audit: type=1804 audit(1642040195.797:851): pid=6709 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir009829693/syzkaller.Rqrn1x/246/bus" dev="sda1" ino=15249 res=1 x_tables: ip6_tables: TCPMSS target: only valid for protocol 6 x_tables: ip6_tables: TCPMSS target: only valid for protocol 6 kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 18211 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:get_counters+0x2b5/0x630 net/ipv6/netfilter/ip6_tables.c:779 Code: 31 ff 41 89 ec 41 83 e4 01 44 89 e6 e8 f4 a6 49 fa 45 84 e4 0f 85 fc 01 00 00 e8 b6 a5 49 fa 48 8d 7b 08 48 89 f8 48 c1 e8 03 <42> 80 3c 38 00 0f 85 6f 02 00 00 48 8b 43 08 48 89 44 24 18 48 89 RSP: 0018:ffff888048a1fb30 EFLAGS: 00010202 RAX: 00edf11017400001 RBX: 076f8880ba000000 RCX: ffffffff8718dfac RDX: 0000000000000000 RSI: ffffffff8718dfba RDI: 076f8880ba000008 RBP: 000000000008a8e8 R08: ffffffff8cd4eca0 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000 R13: ffff8880ba02a380 R14: ffff88800010f347 R15: dffffc0000000000 FS: 000055555747d400(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f7bb9c201b8 CR3: 000000002fdf0000 CR4: 00000000003426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: do_ip6t_get_ctl+0x510/0x910 net/ipv6/netfilter/ip6_tables.c:824 nf_sockopt net/netfilter/nf_sockopt.c:104 [inline] nf_getsockopt+0x72/0xd0 net/netfilter/nf_sockopt.c:122 ipv6_getsockopt+0x1b6/0x260 net/ipv6/ipv6_sockglue.c:1388 tcp_getsockopt+0x86/0xd0 net/ipv4/tcp.c:3629 __sys_getsockopt+0x135/0x210 net/socket.c:2050 __do_sys_getsockopt net/socket.c:2061 [inline] __se_sys_getsockopt net/socket.c:2058 [inline] __x64_sys_getsockopt+0xba/0x150 net/socket.c:2058 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f7bb9b414da Code: 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffcc3e06a58 EFLAGS: 00000212 ORIG_RAX: 0000000000000037 RAX: ffffffffffffffda RBX: 0000000000000029 RCX: 00007f7bb9b414da RDX: 0000000000000041 RSI: 0000000000000029 RDI: 0000000000000003 RBP: 00007ffcc3e06a80 R08: 00007ffcc3e06a7c R09: fefefefeff646b66 R10: 00007ffcc3e06ae0 R11: 0000000000000212 R12: 00007ffcc3e06ae0 R13: 0000000000000003 R14: 00007ffcc3e06a7c R15: 00007f7bb9c228e0 Modules linked in: ---[ end trace 7f3d510dc548a4f2 ]--- RIP: 0010:get_counters+0x2b5/0x630 net/ipv6/netfilter/ip6_tables.c:779 Code: 31 ff 41 89 ec 41 83 e4 01 44 89 e6 e8 f4 a6 49 fa 45 84 e4 0f 85 fc 01 00 00 e8 b6 a5 49 fa 48 8d 7b 08 48 89 f8 48 c1 e8 03 <42> 80 3c 38 00 0f 85 6f 02 00 00 48 8b 43 08 48 89 44 24 18 48 89 RSP: 0018:ffff888048a1fb30 EFLAGS: 00010202 RAX: 00edf11017400001 RBX: 076f8880ba000000 RCX: ffffffff8718dfac RDX: 0000000000000000 RSI: ffffffff8718dfba RDI: 076f8880ba000008 RBP: 000000000008a8e8 R08: ffffffff8cd4eca0 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000 R13: ffff8880ba02a380 R14: ffff88800010f347 R15: dffffc0000000000 FS: 000055555747d400(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f7bb9c201b8 CR3: 000000002fdf0000 CR4: 00000000003426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 31 ff xor %edi,%edi 2: 41 89 ec mov %ebp,%r12d 5: 41 83 e4 01 and $0x1,%r12d 9: 44 89 e6 mov %r12d,%esi c: e8 f4 a6 49 fa callq 0xfa49a705 11: 45 84 e4 test %r12b,%r12b 14: 0f 85 fc 01 00 00 jne 0x216 1a: e8 b6 a5 49 fa callq 0xfa49a5d5 1f: 48 8d 7b 08 lea 0x8(%rbx),%rdi 23: 48 89 f8 mov %rdi,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1) <-- trapping instruction 2f: 0f 85 6f 02 00 00 jne 0x2a4 35: 48 8b 43 08 mov 0x8(%rbx),%rax 39: 48 89 44 24 18 mov %rax,0x18(%rsp) 3e: 48 rex.W 3f: 89 .byte 0x89