Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp3873691imm; Tue, 17 Jul 2018 11:46:05 -0700 (PDT) X-Google-Smtp-Source: AAOMgpd2jQvOonJ9beKEfjLgEJgGGGC8DaS8/ERnMT89X2DWxRNumwTvDiYNfajQ4ZG8v/mbdesN X-Received: by 2002:a63:5e45:: with SMTP id s66-v6mr2686658pgb.151.1531853165121; Tue, 17 Jul 2018 11:46:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531853165; cv=none; d=google.com; s=arc-20160816; b=p3KTFfpmV0FA85V6PxnS2+zkbNZ1odUTdiTVmtjDXIyKOYcg5Byrfh3mzOCew+JrNx 1AfW8pVEFxnwksaMulDfS7Tr67TdbWAkAg0eat6/bAJhRUfYHZkHL37IZfR2Kqa5cJ62 GMgHDc0yl8U2AJwajwmbh1FfxsynKNzZFOKMHBSXI5JTc7z2aRLRA9foNEcpI0votHh+ OHu5io2QE4JIKnwxE/VfFwUKok/Lrp3hLD/52yEFR3Ybdf9zvvGrcldZmNnM0ihja6Av Yiv+Efr26IldJDXDfiChJE9qjeY2iaH4/pF8Ppa1oUZ4uGTNaJZTb3jjgEOayaovpa4i Y6iw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=CtwOlU91XEmgtnosYL8+GtecoTlDiEnOfecojs13Mts=; b=V21dM20Gh0aEfjUMoN6mBd0S1WR1/VkHnCFTvU7BYmnkT7En6gSWyIgBLpi15hhmMU WpywSxSI+spIdDouo8qz3n1X/wrb77F0Dup0RssmnX0bpgPZnAiQapNSGLMURo6K5iqW 38xFodti959HRLeg2Je3cTeMGEwcKvax45D2PjiWupKAQbpsjgn9Zy4my28xXNMNaoIL vuDBgO3Ip3dnBntYiUnv/FitO7pPmu5+QauvqziLAQJQPBMbeJj5b0ESsih0xUtkktjI EhlUFbWEvdNpitr0+gyV/uYnCtjPYjwjZ4vSfTDe1VVEB3Kf56rO3je4/G6BP9ga0YJV 0m1g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=BHm4uAbN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d22-v6si1470839pfj.311.2018.07.17.11.45.49; Tue, 17 Jul 2018 11:46:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=BHm4uAbN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730689AbeGQTSy (ORCPT + 99 others); Tue, 17 Jul 2018 15:18:54 -0400 Received: from mail-pg1-f196.google.com ([209.85.215.196]:45858 "EHLO mail-pg1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729863AbeGQTSx (ORCPT ); Tue, 17 Jul 2018 15:18:53 -0400 Received: by mail-pg1-f196.google.com with SMTP id f1-v6so814027pgq.12 for ; Tue, 17 Jul 2018 11:44:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=CtwOlU91XEmgtnosYL8+GtecoTlDiEnOfecojs13Mts=; b=BHm4uAbNVVzNSsWNo8QL58fZscLMGO/lpaq9HpCxm7NCFSDKI2qwrDiYKhVY/vjvWF BJA8NZhkNRz31G2DpJeS6RxRjMuztcfYY38WU9MaMtFRw3LS7yJpFKxGbB6Li8aXesET GxHBsWYpjvvPDpESmH2bIV5GHPYozUx+4g6mCUGxrMKCQPuNmx59Vuf0P+OvoeVjnUdN QPY15XBlmZxoWhbFpszOXJoO67Z7TtkMrrxi+sGsFkZF6vmwW0fdXEBZAY1jiV3QW6rK Z/UsZwAfEygVh28+PPz4z7k6OPc0xIdraVHo1Ld1tfORMTky1vo0A32ACT+WYd+sV4PV BM3w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=CtwOlU91XEmgtnosYL8+GtecoTlDiEnOfecojs13Mts=; b=o+m2H1M4K+9Gkefn9uqwh1wgFVsrXdfbZ3a42ViFpqpD11354gOze7lqQenKmsTCdW Asbxto75K5GU7MhkpLH+u+i8oSsWRclkMPFLBttAeMLVP93BZQn8SmTE854PeFZ3wCFM zBcRndmZ+PglzjTYlvWM6L5Jx5dGfLdMp/+wCG2lL44ORot3s2zlhp0EHkiAkTbtrgTn 8WZWND0aAic22H19ErVReF57YaUmbIoxPoKx8z70J9TyGMcwMBIGpyg19sB4F10Oru1R XXmR2jA7ArWj43sTg5nk3FYCyAt1K+LjpyXZqzCQ/doP7Dfkro8mPBBiPIzJVjFcGHW3 sSag== X-Gm-Message-State: AOUpUlEI6WCnC0j1Qj+40u3EcbzzCjHoNLugOj/wnq180f2h0JS7vvMx ZkbnXKLKS968QPbLwWwmfseC52ib X-Received: by 2002:a63:7454:: with SMTP id e20-v6mr2753586pgn.410.1531853097984; Tue, 17 Jul 2018 11:44:57 -0700 (PDT) Received: from gmail.com ([2620:15c:17:3:dc28:5c82:b905:e8a8]) by smtp.gmail.com with ESMTPSA id t76-v6sm2790754pfe.109.2018.07.17.11.44.57 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 17 Jul 2018 11:44:57 -0700 (PDT) Date: Tue, 17 Jul 2018 11:44:55 -0700 From: Eric Biggers To: syzbot Cc: keescook@chromium.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, syzkaller-bugs@googlegroups.com Subject: Re: BUG: bad usercopy in __check_heap_object (3) Message-ID: <20180717184455.GE75957@gmail.com> References: <000000000000b9a32405705c54c2@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <000000000000b9a32405705c54c2@google.com> User-Agent: Mutt/1.10+35 (c786a508) (2018-06-22) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jul 06, 2018 at 03:39:04PM -0700, syzbot wrote: > Hello, > > syzbot found the following crash on: > > HEAD commit: 526674536360 Add linux-next specific files for 20180706 > git tree: linux-next > console output: https://syzkaller.appspot.com/x/log.txt?x=12d51a2c400000 > kernel config: https://syzkaller.appspot.com/x/.config?x=c8d1cfc0cb798e48 > dashboard link: https://syzkaller.appspot.com/bug?extid=4b712dce5cbce6700f27 > compiler: gcc (GCC) 8.0.1 20180413 (experimental) > syzkaller repro:https://syzkaller.appspot.com/x/repro.syz?x=14b05afc400000 > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=17594968400000 > > IMPORTANT: if you fix the bug, please add the following tag to the commit: > Reported-by: syzbot+4b712dce5cbce6700f27@syzkaller.appspotmail.com > > IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready > IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready > 8021q: adding VLAN 0 to HW filter on device team0 > usercopy: Kernel memory exposure attempt detected from SLAB object > 'kmalloc-4096' (offset 2399, size 2626)! > ------------[ cut here ]------------ > kernel BUG at mm/usercopy.c:100! > invalid opcode: 0000 [#1] SMP KASAN > CPU: 1 PID: 4718 Comm: syz-executor688 Not tainted 4.18.0-rc3-next-20180706+ > #1 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS > Google 01/01/2011 > RIP: 0010:usercopy_abort+0xbb/0xbd mm/usercopy.c:88 > Code: c0 e8 37 ec b8 ff ff 75 c8 48 8b 55 c0 4d 89 f9 ff 75 d0 4d 89 e8 48 > 89 d9 4c 89 e6 41 56 48 c7 c7 e0 4c f3 87 e8 37 a0 9f ff <0f> 0b e8 0c ec b8 > ff e8 97 42 f7 ff 4c 89 e1 8b 95 14 ff ff ff 31 > RSP: 0018:ffff8801d33a78b0 EFLAGS: 00010286 > RAX: 000000000000006b RBX: ffffffff88c10e70 RCX: 0000000000000000 > RDX: 0000000000000000 RSI: ffffffff81634381 RDI: 0000000000000001 > RBP: ffff8801d33a7908 R08: ffff8801d1e2a200 R09: ffffed003b5e4fc0 > R10: ffffed003b5e4fc0 R11: ffff8801daf27e07 R12: ffffffff87f34bc0 > R13: ffffffff87f34a80 R14: ffffffff87f34a40 R15: ffffffff88c0c905 > FS: 00007f56a6072700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > CR2: 0000000020001000 CR3: 00000001b8fdf000 CR4: 00000000001406e0 > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > Call Trace: > __check_heap_object+0xb5/0xb5 mm/slab.c:4445 > check_heap_object mm/usercopy.c:236 [inline] > __check_object_size+0x4db/0x5f2 mm/usercopy.c:259 > check_object_size include/linux/thread_info.h:119 [inline] > check_copy_size include/linux/thread_info.h:150 [inline] > copy_to_user include/linux/uaccess.h:154 [inline] > seq_read+0x578/0x10e0 fs/seq_file.c:211 > do_loop_readv_writev fs/read_write.c:700 [inline] > do_iter_read+0x49e/0x650 fs/read_write.c:924 > vfs_readv+0x175/0x1c0 fs/read_write.c:986 > do_readv+0x11a/0x310 fs/read_write.c:1019 > __do_sys_readv fs/read_write.c:1106 [inline] > __se_sys_readv fs/read_write.c:1103 [inline] > __x64_sys_readv+0x75/0xb0 fs/read_write.c:1103 > do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 > entry_SYSCALL_64_after_hwframe+0x49/0xbe > RIP: 0033:0x446c09 > Code: e8 1c bc 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 > 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff > 0f 83 5b 07 fc ff c3 66 2e 0f 1f 84 00 00 00 00 > RSP: 002b:00007f56a6071d18 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 > RAX: ffffffffffffffda RBX: 00000000006dcc5c RCX: 0000000000446c09 > RDX: 0000000000000002 RSI: 00000000200021c0 RDI: 0000000000000005 > RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 > R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006dcc58 > R13: 00007f56a6071d20 R14: 6f72746e6f632f2e R15: 0000000000000007 > Modules linked in: > Dumping ftrace buffer: > (ftrace buffer empty) > ---[ end trace 532b9c3f493b2e4d ]--- > RIP: 0010:usercopy_abort+0xbb/0xbd mm/usercopy.c:88 > Code: c0 e8 37 ec b8 ff ff 75 c8 48 8b 55 c0 4d 89 f9 ff 75 d0 4d 89 e8 48 > 89 d9 4c 89 e6 41 56 48 c7 c7 e0 4c f3 87 e8 37 a0 9f ff <0f> 0b e8 0c ec b8 > ff e8 97 42 f7 ff 4c 89 e1 8b 95 14 ff ff ff 31 > RSP: 0018:ffff8801d33a78b0 EFLAGS: 00010286 > RAX: 000000000000006b RBX: ffffffff88c10e70 RCX: 0000000000000000 > RDX: 0000000000000000 RSI: ffffffff81634381 RDI: 0000000000000001 > RBP: ffff8801d33a7908 R08: ffff8801d1e2a200 R09: ffffed003b5e4fc0 > R10: ffffed003b5e4fc0 R11: ffff8801daf27e07 R12: ffffffff87f34bc0 > R13: ffffffff87f34a80 R14: ffffffff87f34a40 R15: ffffffff88c0c905 > FS: 00007f56a6072700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > CR2: 0000000020001000 CR3: 00000001b8fdf000 CR4: 00000000001406e0 > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > > Fixed in -mm and linux-next by: #syz fix: VFS: seq_file: ensure ->from is valid - Eric