syzbot


general protection fault in ipvlan_hard_header

Status: auto-closed as invalid on 2022/01/05 12:41
Reported-by: syzbot+5807993d4dad21237fc5@syzkaller.appspotmail.com
First crash: 1173d, last: 1173d
Similar bugs (3)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.14 general protection fault in ipvlan_hard_header 1 1445d 1445d 0/1 auto-closed as invalid on 2021/04/08 09:20
upstream general protection fault in ipvlan_hard_header (2) net 1 559d 559d 0/28 closed as invalid on 2023/09/01 06:55
upstream general protection fault in ipvlan_hard_header net C done error 13 1148d 1735d 0/28 closed as invalid on 2022/10/12 18:15

Sample crash report:
SQUASHFS error: Unable to read metadata cache entry [e000099]
SQUASHFS error: Unable to read inode 0xe0000000126
(syz-executor.3,25694,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "/dev/loop#" or missing value
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 25701 Comm: syz-executor.4 Not tainted 4.19.206-syzkaller #0
(syz-executor.3,25694,0):ocfs2_fill_super:1225 ERROR: status = -22
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:ipvlan_hard_header+0x114/0x150 drivers/net/ipvlan/ipvlan_main.c:448
Code: 5c 41 5d 41 5e 41 5f c3 45 31 e4 eb e4 e8 b4 d1 1e fd 48 8d bd 68 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 75 2d 4c 8b a5 68 03 00 00 e9 32 ff ff ff e8 75 a4 54
RSP: 0018:ffff888224966c30 EFLAGS: 00010207
RAX: dffffc0000000000 RBX: ffff88800e08d240 RCX: ffffc9000e76d000
RDX: 000000002000006c RSI: ffffffff8443c10c RDI: 0000000100000367
RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000048
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: ffff8880b4cd2b80 R14: ffff88800e08d3b8 R15: 0000000000000048
FS:  00007f4cb649f700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200092c0 CR3: 0000000233dc8000 CR4: 00000000001426e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 dev_hard_header include/linux/netdevice.h:2886 [inline]
 neigh_resolve_output+0x4fa/0x910 net/core/neighbour.c:1369
 neigh_output include/net/neighbour.h:501 [inline]
 ip6_finish_output2+0x113d/0x2290 net/ipv6/ip6_output.c:120
 ip6_finish_output+0x89b/0x10f0 net/ipv6/ip6_output.c:192
 NF_HOOK_COND include/linux/netfilter.h:278 [inline]
 ip6_output+0x205/0x770 net/ipv6/ip6_output.c:209
 dst_output include/net/dst.h:455 [inline]
 NF_HOOK include/linux/netfilter.h:289 [inline]
 ndisc_send_skb+0xa24/0x1720 net/ipv6/ndisc.c:491
 ndisc_send_ns+0x51d/0x840 net/ipv6/ndisc.c:633
 ndisc_solicit+0x2cd/0x500 net/ipv6/ndisc.c:725
 neigh_probe+0xcc/0x110 net/core/neighbour.c:916
 __neigh_event_send+0x387/0xf70 net/core/neighbour.c:1074
 neigh_event_send include/net/neighbour.h:436 [inline]
 neigh_resolve_output+0x6d8/0x910 net/core/neighbour.c:1358
 neigh_output include/net/neighbour.h:501 [inline]
 ip6_finish_output2+0x113d/0x2290 net/ipv6/ip6_output.c:120
 ip6_finish_output+0x89b/0x10f0 net/ipv6/ip6_output.c:192
 NF_HOOK_COND include/linux/netfilter.h:278 [inline]
 ip6_output+0x205/0x770 net/ipv6/ip6_output.c:209
 dst_output include/net/dst.h:455 [inline]
 ip6_local_out+0xaf/0x170 net/ipv6/output_core.c:160
 ip6_send_skb+0xb3/0x300 net/ipv6/ip6_output.c:1741
 ip6_push_pending_frames+0xbd/0xe0 net/ipv6/ip6_output.c:1761
 rawv6_push_pending_frames net/ipv6/raw.c:618 [inline]
 rawv6_sendmsg+0x2a81/0x36a0 net/ipv6/raw.c:959
 inet_sendmsg+0x132/0x5a0 net/ipv4/af_inet.c:798
 sock_sendmsg_nosec net/socket.c:651 [inline]
 sock_sendmsg+0xc3/0x120 net/socket.c:661
 ___sys_sendmsg+0x3b3/0x8e0 net/socket.c:2227
 __sys_sendmmsg+0x195/0x470 net/socket.c:2322
 __do_sys_sendmmsg net/socket.c:2351 [inline]
 __se_sys_sendmmsg net/socket.c:2348 [inline]
 __x64_sys_sendmmsg+0x99/0x100 net/socket.c:2348
 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x4665f9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f4cb649f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665f9
RDX: 03fffffffffffe9f RSI: 00000000200092c0 RDI: 0000000000000004
team0: No ports can be present during mode change
RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c038
R13: 00007fffaabac50f R14: 00007f4cb649f300 R15: 0000000000022000
Modules linked in:
---[ end trace 6f4f9a73a9f80081 ]---
RIP: 0010:ipvlan_hard_header+0x114/0x150 drivers/net/ipvlan/ipvlan_main.c:448
Code: 5c 41 5d 41 5e 41 5f c3 45 31 e4 eb e4 e8 b4 d1 1e fd 48 8d bd 68 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 75 2d 4c 8b a5 68 03 00 00 e9 32 ff ff ff e8 75 a4 54
RSP: 0018:ffff888224966c30 EFLAGS: 00010207
RAX: dffffc0000000000 RBX: ffff88800e08d240 RCX: ffffc9000e76d000
RDX: 000000002000006c RSI: ffffffff8443c10c RDI: 0000000100000367
RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000048
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'.
R13: ffff8880b4cd2b80 R14: ffff88800e08d3b8 R15: 0000000000000048
FS:  00007f4cb649f700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200092c0 CR3: 0000000233dc8000 CR4: 00000000001426e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	5c                   	pop    %rsp
   1:	41 5d                	pop    %r13
   3:	41 5e                	pop    %r14
   5:	41 5f                	pop    %r15
   7:	c3                   	retq
   8:	45 31 e4             	xor    %r12d,%r12d
   b:	eb e4                	jmp    0xfffffff1
   d:	e8 b4 d1 1e fd       	callq  0xfd1ed1c6
  12:	48 8d bd 68 03 00 00 	lea    0x368(%rbp),%rdi
  19:	48 b8 00 00 00 00 00 	movabs $0xdffffc0000000000,%rax
  20:	fc ff df
  23:	48 89 fa             	mov    %rdi,%rdx
  26:	48 c1 ea 03          	shr    $0x3,%rdx
* 2a:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1) <-- trapping instruction
  2e:	75 2d                	jne    0x5d
  30:	4c 8b a5 68 03 00 00 	mov    0x368(%rbp),%r12
  37:	e9 32 ff ff ff       	jmpq   0xffffff6e
  3c:	e8                   	.byte 0xe8
  3d:	75 a4                	jne    0xffffffe3
  3f:	54                   	push   %rsp

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2021/09/07 12:40 linux-4.19.y b172b44fcb17 6ca60148 .config console log report info ci2-linux-4-19 general protection fault in ipvlan_hard_header
* Struck through repros no longer work on HEAD.