Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp642930imu; Thu, 13 Dec 2018 01:48:28 -0800 (PST) X-Google-Smtp-Source: AFSGD/XzUMFtLbgxLloCk+ZXKywm1w+96N87MRpb3u33u0aOVa8Menu7sHCYmkWU0r2Frl7lFh2q X-Received: by 2002:a62:65c5:: with SMTP id z188mr24236542pfb.64.1544694508173; Thu, 13 Dec 2018 01:48:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544694508; cv=none; d=google.com; s=arc-20160816; b=1KElzSyR0Isd0P96zRdbRcsja4+INevPMLgocOA1B1TYPdZ3MPWjPDlPgO2JCDDpB+ cDnEjlEDg2mBM/G8Hnim/EevMIcwp+l20zlqTt0+XG0PC2zHGK5K5yj3l2d76Yz4wmnY gzHvyWNRH9bAbju2hBWsRvPN4v39xlduOtRhNx6i6/hcqakupCYKTHjDy9Nr+O4Civ8P 9HQFMZl66vBhXz1si/Ywtaw3sipAikU7UZA1wu7furZ31c4W8pzpQR3CDAHtSlWqZ+WO JJXyZYvcILbatarhHumBY38JUYzuQm4yo6eYaVYLH1T9Xy5/MROFNsNQUWtME8foHF1s C+lw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=G7ufxpaFcrfiHDVvN+qXL6mTJAaShtAPfv+W5j+wBY8=; b=w2Q1F6LRJu+fpxeZaipHfyYRkvuVrYZlB3IJx1ANKiBs5CNuDIu/tWF2XQMI6hVce2 RL6h1YSwmQ1JlSNHgtT8F40Z8NLoq6xUccxYl+hsNX4+Ns07o7w9jrr2LTAu9h9/ugwo kPhOFq9iWoTdyeihztZRKW9wL8q7fngZlaTIaXbzj6Qbuaj3dUe0mOla7WysFnj723m+ 9MIlNSlc4HXuSFgryFOZFs5t0CJncII61TMtwtbxNHVCMfyVyxOQZXeDxwcGMjxDc6ok WEzGGi5P7F2TMuITd7TIMl9I0Wq7LLVUFkSqiMRy1XcnFxzyA9Ct2fRqCdul3fgTmLy5 aKVg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Ss5lnRKh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j14si1276945pgi.354.2018.12.13.01.48.13; Thu, 13 Dec 2018 01:48:28 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Ss5lnRKh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728026AbeLMJrI (ORCPT + 99 others); Thu, 13 Dec 2018 04:47:08 -0500 Received: from mail-io1-f66.google.com ([209.85.166.66]:44693 "EHLO mail-io1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727988AbeLMJrH (ORCPT ); Thu, 13 Dec 2018 04:47:07 -0500 Received: by mail-io1-f66.google.com with SMTP id r200so1060793iod.11 for ; Thu, 13 Dec 2018 01:47:06 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=G7ufxpaFcrfiHDVvN+qXL6mTJAaShtAPfv+W5j+wBY8=; b=Ss5lnRKh1WpoNccSnxTzfv85C38C2D9jtp087flfDVyZ0UBCgdIO47+5qYw0TsVFYS IfdIN/3MH5P0Ji99AlGtcEPfuHlVzfvVnJBj2u2sILOo6dSndSH14lEHb5iLtBDG3zpi XB/Y2GcCScpHjLyX0iPGLPP7XeAiVFsDTZLQZ9unoyhxJWKdVBaPXNUJXgC3O0dEwso7 SokHZBJ65yU5zGBvH4xtW4ojD5FPA86za+wX4gjJtkjjCX9acTE5gwn9+G5PKdvZrX+p ScTCnozF1C7dP4z7UZNi+8YIvFaneUrtsZsmdYWIzsEl31C7GPeEaMoj9RAB6EYBWF+2 crbg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=G7ufxpaFcrfiHDVvN+qXL6mTJAaShtAPfv+W5j+wBY8=; b=mo5Id2H28BXYAurvX4JizamOCtJjS53Bvug/X3Jq/vdAsD//xn7pIZfcNUiOORKDxK HMKK57l1c+ziZMItzKgQ4zxAuQVtLe+srqvaxVNRYYkj5EdKvB4BDMwl7NR0gh36ExDa ULTdBWjM56A8l7idcOEfk+2CXoweeAwrkHGHzfntxU+mBSx6pEW4RsVDEZgIhbu/77iZ VSO1qF5qpHHiVC8wYrymKPu2MypObBbHdLcv4uDLSJLJXCjjPWHhhcS51hI6pPW8mp5x xOpF3g0713bmERLIgDVWjPAai742M3eDek7fLBOMw4FiniCvAnHkxDLZ+80TYUN6TB0Q 3MUw== X-Gm-Message-State: AA+aEWZK8vqGLIcHPZ/ahrjkL3LlWT6iGiS6mXCu7qUJMfbMlBM7p3i3 Tx63vNcye8h+uPMD0kY7ChmM8mSQ7Kmgz3idTWigqA== X-Received: by 2002:a6b:fa0e:: with SMTP id p14mr16743308ioh.271.1544694425343; Thu, 13 Dec 2018 01:47:05 -0800 (PST) MIME-Version: 1.0 References: <0000000000000dbf4a057cd1418b@google.com> In-Reply-To: From: Dmitry Vyukov Date: Thu, 13 Dec 2018 10:46:53 +0100 Message-ID: Subject: Re: KASAN: use-after-free Read in tipc_group_cong To: Jon Maloy Cc: syzbot+9845fed98688e01f431e@syzkaller.appspotmail.com, David Miller , LKML , netdev , syzkaller-bugs , tipc-discussion@lists.sourceforge.net, Ying Xue Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Dec 13, 2018 at 1:16 AM Jon Maloy wrote: > > -----Original Message----- > > From: syzbot > > Sent: 12-Dec-18 06:11 > > To: davem@davemloft.net; Jon Maloy ; linux- > > kernel@vger.kernel.org; netdev@vger.kernel.org; syzkaller- > > bugs@googlegroups.com; tipc-discussion@lists.sourceforge.net; > > ying.xue@windriver.com > > Subject: KASAN: use-after-free Read in tipc_group_cong > > This seems to be an effect of the same bug as reported in > https://syzkaller.appspot.com/bug?extid=10a9db47c3a0e13eb31c Let's do #syz dup: KASAN: use-after-free Read in tipc_group_bc_cong then. > Cong posted a fix for that one. Did you see the crash after applying his patch? Which patch do you mean? Unfortunately kernel development process is so that it's not possible to figure out what fixes what. I would just wait for new syzbot results. > > Hello, > > > > syzbot found the following crash on: > > > > HEAD commit: f5d582777bcb Merge branch 'for-linus' of git://git.kernel... > > git tree: upstream > > console output: https://syzkaller.appspot.com/x/log.txt?x=1705d525400000 > > kernel config: https://syzkaller.appspot.com/x/.config?x=c8970c89a0efbb23 > > dashboard link: > > https://syzkaller.appspot.com/bug?extid=9845fed98688e01f431e > > compiler: gcc (GCC) 8.0.1 20180413 (experimental) > > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=101b6ba3400000 > > > > IMPORTANT: if you fix the bug, please add the following tag to the commit: > > Reported-by: syzbot+9845fed98688e01f431e@syzkaller.appspotmail.com > > > > 8021q: adding VLAN 0 to HW filter on device team0 > > 8021q: adding VLAN 0 to HW filter on device team0 > > audit: type=1400 audit(1544592509.246:38): avc: denied { associate } for > > pid=6204 comm="syz-executor5" name="syz5" > > scontext=unconfined_u:object_r:unlabeled_t:s0 > > tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 > > ========================================================== > > ======== > > BUG: KASAN: use-after-free in tipc_group_find_dest net/tipc/group.c:255 > > [inline] > > BUG: KASAN: use-after-free in tipc_group_cong+0x566/0x5d0 > > net/tipc/group.c:416 > > Read of size 8 at addr ffff8881c59f5000 by task syz-executor4/10565 > > > > CPU: 1 PID: 10565 Comm: syz-executor4 Not tainted 4.20.0-rc6+ #151 > > Hardware name: Google Google Compute Engine/Google Compute Engine, > > BIOS Google 01/01/2011 Call Trace: > > __dump_stack lib/dump_stack.c:77 [inline] > > dump_stack+0x244/0x39d lib/dump_stack.c:113 > > print_address_description.cold.7+0x9/0x1ff mm/kasan/report.c:256 > > kasan_report_error mm/kasan/report.c:354 [inline] > > kasan_report.cold.8+0x242/0x309 mm/kasan/report.c:412 > > __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:433 > > tipc_group_find_dest net/tipc/group.c:255 [inline] > > tipc_group_cong+0x566/0x5d0 net/tipc/group.c:416 > > tipc_send_group_anycast+0x9bb/0xc80 net/tipc/socket.c:972 > > __tipc_sendmsg+0x12b1/0x1d40 net/tipc/socket.c:1309 > > tipc_sendmsg+0x50/0x70 net/tipc/socket.c:1272 > > sock_sendmsg_nosec net/socket.c:621 [inline] > > sock_sendmsg+0xd5/0x120 net/socket.c:631 > > ___sys_sendmsg+0x7fd/0x930 net/socket.c:2116 > > __sys_sendmsg+0x11d/0x280 net/socket.c:2154 > > __do_sys_sendmsg net/socket.c:2163 [inline] > > __se_sys_sendmsg net/socket.c:2161 [inline] > > __x64_sys_sendmsg+0x78/0xb0 net/socket.c:2161 > > do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 > > entry_SYSCALL_64_after_hwframe+0x49/0xbe > > RIP: 0033:0x457679 > > Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 > > 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 > > cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 > > RSP: 002b:00007f813d748c78 EFLAGS: 00000246 ORIG_RAX: > > 000000000000002e > > RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457679 > > RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000005 > > RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 > > R10: 0000000000000000 R11: 0000000000000246 R12: 00007f813d7496d4 > > R13: 00000000004c44dd R14: 00000000004d74c8 R15: 00000000ffffffff > > > > Allocated by task 10551: > > save_stack+0x43/0xd0 mm/kasan/kasan.c:448 > > set_track mm/kasan/kasan.c:460 [inline] > > kasan_kmalloc+0xc7/0xe0 mm/kasan/kasan.c:553 > > kmem_cache_alloc_trace+0x152/0x750 mm/slab.c:3620 > > kmalloc include/linux/slab.h:546 [inline] > > kzalloc include/linux/slab.h:741 [inline] > > tipc_group_create+0x152/0xa70 net/tipc/group.c:171 > > tipc_sk_join net/tipc/socket.c:2829 [inline] > > tipc_setsockopt+0x2d1/0xd70 net/tipc/socket.c:2944 > > __sys_setsockopt+0x1ba/0x3c0 net/socket.c:1902 > > __do_sys_setsockopt net/socket.c:1913 [inline] > > __se_sys_setsockopt net/socket.c:1910 [inline] > > __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1910 > > do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 > > entry_SYSCALL_64_after_hwframe+0x49/0xbe > > > > Freed by task 10567: > > save_stack+0x43/0xd0 mm/kasan/kasan.c:448 > > set_track mm/kasan/kasan.c:460 [inline] > > __kasan_slab_free+0x102/0x150 mm/kasan/kasan.c:521 > > kasan_slab_free+0xe/0x10 mm/kasan/kasan.c:528 > > __cache_free mm/slab.c:3498 [inline] > > kfree+0xcf/0x230 mm/slab.c:3817 > > tipc_group_delete+0x2e4/0x3f0 net/tipc/group.c:227 > > tipc_sk_leave+0x113/0x220 net/tipc/socket.c:2863 > > tipc_setsockopt+0x97d/0xd70 net/tipc/socket.c:2947 > > __sys_setsockopt+0x1ba/0x3c0 net/socket.c:1902 > > __do_sys_setsockopt net/socket.c:1913 [inline] > > __se_sys_setsockopt net/socket.c:1910 [inline] > > __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1910 > > do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 > > entry_SYSCALL_64_after_hwframe+0x49/0xbe > > > > The buggy address belongs to the object at ffff8881c59f5000 > > which belongs to the cache kmalloc-192 of size 192 The buggy address is > > located 0 bytes inside of > > 192-byte region [ffff8881c59f5000, ffff8881c59f50c0) The buggy address > > belongs to the page: > > page:ffffea0007167d40 count:1 mapcount:0 mapping:ffff8881da800040 > > index:0x0 > > flags: 0x2fffc0000000200(slab) > > raw: 02fffc0000000200 ffffea0007160488 ffffea00071aff08 ffff8881da800040 > > raw: 0000000000000000 ffff8881c59f5000 0000000100000010 > > 0000000000000000 page dumped because: kasan: bad access detected > > > > Memory state around the buggy address: > > ffff8881c59f4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > > ffff8881c59f4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > > > ffff8881c59f5000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb > > ^ > > ffff8881c59f5080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc > > ffff8881c59f5100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > > ========================================================== > > ======== > > > > > > --- > > This bug is generated by a bot. It may contain errors. > > See https://goo.gl/tpsmEJ for more information about syzbot. > > syzbot engineers can be reached at syzkaller@googlegroups.com. > > > > syzbot will keep track of this bug report. See: > > https://goo.gl/tpsmEJ#bug-status-tracking for how to communicate with > > syzbot. > > syzbot can test patches for this bug, for details see: > > https://goo.gl/tpsmEJ#testing-patches > > -- > You received this message because you are subscribed to the Google Groups "syzkaller-bugs" group. > To unsubscribe from this group and stop receiving emails from it, send an email to syzkaller-bugs+unsubscribe@googlegroups.com. > To view this discussion on the web visit https://groups.google.com/d/msgid/syzkaller-bugs/DM5PR15MB1513AA1661B9F06198CB0C959AA00%40DM5PR15MB1513.namprd15.prod.outlook.com. > For more options, visit https://groups.google.com/d/optout.