syzbot


general protection fault in ip6_pol_route (3)

Status: upstream: reported syz repro on 2025/02/04 14:07
Subsystems: bcachefs net
[Documentation on labels]
Reported-by: syzbot+3201be560ebfa39bc6bd@syzkaller.appspotmail.com
First crash: 296d, last: 37d
Cause bisection: failed (error log, bisect log)
  
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [net?] general protection fault in ip6_pol_route (3) 3 (7) 2025/02/07 12:24
Similar bugs (5)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream KASAN: use-after-free Read in ip6_pol_route (2) net 19 C done unreliable 9 1174d 1610d 0/29 auto-obsoleted due to no activity on 2022/09/19 15:39
upstream general protection fault in ip6_pol_route (2) net 8 15 387d 394d 0/29 auto-obsoleted due to no activity on 2024/08/28 04:33
upstream general protection fault in ip6_pol_route net 8 73 395d 433d 26/29 fixed on 2024/06/18 11:11
linux-5.15 KASAN: use-after-free Read in ip6_pol_route 19 1 478d 478d 0/3 auto-obsoleted due to no activity on 2024/07/04 16:14
upstream Internal error in ip6_pol_route net 2 2 615d 639d 0/29 auto-obsoleted due to no activity on 2024/02/18 23:43
Last patch testing requests (14)
Created Duration User Patch Repo Result
2025/06/25 17:35 19m retest repro upstream OK log
2025/06/25 11:59 19m retest repro upstream OK log
2025/06/25 11:59 19m retest repro upstream OK log
2025/06/25 09:09 19m retest repro upstream OK log
2025/06/25 09:09 19m retest repro upstream OK log
2025/06/25 09:09 19m retest repro upstream OK log
2025/06/25 09:09 19m retest repro upstream OK log
2025/06/25 09:09 19m retest repro upstream OK log
2025/04/06 23:39 15m retest repro upstream report log
2025/04/06 03:03 16m retest repro upstream report log
2025/02/07 12:10 12m hdanton@sina.com patch upstream error
2025/02/06 11:24 0m hdanton@sina.com patch upstream error
2025/02/05 11:34 12m hdanton@sina.com patch upstream error
2024/10/17 12:22 20m edumazet@google.com upstream report log

Sample crash report:
Oops: general protection fault, probably for non-canonical address 0xf81ffbf1100c1d95: 0000 [#1] SMP KASAN PTI
KASAN: maybe wild-memory-access in range [0xc0ffff888060eca8-0xc0ffff888060ecaf]
CPU: 1 UID: 0 PID: 5898 Comm: kworker/1:5 Not tainted 6.15.0-rc7-syzkaller-00152-gd0c22de9995b #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Workqueue: mld mld_ifc_work
RIP: 0010:read_pnet include/net/net_namespace.h:409 [inline]
RIP: 0010:dev_net include/linux/netdevice.h:2708 [inline]
RIP: 0010:rt6_is_valid net/ipv6/route.c:1435 [inline]
RIP: 0010:rt6_get_pcpu_route net/ipv6/route.c:1445 [inline]
RIP: 0010:ip6_pol_route+0x497/0x1180 net/ipv6/route.c:2299
Code: e0 48 c1 e8 03 42 80 3c 30 00 74 08 4c 89 e7 e8 4f e6 18 f8 41 bf 08 01 00 00 4d 03 3c 24 e8 30 ae 48 01 4c 89 f8 48 c1 e8 03 <42> 80 3c 30 00 74 08 4c 89 ff e8 2a e6 18 f8 41 be 0c 0f 00 00 4d
RSP: 0018:ffffc90000a08540 EFLAGS: 00010a06
RAX: 181ffff1100c1d95 RBX: 00000000ff000000 RCX: ffff88807cf41e00
RDX: ffff88807cf41e00 RSI: 00000000ff000000 RDI: 0000000000000000
RBP: ffffc90000a08650 R08: 0000000000000000 R09: ffff888068250280
R10: dffffc0000000000 R11: fffffbfff1efc16f R12: ffff888033c48501
R13: ffffffff8a06dcf2 R14: dffffc0000000000 R15: c0ffff888060eca8
FS:  0000000000000000(0000) GS:ffff8881261f6000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fdf35e2ade5 CR3: 000000007ed1c000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <IRQ>
 pol_lookup_func include/net/ip6_fib.h:616 [inline]
 fib6_rule_lookup+0x52f/0x6f0 net/ipv6/fib6_rules.c:120
 ip6_route_input_lookup net/ipv6/route.c:2335 [inline]
 ip6_route_input+0x6ce/0xa50 net/ipv6/route.c:2631
 ip6_rcv_finish+0x141/0x2d0 net/ipv6/ip6_input.c:77
 NF_HOOK+0x30c/0x3a0 include/linux/netfilter.h:314
 __netif_receive_skb_one_core net/core/dev.c:5887 [inline]
 __netif_receive_skb+0xd3/0x380 net/core/dev.c:6000
 process_backlog+0x60e/0x14f0 net/core/dev.c:6352
 __napi_poll+0xc7/0x480 net/core/dev.c:7324
 napi_poll net/core/dev.c:7388 [inline]
 net_rx_action+0x6ea/0xdf0 net/core/dev.c:7510
 handle_softirqs+0x283/0x870 kernel/softirq.c:579
 do_softirq+0xec/0x180 kernel/softirq.c:480
 </IRQ>
 <TASK>
 __local_bh_enable_ip+0x17d/0x1c0 kernel/softirq.c:407
 local_bh_enable include/linux/bottom_half.h:33 [inline]
 rcu_read_unlock_bh include/linux/rcupdate.h:910 [inline]
 __dev_queue_xmit+0x1cd7/0x3a70 net/core/dev.c:4656
 dev_queue_xmit include/linux/netdevice.h:3350 [inline]
 neigh_hh_output include/net/neighbour.h:523 [inline]
 neigh_output include/net/neighbour.h:537 [inline]
 ip6_finish_output2+0x11bc/0x16a0 net/ipv6/ip6_output.c:141
 __ip6_finish_output net/ipv6/ip6_output.c:-1 [inline]
 ip6_finish_output+0x234/0x7d0 net/ipv6/ip6_output.c:226
 NF_HOOK+0x9e/0x380 include/linux/netfilter.h:314
 mld_sendpack+0x800/0xd80 net/ipv6/mcast.c:1868
 mld_send_cr net/ipv6/mcast.c:2169 [inline]
 mld_ifc_work+0x835/0xde0 net/ipv6/mcast.c:2702
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xade/0x17a0 kernel/workqueue.c:3319
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400
 kthread+0x711/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:153
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:read_pnet include/net/net_namespace.h:409 [inline]
RIP: 0010:dev_net include/linux/netdevice.h:2708 [inline]
RIP: 0010:rt6_is_valid net/ipv6/route.c:1435 [inline]
RIP: 0010:rt6_get_pcpu_route net/ipv6/route.c:1445 [inline]
RIP: 0010:ip6_pol_route+0x497/0x1180 net/ipv6/route.c:2299
Code: e0 48 c1 e8 03 42 80 3c 30 00 74 08 4c 89 e7 e8 4f e6 18 f8 41 bf 08 01 00 00 4d 03 3c 24 e8 30 ae 48 01 4c 89 f8 48 c1 e8 03 <42> 80 3c 30 00 74 08 4c 89 ff e8 2a e6 18 f8 41 be 0c 0f 00 00 4d
RSP: 0018:ffffc90000a08540 EFLAGS: 00010a06
RAX: 181ffff1100c1d95 RBX: 00000000ff000000 RCX: ffff88807cf41e00
RDX: ffff88807cf41e00 RSI: 00000000ff000000 RDI: 0000000000000000
RBP: ffffc90000a08650 R08: 0000000000000000 R09: ffff888068250280
R10: dffffc0000000000 R11: fffffbfff1efc16f R12: ffff888033c48501
R13: ffffffff8a06dcf2 R14: dffffc0000000000 R15: c0ffff888060eca8
FS:  0000000000000000(0000) GS:ffff8881261f6000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fdf35e2ade5 CR3: 000000007ed1c000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	e0 48                	loopne 0x4a
   2:	c1 e8 03             	shr    $0x3,%eax
   5:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
   a:	74 08                	je     0x14
   c:	4c 89 e7             	mov    %r12,%rdi
   f:	e8 4f e6 18 f8       	call   0xf818e663
  14:	41 bf 08 01 00 00    	mov    $0x108,%r15d
  1a:	4d 03 3c 24          	add    (%r12),%r15
  1e:	e8 30 ae 48 01       	call   0x148ae53
  23:	4c 89 f8             	mov    %r15,%rax
  26:	48 c1 e8 03          	shr    $0x3,%rax
* 2a:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1) <-- trapping instruction
  2f:	74 08                	je     0x39
  31:	4c 89 ff             	mov    %r15,%rdi
  34:	e8 2a e6 18 f8       	call   0xf818e663
  39:	41 be 0c 0f 00 00    	mov    $0xf0c,%r14d
  3f:	4d                   	rex.WRB

Crashes (25):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/05/25 15:06 upstream d0c22de9995b ed351ea7 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in ip6_pol_route
2025/04/22 23:45 upstream bc3372351d0c 53a8b9bd .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in ip6_pol_route
2025/04/17 02:34 upstream c62f4b82d571 a95239b1 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in ip6_pol_route
2025/04/16 16:10 upstream 1a1d569a75f3 a95239b1 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in ip6_pol_route
2025/03/07 00:12 upstream 848e07631744 831e3629 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in ip6_pol_route
2025/03/03 23:58 upstream 99fa936e8e4f c3901742 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in ip6_pol_route
2025/03/03 10:04 upstream 7eb172143d55 c3901742 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in ip6_pol_route
2025/02/20 22:29 upstream e9a8cac0bf89 0808a665 .config console log report syz / log [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs general protection fault in ip6_pol_route
2025/02/13 11:24 upstream 4dc1d1bec898 b27c2402 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in ip6_pol_route
2025/01/20 11:55 upstream ffd294d346d1 f2cb035c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in ip6_pol_route
2024/12/24 14:41 upstream f07044dd0df0 444551c4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in ip6_pol_route
2024/11/26 22:40 upstream 7eef7e306d3c e9a9a9f2 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in ip6_pol_route
2024/10/24 07:07 upstream c2ee9f594da8 15fa2979 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in ip6_pol_route
2024/10/22 22:52 upstream c2ee9f594da8 15fa2979 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs general protection fault in ip6_pol_route
2025/03/23 00:59 upstream 183601b78a9b c6512ef7 .config console log report syz / log [disk image (non-bootable)] [vmlinux] [kernel image] [mounted in repro] ci-snapshot-upstream-root general protection fault in ip6_pol_route
2025/03/21 17:24 upstream b3ee1e460951 62330552 .config console log report syz / log [disk image (non-bootable)] [vmlinux] [kernel image] [mounted in repro #1] [mounted in repro #2 (clean fs)] [mounted in repro #3 (clean fs)] ci-snapshot-upstream-root general protection fault in ip6_pol_route
2025/03/21 10:11 upstream b3ee1e460951 62330552 .config console log report syz / log [disk image (non-bootable)] [vmlinux] [kernel image] [mounted in repro] ci-snapshot-upstream-root general protection fault in ip6_pol_route
2025/03/13 11:40 upstream b7f94fcf5546 44be8b44 .config console log report syz / log [disk image (non-bootable)] [vmlinux] [kernel image] [mounted in repro] ci-snapshot-upstream-root general protection fault in ip6_pol_route
2025/03/12 09:51 upstream 0b46b049d6ec ee70e6db .config console log report syz / log [disk image (non-bootable)] [vmlinux] [kernel image] [mounted in repro] ci-snapshot-upstream-root general protection fault in ip6_pol_route
2024/11/13 17:15 upstream f1b785f4c787 4dfba277 .config console log report syz / log [disk image (non-bootable)] [vmlinux] [kernel image] [mounted in repro] ci-snapshot-upstream-root general protection fault in ip6_pol_route
2024/09/25 04:13 upstream 68e5c7d4cefb 349a68c4 .config console log report syz / log [disk image (non-bootable)] [vmlinux] [kernel image] [mounted in repro] ci-snapshot-upstream-root general protection fault in ip6_pol_route
2025/06/11 08:31 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci d7fa1af5b33e 5d7e17ca .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: unable to handle kernel paging request in ip6_pol_route
2025/05/22 22:21 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci d7fa1af5b33e 0919b50b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: unable to handle kernel paging request in ip6_pol_route
2025/04/20 06:29 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci c72692105976 2a20f901 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: unable to handle kernel paging request in ip6_pol_route
2024/11/28 02:42 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 7b1d1d4cfac0 5df23865 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: unable to handle kernel paging request in ip6_pol_route
* Struck through repros no longer work on HEAD.