syzbot


general protection fault in __x86_indirect_thunk_rax

Status: closed as invalid on 2019/03/09 07:41
Subsystems: net
[Documentation on labels]
Reported-by: syzbot+f56d57a8d1075c255ccd@syzkaller.appspotmail.com
First crash: 2114d, last: 1878d

Sample crash report:
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 3769 Comm: syz-executor.0 Not tainted 5.0.0+ #109
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__x86_indirect_thunk_rax+0x10/0x20 arch/x86/lib/retpoline.S:32
Code: c4 ff 48 8d 0c ca e9 bd 42 c4 ff bb f2 ff ff ff 45 30 ff e9 63 47 c4 ff 90 90 e8 07 00 00 00 f3 90 0f ae e8 eb f9 48 89 04 24 <c3> 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 00 00 00 e8 07 00 00 00 f3
RSP: 0018:ffff8880ae807b70 EFLAGS: 00010246
RAX: 31699217e0650000 RBX: ffff88808a0b00b6 RCX: ffffffff8607edbe
RDX: 1ffff1101141601b RSI: ffffffff8607edc8 RDI: ffff8880879cc580
RBP: ffff8880ae807ba8 R08: ffff888063942440 R09: 0000000000000003
R10: ffffed1015d05bcf R11: ffff8880ae82de7b R12: ffff8880879cc580
R13: 0000000000000000 R14: ffff8880879cc5d8 R15: 0000000000000000
FS:  00007f8b34dd9700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b33a25000 CR3: 0000000008871000 CR4: 00000000001406f0
Call Trace:
 <IRQ>
 NF_HOOK include/linux/netfilter.h:289 [inline]
 NF_HOOK include/linux/netfilter.h:283 [inline]
 ipv6_rcv+0x10e/0x420 net/ipv6/ip6_input.c:272
 __netif_receive_skb_one_core+0x115/0x1a0 net/core/dev.c:4973
 __netif_receive_skb+0x2c/0x1c0 net/core/dev.c:5083
 process_backlog+0x206/0x750 net/core/dev.c:5923
 napi_poll net/core/dev.c:6346 [inline]
 net_rx_action+0x4fa/0x1070 net/core/dev.c:6412
 __do_softirq+0x266/0x95a kernel/softirq.c:292
 invoke_softirq kernel/softirq.c:373 [inline]
 irq_exit+0x180/0x1d0 kernel/softirq.c:413
 exiting_irq arch/x86/include/asm/apic.h:536 [inline]
 smp_apic_timer_interrupt+0x14a/0x570 arch/x86/kernel/apic/apic.c:1062
 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807
 </IRQ>
RIP: 0010:__sanitizer_cov_trace_pc+0x1/0x50 kernel/kcov.c:94
Code: 08 41 bc f4 ff ff ff e8 21 9d ea ff 48 c7 05 62 76 e6 08 00 00 00 00 e9 c8 e9 ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 55 <48> 89 e5 48 8b 75 08 65 48 8b 04 25 40 ee 01 00 65 8b 15 48 37 92
RSP: 0018:ffff88806b6476f8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13
RAX: 0000000000000000 RBX: 00007f8b36d31000 RCX: ffffffff8199f565
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007
RBP: ffff88806b647868 R08: ffff888063942440 R09: fffff9400042e0d7
R10: fffff9400042e0d6 R11: ffffea00021706b3 R12: ffffea00021706c0
R13: ffffea00021706c0 R14: ffffea00021706c8 R15: dffffc0000000000
 unmap_single_vma+0x19d/0x300 mm/memory.c:1308
 unmap_vmas+0x115/0x250 mm/memory.c:1339
 exit_mmap+0x2c2/0x530 mm/mmap.c:3139
 __mmput kernel/fork.c:1047 [inline]
 mmput+0x15f/0x4c0 kernel/fork.c:1068
 exit_mm kernel/exit.c:545 [inline]
 do_exit+0x838/0x2fd0 kernel/exit.c:862
 do_group_exit+0x135/0x370 kernel/exit.c:979
 get_signal+0x399/0x1d50 kernel/signal.c:2575
 do_signal+0x87/0x1940 arch/x86/kernel/signal.c:816
kobject: 'loop2' (00000000d31c8e68): kobject_uevent_env
kobject: 'loop2' (00000000d31c8e68): fill_kobj_path: path = '/devices/virtual/block/loop2'
 exit_to_usermode_loop+0x244/0x2c0 arch/x86/entry/common.c:162
 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:268 [inline]
 do_syscall_64+0x52d/0x610 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x457f29
Code: Bad RIP value.
RSP: 002b:00007f8b34dd8cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 000000000073bf08 RCX: 0000000000457f29
RDX: 00000000004cc740 RSI: 0000000000000081 RDI: 000000000073bf0c
RBP: 000000000073bf00 R08: 0000000000000009 R09: 0000000000000000
R10: ffffffffffffffff R11: 0000000000000246 R12: 000000000073bf0c
R13: 00007ffe2096bcff R14: 00007f8b34dd99c0 R15: 000000000073bf0c
Modules linked in:
---[ end trace 441ef57e90cace2d ]---
RIP: 0010:__x86_indirect_thunk_rax+0x10/0x20 arch/x86/lib/retpoline.S:32
Code: c4 ff 48 8d 0c ca e9 bd 42 c4 ff bb f2 ff ff ff 45 30 ff e9 63 47 c4 ff 90 90 e8 07 00 00 00 f3 90 0f ae e8 eb f9 48 89 04 24 <c3> 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 00 00 00 e8 07 00 00 00 f3
RSP: 0018:ffff8880ae807b70 EFLAGS: 00010246
RAX: 31699217e0650000 RBX: ffff88808a0b00b6 RCX: ffffffff8607edbe
RDX: 1ffff1101141601b RSI: ffffffff8607edc8 RDI: ffff8880879cc580
RBP: ffff8880ae807ba8 R08: ffff888063942440 R09: 0000000000000003
R10: ffffed1015d05bcf R11: ffff8880ae82de7b R12: ffff8880879cc580
R13: 0000000000000000 R14: ffff8880879cc5d8 R15: 0000000000000000
FS:  00007f8b34dd9700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000457eff CR3: 0000000008871000 CR4: 00000000001406f0

Crashes (4):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2019/03/05 22:53 net-old d9862cfbe209 16559f86 .config console log report ci-upstream-net-this-kasan-gce
2019/01/19 05:17 net-next-old f04d402f2f00 2103a236 .config console log report ci-upstream-net-kasan-gce
2018/07/15 19:10 linux-next 483d835c8189 92a49505 .config console log report ci-upstream-linux-next-kasan-gce-root
2018/07/13 02:48 linux-next 3ee15ba60e6b 06c33b3a .config console log report ci-upstream-linux-next-kasan-gce-root
* Struck through repros no longer work on HEAD.