper
23194 185749 0 0 3 0x14200 pgdaemon pagedaemon
75824 490998 0 0 3 0x14200 bored crynlk
40718 293597 0 0 3 0x14200 bored crypto
37015 317352 0 0 3 0x40014200 acpi0 acpi0
89061 36230 0 0 3 0x14200 bored softnet
73639 347540 0 0 3 0x14200 bored systqmp
78922 148920 0 0 3 0x14200 bored systq
5154 15530 0 0 3 0x40014200 bored softclock
53121 125888 0 0 3 0x40014200 idle0
1 277488 0 0 3 0x82 wait init
0 0 -1 0 3 0x10200 scheduler swapper
---
This bug is generated by a bot. It may contain errors.
See
https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at
syzk...@googlegroups.com.
syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#bug-status-tracking for how to communicate with
syzbot.