Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2974987imm; Sun, 10 Jun 2018 05:59:39 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLquUbV0C9IGiMzvj5Im3+TjDja5MyUU8OQExtRYuM93rRO8ZMD9rlIvTgFEydmD/7qdai1 X-Received: by 2002:a63:6f8a:: with SMTP id k132-v6mr11577299pgc.153.1528635579174; Sun, 10 Jun 2018 05:59:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528635579; cv=none; d=google.com; s=arc-20160816; b=Y0XjC8eIiZHbMFhhBhZl4MpjkDdGZ0YcRSznMGTms0q5umsid7iDR4xIorMMikEOQ3 9bPDd28R8bsjB7/EpjJ80D6CXOQa4IaU0itHLoV2GTWgfANTlYvds3mB7SrWa2y4H7uy +FIkPYcu7rjDJTnIJPg3MWAV3S0qplkvFhq/3Q4NB+l8tnCq/Uz5AjeMVyF9XlQPaja0 mPAq3hnF3GLFjhohur9DhPv+N7NWS+3GnyBjLdeXIom6BoFrce9AaOytSux+pNoQEP1q eXQMbtYKnzP1reKnhXMS32d90mcdGB4fCUhmjkSroHGJEHWThgtAZxOw0DSMSruf+XQa xrUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:references:in-reply-to:mime-version :dkim-signature:arc-authentication-results; bh=CyVx3rPECO+kXmX0lqr9ulOw5iBa3ezodrqQdZ8d+3A=; b=uBBEVDeWH/9PXvnlYWIWE54YES5DPULC4G6QHg2AzvN71gtJ6IDY9U1zb8mIv2uQ8u L6NSej/8LRdIUpR3TumVHUdDTJQwcTiTDGraYFTVxw8wMhHO3/0Vy4ylwnWonYUuOg9K zPgpQ9AkNMVtIkbMF8JhXSifmzcIqZNJHs/ibKOP9ulMZGUyla6kZ3bOSFObrpoNwc57 JmY2+yVfAAw1/ZxMNyhGLr6AMB8W2Meq9Y5steImx08Lc8L+aVecCx680hM1G3Xxp2Jj wB67XBCQk5ctcJWGci9PWupXOAt7IaD8NDEk5twx8rEOYLPIvApqkma8i/Jhc/j8L9QN nOSA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=MIrfBj/o; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d37-v6si61245416plb.125.2018.06.10.05.59.24; Sun, 10 Jun 2018 05:59:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=MIrfBj/o; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753375AbeFJM65 (ORCPT + 99 others); Sun, 10 Jun 2018 08:58:57 -0400 Received: from mail-pf0-f193.google.com ([209.85.192.193]:44597 "EHLO mail-pf0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751845AbeFJM6z (ORCPT ); Sun, 10 Jun 2018 08:58:55 -0400 Received: by mail-pf0-f193.google.com with SMTP id h12-v6so8834828pfk.11 for ; Sun, 10 Jun 2018 05:58:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=CyVx3rPECO+kXmX0lqr9ulOw5iBa3ezodrqQdZ8d+3A=; b=MIrfBj/oYauGjR1EL4vAbxZ1pNsXygr664fQojZ1WsQfbEJ4bAAokZhPxBbQX+8RQ9 Sy8hd+qvXeHEvd77Jzp19IND/4TdDoxTJHEAAGd9OCr+1P/fnLar0qVscTomcl4PZS3l qG6C7EzBuNAjZ2olfaBcfuZFxIUdb3svYk/nFpNTOE1Gnirww+XXrm+B7XZ30QxQmoEE bpToBj9B2/34sHwcQk2NmBN6kEW4OSQkFBFy02Xgjnnpo/iTC0KUdNInuicn1MiDYI0c q4yWY2Bag4JUpAIvdqGip3okQpy6w3L1J2lvsUswfq6FrCEnoPjIUyqbFqk6CseYzobL bJpQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=CyVx3rPECO+kXmX0lqr9ulOw5iBa3ezodrqQdZ8d+3A=; b=HWb5kVSqBdi4KImbqiGcSxS21i4ot/W+mS8CbfQUn5Z8M72sTh+1eSGX7v8NljfWcv 96xfen0F0KYM+1WyjyYEC4o6YAsHUyDXqSddS3JzPyAZQzLZgAJWGkf3XDf3ZLWXm7rH BZQQvxu+ZBRPJQQx7pFfQHd+MKw04ZG1qw1CeLy+rzDMwdN3R/BT84YJ7TjyoErwbKe/ 8sGis4ijBhZ+2l9vuhvpFQz1DCU7/ywu27jxk7Uy5WwOj0Jiih0GRojFzU3U2lC2XE55 9UP0QR6xXBgyEmBlEkFjsxWtjZZicbSwnL9xTNIMwh+AUSNC0vxyXrZnRjHM5fOiuUHV fxig== X-Gm-Message-State: APt69E3uxnd07OO/3zue6QhC4eI+lFXbGIRIeRdlhYYbCb/tKM+YfF+O nGH/+PdC0Vrk6f84sAB/J+l8blUTH2rVdqzDYSPdMQ== X-Received: by 2002:a62:a38d:: with SMTP id q13-v6mr13660648pfl.49.1528635534378; Sun, 10 Jun 2018 05:58:54 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a17:90a:d42:0:0:0:0 with HTTP; Sun, 10 Jun 2018 05:58:33 -0700 (PDT) In-Reply-To: <13f6777a-2170-d0cc-1066-1b48a27ec981@i-love.sakura.ne.jp> References: <00000000000092de58056e3d4b96@google.com> <10d6b170-b820-3077-8737-c9d06e98d0fb@I-love.SAKURA.ne.jp> <13f6777a-2170-d0cc-1066-1b48a27ec981@i-love.sakura.ne.jp> From: Dmitry Vyukov Date: Sun, 10 Jun 2018 14:58:33 +0200 Message-ID: Subject: Re: WARNING: kmalloc bug in xdp_umem_create To: Tetsuo Handa Cc: =?UTF-8?B?QmrDtnJuIFTDtnBlbA==?= , syzbot+4abadc5d69117b346506@syzkaller.appspotmail.com, =?UTF-8?B?QmrDtnJuIFTDtnBlbA==?= , "Karlsson, Magnus" , David Miller , LKML , Netdev , syzkaller-bugs Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Jun 10, 2018 at 2:53 PM, Tetsuo Handa wrote: > On 2018/06/10 20:52, Dmitry Vyukov wrote: >> On Sun, Jun 10, 2018 at 11:31 AM, Bj=C3=B6rn T=C3=B6pel wrote: >>> Den s=C3=B6n 10 juni 2018 kl 04:53 skrev Tetsuo Handa >>> : >>>> >>>> On 2018/06/10 7:47, syzbot wrote: >>>>> Hello, >>>>> >>>>> syzbot found the following crash on: >>>>> >>>>> HEAD commit: 7d3bf613e99a Merge tag 'libnvdimm-for-4.18' of git://= git.k.. >>>>> git tree: upstream >>>>> console output: https://syzkaller.appspot.com/x/log.txt?x=3D1073f68f8= 00000 >>>>> kernel config: https://syzkaller.appspot.com/x/.config?x=3Df04d8d0a2= afb789a >>>>> dashboard link: https://syzkaller.appspot.com/bug?extid=3D4abadc5d691= 17b346506 >>>>> compiler: gcc (GCC) 8.0.1 20180413 (experimental) >>>>> syzkaller repro:https://syzkaller.appspot.com/x/repro.syz?x=3D13c9756= f800000 >>>>> C reproducer: https://syzkaller.appspot.com/x/repro.c?x=3D16366f9f8= 00000 >>>>> >>>>> IMPORTANT: if you fix the bug, please add the following tag to the co= mmit: >>>>> Reported-by: syzbot+4abadc5d69117b346506@syzkaller.appspotmail.com >>>>> >>>>> random: sshd: uninitialized urandom read (32 bytes read) >>>>> random: sshd: uninitialized urandom read (32 bytes read) >>>>> random: sshd: uninitialized urandom read (32 bytes read) >>>>> random: sshd: uninitialized urandom read (32 bytes read) >>>>> random: sshd: uninitialized urandom read (32 bytes read) >>>>> WARNING: CPU: 1 PID: 4537 at mm/slab_common.c:996 kmalloc_slab+0x56/0= x70 mm/slab_common.c:996 >>>>> Kernel panic - not syncing: panic_on_warn set ... >>>> >>>> syzbot gave up upon kmalloc(), but actually error handling path has >>>> NULL pointer dereference bug. >>>> >>> >>> Thanks Tetsuo! This crash has been fixed by Daniel Borkmann in commit >>> c09290c56376 ("bpf, xdp: fix crash in xdp_umem_unaccount_pages"). >> >> Let's tell syzbot about this: >> >> #syz fix: bpf, xdp: fix crash in xdp_umem_unaccount_pages >> >> > Excuse me, but that patch fixes NULL pointer dereference which occurs aft= er kmalloc()'s > "WARNING: CPU: 1 PID: 4537 at mm/slab_common.c:996 kmalloc_slab+0x56/0x70= mm/slab_common.c:996" > message. That is, "Too large memory allocation" itself is not yet fixed. You are right! I fixed it up. Thanks