Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3839068imu; Sat, 24 Nov 2018 12:06:49 -0800 (PST) X-Google-Smtp-Source: AJdET5eL8NDMMnEGaf7KwAfdNV3kgp6r1VjgZq490ZO7eZXkmZVg7kG2QFuGqjRHxzeEJ1r1JLDf X-Received: by 2002:a62:6799:: with SMTP id t25mr21165859pfj.139.1543090009227; Sat, 24 Nov 2018 12:06:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543090009; cv=none; d=google.com; s=arc-20160816; b=kDQ8bPO+UZUERs0nftMTIF6DgWnKOj2fObExKvUIFBmMgeIP97c6Vv7ZQb98rWlFqI wPdij4+7LHkmgTGb96OOlsnCzoXBgZVjFYb2I/rJKTdi4N4X+YDa6ez2zOwNXe/Plndf LIw1MtZg1IsoBGbCRPoqJ/57jWT53DnU0YK4b/+1DZdsIVujF4CwHZi1xChp+U2+bVhJ D52Rf/xEky3T6ZYeaEvR2NDjeYrqtFU/BYuL/IWKgEdnM7QVv1krUs8IBbfzSUJMciOa se0xJ2QzpFVkL6TDWMRnWCNms0ndgYCAosS2yW8Vkc8fMtYrgkf7yMOdxiMl4N03fkIP GMUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=nET9h/Y7EQWedAuWGmKM9KIQfice8dEbSOzTRBPexrE=; b=lTLcCv6+UIQzRutzKEiBk+dP2CWqdV7BJ1VRqX0a7mZzozji+JgcHBCsvfmTAwtrD5 K9b5M1QOJK9Lm/tii05VX8NJs/Ufd+n2aFMUokOZGMyF2A4XpTYKMVKk9wmwW6m2f/MX eFKNqeLYqp0M2HmfSccwK8434QUaZgHWcCpMxB9MwysGer+4XKe3zl2PsPP4XGD2hYq1 x10HjIr56K8oHUHVgk4lq7ReWYsrpTrb+UEIPd1drjy6F6mMwpfBnNp9dX86xUVSTR2r 2e3BDeE+cBs+/YFCMwPJbfKAAMZlAhet700BQjwdURFXTN0fUgW16JvF0GR+d11Lq/2a rW8w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i6si52574295pgm.296.2018.11.24.12.06.33; Sat, 24 Nov 2018 12:06:49 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726321AbeKYGxO (ORCPT + 99 others); Sun, 25 Nov 2018 01:53:14 -0500 Received: from zeniv.linux.org.uk ([195.92.253.2]:52216 "EHLO ZenIV.linux.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726100AbeKYGxN (ORCPT ); Sun, 25 Nov 2018 01:53:13 -0500 Received: from viro by ZenIV.linux.org.uk with local (Exim 4.91 #2 (Red Hat Linux)) id 1gQe9l-0006QY-BK; Sat, 24 Nov 2018 20:03:57 +0000 Date: Sat, 24 Nov 2018 20:03:57 +0000 From: Al Viro To: syzbot Cc: davem@davemloft.net, gregkh@linuxfoundation.org, kgraul@linux.ibm.com, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, stranche@codeaurora.org, syzkaller-bugs@googlegroups.com Subject: Re: WARNING in csum_and_copy_to_iter Message-ID: <20181124200357.GC2217@ZenIV.linux.org.uk> References: <0000000000001ecaa1057b6e4489@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <0000000000001ecaa1057b6e4489@google.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Nov 24, 2018 at 11:40:03AM -0800, syzbot wrote: > Hello, > > syzbot found the following crash on: > > HEAD commit: edeca3a769ad Merge tag 'sound-4.20-rc4' of git://git.kerne.. > git tree: upstream > console output: https://syzkaller.appspot.com/x/log.txt?x=12bee26d400000 > kernel config: https://syzkaller.appspot.com/x/.config?x=73e2bc0cb6463446 > dashboard link: https://syzkaller.appspot.com/bug?extid=ce18da013d76d837144d > compiler: gcc (GCC) 8.0.1 20180413 (experimental) > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=15ccd1f5400000 > > IMPORTANT: if you fix the bug, please add the following tag to the commit: > Reported-by: syzbot+ce18da013d76d837144d@syzkaller.appspotmail.com Caused by commit 95506588d2c1d72ca29adef8ae9bf771bcfb4ced Author: Slavomir Kaslev Date: Fri Nov 16 11:27:53 2018 +0200 socket: do a generic_file_splice_read when proto_ops has no splice_read exposing all ->recvmsg() instances to pipe-backed iov_iter as possible destination. It's not all that hard to fix (I'll probably have a candidate patch by tonight, it's just a matter of adding the only missing primitive), but... shouldn't that patch have sat in -next for at least some testing first? Because it's very easy to reproduce - splice from e.g. UDP socket will step into it. Sure, the sky is not falling (unless you set panic-on-WARN, that is); the damn thing would've failed anyway, but...