syzbot


WARNING: refcount bug in packet_release

Status: closed as invalid on 2018/04/10 15:18
Subsystems: net
[Documentation on labels]
Reported-by: syzbot+69d0327a1a8b4227fcfc@syzkaller.appspotmail.com
First crash: 2495d, last: 2495d

Sample crash report:
IPVS: set_ctl: invalid protocol: 59 224.0.0.2:20000 lc
------------[ cut here ]------------
IPVS: set_ctl: invalid protocol: 59 224.0.0.2:20000 lc
refcount_t: underflow; use-after-free.
WARNING: CPU: 0 PID: 23104 at lib/refcount.c:187 refcount_sub_and_test+0x167/0x1b0 lib/refcount.c:187
IPVS: ftp: loaded support on port[0] = 21
Kernel panic - not syncing: panic_on_warn set ...

CPU: 0 PID: 23104 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #287
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x194/0x24d lib/dump_stack.c:53
 panic+0x1e4/0x41c kernel/panic.c:183
IPVS: ftp: loaded support on port[0] = 21
 __warn+0x1dc/0x200 kernel/panic.c:547
 report_bug+0x1f4/0x2b0 lib/bug.c:186
 fixup_bug.part.10+0x37/0x80 arch/x86/kernel/traps.c:178
 fixup_bug arch/x86/kernel/traps.c:247 [inline]
 do_error_trap+0x2d7/0x3e0 arch/x86/kernel/traps.c:296
x_tables: eb_tables: IDLETIMER.0 target: invalid size 40 (kernel) != (user) 5
 do_invalid_op+0x1b/0x20 arch/x86/kernel/traps.c:315
 invalid_op+0x1b/0x40 arch/x86/entry/entry_64.S:986
RIP: 0010:refcount_sub_and_test+0x167/0x1b0 lib/refcount.c:187
RSP: 0018:ffff8801cf5d7a38 EFLAGS: 00010286
RAX: dffffc0000000008 RBX: 0000000000000000 RCX: ffffffff815b1cde
RDX: 00000000000022af RSI: ffffc90001ec0000 RDI: 0000000000000216
RBP: ffff8801cf5d7ac8 R08: 0000000000000000 R09: 1ffff10039ebaecd
R10: ffff8801cf5d7948 R11: ffffffff88582f38 R12: 1ffff10039ebaf48
R13: 00000000ffffffff R14: 0000000000000001 R15: ffff8801ab0f3400
 refcount_dec_and_test+0x1a/0x20 lib/refcount.c:212
 sock_put include/net/sock.h:1659 [inline]
 packet_release+0x9ac/0xce0 net/packet/af_packet.c:3042
IPVS: ftp: loaded support on port[0] = 21
 sock_release+0x8d/0x1e0 net/socket.c:594
x_tables: eb_tables: IDLETIMER.0 target: invalid size 40 (kernel) != (user) 5
 SYSC_socketpair net/socket.c:1422 [inline]
 SyS_socketpair+0x4b4/0x6f0 net/socket.c:1366
 do_syscall_64+0x281/0x940 arch/x86/entry/common.c:287
kernel msg: ebtables bug: please report to author: entries_size too small
x_tables: eb_tables: mac match: used from hooks BROUTING, but only valid from PREROUTING/INPUT/FORWARD
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x454e79
RSP: 002b:00007f6e1b331c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035
RAX: ffffffffffffffda RBX: 00007f6e1b3326d4 RCX: 0000000000454e79
RDX: 0000000000000300 RSI: 0000000000000003 RDI: 0000000000000011
RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000020000100 R11: 0000000000000246 R12: 00000000ffffffff
R13: 0000000000000643 R14: 00000000006fb6e8 R15: 0000000000000000
Dumping ftrace buffer:
   (ftrace buffer empty)
Kernel Offset: disabled
Rebooting in 86400 seconds..

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2018/03/31 00:59 net-next-old 6f14f49ce5eb 8fbce0e4 .config console log report ci-upstream-net-kasan-gce
* Struck through repros no longer work on HEAD.