Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp157423imu; Thu, 3 Jan 2019 16:24:38 -0800 (PST) X-Google-Smtp-Source: AFSGD/XERwnP9thBmrrXANy17OgSS3v0u6fFfo6Gj+07h55VhPbSq80oeax8awFWJJ984RwafIOU X-Received: by 2002:a62:6408:: with SMTP id y8mr49857348pfb.202.1546561478202; Thu, 03 Jan 2019 16:24:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546561478; cv=none; d=google.com; s=arc-20160816; b=U+14qNFPmEl/lGqF8nio/AOWIdIBfycrZNeEBz8zEtYCspva+PvbDNGIsGDlpZdRKC cum71uI3C7pKfXk4eb3K7j4pfOzaM5Tc1QSH7NvQ+hpcqu1D7k8/jVmNgpINGbPEIxIo Xk/zrPtwuuLPR2nq3qLn3DGfUkzxYYDwBxUu8E+uPAAtf20XvLGh8TD1SqO6Ch4ixNNz wDzuFZhqymrUYglWeGwtTZCpJatmsub6P2AIfcb52ojI+q5i8UV853Qlpt6bEn8JZjBr /gvN6x3pJQx0CfppKMbZ6VzJPtNDBHDz3m0DJNYnrHgAZFO2jNcjedALFG3j5sgBh1F6 KUAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date; bh=uMai1Dum6GWe21a32lTC4/4sYDyEhl4nThYExx2fPBY=; b=rUe8i0obylpQnDkBNYqBSg4mT8PZOeVyHd5ldt/3fzOViO7UTwQL6wLLsFQwsOGU+f mXY5zvBJzVGysCt9XIm79cOVF4s2V6S/lGvP6M+de6ykItMxPBoI+ThmMC5t6w6FIj7k OVO/nC5c7Y3kQf3okPcM8TFqm2BWhJzI13FPrITUA8ZGFMq8ZZbK01Lu/xPBqOjC2kv9 IPv8VglfNRw80U4pZ7FSUzeXliakRikIaNGZ63zJibR4EcVtD3sV66tkrKXYMRJvVLQE i9XEKqu5gWcqe0rlVhDEVFRaTvZzAkg7auyV760zjTgPvzy+G94400M8pLtzgrS4RG/W CV4g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z123si1424997pfb.104.2019.01.03.16.24.17; Thu, 03 Jan 2019 16:24:38 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727637AbfACUA0 (ORCPT + 99 others); Thu, 3 Jan 2019 15:00:26 -0500 Received: from mx1.redhat.com ([209.132.183.28]:44640 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726036AbfACUA0 (ORCPT ); Thu, 3 Jan 2019 15:00:26 -0500 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 5BEB676533; Thu, 3 Jan 2019 20:00:25 +0000 (UTC) Received: from localhost (ovpn-200-16.brq.redhat.com [10.40.200.16]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 773181001947; Thu, 3 Jan 2019 20:00:21 +0000 (UTC) Date: Thu, 3 Jan 2019 21:00:15 +0100 From: Stefano Brivio To: Willem de Bruijn Cc: syzbot , David Miller , Alexey Kuznetsov , linux-kernel , Network Development , syzkaller-bugs@googlegroups.com, Hideaki YOSHIFUJI , Dmitry Vyukov Subject: Re: kernel panic: stack is corrupted in udp4_lib_lookup2 Message-ID: <20190103210015.56917c3b@redhat.com> In-Reply-To: References: <000000000000513fb7057e8d7013@google.com> Organization: Red Hat MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Thu, 03 Jan 2019 20:00:26 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Willem, On Thu, 3 Jan 2019 13:41:43 -0600 Willem de Bruijn wrote: > On Thu, Jan 3, 2019 at 1:39 PM Willem de Bruijn > wrote: > > > > On Thu, Jan 3, 2019 at 7:07 AM syzbot > > wrote: > > > > > > Hello, > > > > > > syzbot found the following crash on: > > > > > > HEAD commit: 195303136f19 Merge tag 'kconfig-v4.21-2' of git://git.kern.. > > > git tree: upstream > > > console output: https://syzkaller.appspot.com/x/log.txt?x=12245d8f400000 > > > kernel config: https://syzkaller.appspot.com/x/.config?x=5e7dc790609552d7 > > > dashboard link: https://syzkaller.appspot.com/bug?extid=4ad25edc7a33e4ab91e0 > > > compiler: gcc (GCC) 8.0.1 20180413 (experimental) > > > > > > Unfortunately, I don't have any reproducer for this crash yet. > > > > > > IMPORTANT: if you fix the bug, please add the following tag to the commit: > > > Reported-by: syzbot+4ad25edc7a33e4ab91e0@syzkaller.appspotmail.com > > > > > > protocol 88fb is buggy, dev hsr_slave_1 > > > protocol 88fb is buggy, dev hsr_slave_0 > > > protocol 88fb is buggy, dev hsr_slave_1 > > > FAT-fs (loop0): invalid media value (0x00) > > > FAT-fs (loop0): Can't find a valid FAT filesystem > > > Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: > > > > This sounds similar to the stack corruption fixed recently in commit > > e7cc082455cb ("udp: Support for error handlers of tunnels ..."). > > > > That fix is for ipv4 gue_err(). ipv6 gue6_err() probably needs the same. > > Correction. The fix is 11789039da ("fou: prevent unbounded recursion > in GUE error handler") Yes, I looked into this, the fix for that issue is on the tree tested by syzbot, and I think this is unrelated, also because KASan should say something before we hit that. By the way, do you happen to know if I objects from kernels tested by syzbot are stored anywhere? It would be helpful to know for sure what's at udp4_lib_lookup2+0x7ea. -- Stefano