Received: by 10.213.65.68 with SMTP id h4csp196871imn; Tue, 13 Mar 2018 00:52:49 -0700 (PDT) X-Google-Smtp-Source: AG47ELsYOBoV01k0rq5Uscc2X17Q2ls2TU0uRI4PGBfBakaReTZU4I2XiyO8s3vmF8XFZsRVJCpf X-Received: by 10.99.94.197 with SMTP id s188mr8741374pgb.363.1520927569222; Tue, 13 Mar 2018 00:52:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1520927569; cv=none; d=google.com; s=arc-20160816; b=d9ODfTZsUaFDTWWYcfmMfv0DVLFdBIYQ7xxbpvFSzhNWw2z7e1LuB0PzlYLCDZm2/0 3jWE7XwvOOwwwoSYVDPN31kKSKhsx4keDiRBZx/I8sRKo+MpLJ3Jpmz79jojwxdOOzzA MB5FdvKKXurtm17sqwEvmoPqfaiSmkGjJZW07V6CrQ3dSlS9fIm4dGf+3+8i/q3lsvdl eOgL3RSXasybl7GvEmyXRdMwK16Eu7kei60NFsWiLBZP3R1IKDcvflXIrHJv2thFyJMC L7X5cBuoXmnSZBtt1aWr0i3z83LUKxDpQb/0/eFQ8T3bfGFgFUOj/HlZal++Oqpy/hWK SF7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=23WKcBRA9KYoAgYFqAU02oE7k20SJQXAiTfgkzT8meY=; b=JNx3wRq/dFQTBtxfZHw5puU9HD5hePx0o9RcClCi0UHwUDRXWaSOkk+EH3jn3ssjxi Cg5+lBehFUziPj5XYOWrvimHiY/jjvgVxktwAUGHpaCIxkepW9IBPjNmRpf+bQZbz80p kbwXFjw0GNWRjj31TFWxBeGs3UFXYFD6rLcULBlUB0IPB6SkWRcWMW119HhoIFpBVe+l UbHbpr/1dvroob9nAYIwb5YEAxBrNT5c2eBeL+RC/NQNdmMHbS6HV8xIp4MzCy1TyVda kpETzeuoXXt5IMyTXuI4U2bzT6MELK0nWoJxy/UBjX6Kh7f+K3s3Ul674Zx/xr/jq0lK c7Lw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p5-v6si7468707pls.238.2018.03.13.00.52.34; Tue, 13 Mar 2018 00:52:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751979AbeCMHvr (ORCPT + 99 others); Tue, 13 Mar 2018 03:51:47 -0400 Received: from a.mx.secunet.com ([62.96.220.36]:56306 "EHLO a.mx.secunet.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751753AbeCMHvp (ORCPT ); Tue, 13 Mar 2018 03:51:45 -0400 Received: from localhost (localhost [127.0.0.1]) by a.mx.secunet.com (Postfix) with ESMTP id 7A8FF201B3; Tue, 13 Mar 2018 08:51:44 +0100 (CET) X-Virus-Scanned: by secunet Received: from a.mx.secunet.com ([127.0.0.1]) by localhost (a.mx.secunet.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tG5f4k-l2dTZ; Tue, 13 Mar 2018 08:51:43 +0100 (CET) Received: from mail-essen-01.secunet.de (mail-essen-01.secunet.de [10.53.40.204]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by a.mx.secunet.com (Postfix) with ESMTPS id C6CE120078; Tue, 13 Mar 2018 08:51:43 +0100 (CET) Received: from gauss2.secunet.de (10.182.7.193) by mail-essen-01.secunet.de (10.53.40.204) with Microsoft SMTP Server id 14.3.382.0; Tue, 13 Mar 2018 08:51:43 +0100 Received: by gauss2.secunet.de (Postfix, from userid 1000) id 6922C31824C6; Tue, 13 Mar 2018 08:51:43 +0100 (CET) Date: Tue, 13 Mar 2018 08:51:43 +0100 From: Steffen Klassert To: syzbot CC: , , , , Subject: Re: WARNING in kmalloc_slab (4) Message-ID: <20180313075143.b3ymdpt3nj3vnz77@gauss3.secunet.de> References: <001a114214fac20a80056746440a@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: <001a114214fac20a80056746440a@google.com> User-Agent: NeoMutt/20170609 (1.8.3) X-G-Data-MailSecurity-for-Exchange-State: 0 X-G-Data-MailSecurity-for-Exchange-Error: 0 X-G-Data-MailSecurity-for-Exchange-Sender: 23 X-G-Data-MailSecurity-for-Exchange-Server: d65e63f7-5c15-413f-8f63-c0d707471c93 X-EXCLAIMER-MD-CONFIG: 2c86f778-e09b-4440-8b15-867914633a10 X-G-Data-MailSecurity-for-Exchange-Guid: E0452A12-C246-4F71-8675-3FB682695E52 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Mar 13, 2018 at 12:33:02AM -0700, syzbot wrote: > Hello, > > syzbot hit the following crash on net-next commit > f44b1886a5f876c87b5889df463ad7b97834ba37 (Fri Mar 9 18:10:06 2018 +0000) > Merge branch 's390-qeth-next' > > Unfortunately, I don't have any reproducer for this crash yet. > Raw console output is attached. > compiler: gcc (GCC) 7.1.1 20170620 > .config is attached. > > IMPORTANT: if you fix the bug, please add the following tag to the commit: > Reported-by: syzbot+6a7e7ed886bde43469c4@syzkaller.appspotmail.com > It will help syzbot understand when the bug is fixed. See footer for > details. > If you forward the report, please keep this part and the footer. > > WARNING: CPU: 1 PID: 27333 at mm/slab_common.c:1012 kmalloc_slab+0x5d/0x70 > mm/slab_common.c:1012 > Kernel panic - not syncing: panic_on_warn set ... > > syz-executor0: vmalloc: allocation failure: 17045651456 bytes, > mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) > CPU: 1 PID: 27333 Comm: syz-executor2 Not tainted 4.16.0-rc4+ #260 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS > Google 01/01/2011 > Call Trace: > __dump_stack lib/dump_stack.c:17 [inline] > dump_stack+0x194/0x24d lib/dump_stack.c:53 > panic+0x1e4/0x41c kernel/panic.c:183 > syz-executor0 cpuset= > __warn+0x1dc/0x200 kernel/panic.c:547 > / > mems_allowed=0 > report_bug+0x211/0x2d0 lib/bug.c:184 > fixup_bug.part.11+0x37/0x80 arch/x86/kernel/traps.c:178 > fixup_bug arch/x86/kernel/traps.c:247 [inline] > do_error_trap+0x2d7/0x3e0 arch/x86/kernel/traps.c:296 > do_invalid_op+0x1b/0x20 arch/x86/kernel/traps.c:315 > invalid_op+0x1b/0x40 arch/x86/entry/entry_64.S:986 > RIP: 0010:kmalloc_slab+0x5d/0x70 mm/slab_common.c:1012 > RSP: 0018:ffff8801ccfc72f0 EFLAGS: 00010246 > RAX: 0000000000000000 RBX: 0000000010000018 RCX: ffffffff84ec4fc8 > RDX: 0000000000000ba7 RSI: 0000000000000000 RDI: 0000000010000018 > RBP: ffff8801ccfc72f0 R08: 0000000000000000 R09: 1ffff100399f8e21 > R10: ffff8801ccfc7040 R11: 0000000000000001 R12: 0000000000000018 > R13: ffff8801ccfc7598 R14: 00000000014080c0 R15: ffff8801aebaad80 > __do_kmalloc mm/slab.c:3700 [inline] > __kmalloc+0x25/0x760 mm/slab.c:3714 > kmalloc include/linux/slab.h:517 [inline] > kzalloc include/linux/slab.h:701 [inline] > xfrm_alloc_replay_state_esn net/xfrm/xfrm_user.c:442 [inline] This is likely fixed with: commit d97ca5d714a5334aecadadf696875da40f1fbf3e xfrm_user: uncoditionally validate esn replay attribute struct The patch is included in the ipsec pull request for the net tree I've sent this morning.