syzbot


BUG: unable to handle kernel NULL pointer dereference in ipv6_rcv (3)

Status: closed as invalid on 2024/06/27 12:46
Subsystems: net
[Documentation on labels]
First crash: 307d, last: 304d
Similar bugs (4)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream BUG: unable to handle kernel NULL pointer dereference in ipv6_rcv net 1 2249d 2249d 0/28 closed as invalid on 2019/03/10 18:51
upstream BUG: unable to handle kernel NULL pointer dereference in ipv6_rcv (2) net 1 2137d 2137d 0/28 closed as invalid on 2019/06/14 19:45
android-5-10 BUG: unable to handle kernel NULL pointer dereference in ipv6_rcv syz 1 1088d 1088d 0/2 auto-closed as invalid on 2022/08/30 17:09
upstream general protection fault in ipv6_rcv net 4 2152d 2216d 0/28 auto-closed as invalid on 2019/10/25 08:42

Sample crash report:
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 0 P4D 0 
Oops: Oops: 0010 [#1] PREEMPT SMP KASAN NOPTI
CPU: 2 PID: 40 Comm: kworker/u32:2 Not tainted 6.10.0-rc1-syzkaller-00027-g4a4be1ad3a6e #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Workqueue: ipv6_addrconf addrconf_dad_work
RIP: 0010:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0018:ffffc90000540c18 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff8880150a5cc0 RCX: ffffffff8983194c
RDX: ffff8880167f8000 RSI: ffffffff898318e5 RDI: ffff8880150a5cc0
RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000006 R12: 0000000000000001
R13: ffff8880150a5d18 R14: 0000000000000000 R15: ffff888029f5c000
FS:  0000000000000000(0000) GS:ffff88802c200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 000000001b96a000 CR4: 0000000000350ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <IRQ>
 dst_input include/net/dst.h:460 [inline]
 dst_input include/net/dst.h:458 [inline]
 ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]
 NF_HOOK include/linux/netfilter.h:314 [inline]
 NF_HOOK include/linux/netfilter.h:308 [inline]
 ipv6_rcv+0x45a/0x680 net/ipv6/ip6_input.c:310
 __netif_receive_skb_one_core+0x12e/0x1e0 net/core/dev.c:5624
 __netif_receive_skb+0x1d/0x160 net/core/dev.c:5738
 process_backlog+0x133/0x760 net/core/dev.c:6067
 __napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:6721
 napi_poll net/core/dev.c:6790 [inline]
 net_rx_action+0x9b6/0xf10 net/core/dev.c:6906
 handle_softirqs+0x216/0x8f0 kernel/softirq.c:554
 do_softirq kernel/softirq.c:455 [inline]
 do_softirq+0xb2/0xf0 kernel/softirq.c:442
 </IRQ>
 <TASK>
 __local_bh_enable_ip+0x100/0x120 kernel/softirq.c:382
 local_bh_enable include/linux/bottom_half.h:33 [inline]
 rcu_read_unlock_bh include/linux/rcupdate.h:851 [inline]
 __dev_queue_xmit+0x872/0x4130 net/core/dev.c:4420
 dev_queue_xmit include/linux/netdevice.h:3095 [inline]
 neigh_resolve_output net/core/neighbour.c:1565 [inline]
 neigh_resolve_output+0x5bc/0x950 net/core/neighbour.c:1545
 neigh_output include/net/neighbour.h:542 [inline]
 ip6_finish_output2+0x673/0x1880 net/ipv6/ip6_output.c:137
 __ip6_finish_output net/ipv6/ip6_output.c:211 [inline]
 ip6_finish_output+0x3f9/0x1300 net/ipv6/ip6_output.c:222
 NF_HOOK_COND include/linux/netfilter.h:303 [inline]
 ip6_output+0x1f8/0x540 net/ipv6/ip6_output.c:243
 dst_output include/net/dst.h:450 [inline]
 NF_HOOK include/linux/netfilter.h:314 [inline]
 ndisc_send_skb+0xa2d/0x1c30 net/ipv6/ndisc.c:509
 ndisc_send_ns+0xc7/0x150 net/ipv6/ndisc.c:667
 addrconf_dad_work+0xca5/0x1500 net/ipv6/addrconf.c:4281
 process_one_work+0x958/0x1ad0 kernel/workqueue.c:3231
 process_scheduled_works kernel/workqueue.c:3312 [inline]
 worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393
 kthread+0x2c1/0x3a0 kernel/kthread.c:389
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>
Modules linked in:
CR2: 0000000000000000
---[ end trace 0000000000000000 ]---
RIP: 0010:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0018:ffffc90000540c18 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff8880150a5cc0 RCX: ffffffff8983194c
RDX: ffff8880167f8000 RSI: ffffffff898318e5 RDI: ffff8880150a5cc0
RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000006 R12: 0000000000000001
R13: ffff8880150a5d18 R14: 0000000000000000 R15: ffff888029f5c000
FS:  0000000000000000(0000) GS:ffff88802c200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 000000001b96a000 CR4: 0000000000350ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400

Crashes (2):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/05/30 04:28 upstream 4a4be1ad3a6e c2e07261 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: unable to handle kernel NULL pointer dereference in ipv6_rcv
2024/06/02 02:25 upstream ec9eeb89e60d c2e07261 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 general protection fault in ipv6_rcv
* Struck through repros no longer work on HEAD.