Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp475057ybi; Fri, 31 May 2019 04:33:19 -0700 (PDT) X-Google-Smtp-Source: APXvYqzFoyoHfpQeRE/l/khHhBj9BD6SzTdacIjWNTLP0QZcRsfFLmru851wz4fvVwOQgq2Vdf3n X-Received: by 2002:a63:4813:: with SMTP id v19mr8755455pga.406.1559302399700; Fri, 31 May 2019 04:33:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559302399; cv=none; d=google.com; s=arc-20160816; b=BS2NXWlaZi+r/WLHZb83Fggl3FaWfQR/txFU2bFrz4ChZLm/ChdaLxtTOjFZjhhl9c T91LjQk/4VZ3TmXQWyRFkx7gJWMiG8KMZV64Y3h3BO0xY3cvMg0cqFt5mYzccN7YkDSA WB64QLse9zTBmhgoUVv5jgqdM0Z29ILX/Uf6GLOPOeP9wjxcEgLzzI64W/k+q94Ardif uYgI4FZgJdFqZsmUw1738yBBvj0Y9kbPWTh2/noDvvZ15Yuxb9cQV3zCw8pfeF+nzW+x +Rvpfz8R4WTb7GH/ZctkE46xAAt/+xxW45djb7k5Uf+x+cCgVhbM2mahSTGUbTiQ1V16 F0Ag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=0wEV/ipC4bfJW9xp4vHq9B9GgjH4aRfvN7qnURusXlw=; b=Z+4E79M9WBiISc1VpGjxmeUOEirfP/0fVKJ/d0069yEYwZOgh/bzlK85+rsJMtMvYO mTp3X0qD/YC36eE4SdKzRZRpjbqQ1RK7kV5StEH0jv0RnuS7RKU30+lhGKqouKorWxN3 XbqTASHh8V9ozk9s17AqF6fN00KY/XIl7fQhkaDzomDPcWXgJh4r+cH3CB0vxRi/gv4y gmxZhUlau3njxlNN9b1EiSQInn3JuJ3nPtWW7c4prmY7BgXD/ky7t2SiRfWD2jKuiJhF LN4Ui9SCdzkVkFphYMCysqs1mjHESy01Qo6e8d/lBLT0esG09xV9A3SvxRLXXrIzKP9L gBGA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="d/aKUHij"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id bh11si5469117plb.383.2019.05.31.04.33.02; Fri, 31 May 2019 04:33:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="d/aKUHij"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727112AbfEaLby (ORCPT + 99 others); Fri, 31 May 2019 07:31:54 -0400 Received: from mail-it1-f194.google.com ([209.85.166.194]:55208 "EHLO mail-it1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726240AbfEaLbx (ORCPT ); Fri, 31 May 2019 07:31:53 -0400 Received: by mail-it1-f194.google.com with SMTP id h20so15103621itk.4 for ; Fri, 31 May 2019 04:31:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=0wEV/ipC4bfJW9xp4vHq9B9GgjH4aRfvN7qnURusXlw=; b=d/aKUHijM4vj2nDYQ+dFb9FmAjLWqYwI6OG29UrSYBta4iBZj6KjcNTZ/5MFWDloKF jvlELMkk7EEAgV4JfTdRz1IHXpfjX0NffLmwakziIL3ZIvaR4IQfE4s2eGsdttTcSql7 5MbirqQyG61d0m/gGfbnJxz+gjzknLM7c/w9/tNnnSDNIECtYnOwzH362cWHUhI7/GWS 9S9ic3mPgCXbqwcsSFAdnbhlqk7e9FNrTP1XckRlKdKvSlA/n4VkvZyJNNQMlqqeRYFA ijILLjDQlNzgtNUfXWP3HZpUbeEpTVl0M7Lv2hE2kEjzAN3dQImJlqzl04iFAdWvV/Zs GVlA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=0wEV/ipC4bfJW9xp4vHq9B9GgjH4aRfvN7qnURusXlw=; b=aMSQ5IQ4tE5lMvkDMQIVjvvTxdLDgVxAQWHP9UBqc+zDGSjSuruq0xaPR1qTWekXiG Qb5vQFzgGtwzuqw4NdPjB7ggK9YCSIn+4kCPOFoRvwzZ0qTm/W9gERD3hzXACg1TWWsL 7hNsCRrIG79ij9Cupun1MbglVUhqZD7x+dhvqmlAqItGsXcQl3f5yh4j0JYxHQw1YRIi PWmJQVI3XUeD1td+0aHjg2GELU6bhCzm7Vvs3Vp+HUHmEzPpDvoXWmQ4Cyi37cssr2+v ig6ku0RCm68Nngjgb2VWre3f9nCWLSm7mzgSQ/1k1pWTt+ubACG29jrZsxWYB6y/JPue NdhQ== X-Gm-Message-State: APjAAAUSxa0saS/g0A2UMBtm07RSz2+U/3tWCoCfHNFtReUuR/XRER6l KJAVFso5JZ6LZ5A+IOZsVLmtghc2jvoJJ2lJCKDUhQ== X-Received: by 2002:a24:91d2:: with SMTP id i201mr6975414ite.88.1559302312320; Fri, 31 May 2019 04:31:52 -0700 (PDT) MIME-Version: 1.0 References: <000000000000862b160580765e94@google.com> <3c44c1ff-2790-ec06-35c6-3572b92170c7@cumulusnetworks.com> <20190220102327.lq2zyqups2fso75z@gondor.apana.org.au> <20190529145845.bcvuc5ows4dedqh3@gondor.apana.org.au> <20190529152650.mjzyd6evzmonymj6@gondor.apana.org.au> In-Reply-To: <20190529152650.mjzyd6evzmonymj6@gondor.apana.org.au> From: Dmitry Vyukov Date: Fri, 31 May 2019 13:31:41 +0200 Message-ID: Subject: Re: KASAN: use-after-free Read in br_mdb_ip_get To: Herbert Xu Cc: Nikolay Aleksandrov , Thomas Graf , syzbot , bridge@lists.linux-foundation.org, David Miller , LKML , netdev , Roopa Prabhu , syzkaller-bugs Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, May 29, 2019 at 5:27 PM Herbert Xu wrote: > > On Wed, May 29, 2019 at 05:14:17PM +0200, Dmitry Vyukov wrote: > > > > > It looks like > > > > > > ommit 1515a63fc413f160d20574ab0894e7f1020c7be2 > > > Author: Nikolay Aleksandrov > > > Date: Wed Apr 3 23:27:24 2019 +0300 > > > > > > net: bridge: always clear mcast matching struct on reports and leaves > > > > > > may have at least fixed the uninitialised value error. > > > > > > The most up-to-date info is always available here: > > > > >> dashboard link: https://syzkaller.appspot.com/bug?extid=bc5ab0af2dbf3b0ae897 > > > > It says no new crashes happened besides the original one. > > > > We now have the following choices: > > > > 1. Invalidate with "#syz invalid" > > 2. Mark as tentatively fixed by that commit (could it fix it?) with > > "#syz fix: net: bridge: always clear mcast matching struct on reports > > and leaves" > > 3. Do nothing, then syzbot will auto-close it soon (bugs without > > reproducers that did not happen in the past 180 days) > > I'm still not quite sure how this could cause the use-after-free, > but it certainly seems to be the cause for the second issue of > uninit-value: > > https://syzkaller.appspot.com/bug?extid=8dfe5ee27aa6d2e396c2 > > And this one does seem to have occured again recently (two months > ago). I've closed the KMSAN bug report with this commit. And since the uninit value was used inside of the rhashtable (as hash?) it could lead to any kind of inconsistencies, I guess we can do: #syz fix: net: bridge: always clear mcast matching struct on reports and leaves here too. Thanks for bringing this up!