* [syzbot] [net?] KMSAN: kernel-infoleak in __skb_datagram_iter (2)
@ 2024-02-02 13:26 syzbot
2024-02-15 9:27 ` [syzbot] [PATCH] net: Fix " syzbot
` (6 more replies)
0 siblings, 7 replies; 15+ messages in thread
From: syzbot @ 2024-02-02 13:26 UTC (permalink / raw)
To: davem, edumazet, kuba, linux-kernel, netdev, pabeni,
syzkaller-bugs
Hello,
syzbot found the following issue on:
HEAD commit: 5bd7ef53ffe5 Merge tag 'pull-fixes' of git://git.kernel.or..
git tree: upstream
console+strace: https://syzkaller.appspot.com/x/log.txt?x=13c1aee6e80000
kernel config: https://syzkaller.appspot.com/x/.config?x=f3f069371247b697
dashboard link: https://syzkaller.appspot.com/bug?extid=34ad5fab48f7bf510349
compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=15555751e80000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=10c93571e80000
Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/cd1e7587b624/disk-5bd7ef53.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/62969c864f78/vmlinux-5bd7ef53.xz
kernel image: https://storage.googleapis.com/syzbot-assets/af66253a313c/bzImage-5bd7ef53.xz
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+34ad5fab48f7bf510349@syzkaller.appspotmail.com
=====================================================
BUG: KMSAN: kernel-infoleak-after-free in instrument_copy_to_user include/linux/instrumented.h:114 [inline]
BUG: KMSAN: kernel-infoleak-after-free in copy_to_user_iter lib/iov_iter.c:24 [inline]
BUG: KMSAN: kernel-infoleak-after-free in iterate_ubuf include/linux/iov_iter.h:29 [inline]
BUG: KMSAN: kernel-infoleak-after-free in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
BUG: KMSAN: kernel-infoleak-after-free in iterate_and_advance include/linux/iov_iter.h:271 [inline]
BUG: KMSAN: kernel-infoleak-after-free in _copy_to_iter+0x364/0x2520 lib/iov_iter.c:186
instrument_copy_to_user include/linux/instrumented.h:114 [inline]
copy_to_user_iter lib/iov_iter.c:24 [inline]
iterate_ubuf include/linux/iov_iter.h:29 [inline]
iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
iterate_and_advance include/linux/iov_iter.h:271 [inline]
_copy_to_iter+0x364/0x2520 lib/iov_iter.c:186
copy_to_iter include/linux/uio.h:197 [inline]
simple_copy_to_iter+0x68/0xa0 net/core/datagram.c:532
__skb_datagram_iter+0x123/0xdc0 net/core/datagram.c:420
skb_copy_datagram_iter+0x5c/0x200 net/core/datagram.c:546
skb_copy_datagram_msg include/linux/skbuff.h:3960 [inline]
packet_recvmsg+0xd9c/0x2000 net/packet/af_packet.c:3482
sock_recvmsg_nosec net/socket.c:1044 [inline]
sock_recvmsg net/socket.c:1066 [inline]
sock_read_iter+0x467/0x580 net/socket.c:1136
call_read_iter include/linux/fs.h:2014 [inline]
new_sync_read fs/read_write.c:389 [inline]
vfs_read+0x8f6/0xe00 fs/read_write.c:470
ksys_read+0x20f/0x4c0 fs/read_write.c:613
__do_sys_read fs/read_write.c:623 [inline]
__se_sys_read fs/read_write.c:621 [inline]
__x64_sys_read+0x93/0xd0 fs/read_write.c:621
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b
Uninit was stored to memory at:
skb_put_data include/linux/skbuff.h:2622 [inline]
netlink_to_full_skb net/netlink/af_netlink.c:181 [inline]
__netlink_deliver_tap_skb net/netlink/af_netlink.c:298 [inline]
__netlink_deliver_tap+0x5be/0xc90 net/netlink/af_netlink.c:325
netlink_deliver_tap net/netlink/af_netlink.c:338 [inline]
netlink_deliver_tap_kernel net/netlink/af_netlink.c:347 [inline]
netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
netlink_unicast+0x10f1/0x1250 net/netlink/af_netlink.c:1368
netlink_sendmsg+0x1238/0x13d0 net/netlink/af_netlink.c:1910
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg net/socket.c:745 [inline]
____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
__sys_sendmsg net/socket.c:2667 [inline]
__do_sys_sendmsg net/socket.c:2676 [inline]
__se_sys_sendmsg net/socket.c:2674 [inline]
__x64_sys_sendmsg+0x307/0x490 net/socket.c:2674
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b
Uninit was created at:
free_pages_prepare mm/page_alloc.c:1087 [inline]
free_unref_page_prepare+0xb0/0xa40 mm/page_alloc.c:2347
free_unref_page_list+0xeb/0x1100 mm/page_alloc.c:2533
release_pages+0x23d3/0x2410 mm/swap.c:1042
free_pages_and_swap_cache+0xd9/0xf0 mm/swap_state.c:316
tlb_batch_pages_flush mm/mmu_gather.c:98 [inline]
tlb_flush_mmu_free mm/mmu_gather.c:293 [inline]
tlb_flush_mmu+0x6f5/0x980 mm/mmu_gather.c:300
tlb_finish_mmu+0x101/0x260 mm/mmu_gather.c:392
exit_mmap+0x49e/0xd30 mm/mmap.c:3321
__mmput+0x13f/0x530 kernel/fork.c:1349
mmput+0x8a/0xa0 kernel/fork.c:1371
exit_mm+0x1b8/0x360 kernel/exit.c:567
do_exit+0xd57/0x4080 kernel/exit.c:858
do_group_exit+0x2fd/0x390 kernel/exit.c:1021
__do_sys_exit_group kernel/exit.c:1032 [inline]
__se_sys_exit_group kernel/exit.c:1030 [inline]
__x64_sys_exit_group+0x3c/0x50 kernel/exit.c:1030
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b
Bytes 3852-3903 of 3904 are uninitialized
Memory access of size 3904 starts at ffff88812ea1e000
Data copied to user address 0000000020003280
CPU: 1 PID: 5043 Comm: syz-executor297 Not tainted 6.7.0-rc5-syzkaller-00047-g5bd7ef53ffe5 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
=====================================================
---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzkaller@googlegroups.com.
syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title
If you want syzbot to run the reproducer, reply with:
#syz test: git://repo/address.git branch-or-commit-hash
If you attach or paste a git patch, syzbot will apply it before testing.
If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)
If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report
If you want to undo deduplication, reply with:
#syz undup
^ permalink raw reply [flat|nested] 15+ messages in thread* Re: [syzbot] [PATCH] net: Fix kernel-infoleak in __skb_datagram_iter (2)
2024-02-02 13:26 [syzbot] [net?] KMSAN: kernel-infoleak in __skb_datagram_iter (2) syzbot
@ 2024-02-15 9:27 ` syzbot
2024-02-17 12:40 ` [syzbot] " syzbot
` (5 subsequent siblings)
6 siblings, 0 replies; 15+ messages in thread
From: syzbot @ 2024-02-15 9:27 UTC (permalink / raw)
To: linux-kernel
For archival purposes, forwarding an incoming command email to
linux-kernel@vger.kernel.org.
***
Subject: [PATCH] net: Fix kernel-infoleak in __skb_datagram_iter (2)
Author: ryasuoka@redhat.com
#syz test
diff --git a/include/linux/skbuff.h b/include/linux/skbuff.h
index 27998f73183e..c7bf1c38b292 100644
--- a/include/linux/skbuff.h
+++ b/include/linux/skbuff.h
@@ -2532,6 +2532,11 @@ static inline unsigned char
*skb_tail_pointer(const struct sk_buff *skb)
return skb->head + skb->tail;
}
+static inline unsigned int skb_tail_offset(const struct sk_buff *skb)
+{
+ return skb->tail;
+}
+
static inline void skb_reset_tail_pointer(struct sk_buff *skb)
{
skb->tail = skb->data - skb->head;
@@ -2549,6 +2554,11 @@ static inline unsigned char
*skb_tail_pointer(const struct sk_buff *skb)
return skb->tail;
}
+static inline unsigned int skb_tail_offset(const struct sk_buff *skb)
+{
+ return skb->tail - skb->head;
+}
+
static inline void skb_reset_tail_pointer(struct sk_buff *skb)
{
skb->tail = skb->data;
diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c
index eb086b06d60d..f11bb308f1ed 100644
--- a/net/netlink/af_netlink.c
+++ b/net/netlink/af_netlink.c
@@ -167,7 +167,7 @@ static inline u32 netlink_group_mask(u32 group)
static struct sk_buff *netlink_to_full_skb(const struct sk_buff *skb,
gfp_t gfp_mask)
{
- unsigned int len = skb_end_offset(skb);
+ unsigned int len = skb_tail_offset(skb);
struct sk_buff *new;
new = alloc_skb(len, gfp_mask);
^ permalink raw reply related [flat|nested] 15+ messages in thread* Re: [syzbot] Re: [PATCH] net: Fix kernel-infoleak in __skb_datagram_iter (2)
2024-02-02 13:26 [syzbot] [net?] KMSAN: kernel-infoleak in __skb_datagram_iter (2) syzbot
2024-02-15 9:27 ` [syzbot] [PATCH] net: Fix " syzbot
@ 2024-02-17 12:40 ` syzbot
2024-02-17 14:51 ` syzbot
` (4 subsequent siblings)
6 siblings, 0 replies; 15+ messages in thread
From: syzbot @ 2024-02-17 12:40 UTC (permalink / raw)
To: linux-kernel
For archival purposes, forwarding an incoming command email to
linux-kernel@vger.kernel.org.
***
Subject: Re: [PATCH] net: Fix kernel-infoleak in __skb_datagram_iter (2)
Author: ryasuoka@redhat.com
#syz test: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
master
diff --git a/include/linux/skbuff.h b/include/linux/skbuff.h
index 2dde34c29203..540df9a6a9b3 100644
--- a/include/linux/skbuff.h
+++ b/include/linux/skbuff.h
@@ -2542,6 +2542,11 @@ static inline unsigned char
*skb_tail_pointer(const struct sk_buff *skb)
return skb->head + skb->tail;
}
+static inline unsigned int skb_tail_offset(const struct sk_buff *skb)
+{
+ return skb->tail;
+}
+
static inline void skb_reset_tail_pointer(struct sk_buff *skb)
{
skb->tail = skb->data - skb->head;
@@ -2559,6 +2564,11 @@ static inline unsigned char
*skb_tail_pointer(const struct sk_buff *skb)
return skb->tail;
}
+static inline unsigned int skb_tail_offset(const struct sk_buff *skb)
+{
+ return skb->tail - skb->head;
+}
+
static inline void skb_reset_tail_pointer(struct sk_buff *skb)
{
skb->tail = skb->data;
diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c
index 9c962347cf85..d1b8e02c7e44 100644
--- a/net/netlink/af_netlink.c
+++ b/net/netlink/af_netlink.c
@@ -167,7 +167,7 @@ static inline u32 netlink_group_mask(u32 group)
static struct sk_buff *netlink_to_full_skb(const struct sk_buff *skb,
gfp_t gfp_mask)
{
- unsigned int len = skb_end_offset(skb);
+ unsigned int len = skb_tail_offset(skb);
struct sk_buff *new;
new = alloc_skb(len, gfp_mask);
^ permalink raw reply related [flat|nested] 15+ messages in thread* Re: [syzbot] Re: [PATCH] net: Fix kernel-infoleak in __skb_datagram_iter (2)
2024-02-02 13:26 [syzbot] [net?] KMSAN: kernel-infoleak in __skb_datagram_iter (2) syzbot
2024-02-15 9:27 ` [syzbot] [PATCH] net: Fix " syzbot
2024-02-17 12:40 ` [syzbot] " syzbot
@ 2024-02-17 14:51 ` syzbot
2024-02-20 2:42 ` [syzbot] [PATCH net] netlink: Fix kernel-infoleak in __skb_datagram_iter() syzbot
` (3 subsequent siblings)
6 siblings, 0 replies; 15+ messages in thread
From: syzbot @ 2024-02-17 14:51 UTC (permalink / raw)
To: linux-kernel
For archival purposes, forwarding an incoming command email to
linux-kernel@vger.kernel.org.
***
Subject: Re: [PATCH] net: Fix kernel-infoleak in __skb_datagram_iter (2)
Author: ryasuoka@redhat.com
#syz test: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
9f8413c4a66f
diff --git a/include/linux/skbuff.h b/include/linux/skbuff.h
index 27998f73183e..c7bf1c38b292 100644
--- a/include/linux/skbuff.h
+++ b/include/linux/skbuff.h
@@ -2532,6 +2532,11 @@ static inline unsigned char
*skb_tail_pointer(const struct sk_buff *skb)
return skb->head + skb->tail;
}
+static inline unsigned int skb_tail_offset(const struct sk_buff *skb)
+{
+ return skb->tail;
+}
+
static inline void skb_reset_tail_pointer(struct sk_buff *skb)
{
skb->tail = skb->data - skb->head;
@@ -2549,6 +2554,11 @@ static inline unsigned char
*skb_tail_pointer(const struct sk_buff *skb)
return skb->tail;
}
+static inline unsigned int skb_tail_offset(const struct sk_buff *skb)
+{
+ return skb->tail - skb->head;
+}
+
static inline void skb_reset_tail_pointer(struct sk_buff *skb)
{
skb->tail = skb->data;
diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c
index eb086b06d60d..f11bb308f1ed 100644
--- a/net/netlink/af_netlink.c
+++ b/net/netlink/af_netlink.c
@@ -167,7 +167,7 @@ static inline u32 netlink_group_mask(u32 group)
static struct sk_buff *netlink_to_full_skb(const struct sk_buff *skb,
gfp_t gfp_mask)
{
- unsigned int len = skb_end_offset(skb);
+ unsigned int len = skb_tail_offset(skb);
struct sk_buff *new;
new = alloc_skb(len, gfp_mask);
^ permalink raw reply related [flat|nested] 15+ messages in thread* Re: [syzbot] [PATCH net] netlink: Fix kernel-infoleak in __skb_datagram_iter()
2024-02-02 13:26 [syzbot] [net?] KMSAN: kernel-infoleak in __skb_datagram_iter (2) syzbot
` (2 preceding siblings ...)
2024-02-17 14:51 ` syzbot
@ 2024-02-20 2:42 ` syzbot
2024-02-20 4:49 ` syzbot
` (2 subsequent siblings)
6 siblings, 0 replies; 15+ messages in thread
From: syzbot @ 2024-02-20 2:42 UTC (permalink / raw)
To: linux-kernel
For archival purposes, forwarding an incoming command email to
linux-kernel@vger.kernel.org.
***
Subject: [PATCH net] netlink: Fix kernel-infoleak in __skb_datagram_iter()
Author: ryasuoka@redhat.com
#syz test: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 5bd7ef53ffe5
diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c
index eb086b06d60d..8277399d19b3 100644
--- a/net/netlink/af_netlink.c
+++ b/net/netlink/af_netlink.c
@@ -167,7 +167,7 @@ static inline u32 netlink_group_mask(u32 group)
static struct sk_buff *netlink_to_full_skb(const struct sk_buff *skb,
gfp_t gfp_mask)
{
- unsigned int len = skb_end_offset(skb);
+ unsigned int len = skb->len;
struct sk_buff *new;
new = alloc_skb(len, gfp_mask);
^ permalink raw reply related [flat|nested] 15+ messages in thread* Re: [syzbot] [PATCH net] netlink: Fix kernel-infoleak in __skb_datagram_iter()
2024-02-02 13:26 [syzbot] [net?] KMSAN: kernel-infoleak in __skb_datagram_iter (2) syzbot
` (3 preceding siblings ...)
2024-02-20 2:42 ` [syzbot] [PATCH net] netlink: Fix kernel-infoleak in __skb_datagram_iter() syzbot
@ 2024-02-20 4:49 ` syzbot
2024-02-20 7:16 ` [syzbot] Test for 34ad5fab48f7bf510349 syzbot
2024-02-20 12:00 ` [syzbot] [PATCH net] netlink: Fix kernel-infoleak in __skb_datagram_iter() syzbot
6 siblings, 0 replies; 15+ messages in thread
From: syzbot @ 2024-02-20 4:49 UTC (permalink / raw)
To: linux-kernel
For archival purposes, forwarding an incoming command email to
linux-kernel@vger.kernel.org.
***
Subject: [PATCH net] netlink: Fix kernel-infoleak in __skb_datagram_iter()
Author: ryasuoka@redhat.com
#syz test
diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c
index 9c962347cf85..ff315351269f 100644
--- a/net/netlink/af_netlink.c
+++ b/net/netlink/af_netlink.c
@@ -167,7 +167,7 @@ static inline u32 netlink_group_mask(u32 group)
static struct sk_buff *netlink_to_full_skb(const struct sk_buff *skb,
gfp_t gfp_mask)
{
- unsigned int len = skb_end_offset(skb);
+ unsigned int len = skb->len;
struct sk_buff *new;
new = alloc_skb(len, gfp_mask);
^ permalink raw reply related [flat|nested] 15+ messages in thread* Re: [syzbot] Test for 34ad5fab48f7bf510349
2024-02-02 13:26 [syzbot] [net?] KMSAN: kernel-infoleak in __skb_datagram_iter (2) syzbot
` (4 preceding siblings ...)
2024-02-20 4:49 ` syzbot
@ 2024-02-20 7:16 ` syzbot
2024-02-20 12:00 ` [syzbot] [PATCH net] netlink: Fix kernel-infoleak in __skb_datagram_iter() syzbot
6 siblings, 0 replies; 15+ messages in thread
From: syzbot @ 2024-02-20 7:16 UTC (permalink / raw)
To: linux-kernel
For archival purposes, forwarding an incoming command email to
linux-kernel@vger.kernel.org.
***
Subject: Test for 34ad5fab48f7bf510349
Author: syoshida@redhat.com
#syz test: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 5bd7ef53ffe5ca580e93e74eb8c81ed191ddc4bd
diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c
index 9c962347cf85..c9ad41bce426 100644
--- a/net/netlink/af_netlink.c
+++ b/net/netlink/af_netlink.c
@@ -167,7 +167,8 @@ static inline u32 netlink_group_mask(u32 group)
static struct sk_buff *netlink_to_full_skb(const struct sk_buff *skb,
gfp_t gfp_mask)
{
- unsigned int len = skb_end_offset(skb);
+ //unsigned int len = skb_end_offset(skb);
+ unsigned int len = skb->len;
struct sk_buff *new;
new = alloc_skb(len, gfp_mask);
^ permalink raw reply related [flat|nested] 15+ messages in thread* Re: [syzbot] [PATCH net] netlink: Fix kernel-infoleak in __skb_datagram_iter()
2024-02-02 13:26 [syzbot] [net?] KMSAN: kernel-infoleak in __skb_datagram_iter (2) syzbot
` (5 preceding siblings ...)
2024-02-20 7:16 ` [syzbot] Test for 34ad5fab48f7bf510349 syzbot
@ 2024-02-20 12:00 ` syzbot
6 siblings, 0 replies; 15+ messages in thread
From: syzbot @ 2024-02-20 12:00 UTC (permalink / raw)
To: linux-kernel
For archival purposes, forwarding an incoming command email to
linux-kernel@vger.kernel.org.
***
Subject: [PATCH net] netlink: Fix kernel-infoleak in __skb_datagram_iter()
Author: ryasuoka@redhat.com
#syz test: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 5bd7ef53ffe5ca580e93e74eb8c81ed191ddc4bd
diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c
index eb086b06d60d..8277399d19b3 100644
--- a/net/netlink/af_netlink.c
+++ b/net/netlink/af_netlink.c
@@ -167,7 +167,7 @@ static inline u32 netlink_group_mask(u32 group)
static struct sk_buff *netlink_to_full_skb(const struct sk_buff *skb,
gfp_t gfp_mask)
{
- unsigned int len = skb_end_offset(skb);
+ unsigned int len = skb->len;
struct sk_buff *new;
new = alloc_skb(len, gfp_mask);
^ permalink raw reply related [flat|nested] 15+ messages in thread
[parent not found: <CAHpthZr+VHsntmc5QRrL+viRKDu4sWJcX2Yf+oauEv9FghyB0A@mail.gmail.com>]
[parent not found: <CAHpthZoG-4eO91UNScaiL1GUcoTZRDMQDzTZ0RvhGZdRZHHGLw@mail.gmail.com>]
[parent not found: <CAHpthZpJeO1JGpOS3h_7n-wu28pEZuxo-SVB=x=OJKXpZ71Brg@mail.gmail.com>]
[parent not found: <ZdQRnIUGz-j1ubag@zeus>]
[parent not found: <ZdQvap_8BIiIq_GB@zeus>]
* Re: [syzbot] [net?] KMSAN: kernel-infoleak in __skb_datagram_iter (2)
[not found] <ZdQvap_8BIiIq_GB@zeus>
@ 2024-02-20 5:27 ` syzbot
0 siblings, 0 replies; 15+ messages in thread
From: syzbot @ 2024-02-20 5:27 UTC (permalink / raw)
To: linux-kernel, ryasuoka, syzkaller-bugs
Hello,
syzbot tried to test the proposed patch but the build/boot failed:
.
[ 10.076074][ T1] fuse: init (API version 7.39)
[ 10.080364][ T1] orangefs_debugfs_init: called with debug mask: :none: :0:
[ 10.082002][ T1] orangefs_init: module version upstream loaded
[ 10.083592][ T1] JFS: nTxBlock = 8192, nTxLock = 65536
[ 10.099770][ T1] SGI XFS with ACLs, security attributes, realtime, quota, no debug enabled
[ 10.104241][ T1] 9p: Installing v9fs 9p2000 file system support
[ 10.105539][ T1] NILFS version 2 loaded
[ 10.106156][ T1] befs: version: 0.9.3
[ 10.107195][ T1] ocfs2: Registered cluster interface o2cb
[ 10.108527][ T1] ocfs2: Registered cluster interface user
[ 10.111379][ T1] OCFS2 User DLM kernel interface loaded
[ 10.118460][ T1] gfs2: GFS2 installed
[ 10.135588][ T1] ceph: loaded (mds proto 32)
[ 12.024322][ T1] NET: Registered PF_ALG protocol family
[ 12.025308][ T1] xor: automatically using best checksumming function avx
[ 12.027314][ T1] async_tx: api initialized (async)
[ 12.028180][ T1] Key type asymmetric registered
[ 12.029109][ T1] Asymmetric key parser 'x509' registered
[ 12.030157][ T1] Asymmetric key parser 'pkcs8' registered
[ 12.030980][ T1] Key type pkcs7_test registered
[ 12.032530][ T1] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 240)
[ 12.034815][ T1] io scheduler mq-deadline registered
[ 12.035601][ T1] io scheduler kyber registered
[ 12.036477][ T1] io scheduler bfq registered
[ 12.043584][ T1] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0
[ 12.054905][ T1] ACPI: button: Power Button [PWRF]
[ 12.061506][ T1] input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input1
[ 12.071048][ T1] ACPI: button: Sleep Button [SLPF]
[ 12.086912][ T1] ioatdma: Intel(R) QuickData Technology Driver 5.00
[ 12.130351][ T1] ACPI: \_SB_.LNKC: Enabled at IRQ 11
[ 12.135899][ T1] virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver
[ 12.175460][ T1] ACPI: \_SB_.LNKD: Enabled at IRQ 10
[ 12.181044][ T1] virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver
[ 12.221372][ T1] ACPI: \_SB_.LNKB: Enabled at IRQ 10
[ 12.226897][ T1] virtio-pci 0000:00:06.0: virtio_pci: leaving for legacy driver
[ 12.317580][ T257] kworker/u4:0 (257) used greatest stack depth: 11000 bytes left
[ 12.798023][ T1] N_HDLC line discipline registered with maxframe=4096
[ 12.805613][ T1] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
[ 12.815494][ T1] 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
[ 12.835349][ T1] 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A
[ 12.855309][ T1] 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A
[ 12.875589][ T1] 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A
[ 12.907146][ T1] Non-volatile memory driver v1.3
[ 12.921393][ T1] Linux agpgart interface v0.103
[ 12.931868][ T1] ACPI: bus type drm_connector registered
[ 12.943489][ T1] [drm] Initialized vgem 1.0.0 20120112 for vgem on minor 0
[ 12.959783][ T1] [drm] Initialized vkms 1.0.0 20180514 for vkms on minor 1
[ 13.248241][ T1] Console: switching to colour frame buffer device 128x48
[ 13.314754][ T1] platform vkms: [drm] fb0: vkmsdrmfb frame buffer device
[ 13.322329][ T1] usbcore: registered new interface driver udl
[ 13.472888][ T1] brd: module loaded
[ 13.561610][ T1] loop: module loaded
[ 13.689528][ T1] zram: Added device: zram0
[ 13.702671][ T1] null_blk: disk nullb0 created
[ 13.707565][ T1] null_blk: module loaded
[ 13.712923][ T1] Guest personality initialized and is inactive
[ 13.719805][ T1] VMCI host device registered (name=vmci, major=10, minor=118)
[ 13.727398][ T1] Initialized host personality
[ 13.732444][ T1] usbcore: registered new interface driver rtsx_usb
[ 13.741306][ T1] usbcore: registered new interface driver viperboard
[ 13.748470][ T1] usbcore: registered new interface driver dln2
[ 13.755172][ T1] usbcore: registered new interface driver pn533_usb
[ 13.765466][ T1] nfcsim 0.2 initialized
[ 13.769944][ T1] usbcore: registered new interface driver port100
[ 13.776737][ T1] usbcore: registered new interface driver nfcmrvl
[ 13.789159][ T1] Loading iSCSI transport class v2.0-870.
[ 13.809621][ T1] virtio_scsi virtio0: 1/0/0 default/read/poll queues
[ 13.830894][ T1] scsi host0: Virtio SCSI HBA
[ 14.080706][ T1] st: Version 20160209, fixed bufsize 32768, s/g segs 256
[ 14.093000][ T41] scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6
[ 14.119106][ T1] Rounding down aligned max_sectors from 4294967295 to 4294967288
[ 14.128024][ T1] db_root: cannot open: /etc/target
[ 14.157608][ T1] =====================================================
[ 14.157758][ T1] BUG: KMSAN: use-after-free in __list_del_entry_valid_or_report+0x19e/0x490
[ 14.157853][ T1] __list_del_entry_valid_or_report+0x19e/0x490
[ 14.157942][ T1] stack_depot_save_flags+0x3e7/0x7b0
[ 14.158005][ T1] stack_depot_save+0x12/0x20
[ 14.158059][ T1] ref_tracker_alloc+0x215/0x700
[ 14.158123][ T1] linkwatch_fire_event+0x32b/0x6d0
[ 14.158208][ T1] netif_carrier_off+0xec/0x110
[ 14.158278][ T1] bond_create+0x19d/0x2a0
[ 14.158354][ T1] bonding_init+0x1a7/0x2d0
[ 14.158412][ T1] do_one_initcall+0x216/0x960
[ 14.158478][ T1] do_initcall_level+0x140/0x350
[ 14.158540][ T1] do_initcalls+0xf0/0x1d0
[ 14.158595][ T1] do_basic_setup+0x22/0x30
[ 14.158651][ T1] kernel_init_freeable+0x300/0x4b0
[ 14.158713][ T1] kernel_init+0x2f/0x7e0
[ 14.158781][ T1] ret_from_fork+0x66/0x80
[ 14.158855][ T1] ret_from_fork_asm+0x11/0x20
[ 14.158921][ T1]
[ 14.158930][ T1] Uninit was created at:
[ 14.158959][ T1] __free_pages_ok+0x133/0xeb0
[ 14.159060][ T1] alloc_pages_exact+0x2f5/0x350
[ 14.159060][ T1] vring_alloc_queue_split+0x2d9/0x990
[ 14.159060][ T1] vring_create_virtqueue_split+0x89/0x380
[ 14.159060][ T1] vring_create_virtqueue+0x101/0x1a0
[ 14.159060][ T1] setup_vq+0x175/0x510
[ 14.159060][ T1] vp_setup_vq+0x103/0x630
[ 14.159060][ T1] vp_find_vqs_msix+0x1162/0x16c0
[ 14.159060][ T1] vp_find_vqs+0x78/0x770
[ 14.159060][ T1] virtscsi_init+0xff7/0x17a0
[ 14.159060][ T1] virtscsi_probe+0x43b/0xfe0
[ 14.159060][ T1] virtio_dev_probe+0x16df/0x1900
[ 14.159060][ T1] really_probe+0x506/0xf40
[ 14.159060][ T1] __driver_probe_device+0x2a7/0x5d0
[ 14.159060][ T1] driver_probe_device+0x72/0x7b0
[ 14.159060][ T1] __driver_attach+0x710/0xa30
[ 14.159060][ T1] bus_for_each_dev+0x34c/0x530
[ 14.159060][ T1] driver_attach+0x51/0x60
[ 14.159060][ T1] bus_add_driver+0x747/0xca0
[ 14.159060][ T1] driver_register+0x3fb/0x650
[ 14.159060][ T1] register_virtio_driver+0xd1/0xf0
[ 14.159060][ T1] virtio_scsi_init+0x123/0x2f0
[ 14.159060][ T1] do_one_initcall+0x216/0x960
[ 14.159060][ T1] do_initcall_level+0x140/0x350
[ 14.159060][ T1] do_initcalls+0xf0/0x1d0
[ 14.159060][ T1] do_basic_setup+0x22/0x30
[ 14.159060][ T1] kernel_init_freeable+0x300/0x4b0
[ 14.159060][ T1] kernel_init+0x2f/0x7e0
[ 14.159060][ T1] ret_from_fork+0x66/0x80
[ 14.159060][ T1] ret_from_fork_asm+0x11/0x20
[ 14.159060][ T1]
[ 14.159060][ T1] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 6.8.0-rc5-syzkaller-gb401b621758e-dirty #0
[ 14.159060][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
[ 14.159060][ T1] =====================================================
[ 14.159060][ T1] Disabling lock debugging due to kernel taint
[ 14.159060][ T1] Kernel panic - not syncing: kmsan.panic set ...
[ 14.159060][ T1] CPU: 1 PID: 1 Comm: swapper/0 Tainted: G B 6.8.0-rc5-syzkaller-gb401b621758e-dirty #0
[ 14.159060][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
[ 14.159060][ T1] Call Trace:
[ 14.159060][ T1] <TASK>
[ 14.159060][ T1] dump_stack_lvl+0x1bf/0x240
[ 14.159060][ T1] dump_stack+0x1e/0x20
[ 14.159060][ T1] panic+0x4de/0xc90
[ 14.159060][ T1] kmsan_report+0x2d0/0x2d0
[ 14.159060][ T1] ? filter_irq_stacks+0x164/0x1a0
[ 14.159060][ T1] ? __msan_warning+0x96/0x110
[ 14.159060][ T1] ? __list_del_entry_valid_or_report+0x19e/0x490
[ 14.159060][ T1] ? stack_depot_save_flags+0x3e7/0x7b0
[ 14.159060][ T1] ? stack_depot_save+0x12/0x20
[ 14.159060][ T1] ? ref_tracker_alloc+0x215/0x700
[ 14.159060][ T1] ? linkwatch_fire_event+0x32b/0x6d0
[ 14.159060][ T1] ? netif_carrier_off+0xec/0x110
[ 14.159060][ T1] ? bond_create+0x19d/0x2a0
[ 14.159060][ T1] ? bonding_init+0x1a7/0x2d0
[ 14.159060][ T1] ? do_one_initcall+0x216/0x960
[ 14.159060][ T1] ? do_initcall_level+0x140/0x350
[ 14.159060][ T1] ? do_initcalls+0xf0/0x1d0
[ 14.159060][ T1] ? do_basic_setup+0x22/0x30
[ 14.159060][ T1] ? kernel_init_freeable+0x300/0x4b0
[ 14.159060][ T1] ? kernel_init+0x2f/0x7e0
[ 14.159060][ T1] ? ret_from_fork+0x66/0x80
[ 14.159060][ T1] ? ret_from_fork_asm+0x11/0x20
[ 14.159060][ T1] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0
[ 14.159060][ T1] ? kmsan_get_metadata+0x146/0x1c0
[ 14.159060][ T1] ? kmsan_get_metadata+0x146/0x1c0
[ 14.159060][ T1] ? kmsan_get_metadata+0x146/0x1c0
[ 14.159060][ T1] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0
[ 14.159060][ T1] ? _raw_spin_lock_irqsave+0x35/0xc0
[ 14.159060][ T1] ? filter_irq_stacks+0x60/0x1a0
[ 14.159060][ T1] ? stack_depot_save_flags+0x2c/0x7b0
[ 14.159060][ T1] ? kmsan_get_metadata+0x146/0x1c0
[ 14.159060][ T1] ? kmsan_get_metadata+0x146/0x1c0
[ 14.159060][ T1] ? kmsan_get_metadata+0x146/0x1c0
[ 14.159060][ T1] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0
[ 14.159060][ T1] __msan_warning+0x96/0x110
[ 14.159060][ T1] __list_del_entry_valid_or_report+0x19e/0x490
[ 14.159060][ T1] stack_depot_save_flags+0x3e7/0x7b0
[ 14.159060][ T1] stack_depot_save+0x12/0x20
[ 14.159060][ T1] ref_tracker_alloc+0x215/0x700
[ 14.159060][ T1] ? linkwatch_fire_event+0x32b/0x6d0
[ 14.159060][ T1] ? netif_carrier_off+0xec/0x110
[ 14.159060][ T1] ? bond_create+0x19d/0x2a0
[ 14.159060][ T1] ? bonding_init+0x1a7/0x2d0
[ 14.159060][ T1] ? do_one_initcall+0x216/0x960
[ 14.159060][ T1] ? do_initcall_level+0x140/0x350
[ 14.159060][ T1] ? do_initcalls+0xf0/0x1d0
[ 14.159060][ T1] ? do_basic_setup+0x22/0x30
[ 14.159060][ T1] ? kernel_init_freeable+0x300/0x4b0
[ 14.159060][ T1] ? kernel_init+0x2f/0x7e0
[ 14.159060][ T1] ? ret_from_fork+0x66/0x80
[ 14.159060][ T1] ? ret_from_fork_asm+0x11/0x20
[ 14.159060][ T1] ? kmsan_internal_unpoison_memory+0x14/0x20
[ 14.159060][ T1] linkwatch_fire_event+0x32b/0x6d0
[ 14.159060][ T1] ? advisor_target_scan_time_store+0xe0/0x170
[ 14.159060][ T1] netif_carrier_off+0xec/0x110
[ 14.159060][ T1] bond_create+0x19d/0x2a0
[ 14.159060][ T1] bonding_init+0x1a7/0x2d0
[ 14.159060][ T1] ? spi_dln2_driver_init+0x40/0x40
[ 14.159060][ T1] do_one_initcall+0x216/0x960
[ 14.159060][ T1] ? spi_dln2_driver_init+0x40/0x40
[ 14.159060][ T1] ? kmsan_get_metadata+0xb0/0x1c0
[ 14.159060][ T1] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0
[ 14.159060][ T1] ? filter_irq_stacks+0x164/0x1a0
[ 14.159060][ T1] ? stack_depot_save_flags+0x2c/0x7b0
[ 14.159060][ T1] ? skip_spaces+0x8f/0xc0
[ 14.159060][ T1] ? kmsan_get_metadata+0x146/0x1c0
[ 14.159060][ T1] ? kmsan_get_metadata+0x146/0x1c0
[ 14.159060][ T1] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0
[ 14.159060][ T1] ? kmsan_get_metadata+0x146/0x1c0
[ 14.159060][ T1] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0
[ 14.159060][ T1] ? parse_args+0x1511/0x15e0
[ 14.159060][ T1] ? kmsan_get_metadata+0x146/0x1c0
[ 14.159060][ T1] ? kmsan_get_shadow_origin_ptr+0x4d/0xa0
[ 14.159060][ T1] ? spi_dln2_driver_init+0x40/0x40
[ 14.159060][ T1] do_initcall_level+0x140/0x350
[ 14.159060][ T1] do_initcalls+0xf0/0x1d0
[ 14.159060][ T1] ? arch_cpuhp_init_parallel_bringup+0xe0/0xe0
[ 14.159060][ T1] do_basic_setup+0x22/0x30
[ 14.159060][ T1] kernel_init_freeable+0x300/0x4b0
[ 14.159060][ T1] ? rest_init+0x260/0x260
[ 14.159060][ T1] kernel_init+0x2f/0x7e0
[ 14.159060][ T1] ? rest_init+0x260/0x260
[ 14.159060][ T1] ret_from_fork+0x66/0x80
[ 14.159060][ T1] ? rest_init+0x260/0x260
[ 14.159060][ T1] ret_from_fork_asm+0x11/0x20
[ 14.159060][ T1] </TASK>
[ 14.159060][ T1] Kernel Offset: disabled
syzkaller build log:
go env (err=<nil>)
GO111MODULE='auto'
GOARCH='amd64'
GOBIN=''
GOCACHE='/syzkaller/.cache/go-build'
GOENV='/syzkaller/.config/go/env'
GOEXE=''
GOEXPERIMENT=''
GOFLAGS=''
GOHOSTARCH='amd64'
GOHOSTOS='linux'
GOINSECURE=''
GOMODCACHE='/syzkaller/jobs-2/linux/gopath/pkg/mod'
GONOPROXY=''
GONOSUMDB=''
GOOS='linux'
GOPATH='/syzkaller/jobs-2/linux/gopath'
GOPRIVATE=''
GOPROXY='https://proxy.golang.org,direct'
GOROOT='/usr/local/go'
GOSUMDB='sum.golang.org'
GOTMPDIR=''
GOTOOLCHAIN='auto'
GOTOOLDIR='/usr/local/go/pkg/tool/linux_amd64'
GOVCS=''
GOVERSION='go1.21.4'
GCCGO='gccgo'
GOAMD64='v1'
AR='ar'
CC='gcc'
CXX='g++'
CGO_ENABLED='1'
GOMOD='/syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/go.mod'
GOWORK=''
CGO_CFLAGS='-O2 -g'
CGO_CPPFLAGS=''
CGO_CXXFLAGS='-O2 -g'
CGO_FFLAGS='-O2 -g'
CGO_LDFLAGS='-O2 -g'
PKG_CONFIG='pkg-config'
GOGCCFLAGS='-fPIC -m64 -pthread -Wl,--no-gc-sections -fmessage-length=0 -ffile-prefix-map=/tmp/go-build3485226163=/tmp/go-build -gno-record-gcc-switches'
git status (err=<nil>)
HEAD detached at 3222d10cb
nothing to commit, working tree clean
tput: No value for $TERM and no -T specified
tput: No value for $TERM and no -T specified
Makefile:32: run command via tools/syz-env for best compatibility, see:
Makefile:33: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env
go list -f '{{.Stale}}' ./sys/syz-sysgen | grep -q false || go install ./sys/syz-sysgen
make .descriptions
tput: No value for $TERM and no -T specified
tput: No value for $TERM and no -T specified
bin/syz-sysgen
touch .descriptions
GOOS=linux GOARCH=amd64 go build "-ldflags=-s -w -X github.com/google/syzkaller/prog.GitRevision=3222d10cbe77bbedb5a7c455e5bcb6b7081a63b7 -X 'github.com/google/syzkaller/prog.gitRevisionDate=20231213-164354'" "-tags=syz_target syz_os_linux syz_arch_amd64 " -o ./bin/linux_amd64/syz-fuzzer github.com/google/syzkaller/syz-fuzzer
GOOS=linux GOARCH=amd64 go build "-ldflags=-s -w -X github.com/google/syzkaller/prog.GitRevision=3222d10cbe77bbedb5a7c455e5bcb6b7081a63b7 -X 'github.com/google/syzkaller/prog.gitRevisionDate=20231213-164354'" "-tags=syz_target syz_os_linux syz_arch_amd64 " -o ./bin/linux_amd64/syz-execprog github.com/google/syzkaller/tools/syz-execprog
GOOS=linux GOARCH=amd64 go build "-ldflags=-s -w -X github.com/google/syzkaller/prog.GitRevision=3222d10cbe77bbedb5a7c455e5bcb6b7081a63b7 -X 'github.com/google/syzkaller/prog.gitRevisionDate=20231213-164354'" "-tags=syz_target syz_os_linux syz_arch_amd64 " -o ./bin/linux_amd64/syz-stress github.com/google/syzkaller/tools/syz-stress
mkdir -p ./bin/linux_amd64
gcc -o ./bin/linux_amd64/syz-executor executor/executor.cc \
-m64 -O2 -pthread -Wall -Werror -Wparentheses -Wunused-const-variable -Wframe-larger-than=16384 -Wno-stringop-overflow -Wno-array-bounds -Wno-format-overflow -Wno-unused-but-set-variable -Wno-unused-command-line-argument -static-pie -fpermissive -w -DGOOS_linux=1 -DGOARCH_amd64=1 \
-DHOSTGOOS_linux=1 -DGIT_REVISION=\"3222d10cbe77bbedb5a7c455e5bcb6b7081a63b7\"
Error text is too large and was truncated, full error text is at:
https://syzkaller.appspot.com/x/error.txt?x=1556f362180000
Tested on:
commit: b401b621 Linux 6.8-rc5
git tree: upstream
kernel config: https://syzkaller.appspot.com/x/.config?x=d33318d4e4a0d226
dashboard link: https://syzkaller.appspot.com/bug?extid=34ad5fab48f7bf510349
compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40
patch: https://syzkaller.appspot.com/x/patch.diff?x=127e7e94180000
^ permalink raw reply [flat|nested] 15+ messages in thread
[parent not found: <20240220.161605.1886801832131178688.syoshida@redhat.com>]
[parent not found: <ZdSUXJYRA8jatpIP@zeus>]
end of thread, other threads:[~2024-02-20 12:25 UTC | newest]
Thread overview: 15+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-02-02 13:26 [syzbot] [net?] KMSAN: kernel-infoleak in __skb_datagram_iter (2) syzbot
2024-02-15 9:27 ` [syzbot] [PATCH] net: Fix " syzbot
2024-02-17 12:40 ` [syzbot] " syzbot
2024-02-17 14:51 ` syzbot
2024-02-20 2:42 ` [syzbot] [PATCH net] netlink: Fix kernel-infoleak in __skb_datagram_iter() syzbot
2024-02-20 4:49 ` syzbot
2024-02-20 7:16 ` [syzbot] Test for 34ad5fab48f7bf510349 syzbot
2024-02-20 12:00 ` [syzbot] [PATCH net] netlink: Fix kernel-infoleak in __skb_datagram_iter() syzbot
[not found] <CAHpthZr+VHsntmc5QRrL+viRKDu4sWJcX2Yf+oauEv9FghyB0A@mail.gmail.com>
2024-02-15 9:51 ` [syzbot] [net?] KMSAN: kernel-infoleak in __skb_datagram_iter (2) syzbot
[not found] <CAHpthZoG-4eO91UNScaiL1GUcoTZRDMQDzTZ0RvhGZdRZHHGLw@mail.gmail.com>
2024-02-17 12:58 ` syzbot
[not found] <CAHpthZpJeO1JGpOS3h_7n-wu28pEZuxo-SVB=x=OJKXpZ71Brg@mail.gmail.com>
2024-02-17 14:55 ` syzbot
[not found] <ZdQRnIUGz-j1ubag@zeus>
2024-02-20 2:56 ` syzbot
[not found] <ZdQvap_8BIiIq_GB@zeus>
2024-02-20 5:27 ` syzbot
[not found] <20240220.161605.1886801832131178688.syoshida@redhat.com>
2024-02-20 7:47 ` syzbot
[not found] <ZdSUXJYRA8jatpIP@zeus>
2024-02-20 12:25 ` syzbot
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox