Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2981401imm; Sun, 3 Jun 2018 16:37:59 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLZ8wBU7CDVWZsPFTjMubP3ojfHD3hnJc7sJ5SGZ1ZK14JNke04lSRbi6ySBTOybgP6CzEK X-Received: by 2002:a17:902:8bc4:: with SMTP id r4-v6mr19400644plo.381.1528069079907; Sun, 03 Jun 2018 16:37:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528069079; cv=none; d=google.com; s=arc-20160816; b=Ncbvz+FMbwkAE1+Zx4nk3x46Z/mMZr/4ZWCEbCkVC5mamoeAhET4iswa9XZ8+xEIBO c1m2VGuHDqCf6RFRAd8vrkdmQEAUgM1ASlHyjEg30Btjc4w0IlwlvR1SxMOs4t3B2cp5 xf6K3gnq5u26EUNh2XvheVqUrkRoyiwyZdfihnrno4cl7oYH9pjReN0B+uFsl5Lqew6d cMCCECiceyo0A9mbpRovyEhiCtqkAvuQTvQf2/1HXK+sx8iKbvE1LiSR8JjNC1umg9d3 Vbnokllwl92bqyVgXzq/zhGAot12cAM7iIF/atPGbTFaHWmn4dOTiPFF8aQf/G6yJiOu DcHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:from:subject:message-id:date :mime-version:arc-authentication-results; bh=p9KVfPUFBBl14+smvCBUTDGw3xbn5+AfzwAw0CbAg/s=; b=MuNkj0qjbTNBOutrN4nB0oar4Z8LIVY31C0H3yt/7ZVj4c6ZYgnFvc8lbj4mx25+yv owEWLxftzZOJVmbKX1+uEsYBak3GiLhuro3uZqJAGa8T/526suVfY3z4Lx9kclK8uWlj 5+pTmDdlbvPWmdW57U6N68FC1dy1UFIFP9Onq9q6voXToiEyv3m9P/dp+YM/CKw/cD8T 7QgEuiykZ0csdUAfCTH70DZffroD/Mn0KO9znbJu0Jc1+wV3DwSqnkixXuQg8XM5K8K4 ZTELyxAIAB9a4xcH6RMabzZE5cXGLPZ21eYn+ryYppTtxAb7CBgKfV9HGcdq2ju/e9Xi PrZA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z5-v6si43568162pfh.367.2018.06.03.16.37.03; Sun, 03 Jun 2018 16:37:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751570AbeFCXgF (ORCPT + 99 others); Sun, 3 Jun 2018 19:36:05 -0400 Received: from mail-io0-f197.google.com ([209.85.223.197]:34351 "EHLO mail-io0-f197.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751232AbeFCXgD (ORCPT ); Sun, 3 Jun 2018 19:36:03 -0400 Received: by mail-io0-f197.google.com with SMTP id x23-v6so15871737iob.1 for ; Sun, 03 Jun 2018 16:36:02 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:date:message-id:subject:from:to; bh=p9KVfPUFBBl14+smvCBUTDGw3xbn5+AfzwAw0CbAg/s=; b=Rh6+celmPzaJp65PtKN7Kz1Buu9vtGh+R7lOgF74wpwbAetOvCBcwS2zm2yzsSHQxT 5SP2Gwmi9Th0yO9Gx1Gliw73PPaPERVrbNveEOHcjiPrnaj59+izfmOKfex2K7LdycdW 1iLhy28ojQtJHaErm4kJ+Qf0OV4lBRzcwrT6GVtJMnndzgP3jzXYZ2bu8yaQQ8248uuY /Jzbfx0dCXRiVh6pr8xveC6CUc8wNZXKvWYWNxuJPwcastGe8PHlWbr2oplktBApfr/L sAAF6dkbRlvV/QwO8jJT/4nv0tfDcZYI46nPz1Rxb+6GHCJhppRC1QUB8g49Ec9qIXU0 +udw== X-Gm-Message-State: APt69E2AMNvOixlSTrTZS8EjJbjrhwCUvKI3Ig7hQ42tjFGsB9Wc9g3l c/2Wz9L+Nj+Az0/DnMsPQVZ4+Xf0YBMtzkrTbY9h+mAAkl+E MIME-Version: 1.0 X-Received: by 2002:a24:378a:: with SMTP id r132-v6mr9256789itr.36.1528068962426; Sun, 03 Jun 2018 16:36:02 -0700 (PDT) Date: Sun, 03 Jun 2018 16:36:02 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <000000000000b2a7ea056dc54779@google.com> Subject: KASAN: slab-out-of-bounds Read in bpf_csum_update From: syzbot To: ast@kernel.org, daniel@iogearbox.net, davem@davemloft.net, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8"; format=flowed; delsp=yes Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following crash on: HEAD commit: 0512e0134582 Merge tag 'xfs-4.17-fixes-3' of git://git.ker.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=17eb2d7b800000 kernel config: https://syzkaller.appspot.com/x/.config?x=968b0b23c7854c0b dashboard link: https://syzkaller.appspot.com/bug?extid=efae31b384d5badbd620 compiler: gcc (GCC) 8.0.1 20180413 (experimental) syzkaller repro:https://syzkaller.appspot.com/x/repro.syz?x=162c6def800000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=14fe3db7800000 IMPORTANT: if you fix the bug, please add the following tag to the commit: Reported-by: syzbot+efae31b384d5badbd620@syzkaller.appspotmail.com random: sshd: uninitialized urandom read (32 bytes read) random: sshd: uninitialized urandom read (32 bytes read) random: sshd: uninitialized urandom read (32 bytes read) random: sshd: uninitialized urandom read (32 bytes read) ================================================================== BUG: KASAN: slab-out-of-bounds in ____bpf_csum_update net/core/filter.c:1679 [inline] BUG: KASAN: slab-out-of-bounds in bpf_csum_update+0xb4/0xc0 net/core/filter.c:1673 Read of size 1 at addr ffff8801d9235b50 by task syz-executor507/4513 CPU: 0 PID: 4513 Comm: syz-executor507 Not tainted 4.17.0-rc7+ #78 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 print_address_description+0x6c/0x20b mm/kasan/report.c:256 kasan_report_error mm/kasan/report.c:354 [inline] kasan_report.cold.7+0x242/0x2fe mm/kasan/report.c:412 __asan_report_load1_noabort+0x14/0x20 mm/kasan/report.c:430 ____bpf_csum_update net/core/filter.c:1679 [inline] bpf_csum_update+0xb4/0xc0 net/core/filter.c:1673 Allocated by task 0: (stack is not available) Freed by task 0: (stack is not available) The buggy address belongs to the object at ffff8801d9235a40 which belongs to the cache skbuff_head_cache of size 232 The buggy address is located 40 bytes to the right of 232-byte region [ffff8801d9235a40, ffff8801d9235b28) The buggy address belongs to the page: page:ffffea0007648d40 count:1 mapcount:0 mapping:ffff8801d9235040 index:0x0 flags: 0x2fffc0000000100(slab) raw: 02fffc0000000100 ffff8801d9235040 0000000000000000 000000010000000c raw: ffffea00074360a0 ffff8801d944d848 ffff8801d9bdd6c0 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801d9235a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff8801d9235a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > ffff8801d9235b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ^ ffff8801d9235b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff8801d9235c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ================================================================== --- This bug is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this bug report. See: https://goo.gl/tpsmEJ#bug-status-tracking for how to communicate with syzbot. syzbot can test patches for this bug, for details see: https://goo.gl/tpsmEJ#testing-patches