Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3100353imm; Sun, 10 Jun 2018 08:28:15 -0700 (PDT) X-Received: by 2002:a17:902:8d8b:: with SMTP id v11-v6mr14967477plo.20.1528644464610; Sun, 10 Jun 2018 08:27:44 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLa7DHMAkGcXvQ3tFmiYYJSvnzK9npWqecefBvz1rIYOkPO9AP2tWxhkQPI6nna61JO/vmm X-Received: by 2002:a17:902:8d8b:: with SMTP id v11-v6mr14967430plo.20.1528644463942; Sun, 10 Jun 2018 08:27:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528644463; cv=none; d=google.com; s=arc-20160816; b=jDAL0XNTzYpOqUshCna4LbPBRR0edvkHZr41GFvnZ5OMKobfsnahoikZD/IbpOh4C4 ClbkJvZYZpIL497x8nAcjD9iC1ol+kz/GozpwqBR5qprlmGUErQQvMrh0yLmtlMw3mzQ pODB+7iFP9oJOJE+X30shOSEmuuxSixqkmdfbGlzLY8M1lNlAC+QrH7HejzXg8kR4z2f 9YZ7saFfo6r8crQ0Bh7RiM1ofx+elTPolsniM9pttqtl6KHRqVkK/pMR3W+P34El8VFN Cg1aFCuaZuQ7lZTW2TlA51/z3sw1U5CgXZqsn4ZZFJRkJ3BzrYfGclUbI5Uouc2Cneqo UHWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:from:subject:message-id:date :mime-version:arc-authentication-results; bh=1B/uhX25LUt4UokdYUp+JeZXSC4wwA4m+mZU7nAw43U=; b=l3BaEXP4zLUGN2bIwaJV5WvJuqu5LQZ3jsWOmv2dysyXZ94UGqFXwTX/Nhg+beV13p slm+lTLrdVo9HaoucHz2wJJAQ0CR5P8P5En6bidYVuRWaSU37BUy7b74rXR0n2Lu0mnQ iJJCUVVQae4ZqA4og+kkU4tQHiBiSx7hxiD63j1+I2MgSOjHLiKbMKz5gV8yvxTnv3oY UX5BScF/A1AAR4BzjvuaTJ/b4yAVC75dIvz9kntPfQV0q0Q0e/bCNBCM3iQd+3y+ijLX WP343Y4Ka59adg0btX6z8qL49KbdpTc/JgSeG6UytVQuZSJSt6wqW8BeKSyyGZVqP0Re Hqvg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c32-v6si15621634plj.277.2018.06.10.08.27.29; Sun, 10 Jun 2018 08:27:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753572AbeFJP1E (ORCPT + 99 others); Sun, 10 Jun 2018 11:27:04 -0400 Received: from mail-io0-f197.google.com ([209.85.223.197]:47577 "EHLO mail-io0-f197.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753375AbeFJP1C (ORCPT ); Sun, 10 Jun 2018 11:27:02 -0400 Received: by mail-io0-f197.google.com with SMTP id 140-v6so14038540iou.14 for ; Sun, 10 Jun 2018 08:27:02 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:date:message-id:subject:from:to; bh=1B/uhX25LUt4UokdYUp+JeZXSC4wwA4m+mZU7nAw43U=; b=D3+9AuDu0OubZXoP/2whhKoOa430zbNQKVSEfKWv0n9wu7g0Nl5Z7VVAeYpO+54h3v MGtrMw3SW/Ltl4WPCTi9IxuHVjXIjE3Lq1CFMllCJoao/yhM6HdyMnq0MZZXedwVjMJb s/KA2PibOjOOq/sWFA+hoydoM/F0hK4+wqrcCbSzPFRMD/LWkDt3ty5Ous8XpHOhjRTO iuq8/I5xOk0pzDqIzDLv3qtudO5+K+3u5zTbKcyKYZKPViQDWfQvzmBlg2JDrawbMUp1 fsutIW3Zu3pfuZMxiPm8FqdVRvEiOTYYG7JIVinN0dhswvvi/lta88Q2DkO1L/KlvV2I /o0w== X-Gm-Message-State: APt69E0EGs1GuQ6pe67hf5lwMhyB0KlzO8o7Qx6QNa7r7/KgsMX5Pfzb hIODFxpq6qxS0T32wb/mLrHNClD/clpt5M7T6NH1/+n2dr2N MIME-Version: 1.0 X-Received: by 2002:a24:1a44:: with SMTP id 65-v6mr6781675iti.20.1528644422221; Sun, 10 Jun 2018 08:27:02 -0700 (PDT) Date: Sun, 10 Jun 2018 08:27:02 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <000000000000c64842056e4b4326@google.com> Subject: KASAN: slab-out-of-bounds Read in bpf_skb_change_proto From: syzbot To: ast@kernel.org, daniel@iogearbox.net, davem@davemloft.net, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8"; format=flowed; delsp=yes Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following crash on: HEAD commit: a16afaf7928b Merge tag 'for-v4.18' of git://git.kernel.org.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=1338f6bf800000 kernel config: https://syzkaller.appspot.com/x/.config?x=314f2150f36c16ca dashboard link: https://syzkaller.appspot.com/bug?extid=d2d729bdde65dee3eae6 compiler: gcc (GCC) 8.0.1 20180413 (experimental) syzkaller repro:https://syzkaller.appspot.com/x/repro.syz?x=1173381f800000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=171f90cf800000 IMPORTANT: if you fix the bug, please add the following tag to the commit: Reported-by: syzbot+d2d729bdde65dee3eae6@syzkaller.appspotmail.com random: sshd: uninitialized urandom read (32 bytes read) random: sshd: uninitialized urandom read (32 bytes read) random: sshd: uninitialized urandom read (32 bytes read) random: sshd: uninitialized urandom read (32 bytes read) ================================================================== BUG: KASAN: slab-out-of-bounds in bpf_skb_proto_xlat net/core/filter.c:2637 [inline] BUG: KASAN: slab-out-of-bounds in ____bpf_skb_change_proto net/core/filter.c:2675 [inline] BUG: KASAN: slab-out-of-bounds in bpf_skb_change_proto+0xe37/0x1300 net/core/filter.c:2650 Read of size 2 at addr ffff8801b04646c0 by task syz-executor241/4519 CPU: 0 PID: 4519 Comm: syz-executor241 Not tainted 4.17.0+ #93 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 print_address_description+0x6c/0x20b mm/kasan/report.c:256 kasan_report_error mm/kasan/report.c:354 [inline] kasan_report.cold.7+0x242/0x2fe mm/kasan/report.c:412 __asan_report_load2_noabort+0x14/0x20 mm/kasan/report.c:431 bpf_skb_proto_xlat net/core/filter.c:2637 [inline] ____bpf_skb_change_proto net/core/filter.c:2675 [inline] bpf_skb_change_proto+0xe37/0x1300 net/core/filter.c:2650 Allocated by task 0: (stack is not available) Freed by task 0: (stack is not available) The buggy address belongs to the object at ffff8801b04646c0 which belongs to the cache skbuff_head_cache of size 232 The buggy address is located 0 bytes inside of 232-byte region [ffff8801b04646c0, ffff8801b04647a8) The buggy address belongs to the page: page:ffffea0006c11900 count:1 mapcount:0 mapping:ffff8801d9a0d080 index:0x0 flags: 0x2fffc0000000100(slab) raw: 02fffc0000000100 ffffea0006c49388 ffffea0006ae5c48 ffff8801d9a0d080 raw: 0000000000000000 ffff8801b0464080 000000010000000c 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801b0464580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff8801b0464600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > ffff8801b0464680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ^ ffff8801b0464700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff8801b0464780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ================================================================== --- This bug is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this bug report. See: https://goo.gl/tpsmEJ#bug-status-tracking for how to communicate with syzbot. syzbot can test patches for this bug, for details see: https://goo.gl/tpsmEJ#testing-patches