Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1984494imm; Thu, 19 Jul 2018 11:03:06 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdWIYL8GM1zxkuCfkmm6vBgjQJ4s6JlOTp+AGJ/Mtyw1to2/Cq0cC12xz3t4gGOR0DtnufC X-Received: by 2002:a17:902:b7c5:: with SMTP id v5-v6mr11250762plz.30.1532023386305; Thu, 19 Jul 2018 11:03:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532023386; cv=none; d=google.com; s=arc-20160816; b=Td6pWGoJpuPq4U/En75giDsN2R5riPm+xwFjzXR47KUw+jbg3LWOaLdFaWqmd5TXhs TNiNM1ed/RsgErAID6D+7jpJNUbICD4skmP4hVV9iardlF4aQIa9F2SAxkEHNe3nMiyY shUAWE72FkB2x3EDI2pvmiUvHZse98NMvjnjlaWw3yP/Hn3k9aYC8XzfmV2Pc/+DZhLn e0d6gERiZitNQ0mOz7H6EhosLhf7KSR1V8pXTqqNcV6T95GQPapSBdn3sF0Vblqzm2CN x/fvrjgBxUobPNRyqgHfEv0un87QlxvDxMfJ5QidhH6h+f6XABQknEUEpeUYS6tM1gD6 js4w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:from:subject:message-id:date :mime-version:arc-authentication-results; bh=GXRMBhecAmL2xtLSEkXWNOLEztBgc9A83j2cwvuLwYs=; b=jPg9wnQMpIfI0TGMdUWztqgOvufYW2sJnRu52s2McFxTvGUNa/EvsVn/Nfr03izRee flOZ7F3H3/HSa93xlEQTiTuEtNYhd3z0qhvaoCjYZl7QX6bCax/xWPUMJbPpeQjSPfzY BeZE2iGDb1I5uErdE7zCcSf5NZJJDUVQkJYxG3RB2T9QySTvPocks2ttj2FhzQ4FL4t5 +xaFFl76L8DLeNlFnNhlYwjZcrHdbqpNrOscAHqGuZNQIQ3AYlxhaNjYeLRFwIQaejAY UJTlqJuSAkM+pXB4ViLpgJ3TME1vM6DjzD43j1wZopALbnB4jgAEItKs7wiG8aCkKJ+H LJQg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d38-v6si6249658pla.422.2018.07.19.11.02.50; Thu, 19 Jul 2018 11:03:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388099AbeGSSpS (ORCPT + 99 others); Thu, 19 Jul 2018 14:45:18 -0400 Received: from mail-io0-f198.google.com ([209.85.223.198]:42974 "EHLO mail-io0-f198.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731979AbeGSSpS (ORCPT ); Thu, 19 Jul 2018 14:45:18 -0400 Received: by mail-io0-f198.google.com with SMTP id t23-v6so6532786ioa.9 for ; Thu, 19 Jul 2018 11:01:02 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:date:message-id:subject:from:to; bh=GXRMBhecAmL2xtLSEkXWNOLEztBgc9A83j2cwvuLwYs=; b=SrcH2z5psCSNtN/qSf2CQjwevQGKWNsbQRtnHAb1h60UfVq+1v7IjnfUBydk4+WpPn 7aaa2bEDxFOMk5DV0fQezbhhcKuMjnv81+DbI4lie/tp+Q9pc3dYhnfbkf5/mUXuj+tE 0gO52uITGBaU8Q5AgQmphusJvdASTh7QQ3SrXSGVAY4JZNtqx5aoOl+gsSW4fWoXMpyG g9r01GVNkEq0gcMPpMk9BBVqvW+aJ7hkAP69ldv+qflX6ZVVKSgkqa4uLXekWtrhd2HC oDsHBrKnrVr3ppqWPLH4tCxmRvtbK2D3xQjBI0/Y9ppITd5IzEEs2EzbvU/syFFUy2fc nENw== X-Gm-Message-State: AOUpUlHpAULuYhY0ToqGLnJl48LHvAor1gHJ6AhKtGhxbRND0Mxs3DZZ ZCHYH+iKnFhgXAJQkpOs/hOFBw51RHOq6GELfp+lNwnSqWdH MIME-Version: 1.0 X-Received: by 2002:a24:ed87:: with SMTP id r129-v6mr3340199ith.32.1532023261297; Thu, 19 Jul 2018 11:01:01 -0700 (PDT) Date: Thu, 19 Jul 2018 11:01:01 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <00000000000047116205715df655@google.com> Subject: KASAN: use-after-free Read in generic_perform_write From: syzbot To: akpm@linux-foundation.org, jack@suse.cz, jlayton@redhat.com, linux-kernel@vger.kernel.org, linux-mm@kvack.org, mgorman@techsingularity.net, syzkaller-bugs@googlegroups.com, willy@infradead.org Content-Type: text/plain; charset="UTF-8"; format=flowed; delsp=yes Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following crash on: HEAD commit: 1c34981993da Add linux-next specific files for 20180719 git tree: linux-next console output: https://syzkaller.appspot.com/x/log.txt?x=16e6ac44400000 kernel config: https://syzkaller.appspot.com/x/.config?x=7002497517b09aec dashboard link: https://syzkaller.appspot.com/bug?extid=b173e77096a8ba815511 compiler: gcc (GCC) 8.0.1 20180413 (experimental) Unfortunately, I don't have any reproducer for this crash yet. IMPORTANT: if you fix the bug, please add the following tag to the commit: Reported-by: syzbot+b173e77096a8ba815511@syzkaller.appspotmail.com IPVS: length: 141 != 24 XFS (loop5): Invalid superblock magic number ================================================================== BUG: KASAN: use-after-free in memcpy include/linux/string.h:345 [inline] BUG: KASAN: use-after-free in iov_iter_copy_from_user_atomic+0xb8d/0xfa0 lib/iov_iter.c:916 Read of size 21 at addr ffff880190103660 by task kworker/0:3/4927 CPU: 0 PID: 4927 Comm: kworker/0:3 Not tainted 4.18.0-rc5-next-20180719+ #11 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events p9_write_work Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c9/0x2b4 lib/dump_stack.c:113 print_address_description+0x6c/0x20b mm/kasan/report.c:256 kasan_report_error mm/kasan/report.c:354 [inline] kasan_report.cold.7+0x242/0x30d mm/kasan/report.c:412 check_memory_region_inline mm/kasan/kasan.c:260 [inline] check_memory_region+0x13e/0x1b0 mm/kasan/kasan.c:267 memcpy+0x23/0x50 mm/kasan/kasan.c:302 memcpy include/linux/string.h:345 [inline] iov_iter_copy_from_user_atomic+0xb8d/0xfa0 lib/iov_iter.c:916 generic_perform_write+0x469/0x6c0 mm/filemap.c:3058 __generic_file_write_iter+0x26e/0x630 mm/filemap.c:3175 ext4_file_write_iter+0x390/0x1450 fs/ext4/file.c:266 call_write_iter include/linux/fs.h:1826 [inline] new_sync_write fs/read_write.c:474 [inline] __vfs_write+0x6af/0x9d0 fs/read_write.c:487 vfs_write+0x1fc/0x560 fs/read_write.c:549 kernel_write+0xab/0x120 fs/read_write.c:526 p9_fd_write net/9p/trans_fd.c:427 [inline] p9_write_work+0x6f1/0xd50 net/9p/trans_fd.c:476 process_one_work+0xc73/0x1ba0 kernel/workqueue.c:2153 worker_thread+0x189/0x13c0 kernel/workqueue.c:2296 kthread+0x345/0x410 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:415 Allocated by task 13072: save_stack+0x43/0xd0 mm/kasan/kasan.c:448 set_track mm/kasan/kasan.c:460 [inline] kasan_kmalloc+0xc4/0xe0 mm/kasan/kasan.c:553 __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x14e/0x760 mm/slab.c:3727 kmalloc include/linux/slab.h:518 [inline] p9_fcall_alloc+0x1e/0x90 net/9p/client.c:237 p9_tag_alloc net/9p/client.c:266 [inline] p9_client_prepare_req.part.8+0x107/0xa00 net/9p/client.c:640 p9_client_prepare_req net/9p/client.c:675 [inline] p9_client_rpc+0x242/0x1330 net/9p/client.c:675 p9_client_version net/9p/client.c:890 [inline] p9_client_create+0xca4/0x1537 net/9p/client.c:974 v9fs_session_init+0x21a/0x1a80 fs/9p/v9fs.c:400 v9fs_mount+0x7c/0x900 fs/9p/vfs_super.c:135 legacy_get_tree+0x131/0x460 fs/fs_context.c:674 vfs_get_tree+0x1cb/0x5c0 fs/super.c:1743 do_new_mount fs/namespace.c:2603 [inline] do_mount+0x6f2/0x1e20 fs/namespace.c:2927 ksys_mount+0x12d/0x140 fs/namespace.c:3143 __do_sys_mount fs/namespace.c:3157 [inline] __se_sys_mount fs/namespace.c:3154 [inline] __x64_sys_mount+0xbe/0x150 fs/namespace.c:3154 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe Freed by task 13072: save_stack+0x43/0xd0 mm/kasan/kasan.c:448 set_track mm/kasan/kasan.c:460 [inline] __kasan_slab_free+0x11a/0x170 mm/kasan/kasan.c:521 kasan_slab_free+0xe/0x10 mm/kasan/kasan.c:528 __cache_free mm/slab.c:3498 [inline] kfree+0xd9/0x260 mm/slab.c:3813 p9_free_req+0xb5/0x120 net/9p/client.c:338 p9_client_rpc+0xa8e/0x1330 net/9p/client.c:739 p9_client_version net/9p/client.c:890 [inline] p9_client_create+0xca4/0x1537 net/9p/client.c:974 v9fs_session_init+0x21a/0x1a80 fs/9p/v9fs.c:400 v9fs_mount+0x7c/0x900 fs/9p/vfs_super.c:135 legacy_get_tree+0x131/0x460 fs/fs_context.c:674 vfs_get_tree+0x1cb/0x5c0 fs/super.c:1743 do_new_mount fs/namespace.c:2603 [inline] do_mount+0x6f2/0x1e20 fs/namespace.c:2927 ksys_mount+0x12d/0x140 fs/namespace.c:3143 __do_sys_mount fs/namespace.c:3157 [inline] __se_sys_mount fs/namespace.c:3154 [inline] __x64_sys_mount+0xbe/0x150 fs/namespace.c:3154 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe The buggy address belongs to the object at ffff880190103640 which belongs to the cache kmalloc-16384 of size 16384 The buggy address is located 32 bytes inside of 16384-byte region [ffff880190103640, ffff880190107640) The buggy address belongs to the page: page:ffffea0006404000 count:1 mapcount:0 mapping:ffff8801da802200 index:0x0 compound_mapcount: 0 flags: 0x2fffc0000010200(slab|head) raw: 02fffc0000010200 ffffea000643b808 ffffea0006452c08 ffff8801da802200 raw: 0000000000000000 ffff880190103640 0000000100000001 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff880190103500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff880190103580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > ffff880190103600: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb ^ ffff880190103680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff880190103700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ================================================================== --- This bug is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this bug report. See: https://goo.gl/tpsmEJ#bug-status-tracking for how to communicate with syzbot.