Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2981400imm; Sun, 3 Jun 2018 16:37:59 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKm17xqjJ2mZyrWHO8rjEGhkbLpj76853GJZ1f9yfAeLUdQ4Ns6yR0511CUF2MxfC7bke2V X-Received: by 2002:a17:902:2f84:: with SMTP id t4-v6mr20092476plb.24.1528069079898; Sun, 03 Jun 2018 16:37:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528069079; cv=none; d=google.com; s=arc-20160816; b=hBK+LE+c0SF+o1KLfoA+UJEepc7i+mWGOgumviImLlAJaGyqW0oex8dbt68rdq3OFH /l848+KnDYlZTO0YPq8dhUz3PIZn843fcLTpR8S5DTbe4KL+JLfOb7EP4mLXoBCZ0M6+ UnUbAEZjDlsbkNXxs2B5EmKK2ZafK+1kZz14XkIx/fzqDq1fMDwbSmgQntVwqfPFxnv6 YulHdRTbZmifvbOBKNIvKZ4swgGeADSRhS0yQLgO2FwGYJmh3cAcl+StnoL4vfTj8LD8 WlTWBXTK9aQe0MVdJQaaUPaArZYWkG50UnwwuUgrikzC9KnAx4DNXdiKzxtYdzLiBDLD 8Q4w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:from:subject:message-id:date :mime-version:arc-authentication-results; bh=QlH7PNmpAjv3+aiwcN3sePPmJbUbyvVxtx104nc56ek=; b=H7azmkl7+vcigYMtQAs58Ut3ucUKsz/Z9UKlCaX9wiMAKW06VGHG6b9RG/XTQWtdl2 S3/q3awlkWu8YL7N2DOTLzP8ov5EkDnjkMO+H8Xu9neAPUqCa5dYS0yM/SavSZJi0sl7 xAL7x9hPDIPrV52WwI+73ee925QOsZMhc4TDueBlHXt+RS8JTsWbqDz0VVsEyu3Os4NQ JDIUA1BmIi3daVK7erFB/NljwbEo6pBi0RWhXevGxd+7wbku+k6FwpGWitivmqfuBSeW YQlttabYlOcpc6VWvwHf4AxNyPvYwNgu9tPWt9ihJRqaxCaXqjPxSQ5Nk30g0gwjXcBA fv+g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 34-v6si45850454plz.66.2018.06.03.16.37.03; Sun, 03 Jun 2018 16:37:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751666AbeFCXgG (ORCPT + 99 others); Sun, 3 Jun 2018 19:36:06 -0400 Received: from mail-it0-f71.google.com ([209.85.214.71]:36217 "EHLO mail-it0-f71.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751354AbeFCXgD (ORCPT ); Sun, 3 Jun 2018 19:36:03 -0400 Received: by mail-it0-f71.google.com with SMTP id c82-v6so6352686itg.1 for ; Sun, 03 Jun 2018 16:36:03 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:date:message-id:subject:from:to; bh=QlH7PNmpAjv3+aiwcN3sePPmJbUbyvVxtx104nc56ek=; b=ju/HSJZq5VOO1hpdheaogLiaDIJmdzvlQTTy0tPU+0qown5OrAUvSqgRnAGcseGFzR a4Uv15eMapptIwWtJtSvipB8rPNa5KaLf82ZC5P3u0QppYzE1AEg983Eo8ygHpI7PkkN gfYEQ4oeG6gHCykYgq0OayZRuN7jh/ue2Z/V3oAR5m53HKcWSv6gAx6P5alU2BC0j34d VBoYahNbe1ows5oR9CoqdenXfzskv1Bes/MudU9x0LVBdlsC7Cxc+PXC9RoLJ8LoOZCh l8jWmj96Zc1WdNy/m55cDV7iXpCtQtbQ34jVet4eDyhRuERgkAlzxM2D3raWaplG726e y0Gg== X-Gm-Message-State: APt69E1JtJUcA+G59MhGcqbm8a0deuG0yZnzAIZlOf9LecsTtrviMkE6 I2TbY+gLNYTB3MvkTcyZK44nZ/Q+p1IBR+OKC1CfU5d5YcC+ MIME-Version: 1.0 X-Received: by 2002:a24:d904:: with SMTP id p4-v6mr8976400itg.45.1528068962760; Sun, 03 Jun 2018 16:36:02 -0700 (PDT) Date: Sun, 03 Jun 2018 16:36:02 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <000000000000b7be6e056dc547e8@google.com> Subject: KASAN: slab-out-of-bounds Read in skb_ensure_writable From: syzbot To: ast@kernel.org, daniel@iogearbox.net, davem@davemloft.net, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8"; format=flowed; delsp=yes Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following crash on: HEAD commit: 0512e0134582 Merge tag 'xfs-4.17-fixes-3' of git://git.ker.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=14956af7800000 kernel config: https://syzkaller.appspot.com/x/.config?x=968b0b23c7854c0b dashboard link: https://syzkaller.appspot.com/bug?extid=e5190cb881d8660fb1a3 compiler: gcc (GCC) 8.0.1 20180413 (experimental) syzkaller repro:https://syzkaller.appspot.com/x/repro.syz?x=123d9d7b800000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=100329d7800000 IMPORTANT: if you fix the bug, please add the following tag to the commit: Reported-by: syzbot+e5190cb881d8660fb1a3@syzkaller.appspotmail.com random: sshd: uninitialized urandom read (32 bytes read) random: sshd: uninitialized urandom read (32 bytes read) random: sshd: uninitialized urandom read (32 bytes read) random: sshd: uninitialized urandom read (32 bytes read) ================================================================== BUG: KASAN: slab-out-of-bounds in pskb_may_pull include/linux/skbuff.h:2104 [inline] BUG: KASAN: slab-out-of-bounds in skb_ensure_writable+0x554/0x620 net/core/skbuff.c:5101 Read of size 4 at addr ffff8801aefc1780 by task syz-executor159/4509 CPU: 0 PID: 4509 Comm: syz-executor159 Not tainted 4.17.0-rc7+ #78 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 print_address_description+0x6c/0x20b mm/kasan/report.c:256 kasan_report_error mm/kasan/report.c:354 [inline] kasan_report.cold.7+0x242/0x2fe mm/kasan/report.c:412 __asan_report_load4_noabort+0x14/0x20 mm/kasan/report.c:432 pskb_may_pull include/linux/skbuff.h:2104 [inline] skb_ensure_writable+0x554/0x620 net/core/skbuff.c:5101 __bpf_try_make_writable net/core/filter.c:1419 [inline] bpf_try_make_writable net/core/filter.c:1425 [inline] ____bpf_l3_csum_replace net/core/filter.c:1546 [inline] bpf_l3_csum_replace+0x8c/0x4d0 net/core/filter.c:1537 Allocated by task 0: (stack is not available) Freed by task 0: (stack is not available) The buggy address belongs to the object at ffff8801aefc1680 which belongs to the cache skbuff_head_cache of size 232 The buggy address is located 24 bytes to the right of 232-byte region [ffff8801aefc1680, ffff8801aefc1768) The buggy address belongs to the page: page:ffffea0006bbf040 count:1 mapcount:0 mapping:ffff8801aefc1040 index:0x0 flags: 0x2fffc0000000100(slab) raw: 02fffc0000000100 ffff8801aefc1040 0000000000000000 000000010000000c raw: ffffea0006b61060 ffffea0006bd69e0 ffff8801d9bdd6c0 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801aefc1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff8801aefc1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > ffff8801aefc1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ^ ffff8801aefc1800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff8801aefc1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ================================================================== --- This bug is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this bug report. See: https://goo.gl/tpsmEJ#bug-status-tracking for how to communicate with syzbot. syzbot can test patches for this bug, for details see: https://goo.gl/tpsmEJ#testing-patches