Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp2049235ybf; Mon, 2 Mar 2020 00:44:23 -0800 (PST) X-Google-Smtp-Source: APXvYqzUvy2dfoRq1IDQoMZ0p6pgjIIKoiiMYqh6wnO7dHs8EWivKSJ8sIrGJL+0qqr0RBTqq89F X-Received: by 2002:aca:1a17:: with SMTP id a23mr10307552oia.84.1583138663106; Mon, 02 Mar 2020 00:44:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583138663; cv=none; d=google.com; s=arc-20160816; b=RuTs78V7/YxMm13xLhs2PeIGhQVniutIKCWwqKLggiR1WdYRUGe8DqGrctLAddlPA1 44r7Z06O/jCdkpQe3TvjX+v67mmz36dV7wOJilh2DlASTnP/JgLpgde/U+pc7+mI5QJg Cvq0j3JC6SlGALSXuhS4iPbaSSEWNUiDiJF+8ZWiuwhTujFPiTl3Q1De8h8ib0zz+7QE NKZnbrPZsH/a+OD0hOLiUnoLJrXNmiwfVCXdkt6HeqxadCCTjmgoxPq7LUlhGDhEZVLi xyYVfu/FKyhOP8Eq8dcZaczGY/WPKB2IMOCB0bB0yEtLIZ5PToISNFOBYQiviSN/r2Z8 SwxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=r8aSF5MeqDQUW8YKb8YbsbsupScDDHgnONeFSMF1J5M=; b=UVtqv1A5jxbvE6N7yFCLczXrxmcHYI4LjoWaTNmx38dV931ZBEI6M57PcI0z2gA26j wDtaeOMvKOLObDkmg56T3lmrPqPpGbiq+eJMQNLMf50l/zDTv0SB3lS5Tl4HVoWBpAeV +T0TEfVQHbQYbzQfD4SrOou/HAJSr2wV8w7B66Zs1LIXFL12RY248rKa6/R55jwibRd3 mpQkBhshNTLUqJYZuAEb/7Q2kz5MHYEwaiJeUN/E/FFpPXVsIxNGTzjch4R1/uJ2dSH4 QfSOSIEGvk0y1RdfOXfy+L7l6Ik5GfI5a381FjNu1pT8S5KvMtKxym7tGjbmhT8aUZKP i9QA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="B/KNoxaQ"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w24si5626638oic.260.2020.03.02.00.44.11; Mon, 02 Mar 2020 00:44:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="B/KNoxaQ"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727417AbgCBIm4 (ORCPT + 99 others); Mon, 2 Mar 2020 03:42:56 -0500 Received: from mail-qk1-f194.google.com ([209.85.222.194]:34437 "EHLO mail-qk1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727060AbgCBImz (ORCPT ); Mon, 2 Mar 2020 03:42:55 -0500 Received: by mail-qk1-f194.google.com with SMTP id 11so9282579qkd.1 for ; Mon, 02 Mar 2020 00:42:53 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=r8aSF5MeqDQUW8YKb8YbsbsupScDDHgnONeFSMF1J5M=; b=B/KNoxaQBGiH3PD1NpEzCo1O0oK4E7EK+1S3evPRu02hz84J4NBnPjObI8b1gKqd4p c1hs9hOlTU4U3f1nxTLhByHL1nWKv73jKdbN6fOKC1q6atwvoOAxFgV1YWZJm0VoENj0 z7VBgyGWyTbTRoSkSpLOAe0ZBovE60dzdlycqAbec+ttpuz4989oFrgKBUsRyN7N5ucu Bz3PiXGf1+EXZHg+suW1UR8i5GirjuSp2OlsCh54mr8OnXEu5Cmdwb/4NTHwZc7RJ6r+ oz9RH21mh4B5udlNT2u1CHarVJgtk7XeMmXpmn1yaF8OMCT+6+vdHLMAuBtDs7o6vO0+ tVDg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=r8aSF5MeqDQUW8YKb8YbsbsupScDDHgnONeFSMF1J5M=; b=XjWLCngQWpUk8Qib2vCh6GzMsZFsv88ksTDA/BsOKHrwAluU8lfyv2LYpI87FZRd2z 1FhU0bc3XtZeNMWzhfoCb3+zU68zcqmuuPG5eUcbx/Bey9nTEg9toga/IyOaKmnoX0nY 4aaKRHSnI5y1aPklAKmy9l64ah+vQztZrOhcTquGRRvLhMsW3qFws1iyBGHdlf71kJmF 5u+BcMso828sYd+MP1+DBxen3EqS1w4HXGhROieNQEYSFYhJuPwMRPUn29/LyNvXTeNu EgQoMr7AJfF+/LWiN6/FGQFftRB8FleSg5kG//G035H+Z3lqj+z1nxwLCPLcWVa8drU3 nJUA== X-Gm-Message-State: APjAAAW5DKd0tlx63MOk1Ip+jFvUt+YzXh/jTpISqYOwTlOLxguTehoc VFeLhWJt0I2vax0WQOKvi3XdAI6cYVm9P71taTbJ5A== X-Received: by 2002:ae9:e003:: with SMTP id m3mr15639507qkk.250.1583138573164; Mon, 02 Mar 2020 00:42:53 -0800 (PST) MIME-Version: 1.0 References: <0000000000003cbb40059f4e0346@google.com> <17916d0509978e14d9a5e9eb52d760fa57460542.camel@redhat.com> In-Reply-To: From: Dmitry Vyukov Date: Mon, 2 Mar 2020 09:42:41 +0100 Message-ID: Subject: Re: kernel panic: audit: backlog limit exceeded To: Paul Moore Cc: Tetsuo Handa , Eric Paris , syzbot , a@unstable.cc, b.a.t.m.a.n@lists.open-mesh.org, Dan Carpenter , David Miller , fzago@cray.com, Greg Kroah-Hartman , john.hammond@intel.com, linux-audit@redhat.com, LKML , mareklindner@neomailbox.ch, netdev , sw@simonwunderlich.de, syzkaller-bugs , syzkaller Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Feb 28, 2020 at 1:14 AM Paul Moore wrote: > > On Thu, Feb 27, 2020 at 10:40 AM Dmitry Vyukov wrote: > > On Mon, Feb 24, 2020 at 11:47 PM Paul Moore wrote: > > > On Mon, Feb 24, 2020 at 5:43 PM Eric Paris wrote: > > > > https://syzkaller.appspot.com/x/repro.syz?x=151b1109e00000 (the > > > > reproducer listed) looks like it is literally fuzzing the AUDIT_SET. > > > > Which seems like this is working as designed if it is setting the > > > > failure mode to 2. > > > > > > So it is, good catch :) I saw the panic and instinctively chalked > > > that up to a mistaken config, not expecting that it was what was being > > > tested. > > > > Yes, this audit failure mode is quite unpleasant for fuzzing. And > > since this is not a top-level syscall argument value, it's effectively > > impossible to filter out in the fuzzer. Maybe another use case for the > > "fuzer lockdown" feature +Tetsuo proposed. > > With the current state of the things, I think we only have an option > > to disable fuzzing of audit. Which is pity because it has found 5 or > > so real bugs in audit too. > > But this happened anyway because audit is only reachable from init pid > > namespace and syzkaller always unshares pid namespace for sandboxing > > reasons, that was removed accidentally and that's how it managed to > > find the bugs. But the unshare is restored now: > > https://github.com/google/syzkaller/commit/5e0e1d1450d7c3497338082fc28912fdd7f93a3c > > > > As a side effect all other real bugs in audit will be auto-obsoleted > > in future if not fixed because they will stop happening. > > On the plus side, I did submit fixes for the other real audit bugs > that syzbot found recently and Linus pulled them into the tree today > so at least we have that small victory. +1! > We could consider adding a fuzz-friendly build time config which would > disable the panic failsafe, but it probably isn't worth it at the > moment considering the syzbot's pid namespace limitations. > > -- > paul moore > www.paul-moore.com