[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAAeHK+yfX9ZtpFMTFXKAtjYE17MDBXMQJS_mH0b3=xTuv3jk9g@mail.gmail.com>
Date: Wed, 3 May 2017 18:33:05 +0200
From: Andrey Konovalov <andreyknvl@...gle.com>
To: David Ahern <dsahern@...il.com>
Cc: "David S. Miller" <davem@...emloft.net>,
Alexey Kuznetsov <kuznet@....inr.ac.ru>,
James Morris <jmorris@...ei.org>,
Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org>,
Patrick McHardy <kaber@...sh.net>,
netdev <netdev@...r.kernel.org>,
LKML <linux-kernel@...r.kernel.org>,
Dmitry Vyukov <dvyukov@...gle.com>,
Kostya Serebryany <kcc@...gle.com>,
Eric Dumazet <edumazet@...gle.com>,
Cong Wang <xiyou.wangcong@...il.com>,
syzkaller <syzkaller@...glegroups.com>
Subject: net/ipv6: GPF in rt6_device_match
Hi David,
Got another report related to fib6.
I'm on 89c9fea3c8034cdb2fd745f551cde0b507fd6893 with your last patch applied.
A reproducer and .config are attached.
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] SMP KASAN
Modules linked in:
CPU: 1 PID: 4059 Comm: a.out Not tainted 4.11.0+ #312
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011
task: ffff880064d11600 task.stack: ffff88006b0e8000
RIP: 0010:rt6_device_match net/ipv6/route.c:515
RIP: 0010:ip6_pol_route_lookup+0x2f2/0xa90 net/ipv6/route.c:885
RSP: 0018:ffff88006b0ef0b8 EFLAGS: 00010246
RAX: 1ffff1000d00f20b RBX: ffff880066dd96c0 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffff88006b0ef5b8 RDI: ffff880068079058
RBP: ffff88006b0ef1e0 R08: 0000000000000002 R09: 4e43247300000000
R10: ffff88006b0ef0b8 R11: dffffc0000000000 R12: 0000000000090000
R13: ffff880068078f00 R14: 0000000000000000 R15: dffffc0000000000
FS: 00007fd68b4d5700(0000) GS:ffff88006cb00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000208e2fe0 CR3: 0000000064c9b000 CR4: 00000000000006e0
Call Trace:
fib6_rule_action+0x261/0x8a0 net/ipv6/fib6_rules.c:100
fib_rules_lookup+0x3cf/0xca0 net/core/fib_rules.c:279
fib6_rule_lookup+0x175/0x360 net/ipv6/fib6_rules.c:44
rt6_lookup+0x267/0x3b0 net/ipv6/route.c:924
ip6gre_tnl_link_config+0x774/0xc00 net/ipv6/ip6_gre.c:746
ip6gre_tunnel_locate+0x4ab/0x7c0 net/ipv6/ip6_gre.c:340
ip6gre_tunnel_ioctl+0x5cd/0x21f0 net/ipv6/ip6_gre.c:878
dev_ifsioc+0x53f/0x9f0 net/core/dev_ioctl.c:338
dev_ioctl+0xc3c/0x1160 net/core/dev_ioctl.c:555
sock_ioctl+0x169/0x440 net/socket.c:944
vfs_ioctl fs/ioctl.c:45
do_vfs_ioctl+0x1bf/0x1660 fs/ioctl.c:685
SYSC_ioctl fs/ioctl.c:700
SyS_ioctl+0x8f/0xc0 fs/ioctl.c:691
entry_SYSCALL_64_fastpath+0x1f/0xbe arch/x86/entry/entry_64.S:204
RIP: 0033:0x7fd68abe7b79
RSP: 002b:00007ffce50c8aa8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007ffce50c8c00 RCX: 00007fd68abe7b79
RDX: 000000002036afd8 RSI: 00000000000089f1 RDI: 0000000000000004
RBP: 00000000004004e0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000
R13: 00007ffce50c8c00 R14: 0000000000000000 R15: 0000000000000000
Code: 95 b1 7d fd 49 8d bd 58 01 00 00 48 89 f8 48 c1 e8 03 42 80 3c
38 00 0f 85 5f 07 00 00 4d 8b b5 58 01 00 00 4c 89 f2 48 c1 ea 03 <42>
80 3c 3a 00 0f 85 39 07 00 00 4d 8b 36 49 8d be 08 01 00 00
RIP: ip6_pol_route_lookup+0x2f2/0xa90 RSP: ffff88006b0ef0b8
---[ end trace 68c87c92d8d28615 ]---
View attachment "rt6_device_match-gpf-poc.c" of type "text/x-csrc" (7277 bytes)
Download attachment ".config" of type "application/octet-stream" (128481 bytes)
Powered by blists - more mailing lists