syzbot


general protection fault in ipvlan_hard_header (2)

Status: closed as invalid on 2023/09/01 06:55
Subsystems: net
[Documentation on labels]
First crash: 356d, last: 356d
Similar bugs (3)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.14 general protection fault in ipvlan_hard_header 1 1242d 1242d 0/1 auto-closed as invalid on 2021/04/08 09:20
upstream general protection fault in ipvlan_hard_header net C done error 13 945d 1532d 0/26 closed as invalid on 2022/10/12 18:15
linux-4.19 general protection fault in ipvlan_hard_header 1 970d 970d 0/1 auto-closed as invalid on 2022/01/05 12:41

Sample crash report:
general protection fault, probably for non-canonical address 0xdffffc0020000070: 0000 [#1] PREEMPT SMP KASAN
KASAN: probably user-memory-access in range [0x0000000100000380-0x0000000100000387]
CPU: 0 PID: 9 Comm: kworker/0:1 Not tainted 6.4.0-rc1-syzkaller-00082-g1e306ec49a1f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023
Workqueue: mld mld_ifc_work
RIP: 0010:ipvlan_hard_header+0x118/0x160 drivers/net/ipvlan/ipvlan_main.c:380
Code: 5c 41 5d 41 5e 41 5f c3 45 31 e4 eb e4 e8 60 5b 04 fc 48 8d bd 88 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 75 2d 4c 8b a5 88 03 00 00 e9 32 ff ff ff e8 01 21 57
RSP: 0000:ffffc900000e7980 EFLAGS: 00010203
RAX: dffffc0000000000 RBX: ffff8880467f3000 RCX: 0000000000000000
RDX: 0000000020000070 RSI: ffffffff857fe980 RDI: 0000000100000387
RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000060
R10: 0000000000000000 R11: 1600000000000000 R12: 0000000000000000
R13: ffff88807d1cc8c0 R14: ffff8880467f31a8 R15: 0000000000000060
FS:  0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055852c973680 CR3: 0000000072d99000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 dev_hard_header include/linux/netdevice.h:3137 [inline]
 neigh_connected_output+0x35e/0x550 net/core/neighbour.c:1576
 neigh_output include/net/neighbour.h:544 [inline]
 ip6_finish_output2+0x55a/0x1560 net/ipv6/ip6_output.c:134
 __ip6_finish_output net/ipv6/ip6_output.c:195 [inline]
 ip6_finish_output+0x69a/0x1170 net/ipv6/ip6_output.c:206
 NF_HOOK_COND include/linux/netfilter.h:292 [inline]
 ip6_output+0x1f1/0x540 net/ipv6/ip6_output.c:227
 dst_output include/net/dst.h:458 [inline]
 NF_HOOK include/linux/netfilter.h:303 [inline]
 NF_HOOK include/linux/netfilter.h:297 [inline]
 mld_sendpack+0xa09/0xed0 net/ipv6/mcast.c:1820
 mld_send_cr net/ipv6/mcast.c:2121 [inline]
 mld_ifc_work+0x73c/0xe20 net/ipv6/mcast.c:2653
 process_one_work+0x99a/0x15e0 kernel/workqueue.c:2405
 worker_thread+0x67d/0x10c0 kernel/workqueue.c:2552
 kthread+0x344/0x440 kernel/kthread.c:379
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:ipvlan_hard_header+0x118/0x160 drivers/net/ipvlan/ipvlan_main.c:380
Code: 5c 41 5d 41 5e 41 5f c3 45 31 e4 eb e4 e8 60 5b 04 fc 48 8d bd 88 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 75 2d 4c 8b a5 88 03 00 00 e9 32 ff ff ff e8 01 21 57
RSP: 0000:ffffc900000e7980 EFLAGS: 00010203
RAX: dffffc0000000000 RBX: ffff8880467f3000 RCX: 0000000000000000
RDX: 0000000020000070 RSI: ffffffff857fe980 RDI: 0000000100000387
RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000060
R10: 0000000000000000 R11: 1600000000000000 R12: 0000000000000000
R13: ffff88807d1cc8c0 R14: ffff8880467f31a8 R15: 0000000000000060
FS:  0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f9e0fc9c718 CR3: 000000004bbc5000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	5c                   	pop    %rsp
   1:	41 5d                	pop    %r13
   3:	41 5e                	pop    %r14
   5:	41 5f                	pop    %r15
   7:	c3                   	retq
   8:	45 31 e4             	xor    %r12d,%r12d
   b:	eb e4                	jmp    0xfffffff1
   d:	e8 60 5b 04 fc       	callq  0xfc045b72
  12:	48 8d bd 88 03 00 00 	lea    0x388(%rbp),%rdi
  19:	48 b8 00 00 00 00 00 	movabs $0xdffffc0000000000,%rax
  20:	fc ff df
  23:	48 89 fa             	mov    %rdi,%rdx
  26:	48 c1 ea 03          	shr    $0x3,%rdx
* 2a:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1) <-- trapping instruction
  2e:	75 2d                	jne    0x5d
  30:	4c 8b a5 88 03 00 00 	mov    0x388(%rbp),%r12
  37:	e9 32 ff ff ff       	jmpq   0xffffff6e
  3c:	e8                   	.byte 0xe8
  3d:	01 21                	add    %esp,(%rcx)
  3f:	57                   	push   %rdi

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2023/05/13 16:06 net 1e306ec49a1f 2b9ba477 .config console log report info ci-upstream-net-this-kasan-gce general protection fault in ipvlan_hard_header
* Struck through repros no longer work on HEAD.