Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp591197rwl; Thu, 30 Mar 2023 22:36:27 -0700 (PDT) X-Google-Smtp-Source: AKy350bvTSuTLkGHP4/4Nup9J6z+xjzI+OWODAU0iBt3N6lSxG4Ac8Hf83hvP5uuI+Ul8ZdMjjoU X-Received: by 2002:a17:902:720a:b0:1a1:b51b:4d3b with SMTP id ba10-20020a170902720a00b001a1b51b4d3bmr22196257plb.1.1680240986930; Thu, 30 Mar 2023 22:36:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680240986; cv=none; d=google.com; s=arc-20160816; b=Iw+M5i63vjRY48gHhR2p8KBKTcBb4wVpAFh/iikeaeV1siO7veVKVuqM0lIT8/h1mM 6A33je8AIZaM9dxZHoRSHfqt8E9bpnhncJYexCcEZYWx4vRpR9xhRZNKZHnUO7f2Fdp0 xgTxSKC5tzG875CjbeVwE+94QwGdgDKW6b1q7z7qtkYimWz6vy4cIfmorjlqh7dMDgV9 RLf/3OYBKtFbOnlzzqzxsOecY4XGJFLMJTedugUtYYuJN0ljp8GoLoenPPjZ3QBDIcxo DqtfuCkeULrLEHv8CWYabY7iAQakJf//u+s5v4K7lR2RZ34AZf9dXJzkLhlqZu4VKBLj 1BYw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=sFbaLJCLfWD2sP4oAKzBbyzPYfVWxioTlKK1mjOk9LA=; b=ZLyzje2xKC3HWatJ8fgEk/KDAfKHiZQQrtUKDtegfZM9XJ6lCzzBlhutwJAvOGv9hD I2kRokIrgAhWPBWIdSN1tTHvL7WPiztwOi+rehlkxGIjqtBhLwIBFsblWi8Jwm6Asoiw q1hT3SCh+OfQYPdnFdJxVQpEOjhqR9ZJLr+lAMs/1+twYnGDNfshsSzHmFXXrE/SJC5F nZRMXd942ts8vE11hPFZEuAqimJOB3aQtTFbg0oWkPCZDVo2Fo0XTUt/M41FDZ3JnOOx TsCaBclLEsaEixx3apD5vLP3oGwH7xM32ekOl1XoWDxEeojioirWYOxEFiWJ4jYY0sVi gR4g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=CbxmtOtA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id jo3-20020a170903054300b001a1deff6062si1316621plb.281.2023.03.30.22.36.12; Thu, 30 Mar 2023 22:36:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=CbxmtOtA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229909AbjCaFbl (ORCPT + 99 others); Fri, 31 Mar 2023 01:31:41 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58496 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229437AbjCaFbk (ORCPT ); Fri, 31 Mar 2023 01:31:40 -0400 Received: from mail-ed1-x52e.google.com (mail-ed1-x52e.google.com [IPv6:2a00:1450:4864:20::52e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8F0DC11EB9; Thu, 30 Mar 2023 22:31:39 -0700 (PDT) Received: by mail-ed1-x52e.google.com with SMTP id t10so85091218edd.12; Thu, 30 Mar 2023 22:31:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; t=1680240698; x=1682832698; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=sFbaLJCLfWD2sP4oAKzBbyzPYfVWxioTlKK1mjOk9LA=; b=CbxmtOtAbnjQdFHjihJh0154ZYZriCwrB8feWb1L0RTjOmdhrTkxLbuyqSawtlmqRm DArza1dOtDqjXjOz5iVUimbLnIWQGdRRaBeYslJbqhzESBsPVMF4Yqb8OtNMuI8uai7E UkLweEI8WOnRu+6Xq4+jIwIPnk7eYs/FJ6OOeytofljv8SW3azo/hkufEHkakISCB4kX 3x3vAhGsh44ohZ94LVoGIHa+HYMkkSeyrT4NvUrK+0ZFHoPi56y6vYQMJ9MuNjGst3Rg UWU+Y0b9DySW5ERLDLCJZB/d3gFQqcrMStVVFXpb/HW7t6tQtCJuMkKMivRgD5I/fGwL Pcig== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680240698; x=1682832698; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=sFbaLJCLfWD2sP4oAKzBbyzPYfVWxioTlKK1mjOk9LA=; b=im4pCGtFgkpszMZDZE3USpkjHwy85xpFz2+JPqBCc2HEPM0jW5P9OKNvnbL9yov1XA HTvNoDcHO2IND5nWEK5P6Me9JLVpJiPxPglgGUaqYmP7mY3thdfr1ppRuDUr2Sl9vOX8 IaRTGZHC8PQwKUEGZg88RqgoxO0/tbnzvefUU1RbCBRZ1a4+a+gPV6AUiDV6kWLuBQo1 ROXzHKpEKWInx2sRQV98cUO9PPgahlyei7vKsUklhfFoprBbVMp5gG8oQLpZ9nwKi1q4 drrFQGQOOAj9XUNsOv47ajMElLjZbuawQHXaRG8Mjr6zrlc+BMN9LFlf9ozXwzhW2XFT u3WA== X-Gm-Message-State: AAQBX9fK0sOdYzTBBYZrsKRKrn8favnQQ+k/hkBhNAHdD9H0Ej6ss1SD B7QuoSitpHaGs0srfLczSriEOvtNanX2c716Egi0qkilkeQS7A== X-Received: by 2002:a50:a444:0:b0:502:4f7:d286 with SMTP id v4-20020a50a444000000b0050204f7d286mr12576457edb.4.1680240697965; Thu, 30 Mar 2023 22:31:37 -0700 (PDT) MIME-Version: 1.0 References: <20230330215507.56509-1-kuniyu@amazon.com> In-Reply-To: <20230330215507.56509-1-kuniyu@amazon.com> From: Jason Xing Date: Fri, 31 Mar 2023 13:31:01 +0800 Message-ID: Subject: Re: general protection fault in raw_seq_start To: Kuniyuki Iwashima Cc: threeearcat@gmail.com, davem@davemloft.net, dsahern@kernel.org, edumazet@google.com, kuba@kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, pabeni@redhat.com Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-0.2 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 31, 2023 at 6:08=E2=80=AFAM Kuniyuki Iwashima wrote: > > From: "Dae R. Jeong" > Date: Sun, 26 Mar 2023 21:12:08 +0900 > > Hi, > > > > We observed an issue "general protection fault in raw_seq_start" > > during fuzzing. > > > > Unfortunately, we have not found a reproducer for the crash yet. We > > will inform you if we have any update on this crash. > > Detailed crash information is attached below. > > > > Best regards, > > Dae R. Jeong > > > > ----- > > > > - Kernel version > > 6.2 > > > > - Last executed input > > unshare(0x40060200) > > r0 =3D syz_open_procfs(0x0, &(0x7f0000002080)=3D'net/raw\x00') > > socket$inet_icmp_raw(0x2, 0x3, 0x1) > > ppoll(0x0, 0x0, 0x0, 0x0, 0x0) > > socket$inet_icmp_raw(0x2, 0x3, 0x1) > > pread64(r0, &(0x7f0000000000)=3D""/10, 0xa, 0x10000000007f) > > Thanks for reporting the issue. > > It seems we need to use RCU variant in raw_get_first(). > I'll post a patch. > > --- > diff --git a/net/ipv4/raw.c b/net/ipv4/raw.c > index 3cf68695b40d..fe0d1ad20b35 100644 > --- a/net/ipv4/raw.c > +++ b/net/ipv4/raw.c > @@ -957,7 +957,7 @@ static struct sock *raw_get_first(struct seq_file *se= q, int bucket) > for (state->bucket =3D bucket; state->bucket < RAW_HTABLE_SIZE; > ++state->bucket) { > hlist =3D &h->ht[state->bucket]; > - sk_nulls_for_each(sk, hnode, hlist) { > + sk_nulls_for_each_rcu(sk, hnode, hlist) { Hello Kuniyuki, I'm wondering if we should also use rcu_read_lock()/_unlock() pair to prote= ct? CC: Eric It seems that we have to convert all the sk_nulls_for_each() to sk_nulls_for_each_rcu() with the rcu_read_lock/_unlock protection in net/ipv4/raw.c? Thanks, Jason > if (sock_net(sk) =3D=3D seq_file_net(seq)) > return sk; > } > --- > > Thanks, > Kuniyuki > > > > > > > - Crash report > > general protection fault, probably for non-canonical address 0xdffffc00= 00000005: 0000 [#1] PREEMPT SMP KASAN > > KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f] > > CPU: 2 PID: 20952 Comm: syz-executor.0 Not tainted 6.2.0-g048ec869bafd-= dirty #7 > > Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-= 0-g155821a1990b-prebuilt.qemu.org 04/01/2014 > > RIP: 0010:read_pnet include/net/net_namespace.h:383 [inline] > > RIP: 0010:sock_net include/net/sock.h:649 [inline] > > RIP: 0010:raw_get_next net/ipv4/raw.c:974 [inline] > > RIP: 0010:raw_get_idx net/ipv4/raw.c:986 [inline] > > RIP: 0010:raw_seq_start+0x431/0x800 net/ipv4/raw.c:995 > > Code: ef e8 33 3d 94 f7 49 8b 6d 00 4c 89 ef e8 b7 65 5f f7 49 89 ed 49= 83 c5 98 0f 84 9a 00 00 00 48 83 c5 c8 48 89 e8 48 c1 e8 03 <42> 80 3c 30 = 00 74 08 48 89 ef e8 00 3d 94 f7 4c 8b 7d 00 48 89 ef > > RSP: 0018:ffffc9001154f9b0 EFLAGS: 00010206 > > RAX: 0000000000000005 RBX: 1ffff1100302c8fd RCX: 0000000000000000 > > RDX: 0000000000000028 RSI: ffffc9001154f988 RDI: ffffc9000f77a338 > > RBP: 0000000000000029 R08: ffffffff8a50ffb4 R09: fffffbfff24b6bd9 > > R10: fffffbfff24b6bd9 R11: 0000000000000000 R12: ffff88801db73b78 > > R13: fffffffffffffff9 R14: dffffc0000000000 R15: 0000000000000030 > > FS: 00007f843ae8e700(0000) GS:ffff888063700000(0000) knlGS:00000000000= 00000 > > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > > CR2: 000055bb9614b35f CR3: 000000003c672000 CR4: 00000000003506e0 > > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > > Call Trace: > > > > seq_read_iter+0x4c6/0x10f0 fs/seq_file.c:225 > > seq_read+0x224/0x320 fs/seq_file.c:162 > > pde_read fs/proc/inode.c:316 [inline] > > proc_reg_read+0x23f/0x330 fs/proc/inode.c:328 > > vfs_read+0x31e/0xd30 fs/read_write.c:468 > > ksys_pread64 fs/read_write.c:665 [inline] > > __do_sys_pread64 fs/read_write.c:675 [inline] > > __se_sys_pread64 fs/read_write.c:672 [inline] > > __x64_sys_pread64+0x1e9/0x280 fs/read_write.c:672 > > do_syscall_x64 arch/x86/entry/common.c:51 [inline] > > do_syscall_64+0x4e/0xa0 arch/x86/entry/common.c:82 > > entry_SYSCALL_64_after_hwframe+0x63/0xcd > > RIP: 0033:0x478d29 > > Code: f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 48 89 f8 48 89= f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 = ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 > > RSP: 002b:00007f843ae8dbe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 > > RAX: ffffffffffffffda RBX: 0000000000791408 RCX: 0000000000478d29 > > RDX: 000000000000000a RSI: 0000000020000000 RDI: 0000000000000003 > > RBP: 00000000f477909a R08: 0000000000000000 R09: 0000000000000000 > > R10: 000010000000007f R11: 0000000000000246 R12: 0000000000791740 > > R13: 0000000000791414 R14: 0000000000791408 R15: 00007ffc2eb48a50 > > > > Modules linked in: > > ---[ end trace 0000000000000000 ]--- > > RIP: 0010:read_pnet include/net/net_namespace.h:383 [inline] > > RIP: 0010:sock_net include/net/sock.h:649 [inline] > > RIP: 0010:raw_get_next net/ipv4/raw.c:974 [inline] > > RIP: 0010:raw_get_idx net/ipv4/raw.c:986 [inline] > > RIP: 0010:raw_seq_start+0x431/0x800 net/ipv4/raw.c:995 > > Code: ef e8 33 3d 94 f7 49 8b 6d 00 4c 89 ef e8 b7 65 5f f7 49 89 ed 49= 83 c5 98 0f 84 9a 00 00 00 48 83 c5 c8 48 89 e8 48 c1 e8 03 <42> 80 3c 30 = 00 74 08 48 89 ef e8 00 3d 94 f7 4c 8b 7d 00 48 89 ef > > RSP: 0018:ffffc9001154f9b0 EFLAGS: 00010206 > > RAX: 0000000000000005 RBX: 1ffff1100302c8fd RCX: 0000000000000000 > > RDX: 0000000000000028 RSI: ffffc9001154f988 RDI: ffffc9000f77a338 > > RBP: 0000000000000029 R08: ffffffff8a50ffb4 R09: fffffbfff24b6bd9 > > R10: fffffbfff24b6bd9 R11: 0000000000000000 R12: ffff88801db73b78 > > R13: fffffffffffffff9 R14: dffffc0000000000 R15: 0000000000000030 > > FS: 00007f843ae8e700(0000) GS:ffff888063700000(0000) knlGS:00000000000= 00000 > > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > > CR2: 00007f92ff166000 CR3: 000000003c672000 CR4: 00000000003506e0 > > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400