Received: by 10.192.165.156 with SMTP id m28csp1669985imm; Thu, 12 Apr 2018 01:10:05 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+2Rt5XeIMZBfYi0TootO5PJxzgcnhqCBzvGMOQI4UjYu9i+cVRzPuXzrNXgw5T3I1w5VGU X-Received: by 10.98.232.2 with SMTP id c2mr6847148pfi.187.1523520605795; Thu, 12 Apr 2018 01:10:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523520605; cv=none; d=google.com; s=arc-20160816; b=E83myQBi8dr0R59rTesyG7HeZcr/BXV3Bz3AEoiSF8QnDD/vZr0SR+3+uiuADBHdg3 taWBwXSEbVzkU7wH6/XqCLNYB1UYR0vYtBSJgL8amAzHmKt7vDRifiQCMEB7+g2BUBAy mExam8Q6x8oaSAdgbTYZwIEen3MUPnDaJIBUsgdx7BZRTS7NShOpnEvvJcAHAZ5Q9XAn ikTS1JedxMUmpdcjqTC9Cn9W/0lyRtash8Jpsh+I5tCB6DfoBIXeCTYLz5gNroNbNrAg 2czdWPhHyRsaK9SyA5yP0p0yFw6qEhyIEh4ubobwQMZs9tm26UwQNsSQmqNQdx8G3ssr NM7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=bzblws4WjV0TH2do9qGzRd/EiE9e7uITv2MRhq1NYr0=; b=N9ns4t6Ra8tQNYFP/9d52TCidecpal92CaEKqgCee7yqCQ6tN36MBbWWXFFZVa8XA8 5NwHlkwEvNmwIyAIOtH1BZqdRN/WqiMPUr5Hy4ryksVdYj+m6c2qZoCXdgSEsB8I9548 +yrI92N/ros871YECWW1gFDA3L+bZgggDspOSRG6V1eQokvpwTuEKVKheSTV3kAZW4Yb x3qgVmoE9o5YarX3bVOW5p3Kz50aQql5GPw6fbOPx4+5Bce6s9oSGUKznHBMPuwb8VQV KrVn01P4AaaJMEQk1igF9W2tDx707OgNtjFT/IthV34VJt5gsEd5bX4znX2ja+EhB1Mr d9ew== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=WoD2QOw5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i10si2211978pfa.164.2018.04.12.01.09.29; Thu, 12 Apr 2018 01:10:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=WoD2QOw5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752980AbeDLIDi (ORCPT + 99 others); Thu, 12 Apr 2018 04:03:38 -0400 Received: from mail-pf0-f193.google.com ([209.85.192.193]:45012 "EHLO mail-pf0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751836AbeDLIDh (ORCPT ); Thu, 12 Apr 2018 04:03:37 -0400 Received: by mail-pf0-f193.google.com with SMTP id p15so2992130pff.11 for ; Thu, 12 Apr 2018 01:03:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=bzblws4WjV0TH2do9qGzRd/EiE9e7uITv2MRhq1NYr0=; b=WoD2QOw5MMo6190a9MTntD7JbYqeOKkYrOYfxnmKTA3Wb6F3S7qtSGhqp+vlL040ZT j585IsYzbAXDe5rX+xhqQ4JI7WZpKkKo3ShrNlu6QEZqXjUcUGFG9zgp8PQIfaoN+B0d IzfbKzE4H9qrOKmWzrDT+UVqyWtAR5aLBer6ulnwOTvJjX08ug+S86FPVSzFWW1LQbdC XIo7bXq7w7KrewHgm7/cWcWqfe9RgTVs8gg7IucyYLNUUMGj1cFCxjeHLVCmjL1t9yxM EaqwUjj6t1WmIOW343Y6Ndk532XtF1+DIv0JlG+SWYU2psU9lEF1CGM2tc1cXn21B2Yy 8w0g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=bzblws4WjV0TH2do9qGzRd/EiE9e7uITv2MRhq1NYr0=; b=DSM5dzZK0ul5p475fyR/uor5OIUT7tu6JDnQp8X1nFI88auyEgsL+ChdBpRDktqjGo ykyvcml0DaBlkD70QRv970x9CxkWNvi0f7jV7HMJ8CWo9YtpYOEIV8+zFRkBygmIxY0j OQp8RkkyOhwQeozQomXrK7RfbYJBB37lZ6rV44t9VTJhsJUubv2Np/SsrFWwDMbCm8Jj awqXpqeNFFzCK3uQ93uO5mALzUmtT2gjBwV6atTB5WG/YvbTelV6hgrqkllXwpb/ewNE jj1keg8VN5d3kn6huyF7aGWAtHiBW1vKoR2Z9V3kwEEtyn27kIgJ+eHVWTqzjrfW4sIJ H+lA== X-Gm-Message-State: ALQs6tAG6YlN2JQ56htQr3FnJg9W5oahHwAIbKGuWtjpwWmlanxdQbIi cpw4LNZ87VS9zarPeKt5+KR0uMw+eUqSRvDmMrJkpVe8y0CJczn3OI1vRNCWNzfiNLz/6az1dGH 7mZC4AqTumMRGPFdiAsuKmXlLzJLHsIE= X-Received: by 10.98.236.86 with SMTP id k83mr6781571pfh.84.1523520216348; Thu, 12 Apr 2018 01:03:36 -0700 (PDT) MIME-Version: 1.0 Received: by 10.100.182.136 with HTTP; Thu, 12 Apr 2018 01:03:15 -0700 (PDT) In-Reply-To: <089e082d0cb81b67d10569a2283f@google.com> References: <089e082d0cb81b67d10569a2283f@google.com> From: Dmitry Vyukov Date: Thu, 12 Apr 2018 10:03:15 +0200 Message-ID: Subject: Re: KMSAN: uninit-value in netif_skb_features To: syzbot Cc: bpoirier@suse.com, David Miller , Eric Dumazet , "Reshetova, Elena" , Kees Cook , LKML , Mike Maloney , netdev , rami.rosen@intel.com, syzkaller-bugs , Willem de Bruijn , makita.toshiaki@lab.ntt.co.jp Content-Type: text/plain; charset="UTF-8" X-ccpol: medium Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 12, 2018 at 10:01 AM, syzbot wrote: > Hello, > > syzbot hit the following crash on https://github.com/google/kmsan.git/master > commit > e2ab7e8abba47a2f2698216258e5d8727ae58717 (Fri Apr 6 16:24:31 2018 +0000) > kmsan: temporarily disable visitAsmInstruction() to help syzbot > syzbot dashboard link: > https://syzkaller.appspot.com/bug?extid=0bbe42c764feafa82c5a > > So far this crash happened 30 times on > https://github.com/google/kmsan.git/master. > C reproducer: https://syzkaller.appspot.com/x/repro.c?id=4850744041668608 > syzkaller reproducer: > https://syzkaller.appspot.com/x/repro.syz?id=6289386287136768 > Raw console output: > https://syzkaller.appspot.com/x/log.txt?id=4577411249209344 > Kernel config: > https://syzkaller.appspot.com/x/.config?id=6627248707860932248 > compiler: clang version 7.0.0 (trunk 329391) +Toshiaki as this seems to be related to the recent vlan tagging changes. This also seems to be related to https://groups.google.com/d/msg/syzkaller-bugs/FNEavkB4QaM/efXl2AeRBgAJ > IMPORTANT: if you fix the bug, please add the following tag to the commit: > Reported-by: syzbot+0bbe42c764feafa82c5a@syzkaller.appspotmail.com > It will help syzbot understand when the bug is fixed. See footer for > details. > If you forward the report, please keep this part and the footer. > > ================================================================== > BUG: KMSAN: uninit-value in eth_type_vlan include/linux/if_vlan.h:283 > [inline] > BUG: KMSAN: uninit-value in skb_vlan_tagged_multi > include/linux/if_vlan.h:656 [inline] > BUG: KMSAN: uninit-value in vlan_features_check include/linux/if_vlan.h:672 > [inline] > BUG: KMSAN: uninit-value in dflt_features_check net/core/dev.c:2949 [inline] > BUG: KMSAN: uninit-value in netif_skb_features+0xd1b/0xdc0 > net/core/dev.c:3009 > CPU: 1 PID: 3582 Comm: syzkaller435149 Not tainted 4.16.0+ #82 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS > Google 01/01/2011 > Call Trace: > __dump_stack lib/dump_stack.c:17 [inline] > dump_stack+0x185/0x1d0 lib/dump_stack.c:53 > kmsan_report+0x142/0x240 mm/kmsan/kmsan.c:1067 > __msan_warning_32+0x6c/0xb0 mm/kmsan/kmsan_instr.c:676 > eth_type_vlan include/linux/if_vlan.h:283 [inline] > skb_vlan_tagged_multi include/linux/if_vlan.h:656 [inline] > vlan_features_check include/linux/if_vlan.h:672 [inline] > dflt_features_check net/core/dev.c:2949 [inline] > netif_skb_features+0xd1b/0xdc0 net/core/dev.c:3009 > validate_xmit_skb+0x89/0x1320 net/core/dev.c:3084 > __dev_queue_xmit+0x1cb2/0x2b60 net/core/dev.c:3549 > dev_queue_xmit+0x4b/0x60 net/core/dev.c:3590 > packet_snd net/packet/af_packet.c:2944 [inline] > packet_sendmsg+0x7c57/0x8a10 net/packet/af_packet.c:2969 > sock_sendmsg_nosec net/socket.c:630 [inline] > sock_sendmsg net/socket.c:640 [inline] > sock_write_iter+0x3b9/0x470 net/socket.c:909 > do_iter_readv_writev+0x7bb/0x970 include/linux/fs.h:1776 > do_iter_write+0x30d/0xd40 fs/read_write.c:932 > vfs_writev fs/read_write.c:977 [inline] > do_writev+0x3c9/0x830 fs/read_write.c:1012 > SYSC_writev+0x9b/0xb0 fs/read_write.c:1085 > SyS_writev+0x56/0x80 fs/read_write.c:1082 > do_syscall_64+0x309/0x430 arch/x86/entry/common.c:287 > entry_SYSCALL_64_after_hwframe+0x3d/0xa2 > RIP: 0033:0x43ffa9 > RSP: 002b:00007fff2cff3948 EFLAGS: 00000217 ORIG_RAX: 0000000000000014 > RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 000000000043ffa9 > RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 > RBP: 00000000006cb018 R08: 0000000000000000 R09: 0000000000000000 > R10: 0000000000000000 R11: 0000000000000217 R12: 00000000004018d0 > R13: 0000000000401960 R14: 0000000000000000 R15: 0000000000000000 > > Uninit was created at: > kmsan_save_stack_with_flags mm/kmsan/kmsan.c:278 [inline] > kmsan_internal_poison_shadow+0xb8/0x1b0 mm/kmsan/kmsan.c:188 > kmsan_kmalloc+0x94/0x100 mm/kmsan/kmsan.c:314 > kmsan_slab_alloc+0x11/0x20 mm/kmsan/kmsan.c:321 > slab_post_alloc_hook mm/slab.h:445 [inline] > slab_alloc_node mm/slub.c:2737 [inline] > __kmalloc_node_track_caller+0xaed/0x11c0 mm/slub.c:4369 > __kmalloc_reserve net/core/skbuff.c:138 [inline] > __alloc_skb+0x2cf/0x9f0 net/core/skbuff.c:206 > alloc_skb include/linux/skbuff.h:984 [inline] > alloc_skb_with_frags+0x1d4/0xb20 net/core/skbuff.c:5234 > sock_alloc_send_pskb+0xb56/0x1190 net/core/sock.c:2085 > packet_alloc_skb net/packet/af_packet.c:2803 [inline] > packet_snd net/packet/af_packet.c:2894 [inline] > packet_sendmsg+0x6444/0x8a10 net/packet/af_packet.c:2969 > sock_sendmsg_nosec net/socket.c:630 [inline] > sock_sendmsg net/socket.c:640 [inline] > sock_write_iter+0x3b9/0x470 net/socket.c:909 > do_iter_readv_writev+0x7bb/0x970 include/linux/fs.h:1776 > do_iter_write+0x30d/0xd40 fs/read_write.c:932 > vfs_writev fs/read_write.c:977 [inline] > do_writev+0x3c9/0x830 fs/read_write.c:1012 > SYSC_writev+0x9b/0xb0 fs/read_write.c:1085 > SyS_writev+0x56/0x80 fs/read_write.c:1082 > do_syscall_64+0x309/0x430 arch/x86/entry/common.c:287 > entry_SYSCALL_64_after_hwframe+0x3d/0xa2 > ================================================================== > > > --- > This bug is generated by a dumb bot. It may contain errors. > See https://goo.gl/tpsmEJ for details. > Direct all questions to syzkaller@googlegroups.com. > > syzbot will keep track of this bug report. > If you forgot to add the Reported-by tag, once the fix for this bug is > merged > into any tree, please reply to this email with: > #syz fix: exact-commit-title > If you want to test a patch for this bug, please reply with: > #syz test: git://repo/address.git branch > and provide the patch inline or as an attachment. > To mark this as a duplicate of another syzbot report, please reply with: > #syz dup: exact-subject-of-another-report > If it's a one-off invalid bug report, please reply with: > #syz invalid > Note: if the crash happens again, it will cause creation of a new bug > report. > Note: all commands must start from beginning of the line in the email body. > > -- > You received this message because you are subscribed to the Google Groups > "syzkaller-bugs" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to syzkaller-bugs+unsubscribe@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/syzkaller-bugs/089e082d0cb81b67d10569a2283f%40google.com. > For more options, visit https://groups.google.com/d/optout.