Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp2149212imm; Wed, 16 May 2018 08:35:53 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoJXW4jwVgOi0GC9FW2saeYdLExOhzfxwJUPgh5KrISlJF7GE3L/3Va/DXRGuzB3liQWUoc X-Received: by 2002:a17:902:7e05:: with SMTP id b5-v6mr1389407plm.230.1526484953811; Wed, 16 May 2018 08:35:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526484953; cv=none; d=google.com; s=arc-20160816; b=OKld0SlJux0pBB+GcOMsZ0wkl0O9s2/MHKa+MRPUsF5ijjiEp5Tg8ppVcVL8i+aUMy akW9MLptu3jXgyGcqrhXQwH5Q6VqOXNV53J+u+dbmRcwQCp5oispXfo61X0g5NM2XPtj ncs748MiZ73ponEQipec4/l9iStddh0b20zk2sXx6wKp8gfLBItLsQUcyMBxWLP8MgRv WjPPPPDe9hGpaSp3yuzoGL2q+nc4cIOj6bSb7irNfG0KwRyKMtUV39NmrOt9Apf9pYVV 9cgeR7v7k7UitFg+ADyY61rVmzqfpiaGMQpbnV7fNXb5JYFbFOOOAcjYODskLgTbLfOM OwTw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:from:subject:message-id:date :mime-version:arc-authentication-results; bh=tidm2l1ySie15vzWQP+zNAYFnbAYwQlOTIZjxu0q/pA=; b=RrULhM+272KhQjK8f9IdonP97bgammvgPClpB+7ERoGqPeyvAC+q3XQ+8oXY8q2F2e EntkEAcvhBLFazcyGiv30u/+5Mt5Pl5qenVWHVbpeIunoGxE+32pDi0JtRV7M0joMJ81 rTT+F+dCbGTROm1ZAsVS3ny+K9UN2d4IDKdYOmpJq2jMFVY+tQYx4BMz/OvIokJZZ1j6 NzOmCWwCaZc1L3Q1edHlE6FDeBOt4Fk5YRzQk2UbO+SHFMUhQfe6aw8B64QK3tiZxOIA mWLXTOgsUbTd64C/eusP389P9ykz8yDWOW+wQ6J8DyGdXEJaW1J0LRwYe+D9T8Vv5CEW gocA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r2-v6si2805454pli.370.2018.05.16.08.35.39; Wed, 16 May 2018 08:35:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752177AbeEPPfF (ORCPT + 99 others); Wed, 16 May 2018 11:35:05 -0400 Received: from mail-it0-f69.google.com ([209.85.214.69]:52032 "EHLO mail-it0-f69.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751880AbeEPPfD (ORCPT ); Wed, 16 May 2018 11:35:03 -0400 Received: by mail-it0-f69.google.com with SMTP id i3-v6so2402939iti.1 for ; Wed, 16 May 2018 08:35:02 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:date:message-id:subject:from:to; bh=tidm2l1ySie15vzWQP+zNAYFnbAYwQlOTIZjxu0q/pA=; b=Ohr94f6Qxy0JRu6cl3/ATvYT8IDdgEPz/R9uSLxM0y4jG4mc6LkJECazsbc07pVpRa QBmVjTGOkNY/VmcTW3/sT37k4OSfBHPHERwOsMnU0xTocAi6oMIzx6WTlEPtSuHTGFAb Et1cZuoH+wFp1LzXjeBnTTkR1eBBqH8FNSaEGy57P3Og44FpFbEiBI/QOizN3H3s3507 steZYOsBpVEcQnkYoywwUdByGloOqp0sNDhkfn9mZD0beL+VNcUSb8iZsPq/OtrYzQwX 1dwloqQhHUs7NwkUxtm6oMlAwiTYX9x0HtZoc8tmvx/Z2aMJotbviat+Vji78LCM4mdj 5nJw== X-Gm-Message-State: ALKqPwdVLprTbF1AUW1PNgPzFVAG5y2MFW3Kp+3ROe1C9gO9DKSgaqnK rDMJDnU/4O9SuubOcd0M2j+pzlLW787dm7Q2rItRTT/YK2aE MIME-Version: 1.0 X-Received: by 2002:a6b:ae54:: with SMTP id x81-v6mr1079190ioe.104.1526484902603; Wed, 16 May 2018 08:35:02 -0700 (PDT) Date: Wed, 16 May 2018 08:35:02 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <0000000000005ff424056c5476bf@google.com> Subject: WARNING: kmalloc bug in memdup_user (3) From: syzbot To: ast@kernel.org, daniel@iogearbox.net, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8"; format=flowed; delsp=yes Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following crash on: HEAD commit: c5c7d7f3c451 Merge branch 'bpf-sock-hashmap' git tree: bpf-next console output: https://syzkaller.appspot.com/x/log.txt?x=1626ae37800000 kernel config: https://syzkaller.appspot.com/x/.config?x=10c4dc62055b68f5 dashboard link: https://syzkaller.appspot.com/bug?extid=0f92a17b0706231d0a09 compiler: gcc (GCC) 8.0.1 20180413 (experimental) syzkaller repro:https://syzkaller.appspot.com/x/repro.syz?x=126a5197800000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=1598c477800000 IMPORTANT: if you fix the bug, please add the following tag to the commit: Reported-by: syzbot+0f92a17b0706231d0a09@syzkaller.appspotmail.com random: sshd: uninitialized urandom read (32 bytes read) random: sshd: uninitialized urandom read (32 bytes read) random: sshd: uninitialized urandom read (32 bytes read) random: sshd: uninitialized urandom read (32 bytes read) WARNING: CPU: 0 PID: 4531 at mm/slab_common.c:996 kmalloc_slab+0x56/0x70 mm/slab_common.c:996 Kernel panic - not syncing: panic_on_warn set ... CPU: 0 PID: 4531 Comm: syz-executor594 Not tainted 4.17.0-rc3+ #9 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 panic+0x22f/0x4de kernel/panic.c:184 __warn.cold.8+0x163/0x1b3 kernel/panic.c:536 report_bug+0x252/0x2d0 lib/bug.c:186 fixup_bug arch/x86/kernel/traps.c:178 [inline] do_error_trap+0x1de/0x490 arch/x86/kernel/traps.c:296 do_invalid_op+0x1b/0x20 arch/x86/kernel/traps.c:315 invalid_op+0x14/0x20 arch/x86/entry/entry_64.S:992 RIP: 0010:kmalloc_slab+0x56/0x70 mm/slab_common.c:996 RSP: 0018:ffff8801ad4b7c48 EFLAGS: 00010246 RAX: 0000000000000000 RBX: fffffffffffffff4 RCX: ffffffff8185e678 RDX: ffffffff8185e6eb RSI: 0000000000000000 RDI: 00000000fffffffd RBP: ffff8801ad4b7c48 R08: ffff8801adb3e2c0 R09: ffffed0035ba1f08 R10: ffffed0035ba1f08 R11: ffff8801add0f843 R12: 00000000fffffffd R13: 0000000020000240 R14: 00000000ffffffff R15: 00000000014200c0 __do_kmalloc mm/slab.c:3713 [inline] __kmalloc_track_caller+0x21/0x760 mm/slab.c:3733 memdup_user+0x2c/0xa0 mm/util.c:160 map_delete_elem+0x21b/0x4e0 kernel/bpf/syscall.c:796 __do_sys_bpf kernel/bpf/syscall.c:2128 [inline] __se_sys_bpf kernel/bpf/syscall.c:2096 [inline] __x64_sys_bpf+0x33f/0x4f0 kernel/bpf/syscall.c:2096 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x43fd89 RSP: 002b:00007ffe3ad9ad78 EFLAGS: 00000213 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 000000000043fd89 RDX: 0000000000000010 RSI: 0000000020000000 RDI: 0000000000000003 RBP: 00000000006ca018 R08: 00000000004002c8 R09: 00000000004002c8 R10: 00000000004002c8 R11: 0000000000000213 R12: 00000000004016b0 R13: 0000000000401740 R14: 0000000000000000 R15: 0000000000000000 Dumping ftrace buffer: (ftrace buffer empty) Kernel Offset: disabled Rebooting in 86400 seconds.. --- This bug is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this bug report. See: https://goo.gl/tpsmEJ#bug-status-tracking for how to communicate with syzbot. syzbot can test patches for this bug, for details see: https://goo.gl/tpsmEJ#testing-patches