From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.0 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id F1F02C43387 for ; Thu, 3 Jan 2019 20:07:53 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id BB915208E3 for ; Thu, 3 Jan 2019 20:07:53 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727731AbfACUHw convert rfc822-to-8bit (ORCPT ); Thu, 3 Jan 2019 15:07:52 -0500 Received: from mx1.redhat.com ([209.132.183.28]:51928 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726036AbfACUHw (ORCPT ); Thu, 3 Jan 2019 15:07:52 -0500 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id BEC53B946; Thu, 3 Jan 2019 20:07:51 +0000 (UTC) Received: from localhost (ovpn-200-16.brq.redhat.com [10.40.200.16]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 67B7760C68; Thu, 3 Jan 2019 20:07:48 +0000 (UTC) Date: Thu, 3 Jan 2019 21:07:43 +0100 From: Stefano Brivio To: Eric Dumazet Cc: syzbot , davem@davemloft.net, kuznet@ms2.inr.ac.ru, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, syzkaller-bugs@googlegroups.com, yoshfuji@linux-ipv6.org, Willem de Bruijn Subject: Re: kernel panic: stack is corrupted in udp4_lib_lookup2 Message-ID: <20190103210743.6518841e@redhat.com> In-Reply-To: References: <000000000000513fb7057e8d7013@google.com> Organization: Red Hat MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Thu, 03 Jan 2019 20:07:51 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 3 Jan 2019 12:01:29 -0800 Eric Dumazet wrote: > On 01/03/2019 05:07 AM, syzbot wrote: > > Hello, > > > > syzbot found the following crash on: > > > > HEAD commit:    195303136f19 Merge tag 'kconfig-v4.21-2' of git://git.kern.. > > git tree:       upstream > > console output: https://syzkaller.appspot.com/x/log.txt?x=12245d8f400000 > > kernel config:  https://syzkaller.appspot.com/x/.config?x=5e7dc790609552d7 > > dashboard link: https://syzkaller.appspot.com/bug?extid=4ad25edc7a33e4ab91e0 > > compiler:       gcc (GCC) 8.0.1 20180413 (experimental) > > > > Unfortunately, I don't have any reproducer for this crash yet. > > > > IMPORTANT: if you fix the bug, please add the following tag to the commit: > > Reported-by: syzbot+4ad25edc7a33e4ab91e0@syzkaller.appspotmail.com > > > > protocol 88fb is buggy, dev hsr_slave_1 > > protocol 88fb is buggy, dev hsr_slave_0 > > protocol 88fb is buggy, dev hsr_slave_1 > > FAT-fs (loop0): invalid media value (0x00) > > FAT-fs (loop0): Can't find a valid FAT filesystem > > Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: udp4_lib_lookup2+0x7ea/0x7f0 net/ipv4/udp.c:455 > > CPU: 1 PID: 17960 Comm: syz-executor2 Not tainted 4.20.0+ #176 > > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 > > Call Trace: > > Kernel Offset: disabled > > Rebooting in 86400 seconds.. > > > > > > --- > > This bug is generated by a bot. It may contain errors. > > See https://goo.gl/tpsmEJ for more information about syzbot. > > syzbot engineers can be reached at syzkaller@googlegroups.com. > > > > syzbot will keep track of this bug report. See: > > https://goo.gl/tpsmEJ#bug-status-tracking for how to communicate with syzbot. > > Maybe commit 11789039da536fea96c98a40c2b441decf2e7323 > Author: Stefano Brivio > Date: Tue Dec 18 00:13:17 2018 +0100 > > fou: Prevent unbounded recursion in GUE error handler > > Forgot to deal with IPv6 ? Damn, yes. :( Thanks both for pointing that out, patch coming. Still, I can't be sure this is the same issue. -- Stefano