30c7be26fd35 ("udplite: call proper backlog handlers")

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

Syzkaller has triggered a GPF when fuzzing a 4.4 kernel with the following calltrace.

Call Trace:
 [<ffffffff8225c7cb>] sk_backlog_rcv include/net/sock.h:874 [inline]
 [<ffffffff8225c7cb>] __release_sock net/core/sock.c:2059 [inline]
 [<ffffffff8225c7cb>] release_sock+0x16b/0x520 net/core/sock.c:2507
 [<ffffffff826d171b>] udp_sendmsg+0x115b/0x1c70 net/ipv4/udp.c:1107
 [<ffffffff82700efc>] inet_sendmsg+0x20c/0x4d0 net/ipv4/af_inet.c:780
 [<ffffffff8224b7f1>] sock_sendmsg_nosec net/socket.c:638 [inline]
 [<ffffffff8224b7f1>] sock_sendmsg+0xd1/0x110 net/socket.c:648
 [<ffffffff8224c4bc>] SYSC_sendto+0x21c/0x370 net/socket.c:1678
 [<ffffffff82251635>] SyS_sendto+0x45/0x60 net/socket.c:1646
 [<ffffffff82a62a67>] entry_SYSCALL_64_fastpath+0x1e/0xa0
Code: 74 24 58 41 f6 c6 01 0f 85 b2 08 00 00 e8 65 d2 c3 fe 49 83 e6 fe 48 b8 00 00 00 00 00 fc ff df 49 8d 7e 60 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 01 0f 8e b9 0e 00 00 41 f6 46 60 04 
RIP  [<ffffffff826d3014>] __xfrm_policy_check2 include/net/xfrm.h:1070 [inline]
RIP  [<ffffffff826d3014>] xfrm_policy_check include/net/xfrm.h:1076 [inline]
RIP  [<ffffffff826d3014>] xfrm4_policy_check include/net/xfrm.h:1081 [inline]
RIP  [<ffffffff826d3014>] udp_queue_rcv_skb+0x194/0x1590 net/ipv4/udp.c:1520
 RSP <ffff8800b987f930>

Could the following patch be applied to v4.4.y? It is present in v4.9.y.
* 30c7be26fd35 ("udplite: call proper backlog handlers")

Tests run:
* Chrome OS tryjob tests
* Syzkaller reproducer


Thanks,
- Zubin



[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux