Received: by 2002:a89:2c3:0:b0:1ed:23cc:44d1 with SMTP id d3csp966505lqs; Wed, 6 Mar 2024 02:08:26 -0800 (PST) X-Forwarded-Encrypted: i=2; AJvYcCXGkv34ybSfJgUjWe24XjtdStNju688b9qGrwCYE9I/Vdd3Ebe+OcS1tkv6aQP8jXgaELs61a0h7IqGTSkKFuTeC0WP0yaMkHTCfBUo+Q== X-Google-Smtp-Source: AGHT+IFRc5OpVfnJdmMKH6JnaKYY4i6AqIjajQnR26Jd701ohyXnviMBlWUQvLdDwm7ST5RICjeA X-Received: by 2002:a25:dbce:0:b0:dd0:471:712 with SMTP id g197-20020a25dbce000000b00dd004710712mr11111170ybf.33.1709719706493; Wed, 06 Mar 2024 02:08:26 -0800 (PST) Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id js5-20020a0562142aa500b0068f737e5d7csi13741215qvb.459.2024.03.06.02.08.26 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 06 Mar 2024 02:08:26 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-93707-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=neutral (body hash did not verify) header.i=@google.com header.s=20230601 header.b=GQY+HdZ0; arc=fail (body hash mismatch); spf=pass (google.com: domain of linux-kernel+bounces-93707-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-93707-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=REJECT sp=REJECT dis=REJECT) header.from=google.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 176A91C203F6 for ; Wed, 6 Mar 2024 10:08:26 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id C0F155F848; Wed, 6 Mar 2024 10:08:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=google.com header.i=@google.com header.b="GQY+HdZ0" Received: from mail-ed1-f41.google.com (mail-ed1-f41.google.com [209.85.208.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9DE065DF28 for ; Wed, 6 Mar 2024 10:08:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.208.41 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709719690; cv=none; b=UPmCBHEi9iaCLJCIx0QuLA3Fz6gBIf2Yy2vd/OdESCfvepw/Qx0Efo6Wo8qh0O8rCvhPVERXpJpcoAYMiuZrzLsHTWTJ1kocdXo5NeyLiiJWDRRy27y079RrrJBGRnAULbGAeF5IXxwde96+oNTOCLlhMP6HWG2QTWnHMpZJwmA= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709719690; c=relaxed/simple; bh=kstqcK2A3vJCOafmI82tciNwogbOL4sWtTsekpVeX2I=; h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=Di9/ksefgMnnVQ1wzHFM8rXHMsPjSNanvl4yCrNzd5k5es57c9SYWPVWp4jym9EOShXHDWL7WBgY/WAik3ZJChg8b/9G9Y4KBl2hlSV6THjrR4ZoFeQaROErSSXtbWkpDGCmMt21uvMiazob22L56VYmkhKZejyeG7kPtAlSD98= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=GQY+HdZ0; arc=none smtp.client-ip=209.85.208.41 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=google.com Received: by mail-ed1-f41.google.com with SMTP id 4fb4d7f45d1cf-56693f0d235so9695a12.0 for ; Wed, 06 Mar 2024 02:08:06 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1709719685; x=1710324485; darn=vger.kernel.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=u/vNy60ussJq/lU/bVCYyZL7LvpUujEwD8R00UwYdP8=; b=GQY+HdZ0Pg+JHYG+QtmrbpmDl/sGrfCpjiX45cHEJDf/a56oKNvf9pqhVahLjBNfmj j6PJIx3rKAOeRFjL6kNvuTSF5+7y+X4mtSFQrwRLe0Rt84UVlES9NQO442/9lsIvHuJB u5p2OMzf4FDvxl15fsu/xDkeUCqI6kv4SKogeUGvomgBOi0WQwMfOCKOg9kQ/2y/Rc5n 5t6bz35XgoAONXtNkXgbdW5CFeOg5kXBsH+0yzE9UAd9myrSsnlUC8aLrh3orwv6xRU4 b3FVMGis/wTTOrT79+TH3ZYwJGuukBLU9TBbJIt8rQklGVub5ud3AnKyBXyUytr/VdHc gudg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709719685; x=1710324485; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=u/vNy60ussJq/lU/bVCYyZL7LvpUujEwD8R00UwYdP8=; b=gcpO0CL9NoQ3AS+QXBDPww4I0YeqRMLHOpMH6AHRsgdZSUEHNlCA2tMJlHbrSCtekv QI6390aXpCwZQP1Fd37DQwblbXAfvfmNMgkNY7XIryFcV4nByVvr9Xkdi9NXtfzxzrco omBdvgjNJFYMcPNh+sj9dNP0uo+XuQTmnC3O9VUj4OfO0EDNt9Yj330YVN8hUWYT0ise by/ySi1Yh13sbJQ2rB3LTxxE4H7nr21c8YlgQlvHzsyS1a7/x/AlDrlITIvUs61WpDh5 FnDFaja1SN8EOTV2Ti8R4terZ6Enbj/tjrad8EOLcMl7pzDFMfY/l4InDacm/Qz37s7S hsRA== X-Forwarded-Encrypted: i=1; AJvYcCXVdj/lHXYd4iQo1wT0LnKtZAUvDAOPlvTlAKMcMpM0m8l4GZDZEq24s70o/TifoV4t5T7Kr4JNXgzEdc7g3n7oJwl9BhqjDXg9WThV X-Gm-Message-State: AOJu0Yx5C6s9wRPXE6MhxJrSeivHIA8SOwI4CHiHoglMc350cLmM6Uiz nnxVJkgwlrnxVplIoze6pHn9xA4BilVTGDKQHdOeM3UiyoyKeCRSfYEV99gPWPg/uSv99mXkN7c 0cJSz6cOE5TNDsPFPijM/IuiW1bUahBuJ+W8U X-Received: by 2002:a50:ef03:0:b0:566:b5f5:48cc with SMTP id m3-20020a50ef03000000b00566b5f548ccmr344799eds.5.1709719684301; Wed, 06 Mar 2024 02:08:04 -0800 (PST) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 References: In-Reply-To: From: Eric Dumazet Date: Wed, 6 Mar 2024 11:07:50 +0100 Message-ID: Subject: Re: KASAN: slab-use-after-free Read in ip_finish_output To: xingwei lee , Florian Westphal Cc: pabeni@redhat.com, davem@davemloft.net, kuba@kernel.org, linux-hams@vger.kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, ralf@linux-mips.org, syzkaller-bugs@googlegroups.com, samsun1006219@gmail.com Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Wed, Mar 6, 2024 at 11:00=E2=80=AFAM xingwei lee = wrote: > > Hello, I found a new bug titled "KASAN: slab-use-after-free Read in > ip_finish_output=E2=80=9D or =E2=80=9CKASAN: slab-use-after-free in sk_to= _full_sk" and > confirmed it in the latest net and net-next branch. After my simple > analysis, it may be related to the net/rose or AF_PACKET/PF_PACKET > socket. I already had a syzbot report for this issue, thanks. Adding Florian to the discussion. The issue is cause by ip defrag layer, which calls skb_orphan() These were my notes, I had little time to work on it so far. Calling ip_defrag() in output path is also implying skb_orphan(), which is buggy because output path relies on sk not disappearing. A relevant old patch about the issue was : commit 8282f27449bf15548cb82c77b6e04ee0ab827bdc Author: Joe Stringer Date: Fri Jan 22 15:49:12 2016 -0800 inet: frag: Always orphan skbs inside ip_defrag() Later parts of the stack (including fragmentation) expect that there is never a socket attached to frag in a frag_list, however this invariant was not enforced on all defrag paths. This could lead to the BUG_ON(skb->sk) during ip_do_fragment(), as per the call stack at the end of this commit message. While the call could be added to openvswitch to fix this particular error, the head and tail of the frags list are already orphaned indirectly inside ip_defrag(), so it seems like the remaining fragments should all be orphaned in all circumstances. kernel BUG at net/ipv4/ip_output.c:586! This is quite an interesting bug involving ipvlan fed with af_packet socket= s. net/ipv4/ip_output.c depends on skb->sk being set, and probably to an inet socket, not an arbitrary one. If we orphan the packet in ipvlan, then downstream things like FQ packet scheduler will not work properly. We need to change ip_defrag() to only use skb_orphan() when really needed, ie whenever frag_list is going to be used. BUG: KASAN: slab-use-after-free in sk_fullsock include/net/sock.h:2823 [inl= ine] BUG: KASAN: slab-use-after-free in ip_skb_dst_mtu+0x830/0x9b0 include/net/ip.h:499 Read of size 1 at addr ffff88802f1dc012 by task swapper/1/0 CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.8.0-rc5-syzkaller-00129-g2a770cdc4382 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:377 [inline] print_report+0x167/0x540 mm/kasan/report.c:488 kasan_report+0x142/0x180 mm/kasan/report.c:601 sk_fullsock include/net/sock.h:2823 [inline] ip_skb_dst_mtu+0x830/0x9b0 include/net/ip.h:499 __ip_finish_output+0x12b/0x400 net/ipv4/ip_output.c:306 ipvlan_process_v4_outbound+0x3ef/0x700 drivers/net/ipvlan/ipvlan_core.c:442 ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:540 [inline] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline] ipvlan_queue_xmit+0xaa2/0x11f0 drivers/net/ipvlan/ipvlan_core.c:668 ipvlan_start_xmit+0x4a/0x150 drivers/net/ipvlan/ipvlan_main.c:222 __netdev_start_xmit include/linux/netdevice.h:4989 [inline] netdev_start_xmit include/linux/netdevice.h:5003 [inline] xmit_one net/core/dev.c:3547 [inline] dev_hard_start_xmit+0x242/0x770 net/core/dev.c:3563 sch_direct_xmit+0x2b6/0x5f0 net/sched/sch_generic.c:342 qdisc_restart net/sched/sch_generic.c:407 [inline] __qdisc_run+0xbed/0x2150 net/sched/sch_generic.c:415 qdisc_run+0xda/0x270 include/net/pkt_sched.h:125 net_tx_action+0x877/0xa30 net/core/dev.c:5197 __do_softirq+0x2bb/0x942 kernel/softirq.c:553 invoke_softirq kernel/softirq.c:427 [inline] __irq_exit_rcu+0xf1/0x1c0 kernel/softirq.c:632 irq_exit_rcu+0x9/0x30 kernel/softirq.c:644 sysvec_apic_timer_interrupt+0x97/0xb0 arch/x86/kernel/apic/apic.c:1076 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:6= 49 RIP: 0010:native_irq_disable arch/x86/include/asm/irqflags.h:37 [inline] RIP: 0010:arch_local_irq_disable arch/x86/include/asm/irqflags.h:72 [inline= ] RIP: 0010:acpi_safe_halt+0x20/0x30 drivers/acpi/processor_idle.c:113 Code: 90 90 90 90 90 90 90 90 90 90 65 48 8b 05 a8 b9 9c 74 48 f7 00 08 00 00 00 75 10 66 90 0f 00 2d d6 04 a1 00 f3 0f 1e fa fb f4 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 RSP: 0018:ffffc90000187d08 EFLAGS: 00000246 RAX: ffff8880172cbb80 RBX: ffff888017ac1064 RCX: 000000000002e1a1 RDX: 0000000000000001 RSI: ffff888017ac1000 RDI: ffff888017ac1064 RBP: 0000000000038f98 R08: ffff8880b9536d8b R09: 1ffff110172a6db1 R10: dffffc0000000000 R11: ffffffff8b670120 R12: ffff88801bfd2800 R13: 0000000000000000 R14: 0000000000000001 R15: ffffffff8e8984e0 acpi_idle_enter+0xe4/0x140 drivers/acpi/processor_idle.c:707 cpuidle_enter_state+0x118/0x490 drivers/cpuidle/cpuidle.c:267 cpuidle_enter+0x5d/0xa0 drivers/cpuidle/cpuidle.c:388 call_cpuidle kernel/sched/idle.c:134 [inline] cpuidle_idle_call kernel/sched/idle.c:215 [inline] do_idle+0x374/0x5d0 kernel/sched/idle.c:312 cpu_startup_entry+0x41/0x60 kernel/sched/idle.c:410 start_secondary+0x100/0x100 arch/x86/kernel/smpboot.c:336 secondary_startup_64_no_verify+0x171/0x17b Allocated by task 5133: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:372 [inline] __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:389 kasan_kmalloc include/linux/kasan.h:211 [inline] __do_kmalloc_node mm/slub.c:3981 [inline] __kmalloc+0x22e/0x490 mm/slub.c:3994 kmalloc include/linux/slab.h:594 [inline] sk_prot_alloc+0xe0/0x210 net/core/sock.c:2078 sk_alloc+0x38/0x370 net/core/sock.c:2131 packet_create+0x104/0x790 net/packet/af_packet.c:3352 __sock_create+0x48f/0x920 net/socket.c:1571 sock_create net/socket.c:1622 [inline] __sys_socket_create net/socket.c:1659 [inline] __sys_socket+0x14f/0x3c0 net/socket.c:1706 __do_sys_socket net/socket.c:1720 [inline] __se_sys_socket net/socket.c:1718 [inline] __x64_sys_socket+0x7a/0x90 net/socket.c:1718 do_syscall_64+0xf9/0x240 entry_SYSCALL_64_after_hwframe+0x6f/0x77 Freed by task 0: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x4e/0x60 mm/kasan/generic.c:640 poison_slab_object+0xa6/0xe0 mm/kasan/common.c:241 __kasan_slab_free+0x34/0x70 mm/kasan/common.c:257 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2121 [inline] slab_free mm/slub.c:4299 [inline] kfree+0x14a/0x380 mm/slub.c:4409 sk_prot_free net/core/sock.c:2114 [inline] __sk_destruct+0x47f/0x5f0 net/core/sock.c:2206 skb_orphan include/linux/skbuff.h:3127 [inline] ip_defrag+0x208/0x25d0 net/ipv4/ip_fragment.c:490 nf_ct_ipv4_gather_frags net/ipv4/netfilter/nf_defrag_ipv4.c:32 [inline] ipv4_conntrack_defrag+0x3de/0x5a0 net/ipv4/netfilter/nf_defrag_ipv4.c:87 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626 nf_hook+0x2c4/0x450 include/linux/netfilter.h:269 __ip_local_out+0x3d9/0x4e0 net/ipv4/ip_output.c:118 ip_local_out+0x26/0x70 net/ipv4/ip_output.c:127 ipvlan_process_v4_outbound+0x3ef/0x700 drivers/net/ipvlan/ipvlan_core.c:442 ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:540 [inline] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline] ipvlan_queue_xmit+0xaa2/0x11f0 drivers/net/ipvlan/ipvlan_core.c:668 ipvlan_start_xmit+0x4a/0x150 drivers/net/ipvlan/ipvlan_main.c:222 __netdev_start_xmit include/linux/netdevice.h:4989 [inline] netdev_start_xmit include/linux/netdevice.h:5003 [inline] xmit_one net/core/dev.c:3547 [inline] dev_hard_start_xmit+0x242/0x770 net/core/dev.c:3563 sch_direct_xmit+0x2b6/0x5f0 net/sched/sch_generic.c:342 qdisc_restart net/sched/sch_generic.c:407 [inline] __qdisc_run+0xbed/0x2150 net/sched/sch_generic.c:415 qdisc_run+0xda/0x270 include/net/pkt_sched.h:125 net_tx_action+0x877/0xa30 net/core/dev.c:5197 __do_softirq+0x2bb/0x942 kernel/softirq.c:553 The buggy address belongs to the object at ffff88802f1dc000 which belongs to the cache kmalloc-4k of size 4096 The buggy address is located 18 bytes inside of freed 4096-byte region [ffff88802f1dc000, ffff88802f1dd000) The buggy address belongs to the physical page: page:ffffea0000bc7600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2f1d8 head:ffffea0000bc7600 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:= 0 anon flags: 0xfff00000000840(slab|head|node=3D0|zone=3D1|lastcpupid=3D0x7ff= ) page_type: 0xffffffff() raw: 00fff00000000840 ffff888014c42140 0000000000000000 dead000000000001 raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEM= ALLOC), pid 1, tgid 1 (swapper/0), ts 12832348429, free_ts 0 set_page_owner include/linux/page_owner.h:31 [inline] post_alloc_hook+0x1ea/0x210 mm/page_alloc.c:1533 prep_new_page mm/page_alloc.c:1540 [inline] get_page_from_freelist+0x33ea/0x3580 mm/page_alloc.c:3311 __alloc_pages+0x255/0x680 mm/page_alloc.c:4567 __alloc_pages_node include/linux/gfp.h:238 [inline] alloc_pages_node include/linux/gfp.h:261 [inline] alloc_slab_page+0x5f/0x160 mm/slub.c:2190 allocate_slab mm/slub.c:2354 [inline] new_slab+0x84/0x2f0 mm/slub.c:2407 ___slab_alloc+0xd17/0x13e0 mm/slub.c:3540 __slab_alloc mm/slub.c:3625 [inline] __slab_alloc_node mm/slub.c:3678 [inline] slab_alloc_node mm/slub.c:3850 [inline] kmalloc_trace+0x264/0x360 mm/slub.c:4007 kmalloc include/linux/slab.h:590 [inline] kzalloc include/linux/slab.h:711 [inline] kobject_uevent_env+0x28b/0x8f0 lib/kobject_uevent.c:524 kernel_add_sysfs_param+0x10a/0x130 kernel/params.c:821 param_sysfs_builtin+0x16e/0x1f0 kernel/params.c:856 param_sysfs_builtin_init+0x31/0x40 kernel/params.c:990 do_one_initcall+0x238/0x830 init/main.c:1236 do_initcall_level+0x157/0x210 init/main.c:1298 do_initcalls+0x3f/0x80 init/main.c:1314 kernel_init_freeable+0x42f/0x5d0 init/main.c:1551 kernel_init+0x1d/0x2a0 init/main.c:1441 page_owner free stack trace missing Memory state around the buggy address: ffff88802f1dbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff88802f1dbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >ffff88802f1dc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff88802f1dc080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff88802f1dc100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb > > If you fix this issue, please add the following tag to the commit: > Reported-by: xingwei lee > Reported-by: yue sun > kernel: net-next e3350ba4a5b7573d4e14ee1dff8c414646435a04(lastest) > kernel config: https://syzkaller.appspot.com/text?tag=3DKernelConfig&x=3D= 4a65fa9f077ead01 > with KASAN enabled > compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2= 40 > > ./root@syzkaller:~# ./535 > [ 168.288592][ C2] > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > [ 168.290954][ C2] BUG: KASAN: slab-use-after-free in > ip_finish_output+0x8d/0x330 > [ 168.293040][ C2] Read of size 1 at addr ffff8880349c4012 by task > swapper/2/0 > [ 168.295066][ C2] > [ 168.296007][ C2] CPU: 2 PID: 0 Comm: swapper/2 Not tainted > 6.8.0-rc6-02015-ge3350ba4a5b7 #13 > [ 168.298646][ C2] Hardware name: QEMU Standard PC (i440FX + PIIX, > 1996), BIOS 1.16.2-1.fc38 04/01/2014 > [ 168.301143][ C2] Call Trace: > [ 168.301993][ C2] > [ 168.302726][ C2] dump_stack_lvl+0xee/0x1e0 > [ 168.303918][ C2] print_report+0xc4/0x620 > [ 168.305260][ C2] ? __virt_addr_valid+0x67/0x5c0 > [ 168.306598][ C2] ? __phys_addr+0xd3/0x150 > [ 168.308122][ C2] kasan_report+0xda/0x110 > [ 168.309283][ C2] ? ip_finish_output+0x8d/0x330 > [ 168.310631][ C2] ? ip_finish_output+0x8d/0x330 > [ 168.311918][ C2] ip_finish_output+0x8d/0x330 > [ 168.313060][ C2] ip_output+0x144/0x2b0 > [ 168.313944][ C2] ip_local_out+0xb8/0x1b0 > [ 168.314865][ C2] ipvlan_process_v4_outbound+0x3a0/0x500 > [ 168.316058][ C2] ? ipvlan_route_v6_outbound+0x4b0/0x4b0 > [ 168.317261][ C2] ? ipvlan_get_L3_hdr+0x91/0xda0 > [ 168.318312][ C2] ipvlan_queue_xmit+0xdb3/0x11c0 > [ 168.319360][ C2] ? print_usage_bug.part.0+0x550/0x550 > [ 168.320507][ C2] ? ipvlan_handle_mode_l3+0x150/0x150 > [ 168.321671][ C2] ? validate_xmit_xfrm+0x4c0/0x1320 > [ 168.322766][ C2] ? netif_skb_features+0x3ca/0xce0 > [ 168.323848][ C2] ipvlan_start_xmit+0x4e/0x160 > [ 168.324860][ C2] dev_hard_start_xmit+0x141/0x720 > [ 168.325923][ C2] sch_direct_xmit+0x1bd/0xc70 > [ 168.327068][ C2] ? ktime_get+0x2c3/0x4c0 > [ 168.328137][ C2] ? qdisc_dequeue_head+0x290/0x370 > [ 168.329317][ C2] ? dev_watchdog+0x940/0x940 > [ 168.330387][ C2] ? tbf_dequeue+0x980/0xdc0 > [ 168.331454][ C2] __qdisc_run+0x577/0x1ad0 > [ 168.332384][ C2] net_tx_action+0x765/0xd10 > [ 168.333548][ C2] __do_softirq+0x21a/0x8de > [ 168.334486][ C2] ? __lock_text_end+0x3/0x3 > [ 168.335434][ C2] irq_exit_rcu+0xb7/0x120 > [ 168.336352][ C2] sysvec_apic_timer_interrupt+0x95/0xb0 > [ 168.337665][ C2] > [ 168.338266][ C2] > > > =3D* repro.c =3D* > #define _GNU_SOURCE > > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > > static unsigned long long procid; > > static void sleep_ms(uint64_t ms) { > usleep(ms * 1000); > } > > static uint64_t current_time_ms(void) { > struct timespec ts; > if (clock_gettime(CLOCK_MONOTONIC, &ts)) > exit(1); > return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000; > } > > static bool write_file(const char* file, const char* what, ...) { > char buf[1024]; > va_list args; > va_start(args, what); > vsnprintf(buf, sizeof(buf), what, args); > va_end(args); > buf[sizeof(buf) - 1] =3D 0; > int len =3D strlen(buf); > int fd =3D open(file, O_WRONLY | O_CLOEXEC); > if (fd =3D=3D -1) > return false; > if (write(fd, buf, len) !=3D len) { > int err =3D errno; > close(fd); > errno =3D err; > return false; > } > close(fd); > return true; > } > > struct nlmsg { > char* pos; > int nesting; > struct nlattr* nested[8]; > char buf[4096]; > }; > > static void netlink_init(struct nlmsg* nlmsg, > int typ, > int flags, > const void* data, > int size) { > memset(nlmsg, 0, sizeof(*nlmsg)); > struct nlmsghdr* hdr =3D (struct nlmsghdr*)nlmsg->buf; > hdr->nlmsg_type =3D typ; > hdr->nlmsg_flags =3D NLM_F_REQUEST | NLM_F_ACK | flags; > memcpy(hdr + 1, data, size); > nlmsg->pos =3D (char*)(hdr + 1) + NLMSG_ALIGN(size); > } > > static void netlink_attr(struct nlmsg* nlmsg, > int typ, > const void* data, > int size) { > struct nlattr* attr =3D (struct nlattr*)nlmsg->pos; > attr->nla_len =3D sizeof(*attr) + size; > attr->nla_type =3D typ; > if (size > 0) > memcpy(attr + 1, data, size); > nlmsg->pos +=3D NLMSG_ALIGN(attr->nla_len); > } > > static void netlink_nest(struct nlmsg* nlmsg, int typ) { > struct nlattr* attr =3D (struct nlattr*)nlmsg->pos; > attr->nla_type =3D typ; > nlmsg->pos +=3D sizeof(*attr); > nlmsg->nested[nlmsg->nesting++] =3D attr; > } > > static void netlink_done(struct nlmsg* nlmsg) { > struct nlattr* attr =3D nlmsg->nested[--nlmsg->nesting]; > attr->nla_len =3D nlmsg->pos - (char*)attr; > } > > static int netlink_send_ext(struct nlmsg* nlmsg, > int sock, > uint16_t reply_type, > int* reply_len, > bool dofail) { > if (nlmsg->pos > nlmsg->buf + sizeof(nlmsg->buf) || nlmsg->nesting) > exit(1); > struct nlmsghdr* hdr =3D (struct nlmsghdr*)nlmsg->buf; > hdr->nlmsg_len =3D nlmsg->pos - nlmsg->buf; > struct sockaddr_nl addr; > memset(&addr, 0, sizeof(addr)); > addr.nl_family =3D AF_NETLINK; > ssize_t n =3D sendto(sock, nlmsg->buf, hdr->nlmsg_len, 0, > (struct sockaddr*)&addr, sizeof(addr)); > if (n !=3D (ssize_t)hdr->nlmsg_len) { > if (dofail) > exit(1); > return -1; > } > n =3D recv(sock, nlmsg->buf, sizeof(nlmsg->buf), 0); > if (reply_len) > *reply_len =3D 0; > if (n < 0) { > if (dofail) > exit(1); > return -1; > } > if (n < (ssize_t)sizeof(struct nlmsghdr)) { > errno =3D EINVAL; > if (dofail) > exit(1); > return -1; > } > if (hdr->nlmsg_type =3D=3D NLMSG_DONE) > return 0; > if (reply_len && hdr->nlmsg_type =3D=3D reply_type) { > *reply_len =3D n; > return 0; > } > if (n < (ssize_t)(sizeof(struct nlmsghdr) + sizeof(struct nlmsgerr))) { > errno =3D EINVAL; > if (dofail) > exit(1); > return -1; > } > if (hdr->nlmsg_type !=3D NLMSG_ERROR) { > errno =3D EINVAL; > if (dofail) > exit(1); > return -1; > } > errno =3D -((struct nlmsgerr*)(hdr + 1))->error; > return -errno; > } > > static int netlink_send(struct nlmsg* nlmsg, int sock) { > return netlink_send_ext(nlmsg, sock, 0, NULL, true); > } > > static int netlink_query_family_id(struct nlmsg* nlmsg, > int sock, > const char* family_name, > bool dofail) { > struct genlmsghdr genlhdr; > memset(&genlhdr, 0, sizeof(genlhdr)); > genlhdr.cmd =3D CTRL_CMD_GETFAMILY; > netlink_init(nlmsg, GENL_ID_CTRL, 0, &genlhdr, sizeof(genlhdr)); > netlink_attr(nlmsg, CTRL_ATTR_FAMILY_NAME, family_name, > strnlen(family_name, GENL_NAMSIZ - 1) + 1); > int n =3D 0; > int err =3D netlink_send_ext(nlmsg, sock, GENL_ID_CTRL, &n, dofail); > if (err < 0) { > return -1; > } > uint16_t id =3D 0; > struct nlattr* attr =3D (struct nlattr*)(nlmsg->buf + NLMSG_HDRLEN + > NLMSG_ALIGN(sizeof(genlhdr))); > for (; (char*)attr < nlmsg->buf + n; > attr =3D (struct nlattr*)((char*)attr + NLMSG_ALIGN(attr->nla_len)= )) { > if (attr->nla_type =3D=3D CTRL_ATTR_FAMILY_ID) { > id =3D *(uint16_t*)(attr + 1); > break; > } > } > if (!id) { > errno =3D EINVAL; > return -1; > } > recv(sock, nlmsg->buf, sizeof(nlmsg->buf), 0); > return id; > } > > static int netlink_next_msg(struct nlmsg* nlmsg, > unsigned int offset, > unsigned int total_len) { > struct nlmsghdr* hdr =3D (struct nlmsghdr*)(nlmsg->buf + offset); > if (offset =3D=3D total_len || offset + hdr->nlmsg_len > total_len) > return -1; > return hdr->nlmsg_len; > } > > static void netlink_add_device_impl(struct nlmsg* nlmsg, > const char* type, > const char* name, > bool up) { > struct ifinfomsg hdr; > memset(&hdr, 0, sizeof(hdr)); > if (up) > hdr.ifi_flags =3D hdr.ifi_change =3D IFF_UP; > netlink_init(nlmsg, RTM_NEWLINK, NLM_F_EXCL | NLM_F_CREATE, &hdr, > sizeof(hdr)); > if (name) > netlink_attr(nlmsg, IFLA_IFNAME, name, strlen(name)); > netlink_nest(nlmsg, IFLA_LINKINFO); > netlink_attr(nlmsg, IFLA_INFO_KIND, type, strlen(type)); > } > > static void netlink_add_device(struct nlmsg* nlmsg, > int sock, > const char* type, > const char* name) { > netlink_add_device_impl(nlmsg, type, name, false); > netlink_done(nlmsg); > int err =3D netlink_send(nlmsg, sock); > if (err < 0) { > } > } > > static void netlink_add_veth(struct nlmsg* nlmsg, > int sock, > const char* name, > const char* peer) { > netlink_add_device_impl(nlmsg, "veth", name, false); > netlink_nest(nlmsg, IFLA_INFO_DATA); > netlink_nest(nlmsg, VETH_INFO_PEER); > nlmsg->pos +=3D sizeof(struct ifinfomsg); > netlink_attr(nlmsg, IFLA_IFNAME, peer, strlen(peer)); > netlink_done(nlmsg); > netlink_done(nlmsg); > netlink_done(nlmsg); > int err =3D netlink_send(nlmsg, sock); > if (err < 0) { > } > } > > static void netlink_add_xfrm(struct nlmsg* nlmsg, int sock, const char* n= ame) { > netlink_add_device_impl(nlmsg, "xfrm", name, true); > netlink_nest(nlmsg, IFLA_INFO_DATA); > int if_id =3D 1; > netlink_attr(nlmsg, 2, &if_id, sizeof(if_id)); > netlink_done(nlmsg); > netlink_done(nlmsg); > int err =3D netlink_send(nlmsg, sock); > if (err < 0) { > } > } > > static void netlink_add_hsr(struct nlmsg* nlmsg, > int sock, > const char* name, > const char* slave1, > const char* slave2) { > netlink_add_device_impl(nlmsg, "hsr", name, false); > netlink_nest(nlmsg, IFLA_INFO_DATA); > int ifindex1 =3D if_nametoindex(slave1); > netlink_attr(nlmsg, IFLA_HSR_SLAVE1, &ifindex1, sizeof(ifindex1)); > int ifindex2 =3D if_nametoindex(slave2); > netlink_attr(nlmsg, IFLA_HSR_SLAVE2, &ifindex2, sizeof(ifindex2)); > netlink_done(nlmsg); > netlink_done(nlmsg); > int err =3D netlink_send(nlmsg, sock); > if (err < 0) { > } > } > > static void netlink_add_linked(struct nlmsg* nlmsg, > int sock, > const char* type, > const char* name, > const char* link) { > netlink_add_device_impl(nlmsg, type, name, false); > netlink_done(nlmsg); > int ifindex =3D if_nametoindex(link); > netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); > int err =3D netlink_send(nlmsg, sock); > if (err < 0) { > } > } > > static void netlink_add_vlan(struct nlmsg* nlmsg, > int sock, > const char* name, > const char* link, > uint16_t id, > uint16_t proto) { > netlink_add_device_impl(nlmsg, "vlan", name, false); > netlink_nest(nlmsg, IFLA_INFO_DATA); > netlink_attr(nlmsg, IFLA_VLAN_ID, &id, sizeof(id)); > netlink_attr(nlmsg, IFLA_VLAN_PROTOCOL, &proto, sizeof(proto)); > netlink_done(nlmsg); > netlink_done(nlmsg); > int ifindex =3D if_nametoindex(link); > netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); > int err =3D netlink_send(nlmsg, sock); > if (err < 0) { > } > } > > static void netlink_add_macvlan(struct nlmsg* nlmsg, > int sock, > const char* name, > const char* link) { > netlink_add_device_impl(nlmsg, "macvlan", name, false); > netlink_nest(nlmsg, IFLA_INFO_DATA); > uint32_t mode =3D MACVLAN_MODE_BRIDGE; > netlink_attr(nlmsg, IFLA_MACVLAN_MODE, &mode, sizeof(mode)); > netlink_done(nlmsg); > netlink_done(nlmsg); > int ifindex =3D if_nametoindex(link); > netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); > int err =3D netlink_send(nlmsg, sock); > if (err < 0) { > } > } > > static void netlink_add_geneve(struct nlmsg* nlmsg, > int sock, > const char* name, > uint32_t vni, > struct in_addr* addr4, > struct in6_addr* addr6) { > netlink_add_device_impl(nlmsg, "geneve", name, false); > netlink_nest(nlmsg, IFLA_INFO_DATA); > netlink_attr(nlmsg, IFLA_GENEVE_ID, &vni, sizeof(vni)); > if (addr4) > netlink_attr(nlmsg, IFLA_GENEVE_REMOTE, addr4, sizeof(*addr4)); > if (addr6) > netlink_attr(nlmsg, IFLA_GENEVE_REMOTE6, addr6, sizeof(*addr6)); > netlink_done(nlmsg); > netlink_done(nlmsg); > int err =3D netlink_send(nlmsg, sock); > if (err < 0) { > } > } > > #define IFLA_IPVLAN_FLAGS 2 > #define IPVLAN_MODE_L3S 2 > #undef IPVLAN_F_VEPA > #define IPVLAN_F_VEPA 2 > > static void netlink_add_ipvlan(struct nlmsg* nlmsg, > int sock, > const char* name, > const char* link, > uint16_t mode, > uint16_t flags) { > netlink_add_device_impl(nlmsg, "ipvlan", name, false); > netlink_nest(nlmsg, IFLA_INFO_DATA); > netlink_attr(nlmsg, IFLA_IPVLAN_MODE, &mode, sizeof(mode)); > netlink_attr(nlmsg, IFLA_IPVLAN_FLAGS, &flags, sizeof(flags)); > netlink_done(nlmsg); > netlink_done(nlmsg); > int ifindex =3D if_nametoindex(link); > netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); > int err =3D netlink_send(nlmsg, sock); > if (err < 0) { > } > } > > static void netlink_device_change(struct nlmsg* nlmsg, > int sock, > const char* name, > bool up, > const char* master, > const void* mac, > int macsize, > const char* new_name) { > struct ifinfomsg hdr; > memset(&hdr, 0, sizeof(hdr)); > if (up) > hdr.ifi_flags =3D hdr.ifi_change =3D IFF_UP; > hdr.ifi_index =3D if_nametoindex(name); > netlink_init(nlmsg, RTM_NEWLINK, 0, &hdr, sizeof(hdr)); > if (new_name) > netlink_attr(nlmsg, IFLA_IFNAME, new_name, strlen(new_name)); > if (master) { > int ifindex =3D if_nametoindex(master); > netlink_attr(nlmsg, IFLA_MASTER, &ifindex, sizeof(ifindex)); > } > if (macsize) > netlink_attr(nlmsg, IFLA_ADDRESS, mac, macsize); > int err =3D netlink_send(nlmsg, sock); > if (err < 0) { > } > } > > static int netlink_add_addr(struct nlmsg* nlmsg, > int sock, > const char* dev, > const void* addr, > int addrsize) { > struct ifaddrmsg hdr; > memset(&hdr, 0, sizeof(hdr)); > hdr.ifa_family =3D addrsize =3D=3D 4 ? AF_INET : AF_INET6; > hdr.ifa_prefixlen =3D addrsize =3D=3D 4 ? 24 : 120; > hdr.ifa_scope =3D RT_SCOPE_UNIVERSE; > hdr.ifa_index =3D if_nametoindex(dev); > netlink_init(nlmsg, RTM_NEWADDR, NLM_F_CREATE | NLM_F_REPLACE, &hdr, > sizeof(hdr)); > netlink_attr(nlmsg, IFA_LOCAL, addr, addrsize); > netlink_attr(nlmsg, IFA_ADDRESS, addr, addrsize); > return netlink_send(nlmsg, sock); > } > > static void netlink_add_addr4(struct nlmsg* nlmsg, > int sock, > const char* dev, > const char* addr) { > struct in_addr in_addr; > inet_pton(AF_INET, addr, &in_addr); > int err =3D netlink_add_addr(nlmsg, sock, dev, &in_addr, sizeof(in_addr= )); > if (err < 0) { > } > } > > static void netlink_add_addr6(struct nlmsg* nlmsg, > int sock, > const char* dev, > const char* addr) { > struct in6_addr in6_addr; > inet_pton(AF_INET6, addr, &in6_addr); > int err =3D netlink_add_addr(nlmsg, sock, dev, &in6_addr, sizeof(in6_ad= dr)); > if (err < 0) { > } > } > > static struct nlmsg nlmsg; > > #define DEVLINK_FAMILY_NAME "devlink" > > #define DEVLINK_CMD_PORT_GET 5 > #define DEVLINK_ATTR_BUS_NAME 1 > #define DEVLINK_ATTR_DEV_NAME 2 > #define DEVLINK_ATTR_NETDEV_NAME 7 > > static struct nlmsg nlmsg2; > > static void initialize_devlink_ports(const char* bus_name, > const char* dev_name, > const char* netdev_prefix) { > struct genlmsghdr genlhdr; > int len, total_len, id, err, offset; > uint16_t netdev_index; > int sock =3D socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); > if (sock =3D=3D -1) > exit(1); > int rtsock =3D socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); > if (rtsock =3D=3D -1) > exit(1); > id =3D netlink_query_family_id(&nlmsg, sock, DEVLINK_FAMILY_NAME, true)= ; > if (id =3D=3D -1) > goto error; > memset(&genlhdr, 0, sizeof(genlhdr)); > genlhdr.cmd =3D DEVLINK_CMD_PORT_GET; > netlink_init(&nlmsg, id, NLM_F_DUMP, &genlhdr, sizeof(genlhdr)); > netlink_attr(&nlmsg, DEVLINK_ATTR_BUS_NAME, bus_name, strlen(bus_name) = + 1); > netlink_attr(&nlmsg, DEVLINK_ATTR_DEV_NAME, dev_name, strlen(dev_name) = + 1); > err =3D netlink_send_ext(&nlmsg, sock, id, &total_len, true); > if (err < 0) { > goto error; > } > offset =3D 0; > netdev_index =3D 0; > while ((len =3D netlink_next_msg(&nlmsg, offset, total_len)) !=3D -1) { > struct nlattr* attr =3D (struct nlattr*)(nlmsg.buf + offset + NLMSG_H= DRLEN + > NLMSG_ALIGN(sizeof(genlhdr))); > for (; (char*)attr < nlmsg.buf + offset + len; > attr =3D (struct nlattr*)((char*)attr + NLMSG_ALIGN(attr->nla_le= n))) { > if (attr->nla_type =3D=3D DEVLINK_ATTR_NETDEV_NAME) { > char* port_name; > char netdev_name[IFNAMSIZ]; > port_name =3D (char*)(attr + 1); > snprintf(netdev_name, sizeof(netdev_name), "%s%d", netdev_prefix, > netdev_index); > netlink_device_change(&nlmsg2, rtsock, port_name, true, 0, 0, 0, > netdev_name); > break; > } > } > offset +=3D len; > netdev_index++; > } > error: > close(rtsock); > close(sock); > } > > #define DEV_IPV4 "172.20.20.%d" > #define DEV_IPV6 "fe80::%02x" > #define DEV_MAC 0x00aaaaaaaaaa > > static void netdevsim_add(unsigned int addr, unsigned int port_count) { > write_file("/sys/bus/netdevsim/del_device", "%u", addr); > if (write_file("/sys/bus/netdevsim/new_device", "%u %u", addr, port_cou= nt)) { > char buf[32]; > snprintf(buf, sizeof(buf), "netdevsim%d", addr); > initialize_devlink_ports("netdevsim", buf, "netdevsim"); > } > } > > #define WG_GENL_NAME "wireguard" > enum wg_cmd { > WG_CMD_GET_DEVICE, > WG_CMD_SET_DEVICE, > }; > enum wgdevice_attribute { > WGDEVICE_A_UNSPEC, > WGDEVICE_A_IFINDEX, > WGDEVICE_A_IFNAME, > WGDEVICE_A_PRIVATE_KEY, > WGDEVICE_A_PUBLIC_KEY, > WGDEVICE_A_FLAGS, > WGDEVICE_A_LISTEN_PORT, > WGDEVICE_A_FWMARK, > WGDEVICE_A_PEERS, > }; > enum wgpeer_attribute { > WGPEER_A_UNSPEC, > WGPEER_A_PUBLIC_KEY, > WGPEER_A_PRESHARED_KEY, > WGPEER_A_FLAGS, > WGPEER_A_ENDPOINT, > WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, > WGPEER_A_LAST_HANDSHAKE_TIME, > WGPEER_A_RX_BYTES, > WGPEER_A_TX_BYTES, > WGPEER_A_ALLOWEDIPS, > WGPEER_A_PROTOCOL_VERSION, > }; > enum wgallowedip_attribute { > WGALLOWEDIP_A_UNSPEC, > WGALLOWEDIP_A_FAMILY, > WGALLOWEDIP_A_IPADDR, > WGALLOWEDIP_A_CIDR_MASK, > }; > > static void netlink_wireguard_setup(void) { > const char ifname_a[] =3D "wg0"; > const char ifname_b[] =3D "wg1"; > const char ifname_c[] =3D "wg2"; > const char private_a[] =3D > "\xa0\x5c\xa8\x4f\x6c\x9c\x8e\x38\x53\xe2\xfd\x7a\x70\xae\x0f\xb2\x= 0f\xa1" > "\x52\x60\x0c\xb0\x08\x45\x17\x4f\x08\x07\x6f\x8d\x78\x43"; > const char private_b[] =3D > "\xb0\x80\x73\xe8\xd4\x4e\x91\xe3\xda\x92\x2c\x22\x43\x82\x44\xbb\x= 88\x5c" > "\x69\xe2\x69\xc8\xe9\xd8\x35\xb1\x14\x29\x3a\x4d\xdc\x6e"; > const char private_c[] =3D > "\xa0\xcb\x87\x9a\x47\xf5\xbc\x64\x4c\x0e\x69\x3f\xa6\xd0\x31\xc7\x= 4a\x15" > "\x53\xb6\xe9\x01\xb9\xff\x2f\x51\x8c\x78\x04\x2f\xb5\x42"; > const char public_a[] =3D > "\x97\x5c\x9d\x81\xc9\x83\xc8\x20\x9e\xe7\x81\x25\x4b\x89\x9f\x8e\x= d9\x25" > "\xae\x9f\x09\x23\xc2\x3c\x62\xf5\x3c\x57\xcd\xbf\x69\x1c"; > const char public_b[] =3D > "\xd1\x73\x28\x99\xf6\x11\xcd\x89\x94\x03\x4d\x7f\x41\x3d\xc9\x57\x= 63\x0e" > "\x54\x93\xc2\x85\xac\xa4\x00\x65\xcb\x63\x11\xbe\x69\x6b"; > const char public_c[] =3D > "\xf4\x4d\xa3\x67\xa8\x8e\xe6\x56\x4f\x02\x02\x11\x45\x67\x27\x08\x= 2f\x5c" > "\xeb\xee\x8b\x1b\xf5\xeb\x73\x37\x34\x1b\x45\x9b\x39\x22"; > const uint16_t listen_a =3D 20001; > const uint16_t listen_b =3D 20002; > const uint16_t listen_c =3D 20003; > const uint16_t af_inet =3D AF_INET; > const uint16_t af_inet6 =3D AF_INET6; > const struct sockaddr_in endpoint_b_v4 =3D { > .sin_family =3D AF_INET, > .sin_port =3D htons(listen_b), > .sin_addr =3D {htonl(INADDR_LOOPBACK)}}; > const struct sockaddr_in endpoint_c_v4 =3D { > .sin_family =3D AF_INET, > .sin_port =3D htons(listen_c), > .sin_addr =3D {htonl(INADDR_LOOPBACK)}}; > struct sockaddr_in6 endpoint_a_v6 =3D {.sin6_family =3D AF_INET6, > .sin6_port =3D htons(listen_a)}; > endpoint_a_v6.sin6_addr =3D in6addr_loopback; > struct sockaddr_in6 endpoint_c_v6 =3D {.sin6_family =3D AF_INET6, > .sin6_port =3D htons(listen_c)}; > endpoint_c_v6.sin6_addr =3D in6addr_loopback; > const struct in_addr first_half_v4 =3D {0}; > const struct in_addr second_half_v4 =3D {(uint32_t)htonl(128 << 24)}; > const struct in6_addr first_half_v6 =3D {{{0}}}; > const struct in6_addr second_half_v6 =3D {{{0x80}}}; > const uint8_t half_cidr =3D 1; > const uint16_t persistent_keepalives[] =3D {1, 3, 7, 9, 14, 19}; > struct genlmsghdr genlhdr =3D {.cmd =3D WG_CMD_SET_DEVICE, .version =3D= 1}; > int sock; > int id, err; > sock =3D socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); > if (sock =3D=3D -1) { > return; > } > id =3D netlink_query_family_id(&nlmsg, sock, WG_GENL_NAME, true); > if (id =3D=3D -1) > goto error; > netlink_init(&nlmsg, id, 0, &genlhdr, sizeof(genlhdr)); > netlink_attr(&nlmsg, WGDEVICE_A_IFNAME, ifname_a, strlen(ifname_a) + 1)= ; > netlink_attr(&nlmsg, WGDEVICE_A_PRIVATE_KEY, private_a, 32); > netlink_attr(&nlmsg, WGDEVICE_A_LISTEN_PORT, &listen_a, 2); > netlink_nest(&nlmsg, NLA_F_NESTED | WGDEVICE_A_PEERS); > netlink_nest(&nlmsg, NLA_F_NESTED | 0); > netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_b, 32); > netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_b_v4, > sizeof(endpoint_b_v4)); > netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, > &persistent_keepalives[0], 2); > netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); > netlink_nest(&nlmsg, NLA_F_NESTED | 0); > netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); > netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v4, > sizeof(first_half_v4)); > netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); > netlink_done(&nlmsg); > netlink_nest(&nlmsg, NLA_F_NESTED | 0); > netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); > netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v6, > sizeof(first_half_v6)); > netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); > netlink_done(&nlmsg); > netlink_done(&nlmsg); > netlink_done(&nlmsg); > netlink_nest(&nlmsg, NLA_F_NESTED | 0); > netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_c, 32); > netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_c_v6, > sizeof(endpoint_c_v6)); > netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, > &persistent_keepalives[1], 2); > netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); > netlink_nest(&nlmsg, NLA_F_NESTED | 0); > netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); > netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v4, > sizeof(second_half_v4)); > netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); > netlink_done(&nlmsg); > netlink_nest(&nlmsg, NLA_F_NESTED | 0); > netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); > netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v6, > sizeof(second_half_v6)); > netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); > netlink_done(&nlmsg); > netlink_done(&nlmsg); > netlink_done(&nlmsg); > netlink_done(&nlmsg); > err =3D netlink_send(&nlmsg, sock); > if (err < 0) { > } > netlink_init(&nlmsg, id, 0, &genlhdr, sizeof(genlhdr)); > netlink_attr(&nlmsg, WGDEVICE_A_IFNAME, ifname_b, strlen(ifname_b) + 1)= ; > netlink_attr(&nlmsg, WGDEVICE_A_PRIVATE_KEY, private_b, 32); > netlink_attr(&nlmsg, WGDEVICE_A_LISTEN_PORT, &listen_b, 2); > netlink_nest(&nlmsg, NLA_F_NESTED | WGDEVICE_A_PEERS); > netlink_nest(&nlmsg, NLA_F_NESTED | 0); > netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_a, 32); > netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_a_v6, > sizeof(endpoint_a_v6)); > netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, > &persistent_keepalives[2], 2); > netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); > netlink_nest(&nlmsg, NLA_F_NESTED | 0); > netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); > netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v4, > sizeof(first_half_v4)); > netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); > netlink_done(&nlmsg); > netlink_nest(&nlmsg, NLA_F_NESTED | 0); > netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); > netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v6, > sizeof(first_half_v6)); > netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); > netlink_done(&nlmsg); > netlink_done(&nlmsg); > netlink_done(&nlmsg); > netlink_nest(&nlmsg, NLA_F_NESTED | 0); > netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_c, 32); > netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_c_v4, > sizeof(endpoint_c_v4)); > netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, > &persistent_keepalives[3], 2); > netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); > netlink_nest(&nlmsg, NLA_F_NESTED | 0); > netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); > netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v4, > sizeof(second_half_v4)); > netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); > netlink_done(&nlmsg); > netlink_nest(&nlmsg, NLA_F_NESTED | 0); > netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); > netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v6, > sizeof(second_half_v6)); > netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); > netlink_done(&nlmsg); > netlink_done(&nlmsg); > netlink_done(&nlmsg); > netlink_done(&nlmsg); > err =3D netlink_send(&nlmsg, sock); > if (err < 0) { > } > netlink_init(&nlmsg, id, 0, &genlhdr, sizeof(genlhdr)); > netlink_attr(&nlmsg, WGDEVICE_A_IFNAME, ifname_c, strlen(ifname_c) + 1)= ; > netlink_attr(&nlmsg, WGDEVICE_A_PRIVATE_KEY, private_c, 32); > netlink_attr(&nlmsg, WGDEVICE_A_LISTEN_PORT, &listen_c, 2); > netlink_nest(&nlmsg, NLA_F_NESTED | WGDEVICE_A_PEERS); > netlink_nest(&nlmsg, NLA_F_NESTED | 0); > netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_a, 32); > netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_a_v6, > sizeof(endpoint_a_v6)); > netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, > &persistent_keepalives[4], 2); > netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); > netlink_nest(&nlmsg, NLA_F_NESTED | 0); > netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); > netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v4, > sizeof(first_half_v4)); > netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); > netlink_done(&nlmsg); > netlink_nest(&nlmsg, NLA_F_NESTED | 0); > netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); > netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v6, > sizeof(first_half_v6)); > netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); > netlink_done(&nlmsg); > netlink_done(&nlmsg); > netlink_done(&nlmsg); > netlink_nest(&nlmsg, NLA_F_NESTED | 0); > netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_b, 32); > netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_b_v4, > sizeof(endpoint_b_v4)); > netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, > &persistent_keepalives[5], 2); > netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); > netlink_nest(&nlmsg, NLA_F_NESTED | 0); > netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); > netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v4, > sizeof(second_half_v4)); > netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); > netlink_done(&nlmsg); > netlink_nest(&nlmsg, NLA_F_NESTED | 0); > netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); > netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v6, > sizeof(second_half_v6)); > netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); > netlink_done(&nlmsg); > netlink_done(&nlmsg); > netlink_done(&nlmsg); > netlink_done(&nlmsg); > err =3D netlink_send(&nlmsg, sock); > if (err < 0) { > } > > error: > close(sock); > } > > static void initialize_netdevices(void) { > char netdevsim[16]; > sprintf(netdevsim, "netdevsim%d", (int)procid); > struct { > const char* type; > const char* dev; > } devtypes[] =3D { > {"ip6gretap", "ip6gretap0"}, {"bridge", "bridge0"}, {"vcan", "vcan0= "}, > {"bond", "bond0"}, {"team", "team0"}, {"dummy", "dumm= y0"}, > {"nlmon", "nlmon0"}, {"caif", "caif0"}, {"batadv", "bat= adv0"}, > {"vxcan", "vxcan1"}, {"veth", 0}, {"wireguard", "= wg0"}, > {"wireguard", "wg1"}, {"wireguard", "wg2"}, > }; > const char* devmasters[] =3D {"bridge", "bond", "team", "batadv"}; > struct { > const char* name; > int macsize; > bool noipv6; > } devices[] =3D { > {"lo", ETH_ALEN}, > {"sit0", 0}, > {"bridge0", ETH_ALEN}, > {"vcan0", 0, true}, > {"tunl0", 0}, > {"gre0", 0}, > {"gretap0", ETH_ALEN}, > {"ip_vti0", 0}, > {"ip6_vti0", 0}, > {"ip6tnl0", 0}, > {"ip6gre0", 0}, > {"ip6gretap0", ETH_ALEN}, > {"erspan0", ETH_ALEN}, > {"bond0", ETH_ALEN}, > {"veth0", ETH_ALEN}, > {"veth1", ETH_ALEN}, > {"team0", ETH_ALEN}, > {"veth0_to_bridge", ETH_ALEN}, > {"veth1_to_bridge", ETH_ALEN}, > {"veth0_to_bond", ETH_ALEN}, > {"veth1_to_bond", ETH_ALEN}, > {"veth0_to_team", ETH_ALEN}, > {"veth1_to_team", ETH_ALEN}, > {"veth0_to_hsr", ETH_ALEN}, > {"veth1_to_hsr", ETH_ALEN}, > {"hsr0", 0}, > {"dummy0", ETH_ALEN}, > {"nlmon0", 0}, > {"vxcan0", 0, true}, > {"vxcan1", 0, true}, > {"caif0", ETH_ALEN}, > {"batadv0", ETH_ALEN}, > {netdevsim, ETH_ALEN}, > {"xfrm0", ETH_ALEN}, > {"veth0_virt_wifi", ETH_ALEN}, > {"veth1_virt_wifi", ETH_ALEN}, > {"virt_wifi0", ETH_ALEN}, > {"veth0_vlan", ETH_ALEN}, > {"veth1_vlan", ETH_ALEN}, > {"vlan0", ETH_ALEN}, > {"vlan1", ETH_ALEN}, > {"macvlan0", ETH_ALEN}, > {"macvlan1", ETH_ALEN}, > {"ipvlan0", ETH_ALEN}, > {"ipvlan1", ETH_ALEN}, > {"veth0_macvtap", ETH_ALEN}, > {"veth1_macvtap", ETH_ALEN}, > {"macvtap0", ETH_ALEN}, > {"macsec0", ETH_ALEN}, > {"veth0_to_batadv", ETH_ALEN}, > {"veth1_to_batadv", ETH_ALEN}, > {"batadv_slave_0", ETH_ALEN}, > {"batadv_slave_1", ETH_ALEN}, > {"geneve0", ETH_ALEN}, > {"geneve1", ETH_ALEN}, > {"wg0", 0}, > {"wg1", 0}, > {"wg2", 0}, > }; > int sock =3D socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); > if (sock =3D=3D -1) > exit(1); > unsigned i; > for (i =3D 0; i < sizeof(devtypes) / sizeof(devtypes[0]); i++) > netlink_add_device(&nlmsg, sock, devtypes[i].type, devtypes[i].dev); > for (i =3D 0; i < sizeof(devmasters) / (sizeof(devmasters[0])); i++) { > char master[32], slave0[32], veth0[32], slave1[32], veth1[32]; > sprintf(slave0, "%s_slave_0", devmasters[i]); > sprintf(veth0, "veth0_to_%s", devmasters[i]); > netlink_add_veth(&nlmsg, sock, slave0, veth0); > sprintf(slave1, "%s_slave_1", devmasters[i]); > sprintf(veth1, "veth1_to_%s", devmasters[i]); > netlink_add_veth(&nlmsg, sock, slave1, veth1); > sprintf(master, "%s0", devmasters[i]); > netlink_device_change(&nlmsg, sock, slave0, false, master, 0, 0, NULL= ); > netlink_device_change(&nlmsg, sock, slave1, false, master, 0, 0, NULL= ); > } > netlink_add_xfrm(&nlmsg, sock, "xfrm0"); > netlink_device_change(&nlmsg, sock, "bridge_slave_0", true, 0, 0, 0, NU= LL); > netlink_device_change(&nlmsg, sock, "bridge_slave_1", true, 0, 0, 0, NU= LL); > netlink_add_veth(&nlmsg, sock, "hsr_slave_0", "veth0_to_hsr"); > netlink_add_veth(&nlmsg, sock, "hsr_slave_1", "veth1_to_hsr"); > netlink_add_hsr(&nlmsg, sock, "hsr0", "hsr_slave_0", "hsr_slave_1"); > netlink_device_change(&nlmsg, sock, "hsr_slave_0", true, 0, 0, 0, NULL)= ; > netlink_device_change(&nlmsg, sock, "hsr_slave_1", true, 0, 0, 0, NULL)= ; > netlink_add_veth(&nlmsg, sock, "veth0_virt_wifi", "veth1_virt_wifi"); > netlink_add_linked(&nlmsg, sock, "virt_wifi", "virt_wifi0", > "veth1_virt_wifi"); > netlink_add_veth(&nlmsg, sock, "veth0_vlan", "veth1_vlan"); > netlink_add_vlan(&nlmsg, sock, "vlan0", "veth0_vlan", 0, htons(ETH_P_80= 21Q)); > netlink_add_vlan(&nlmsg, sock, "vlan1", "veth0_vlan", 1, htons(ETH_P_80= 21AD)); > netlink_add_macvlan(&nlmsg, sock, "macvlan0", "veth1_vlan"); > netlink_add_macvlan(&nlmsg, sock, "macvlan1", "veth1_vlan"); > netlink_add_ipvlan(&nlmsg, sock, "ipvlan0", "veth0_vlan", IPVLAN_MODE_L= 2, 0); > netlink_add_ipvlan(&nlmsg, sock, "ipvlan1", "veth0_vlan", IPVLAN_MODE_L= 3S, > IPVLAN_F_VEPA); > netlink_add_veth(&nlmsg, sock, "veth0_macvtap", "veth1_macvtap"); > netlink_add_linked(&nlmsg, sock, "macvtap", "macvtap0", "veth0_macvtap"= ); > netlink_add_linked(&nlmsg, sock, "macsec", "macsec0", "veth1_macvtap"); > char addr[32]; > sprintf(addr, DEV_IPV4, 14 + 10); > struct in_addr geneve_addr4; > if (inet_pton(AF_INET, addr, &geneve_addr4) <=3D 0) > exit(1); > struct in6_addr geneve_addr6; > if (inet_pton(AF_INET6, "fc00::01", &geneve_addr6) <=3D 0) > exit(1); > netlink_add_geneve(&nlmsg, sock, "geneve0", 0, &geneve_addr4, 0); > netlink_add_geneve(&nlmsg, sock, "geneve1", 1, 0, &geneve_addr6); > netdevsim_add((int)procid, 4); > netlink_wireguard_setup(); > for (i =3D 0; i < sizeof(devices) / (sizeof(devices[0])); i++) { > char addr[32]; > sprintf(addr, DEV_IPV4, i + 10); > netlink_add_addr4(&nlmsg, sock, devices[i].name, addr); > if (!devices[i].noipv6) { > sprintf(addr, DEV_IPV6, i + 10); > netlink_add_addr6(&nlmsg, sock, devices[i].name, addr); > } > uint64_t macaddr =3D DEV_MAC + ((i + 10ull) << 40); > netlink_device_change(&nlmsg, sock, devices[i].name, true, 0, &macadd= r, > devices[i].macsize, NULL); > } > close(sock); > } > static void initialize_netdevices_init(void) { > int sock =3D socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); > if (sock =3D=3D -1) > exit(1); > struct { > const char* type; > int macsize; > bool noipv6; > bool noup; > } devtypes[] =3D { > {"nr", 7, true}, > {"rose", 5, true, true}, > }; > unsigned i; > for (i =3D 0; i < sizeof(devtypes) / sizeof(devtypes[0]); i++) { > char dev[32], addr[32]; > sprintf(dev, "%s%d", devtypes[i].type, (int)procid); > sprintf(addr, "172.30.%d.%d", i, (int)procid + 1); > netlink_add_addr4(&nlmsg, sock, dev, addr); > if (!devtypes[i].noipv6) { > sprintf(addr, "fe88::%02x:%02x", i, (int)procid + 1); > netlink_add_addr6(&nlmsg, sock, dev, addr); > } > int macsize =3D devtypes[i].macsize; > uint64_t macaddr =3D 0xbbbbbb + > ((unsigned long long)i << (8 * (macsize - 2))) + > (procid << (8 * (macsize - 1))); > netlink_device_change(&nlmsg, sock, dev, !devtypes[i].noup, 0, &macad= dr, > macsize, NULL); > } > close(sock); > } > > #define MAX_FDS 30 > > static long syz_genetlink_get_family_id(volatile long name, > volatile long sock_arg) { > int fd =3D sock_arg; > if (fd < 0) { > fd =3D socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); > if (fd =3D=3D -1) { > return -1; > } > } > struct nlmsg nlmsg_tmp; > int ret =3D netlink_query_family_id(&nlmsg_tmp, fd, (char*)name, false)= ; > if ((int)sock_arg < 0) > close(fd); > if (ret < 0) { > return -1; > } > return ret; > } > > static void setup_common() { > if (mount(0, "/sys/fs/fuse/connections", "fusectl", 0, 0)) { > } > } > > static void setup_binderfs() { > if (mkdir("/dev/binderfs", 0777)) { > } > if (mount("binder", "/dev/binderfs", "binder", 0, NULL)) { > } > if (symlink("/dev/binderfs", "./binderfs")) { > } > } > > static void loop(); > > static void sandbox_common() { > prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); > setsid(); > struct rlimit rlim; > rlim.rlim_cur =3D rlim.rlim_max =3D (200 << 20); > setrlimit(RLIMIT_AS, &rlim); > rlim.rlim_cur =3D rlim.rlim_max =3D 32 << 20; > setrlimit(RLIMIT_MEMLOCK, &rlim); > rlim.rlim_cur =3D rlim.rlim_max =3D 136 << 20; > setrlimit(RLIMIT_FSIZE, &rlim); > rlim.rlim_cur =3D rlim.rlim_max =3D 1 << 20; > setrlimit(RLIMIT_STACK, &rlim); > rlim.rlim_cur =3D rlim.rlim_max =3D 128 << 20; > setrlimit(RLIMIT_CORE, &rlim); > rlim.rlim_cur =3D rlim.rlim_max =3D 256; > setrlimit(RLIMIT_NOFILE, &rlim); > if (unshare(CLONE_NEWNS)) { > } > if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, NULL)) { > } > if (unshare(CLONE_NEWIPC)) { > } > if (unshare(0x02000000)) { > } > if (unshare(CLONE_NEWUTS)) { > } > if (unshare(CLONE_SYSVSEM)) { > } > typedef struct { > const char* name; > const char* value; > } sysctl_t; > static const sysctl_t sysctls[] =3D { > {"/proc/sys/kernel/shmmax", "16777216"}, > {"/proc/sys/kernel/shmall", "536870912"}, > {"/proc/sys/kernel/shmmni", "1024"}, > {"/proc/sys/kernel/msgmax", "8192"}, > {"/proc/sys/kernel/msgmni", "1024"}, > {"/proc/sys/kernel/msgmnb", "1024"}, > {"/proc/sys/kernel/sem", "1024 1048576 500 1024"}, > }; > unsigned i; > for (i =3D 0; i < sizeof(sysctls) / sizeof(sysctls[0]); i++) > write_file(sysctls[i].name, sysctls[i].value); > } > > static int wait_for_loop(int pid) { > if (pid < 0) > exit(1); > int status =3D 0; > while (waitpid(-1, &status, __WALL) !=3D pid) { > } > return WEXITSTATUS(status); > } > > static void drop_caps(void) { > struct __user_cap_header_struct cap_hdr =3D {}; > struct __user_cap_data_struct cap_data[2] =3D {}; > cap_hdr.version =3D _LINUX_CAPABILITY_VERSION_3; > cap_hdr.pid =3D getpid(); > if (syscall(SYS_capget, &cap_hdr, &cap_data)) > exit(1); > const int drop =3D (1 << CAP_SYS_PTRACE) | (1 << CAP_SYS_NICE); > cap_data[0].effective &=3D ~drop; > cap_data[0].permitted &=3D ~drop; > cap_data[0].inheritable &=3D ~drop; > if (syscall(SYS_capset, &cap_hdr, &cap_data)) > exit(1); > } > > static int do_sandbox_none(void) { > if (unshare(CLONE_NEWPID)) { > } > int pid =3D fork(); > if (pid !=3D 0) > return wait_for_loop(pid); > setup_common(); > sandbox_common(); > drop_caps(); > initialize_netdevices_init(); > if (unshare(CLONE_NEWNET)) { > } > write_file("/proc/sys/net/ipv4/ping_group_range", "0 65535"); > initialize_netdevices(); > setup_binderfs(); > loop(); > exit(1); > } > > static void kill_and_wait(int pid, int* status) { > kill(-pid, SIGKILL); > kill(pid, SIGKILL); > for (int i =3D 0; i < 100; i++) { > if (waitpid(-1, status, WNOHANG | __WALL) =3D=3D pid) > return; > usleep(1000); > } > DIR* dir =3D opendir("/sys/fs/fuse/connections"); > if (dir) { > for (;;) { > struct dirent* ent =3D readdir(dir); > if (!ent) > break; > if (strcmp(ent->d_name, ".") =3D=3D 0 || strcmp(ent->d_name, "..") = =3D=3D 0) > continue; > char abort[300]; > snprintf(abort, sizeof(abort), "/sys/fs/fuse/connections/%s/abort", > ent->d_name); > int fd =3D open(abort, O_WRONLY); > if (fd =3D=3D -1) { > continue; > } > if (write(fd, abort, 1) < 0) { > } > close(fd); > } > closedir(dir); > } else { > } > while (waitpid(-1, status, __WALL) !=3D pid) { > } > } > > static void setup_test() { > prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); > setpgrp(); > write_file("/proc/self/oom_score_adj", "1000"); > } > > static void close_fds() { > for (int fd =3D 3; fd < MAX_FDS; fd++) > close(fd); > } > > static void execute_one(void); > > #define WAIT_FLAGS __WALL > > static void loop(void) { > int iter =3D 0; > for (;; iter++) { > int pid =3D fork(); > if (pid < 0) > exit(1); > if (pid =3D=3D 0) { > setup_test(); > execute_one(); > close_fds(); > exit(0); > } > int status =3D 0; > uint64_t start =3D current_time_ms(); > for (;;) { > if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) =3D=3D pid) > break; > sleep_ms(1); > if (current_time_ms() - start < 5000) > continue; > kill_and_wait(pid, &status); > break; > } > } > } > > uint64_t r[4] =3D {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffff= ffff, > 0x0}; > > void execute_one(void) { > intptr_t res =3D 0; > res =3D syscall(__NR_socket, /*domain=3D*/0x11ul, /*type=3D*/3ul, /*pro= to=3D*/0x300); > if (res !=3D -1) > r[0] =3D res; > *(uint32_t*)0x20006ffc =3D 0x200; > syscall(__NR_setsockopt, /*fd=3D*/r[0], /*level=3D*/0x107, /*optname=3D= */0xf, > /*optval=3D*/0x20006ffcul, /*optlen=3D*/0xe50fb6c50bc849c9ul); > res =3D syscall(__NR_socket, /*domain=3D*/0x10ul, /*type=3D*/3ul, /*pro= to=3D*/0); > if (res !=3D -1) > r[1] =3D res; > *(uint64_t*)0x20001340 =3D 0; > *(uint32_t*)0x20001348 =3D 0; > *(uint64_t*)0x20001350 =3D 0x20000800; > *(uint64_t*)0x20000800 =3D 0; > *(uint64_t*)0x20000808 =3D 0; > *(uint64_t*)0x20000810 =3D 0; > *(uint64_t*)0x20000818 =3D 0; > *(uint64_t*)0x20000820 =3D 0; > *(uint64_t*)0x20000828 =3D 0; > *(uint64_t*)0x20000830 =3D 0x200001c0; > memcpy((void*)0x200001c0, > "\x8f\xc2\x86\x98\x2d\xf8\x34\x00\x25\x8d\x0b\xce\x45\x0d\xcb\x2= 7\x3c" > "\x88\x0f\x76\x6d\x6d\x47\xbf\x05\xa0\x14\x6a\x7a\xb1\xcc\xa6\x7= 1\x44" > "\x75\xe7\x55\xea\xe9\xcc\x4c\x43\x05", > 43); > *(uint64_t*)0x20000838 =3D 0x2b; > *(uint64_t*)0x20000840 =3D 0; > *(uint64_t*)0x20000848 =3D 0; > *(uint64_t*)0x20000850 =3D 0; > *(uint64_t*)0x20000858 =3D 0; > *(uint64_t*)0x20000860 =3D 0; > *(uint64_t*)0x20000868 =3D 0; > *(uint64_t*)0x20001358 =3D 7; > *(uint64_t*)0x20001360 =3D 0; > *(uint64_t*)0x20001368 =3D 0; > *(uint32_t*)0x20001370 =3D 0; > *(uint32_t*)0x20001378 =3D 0; > *(uint64_t*)0x20001380 =3D 0; > *(uint32_t*)0x20001388 =3D 0; > *(uint64_t*)0x20001390 =3D 0; > *(uint64_t*)0x20001398 =3D 0; > *(uint64_t*)0x200013a0 =3D 0; > *(uint64_t*)0x200013a8 =3D 0; > *(uint32_t*)0x200013b0 =3D 0; > *(uint32_t*)0x200013b8 =3D 0; > *(uint64_t*)0x200013c0 =3D 0; > *(uint32_t*)0x200013c8 =3D 0; > *(uint64_t*)0x200013d0 =3D 0; > *(uint64_t*)0x200013d8 =3D 0; > *(uint64_t*)0x200013e0 =3D 0; > *(uint64_t*)0x200013e8 =3D 0; > *(uint32_t*)0x200013f0 =3D 0; > *(uint32_t*)0x200013f8 =3D 0; > syscall(__NR_sendmmsg, /*fd=3D*/r[0], /*mmsg=3D*/0x20001340ul, /*vlen= =3D*/3ul, > /*f=3D*/0x40000ul); > res =3D syscall(__NR_socket, /*domain=3D*/0x10ul, /*type=3D*/0x803ul, /= *proto=3D*/0); > if (res !=3D -1) > r[2] =3D res; > memcpy((void*)0x20000700, "TIPCv2\000", 7); > syz_genetlink_get_family_id(/*name=3D*/0x20000700, /*fd=3D*/r[2]); > *(uint32_t*)0x20000200 =3D 0x14; > res =3D syscall(__NR_getsockname, /*fd=3D*/r[2], /*addr=3D*/0x20001480u= l, > /*addrlen=3D*/0x20000200ul); > if (res !=3D -1) > r[3] =3D *(uint32_t*)0x20001484; > *(uint64_t*)0x20000000 =3D 0; > *(uint32_t*)0x20000008 =3D 0; > *(uint64_t*)0x20000010 =3D 0x20000140; > *(uint64_t*)0x20000140 =3D 0x20000500; > memcpy((void*)0x20000500, > "\x3c\x00\x00\x00\x10\x00\x01\x44\x00\xee\xff\xff\xff\xff\x07\x1= a\xf7" > "\x00\x00\x00", > 20); > *(uint32_t*)0x20000514 =3D r[3]; > memcpy((void*)0x20000518, > "\x01\x00\x00\x00\x01\x00\x00\x00\x1c\x00\x12\x00\x0c\x00\x01\x0= 0\x62" > "\x72\x69\x64\x67\x65", > 22); > *(uint64_t*)0x20000148 =3D 0x3c; > *(uint64_t*)0x20000018 =3D 1; > *(uint64_t*)0x20000020 =3D 0; > *(uint64_t*)0x20000028 =3D 0; > *(uint32_t*)0x20000030 =3D 0; > syscall(__NR_sendmsg, /*fd=3D*/r[2], /*msg=3D*/0x20000000ul, /*f=3D*/0u= l); > *(uint64_t*)0x200007c0 =3D 0; > *(uint32_t*)0x200007c8 =3D 0; > *(uint64_t*)0x200007d0 =3D 0x20000080; > *(uint64_t*)0x20000080 =3D 0x20000180; > memcpy((void*)0x20000180, > "\x60\x00\x00\x00\x24\x00\x0b\x0e\x00\x00\x00\x00\x00\x80\x00\x0= 0\x00" > "\x00\x00\x00", > 20); > *(uint32_t*)0x20000194 =3D r[3]; > memcpy( > (void*)0x20000198, > "\x00\x00\x00\x00\xff\xff\xff\xff\x00\x00\x00\x45\x08\x00\x01\x00\x= 74\x62" > "\x66\x00\x34\x00\x02\x00\x08\x00\x06\x00\xa4\x23\x00\x00\x28\x00\x= 01", > 35); > *(uint64_t*)0x20000088 =3D 0x60; > *(uint64_t*)0x200007d8 =3D 1; > *(uint64_t*)0x200007e0 =3D 0; > *(uint64_t*)0x200007e8 =3D 0; > *(uint32_t*)0x200007f0 =3D 0; > syscall(__NR_sendmsg, /*fd=3D*/r[1], /*msg=3D*/0x200007c0ul, /*f=3D*/0u= l); > *(uint16_t*)0x20000040 =3D 0x11; > *(uint16_t*)0x20000042 =3D htobe16(0); > *(uint32_t*)0x20000044 =3D r[3]; > *(uint16_t*)0x20000048 =3D 1; > *(uint8_t*)0x2000004a =3D 0; > *(uint8_t*)0x2000004b =3D 6; > memset((void*)0x2000004c, 170, 5); > *(uint8_t*)0x20000051 =3D 0; > memset((void*)0x20000052, 0, 2); > syscall(__NR_bind, /*fd=3D*/r[0], /*addr=3D*/0x20000040ul, /*addrlen=3D= */0x14ul); > memcpy((void*)0x20000280, > "\x41\x03\x09\x5c\xf2\x1d\x48\x04\x07\x02\x02\x00\xc5\x2c\xf7\xc= 2\x59" > "\x75\xe0\x05\xb0\x2f\x08\x00\xeb\x2b\x2f\xf0\xda\xc8\x89\x7c\x6= b\x11" > "\x87\x77\xfa\xff\xff\xff\x30\x66\x09\x0c\xb6\x00\xc5\x47\x1d\x1= 3\x0a" > "\x66\x32\x1a\x54\xe7\xdf\x30\x5f\x80\xa8\x81\x61\xb6\xfd\x8f\x2= 4\x28" > "\x6a\x57\xc3\xfe\xff\xff", > 74); > syscall(__NR_sendto, /*fd=3D*/r[0], /*buf=3D*/0x20000280ul, /*len=3D*/0= x5c13ul, > /*f=3D*/0x806ul, /*addr=3D*/0ul, /*addrlen=3D*/0x2ful); > } > int main(void) { > syscall(__NR_mmap, /*addr=3D*/0x1ffff000ul, /*len=3D*/0x1000ul, /*prot= =3D*/0ul, > /*flags=3D*/0x32ul, /*fd=3D*/-1, /*offset=3D*/0ul); > syscall(__NR_mmap, /*addr=3D*/0x20000000ul, /*len=3D*/0x1000000ul, /*pr= ot=3D*/7ul, > /*flags=3D*/0x32ul, /*fd=3D*/-1, /*offset=3D*/0ul); > syscall(__NR_mmap, /*addr=3D*/0x21000000ul, /*len=3D*/0x1000ul, /*prot= =3D*/0ul, > /*flags=3D*/0x32ul, /*fd=3D*/-1, /*offset=3D*/0ul); > do_sandbox_none(); > return 0; > } > > =3D* repro.txt =3D* > r0 =3D socket$packet(0x11, 0x3, 0x300) > setsockopt$packet_int(r0, 0x107, 0xf, > &(0x7f0000006ffc)=3D0x4000000000000200, 0xe50fb6c50bc849c9) > r1 =3D socket(0x10, 0x3, 0x0) > sendmmsg$inet(r0, &(0x7f0000001340)=3D[{{0x0, 0x0, > &(0x7f0000000800)=3D[{0x0}, {0x0}, {0x0}, > {&(0x7f00000001c0)=3D"8fc286982df83400258d0bce450dcb273c880f766d6d47bf05a= 0146a7ab1cca6714475e755eae9cc4c4305", > 0x2b}, {0x0}, {0x0}, {0x0}], 0x7}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, > 0x0}}], 0x3, 0x40000) > r2 =3D socket(0x10, 0x803, 0x0) > syz_genetlink_get_family_id$tipc2(&(0x7f0000000700), r2) > getsockname$packet(r2, &(0x7f0000001480)=3D{0x11, 0x0, 0x0, 0x1, > 0x0, 0x6, @broadcast}, &(0x7f0000000200)=3D0x14) > sendmsg$nl_route(r2, &(0x7f0000000000)=3D{0x0, 0x0, > &(0x7f0000000140)=3D{&(0x7f0000000500)=3DANY=3D[@ANYBLOB=3D"3c00000010000= 14400eeffffffff071af7000000", > @ANYRES32=3Dr3, @ANYBLOB=3D"01000000010000001c0012000c000100627269646765"= ], > 0x3c}}, 0x0) > sendmsg$nl_route_sched(r1, &(0x7f00000007c0)=3D{0x0, 0x0, > &(0x7f0000000080)=3D{&(0x7f0000000180)=3DANY=3D[@ANYBLOB=3D"6000000024000= b0e000000000080000000000000", > @ANYRES32=3Dr3, @ANYBLOB=3D"00000000ffffffff00000045080001007462660034000= 20008000600a4230000280001"], > 0x60}}, 0x0) > bind$packet(r0, &(0x7f0000000040)=3D{0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev},= 0x14) > sendto$inet6(r0, > &(0x7f0000000280)=3D"4103095cf21d480407020200c52cf7c25975e005b02f0800eb2b= 2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b= 6fd8f24286a57c3feffff", > 0x5c13, 0x806, 0x0, 0x2f) > > See aslo https://gist.github.com/xrivendell7/865a5d95635b9dde886a3f3eb156= b7f9 > > BTW, I make a simple analysis for this bug, because there is a similar > bug related to net/rose > https://syzkaller.appspot.com/bug?extid=3D677921bcd8c3a67a3df3 do not > respone so far, and in the same fuzzing instance, I aslo triggered bug > titled "KASAN: null-ptr-deref Read in rose_transmit_link=E2=80=9D and "KA= SAN: > slab-use-after-free Read in mini_qdisc_pair_swap=E2=80=9D. When analysis = the > repro.txt above, I notice this syscall > getsockname$packet(r2, &(0x7f0000001480)=3D{0x11, 0x0, 0x0, 0x1, > 0x0, 0x6, @broadcast}, &(0x7f0000000200)=3D0x14) > the r3 socket is a AF_PACKET. > and also in the repro.txt of bug =E2=80=9CKASAN: slab-use-after-free Read= in > mini_qdisc_pair_swap=E2=80=9D below: > r0 =3D socket$nl_route(0x10, 0x3, 0x0) > r1 =3D socket(0x11, 0x800000003, 0x0) > bind(r1, &(0x7f0000000080)=3D@generic=3D{0x11, > "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836= 005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e1= 5775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000= 000006ad8e5ecc326d3a09ffc2c654"}, > 0x80) > getsockname$packet(r1, &(0x7f0000000040)=3D{0x11, 0x0, 0x0, 0x1, > 0x0, 0x6, @dev}, &(0x7f0000000140)=3D0x14) > sendmsg$nl_route_sched(r0, &(0x7f00000001c0)=3D{0x0, 0x0, > &(0x7f0000000180)=3D{&(0x7f0000000200)=3D@newtfilter=3D{0x3c, 0x2c, 0xd27= , > 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}, {0x2}}, > [@filter_kind_options=3D@f_basic=3D{{0xa}, {0xc, 0x2, > [@TCA_BASIC_CLASSID=3D{0x8, 0x1, {0x0, 0xffff}}]}}]}, 0x3c}}, 0x0) > r3 =3D socket$nl_route(0x10, 0x3, 0x0) > r4 =3D socket(0x11, 0x800000003, 0x0) > bind(r4, &(0x7f0000000180)=3D@generic=3D{0x11, > "0000010000000000080044944eeba72e2aba000000012e0b3836005404b0e0301a080000= 00e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bb= f0e5bf5ff1b0816f3f6db1c000100000000000000497400000000000000065ecc326d3a09ff= c2c65400"}, > 0x80) > sendmsg$nl_route_sched(r0, &(0x7f0000000fc0)=3D{&(0x7f0000000240)=3D{0x10= , > 0x0, 0x0, 0x4}, 0xc, > &(0x7f0000000f80)=3D{&(0x7f0000000b80)=3D@newtaction=3D{0x3ec, 0x30, 0x80= 0, > 0x70bd25, 0x25dfdbfc, {}, [{0x3d8, 0x1, [@m_xt=3D{0x298, 0x6, 0x0, 0x0, > {{0x7}, {0x1b0, 0x2, 0x0, 0x1, [@TCA_IPT_TARG=3D{0x10f, 0x6, {0x1, > 'filter\x00', 0x2, 0x81, > "0f6a0e0e9afe6ddcc31e0e668f77ddf9119e50d18216aeb5aa9f203e3cc53be5b5e38b3b= d07de80b47aefdbc0f9ccccfb2992b045d841cb60de6b62120e990b2dce06b27b76e8dc0528= 2ff99b491baece2e95564344b923fc333ba942160fcfb32e390a058ac445fa3fdbf222646ad= 9017c991b55724092280ccf4e7587ed5488546b6d1b76d6266d776c5f4d3e271f54aa8c666f= 9869f1efbc141f93536baf54e445006cde67ae19b5a108d2b42d60258ad757bdb366664d51f= efd60c0f34be08a4d782871a0fe790d97afcf333a1b0b2a8855831183d8158c4ad18f1abcf9= 157b95700ea"}}, > @TCA_IPT_TARG=3D{0x4a, 0x6, {0x1ff, 'filter\x00', 0x0, 0xfff, > "218cac2617fc60c1ab2a4db8719d2d06f442070848ab99e8745c05db95b2ffa0"}}, > @TCA_IPT_TARG=3D{0x46, 0x6, {0x0, 'mangle\x00', 0x0, 0x8000, > "602fb37f5a77780427fe2d2b98797d28cd1b381186073dedb8845115"}}, > @TCA_IPT_HOOK=3D{0x8, 0x2, 0x4}]}, {0xc2, 0x6, > "5f6c37010c0403cc9b6816f199e64cbd31209b4f9ae1ef492ccf689a4bf45834ebc4b552= a254c39ea0145114b3ab87ae5902b061ff0d7d0884c4ef3898c749a30087dd7a337ab102965= 9c7aded68b95b1d70d2f1e0160a7be432ca197cd9d9ab377f84fccba0de883f107e5bb42d49= acedfc21ebbbba51340fa03a8d8256f88597ab465c3e05aa4b95283104da7f194717b52cf3a= 42a62763d9f5e3903e2b6eae1ff4dbadab08f9d7cbe8424e35d6eee461472fe778afa2cc012= cc17862c"}, > {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x4, 0x2}}}}, @m_ct=3D{0x13c, 0x14, > 0x0, 0x0, {{0x7}, {0x4c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS=3D{0x18, 0x1, > {0x400, 0xfffffe01, 0x4, 0x5, 0x3ff}}, @TCA_CT_NAT_IPV6_MIN=3D{0x14, > 0xb, @dev=3D{0xfe, 0x80, '\x00', 0x42}}, @TCA_CT_LABELS_MASK=3D{0x14, 0x8= , > "13b512d82312f916d67fdbd5b16d3237"}, @TCA_CT_ACTION=3D{0x6, 0x3, > 0x23}]}, {0xcb, 0x6, > "cf98aefc95d61dfa6782891a5719a3b681816fb6c044d6c8d89eff2059c7964d8e81f703= 9162904b509c86c781358268a18d72be977577b1537729daf78cf6ef23a4ff31ebb423f245d= 3b450010d037143aaf848f11f3bb849900ef8c1e358fb30568cc604e194a413ba6a7e22051d= 17d6f912153ca7a2a592831f1bd6fc25da70cde15360d10a034504727bc06a576479cde3cd6= b5905dbcce6c631d2b0f476a1a9373d37cf20c8b32da1111379ca5897892f996fd80252607f= c19370ff7aee4b20c486a04cc7"}, > {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2}}}}]}]}, 0x3ec}, 0x1, 0x0, > 0x0, 0x40000}, 0x200580c0) > getsockname$packet(r4, &(0x7f0000000000)=3D{0x11, 0x0, 0x0, 0x1, > 0x0, 0x6, @dev}, &(0x7f0000000140)=3D0x14) > sendmsg$nl_route_sched(r3, &(0x7f0000000200)=3D{0x0, 0x0, > &(0x7f0000000080)=3D{&(0x7f0000000040)=3D@gettclass=3D{0x24, 0x29, 0x1, 0= x0, > 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0xffff}, {0x0, 0xffff}}}, 0x24}}, 0x0) > pipe(&(0x7f0000000200)=3D{0xffffffffffffffff, 0xfffffffffff= fffff}) > r8 =3D socket$inet_udp(0x2, 0x2, 0x0) > setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, > &(0x7f0000000000)=3D{@mcast2}, 0x14) > close(r8) > socket$inet(0x10, 0x2, 0x0) > r9 =3D socket(0x11, 0x800000003, 0x0) > bind(r9, &(0x7f0000000080)=3D@generic=3D{0x11, > "0000010000000000080025944eeba71a4976e252922c000000002aba000000012e0b3836= 005404b0e0301a4ce875f2e0ff5f163ee340b7679500800000000000000101013c5891039e1= 5775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000= 000006ad8e5ecc326d3a09ffc2c654"}, > 0x80) > getsockname$packet(r9, &(0x7f0000000100)=3D{0x11, 0x0, 0x0, 0x1, > 0x0, 0x6, @dev}, &(0x7f0000000140)=3D0x14) > sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)=3D{0x0, > 0x0, &(0x7f00000002c0)=3D{&(0x7f0000000300)=3DANY=3D[@ANYBLOB=3D"d0080000= 2400ffffff7f00000000ffffa6fffff7", > @ANYRES32=3Dr10, @ANYBLOB=3D"0000000bf1ffffff000000000800010063627100a408= 020004040600030000000500000000700300fdffffffffff00001f000000050000000001000= 0000000100083000000fdffffff07000000084900000100000002000000cf000000feffffff= 0800003326f6000180000003000000090000000200000000274a49ef6949a7bb00000005000= 0000100000004000000ff7f000000000000000400000002000004000000ff0f0000f44f3500= 01000000010400005eb768350100000008000000ffffffffc38d00001f00000004000883060= 0000000000100f7ffffff030000000080ffff050000000600000006000000a9000000000000= 00c0000000c0ffffff08000000018000000101000006000000b300000000000020050000000= 104000004000000070000000800000001010000c22e0000c0ffffff05000000040000000600= 00000900000008000000f7ffffff08000000030000000800000004000000010300800400000= 00400000000100000040000000700000009000000fcffffff01000000010000000900000000= 020000060e0000080000000200000002000000090000000800000007000000ab000000fb000= 00007000000ff0100000800000001040000070000000300000009000000ff07000008000000= ffff0000a90100000900000005000000200000000500000001000000070000008eb70000000= 00080010000000000000007000000fffffffffcffffff01f0ffff000000003f000000030000= 00000100000080000000800000030000000500000005000000ffffffff0700000015ba00000= 4000000070000000300000003000000ffffffff04000000554f00006ff80000070000000300= 0000000200000600000008000000b3000000060000000000000000070000010100000300000= 00080000000040000730a000001000080010000009e0c000000080000010000800000000000= 0000004000000000fefffff67d000006000000ff01000002000000000000004000000040000= 000ed000000010001000e0a05000000000000020000040000000600000002000000ff7f0000= 0100000001000000060000007f0000000200000000040000040000000900000090000000080= 00000b67c0000040000000400000005000000f50a0000ffff0000060000008ff9ffff070000= 001eaaffff3f0000008000000000000000ff0c0000ff7f0000030000007f0000002d0000000= 800000000010000ff070000ffffffff2bab000002000000ace800000500000000000000e1bf= 934d070000001f000d000300000004000000070000000900000005000000030000000200000= 087d400000200000008000000000100007f0000000e000000080000000200000007000000ff= ffff7f06000000000000000500000001000000820000001f0000000004000001000000fafff= fff0500000006000000070000000300000010000500810306009fff04000800000004040600= d90b0000ff00000005000000040000001ba2cc3b00000080010000003f000000ff0f0020115= 2497303008000be060000fffffffffffeffff7f000000ff0000008100000000db0400090000= 00070000000300000000000000060000008f5e0000010000000002000006000000010100000= 200000007000000000000e03189000001040000000800000600000004000000080000000400= 000002000000c00000000800000008000000f7ffffff05000000810000004d0000000100008= 0eb0700001f000000090000000597000001000000000000000000000002000000ffff000001= 00000002000000000000e0a000000040000000ff000000f7ffffff050000000900000007000= 0000600000028080000030000000600000004000000be000000030000000700000005000000= 38080000faffffffffffffff47b5554d001000008100000007000000ffffffff04000000010= 0000002000000566b00002000000004000000020000008b01000001000000ffff0000040000= 00ff0f0000050000002000000003000000e40d000007000000f8ffffff200000003f0000003= 87f00000700000007000000c10a000009000000040000000400000000000000008000000100= 008009000000370b000000000080ff07000006000000bb7900000400000002000000ffffff7= f0300000000000000090000000700000005000000000000807f0000000900000008000000fa= d4ffffff01000001010000010000003f0000000400000020f2ffff01000100ffff000001000= 0000200000008000000fbfffffff9ffffff040000004d000000060000000200000002000000= 070000004e0d0000000200000800000035000000300e0000070000000004000002000000018= 0000020000000f2ffffff070000000500000000010000fffffeff0900000000080000070000= 000800000009000000ff7f00000900000004000000040000000000000006000000050000000= 100000009000000080000007e0700000300000000800000bf16000002000006000000ffee00= 00000100000000000000001000000100000000000000000000007f000000100800000000000= 00100008002000000080000000101000003000000ffffff7ffffffffff7ffffff0600000003= 000000a6060000ff0300000700000001800000090000000200000000000000040000000080f= fff00020000070000000500000001000100000000800000af06060000002b0a000005000000= 010000000500000009000000040000000500000002000000ffffff7ff300000008000000020= 00000ffff0000ff070000810000004000000075fc000009000000fbffffff05000000000000= 00810000000100000080000000d05e0000020000001f00000000000000ff010000451e00002= d00000000000000ff0000001000030008001000ff070000010000001800010039"], > 0x3}}, 0x0) > write$binfmt_misc(r7, &(0x7f0000000000)=3DANY=3D[], 0xfffffecc) > splice(r6, 0x0, r8, 0x0, 0x4ffe0, 0x0) > > notice the similar getsockname$packet(r4, &(0x7f0000000000)=3D{0x11, > 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=3D0x14) also > related to net/rose. > So I believe it maybe also the same bug realted to net/rose > AF_PACKET/PF_PACKET socket cluster. > If such a security warning is indeed caused, I think it is necessary > to fix it quickly. > > I hope it helps. > Best regards. > xingwei Lee