lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 16 May 2016 00:02:26 +0800
From:	Baozeng Ding <sploving1@...il.com>
To:	davem@...emloft.net, kuznet@....inr.ac.ru, jmorris@...ei.org,
	yoshfuji@...ux-ipv6.org, kaber@...sh.net
Cc:	netdev@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: BUG: net/ipv4: KASAN: use-after-free in tcp_v4_rcv

Hi all,
I've got the following report use-after-free in tcp_v4_rcv while running 
syzkaller.
Unfortunately no reproducer.The kernel version is 4.6.0-rc2+.

===========================================================
BUG: KASAN: use-after-free in tcp_v4_rcv+0x2144/0x2c20 at addr 
ffff8800380279c0
Write of size 8 by task syz-executor/7055
=============================================================================
BUG skbuff_head_cache (Tainted: G    B D        ): kasan: bad access 
detected
-----------------------------------------------------------------------------

INFO: Freed in e1000_clean+0xa08/0x24a0 age=6364136532 cpu=2226773637 pid=-1
[<     inline     >] napi_poll net/core/dev.c:5087
[<      none      >] net_rx_action+0x751/0xd80 net/core/dev.c:5152
[<      none      >] __do_softirq+0x22b/0x8da kernel/softirq.c:273
[<     inline     >] invoke_softirq kernel/softirq.c:350
[<      none      >] irq_exit+0x15d/0x190 kernel/softirq.c:391
[<     inline     >] exiting_irq ./arch/x86/include/asm/apic.h:658
[<      none      >] do_IRQ+0x86/0x1a0 arch/x86/kernel/irq.c:252
[<      none      >] ret_from_intr+0x0/0x20 arch/x86/entry/entry_64.S:454
[<      none      >] kfree_skbmem+0xe6/0x100 net/core/skbuff.c:622
[<      none      >] __slab_free+0x1e8/0x300 mm/slub.c:2657
[<     inline     >] slab_free mm/slub.c:2810
[<      none      >] kmem_cache_free+0x298/0x320 mm/slub.c:2819
[<      none      >] kfree_skbmem+0xe6/0x100 net/core/skbuff.c:622
[<      none      >] __kfree_skb+0x1d/0x20 net/core/skbuff.c:684
[<      none      >] kfree_skb+0x107/0x310 net/core/skbuff.c:704
[<      none      >] packet_rcv_spkt+0xd8/0x4a0 net/packet/af_packet.c:1822
[<     inline     >] deliver_skb net/core/dev.c:1814
[<     inline     >] deliver_ptype_list_skb net/core/dev.c:1829
[<      none      >] __netif_receive_skb_core+0x134a/0x3060 
net/core/dev.c:4143
[<      none      >] __netif_receive_skb+0x2a/0x160 net/core/dev.c:4198


Call Trace:
  [<     inline     >] __dump_stack lib/dump_stack.c:15
  [<ffffffff829557d1>] dump_stack+0xb3/0x112 lib/dump_stack.c:51
  [<ffffffff8170fabd>] print_trailer+0x10d/0x190 mm/slub.c:667
  [<ffffffff817165af>] object_err+0x2f/0x40 mm/slub.c:674
  [<     inline     >] print_address_description mm/kasan/report.c:179
  [<ffffffff81718dd8>] kasan_report_error+0x218/0x530 mm/kasan/report.c:275
  [<ffffffff84f3c5f4>] ? tcp_v4_rcv+0x1d14/0x2c20 net/ipv4/tcp_ipv4.c:1653
  [<     inline     >] kasan_report mm/kasan/report.c:297
  [<ffffffff8171932e>] __asan_report_store8_noabort+0x3e/0x40 
mm/kasan/report.c:323
  [<     inline     >] ? nf_reset include/linux/skbuff.h:3464
  [<ffffffff84f3c501>] ? tcp_v4_rcv+0x1c21/0x2c20 net/ipv4/tcp_ipv4.c:1639
  [<     inline     >] ? __sk_add_backlog include/net/sock.h:810
  [<     inline     >] ? sk_add_backlog include/net/sock.h:843
  [<ffffffff84f3ca24>] ? tcp_v4_rcv+0x2144/0x2c20 net/ipv4/tcp_ipv4.c:1659
  [<     inline     >] __sk_add_backlog include/net/sock.h:810
  [<     inline     >] sk_add_backlog include/net/sock.h:843
  [<ffffffff84f3ca24>] tcp_v4_rcv+0x2144/0x2c20 net/ipv4/tcp_ipv4.c:1659
  [<ffffffff84f5b6b1>] ? raw_local_deliver+0x7c1/0xae0 net/ipv4/raw.c:221
  [<ffffffff84cee35a>] ? nf_iterate+0x1aa/0x230 net/netfilter/core.c:289
  [<ffffffff84cee3e0>] ? nf_iterate+0x230/0x230 net/netfilter/core.c:268
  [<ffffffff84e96fb0>] ip_local_deliver_finish+0x2b0/0xa50 
net/ipv4/ip_input.c:216
  [<     inline     >] ? __skb_pull include/linux/skbuff.h:1900
  [<ffffffff84e96e2a>] ? ip_local_deliver_finish+0x12a/0xa50 
net/ipv4/ip_input.c:194
  [<     inline     >] NF_HOOK_THRESH include/linux/netfilter.h:219
  [<     inline     >] NF_HOOK include/linux/netfilter.h:242
  [<ffffffff84e97e43>] ip_local_deliver+0x1b3/0x350 net/ipv4/ip_input.c:257
  [<ffffffff84e97c90>] ? ip_call_ra_chain+0x540/0x540 
net/ipv4/ip_input.c:163
  [<ffffffff84e96d00>] ? ip_rcv_finish+0x1ab0/0x1ab0 
include/net/net_namespace.h:259
  [<     inline     >] dst_input include/net/dst.h:510
  [<ffffffff84e958c9>] ip_rcv_finish+0x679/0x1ab0 net/ipv4/ip_input.c:388
  [<ffffffff84be8d1f>] ? sk_filter+0x7f/0xe50 net/core/filter.c:94
  [<     inline     >] NF_HOOK_THRESH include/linux/netfilter.h:219
  [<     inline     >] NF_HOOK include/linux/netfilter.h:242
  [<ffffffff84e98943>] ip_rcv+0x963/0x10c0 net/ipv4/ip_input.c:478
  [<ffffffff84e97fe0>] ? ip_local_deliver+0x350/0x350 
net/ipv4/ip_input.c:250
  [<ffffffff84b56c02>] ? skb_release_data+0x3d2/0x430 net/core/skbuff.c:599
  [<ffffffff84e95250>] ? inet_del_offload+0x40/0x40 ??:?
  [<ffffffff852211ed>] ? packet_rcv_spkt+0xdd/0x4a0 
net/packet/af_packet.c:1822
  [<ffffffff84e97fe0>] ? ip_local_deliver+0x350/0x350 
net/ipv4/ip_input.c:250
  [<ffffffff84b99b1d>] __netif_receive_skb_core+0x168d/0x3060 
net/core/dev.c:4160
  [<ffffffff84b98490>] ? netif_wake_subqueue+0x220/0x220 
include/linux/compiler.h:222
  [<     inline     >] ? ktime_get_real include/linux/timekeeping.h:179
  [<     inline     >] ? __net_timestamp include/linux/skbuff.h:3099
  [<ffffffff84b9ddf5>] ? netif_receive_skb_internal+0x125/0x390 
net/core/dev.c:4207
  [<     inline     >] ? __net_timestamp include/linux/skbuff.h:3099
  [<ffffffff84b9de1a>] ? netif_receive_skb_internal+0x14a/0x390 
net/core/dev.c:4207
  [<ffffffff84b9b51a>] __netif_receive_skb+0x2a/0x160 net/core/dev.c:4198
  [<ffffffff84b9de85>] netif_receive_skb_internal+0x1b5/0x390 
net/core/dev.c:4226
  [<     inline     >] ? __net_timestamp include/linux/skbuff.h:3099
  [<ffffffff84b9de1a>] ? netif_receive_skb_internal+0x14a/0x390 
net/core/dev.c:4207
  [<ffffffff84b9dcd0>] ? dev_cpu_callback+0x690/0x690 net/core/dev.c:7755
  [<ffffffff84ba1849>] ? dev_gro_receive+0x1d9/0x16f0 net/core/dev.c:4514
  [<     inline     >] ? skb_is_gso include/linux/skbuff.h:3648
  [<ffffffff84ba1cd5>] ? dev_gro_receive+0x665/0x16f0 net/core/dev.c:4426
  [<ffffffff817187d2>] ? kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:482
  [<     inline     >] ? trace_kmem_cache_alloc 
include/trace/events/kmem.h:53
  [<ffffffff81713149>] ? kmem_cache_alloc+0x1f9/0x2f0 mm/slub.c:2587
  [<ffffffff84c46a40>] ? eth_type_trans+0x2a0/0x5b0 net/ethernet/eth.c:186
  [<     inline     >] napi_skb_finish net/core/dev.c:4553
  [<ffffffff84ba3882>] napi_gro_receive+0x2c2/0x480 net/core/dev.c:4585
  [<     inline     >] e1000_receive_skb 
drivers/net/ethernet/intel/e1000/e1000_main.c:4035
  [<ffffffff83977bb0>] e1000_clean_rx_irq+0x440/0x1110 
drivers/net/ethernet/intel/e1000/e1000_main.c:4491
  [<ffffffff83977770>] ? e1000_enter_82542_rst+0x260/0x260 
drivers/net/ethernet/intel/e1000/e1000_main.c:2148
  [<ffffffff83974d08>] e1000_clean+0xa08/0x24a0 
drivers/net/ethernet/intel/e1000/e1000_main.c:3836
  [<ffffffff813c0d29>] ? check_preempt_wakeup+0x3c9/0xa70 
kernel/sched/fair.c:5411
  [<ffffffff83974300>] ? 
e1000_unmap_and_free_tx_resource.isra.46+0x3e0/0x3e0 
drivers/net/ethernet/intel/e1000/e1000_main.c:1972
  [<ffffffff814011ad>] ? trace_hardirqs_off+0xd/0x10 
kernel/locking/lockdep.c:2772
  [<ffffffff81409300>] ? debug_check_no_locks_freed+0x290/0x290 
kernel/locking/lockdep.c:4212
  [<     inline     >] napi_poll net/core/dev.c:5087
  [<ffffffff84ba02c1>] net_rx_action+0x751/0xd80 net/core/dev.c:5152
  [<ffffffff82da9bbc>] ? add_interrupt_randomness+0x2bc/0x570 
drivers/char/random.c:922
  [<ffffffff84b9fb70>] ? sk_busy_loop+0x1130/0x1130 
include/trace/events/napi.h:13
  [<ffffffff814412a2>] ? handle_irq_event+0xb2/0x140 kernel/irq/handle.c:194
  [<     inline     >] ? apic_eoi ./arch/x86/include/asm/apic.h:402
  [<     inline     >] ? ack_APIC_irq ./arch/x86/include/asm/apic.h:446
  [<ffffffff812120d5>] ? ioapic_ack_level+0x165/0x450 
arch/x86/kernel/apic/io_apic.c:1814
  [<     inline     >] ? invoke_softirq kernel/softirq.c:350
  [<ffffffff8131690d>] ? irq_exit+0x15d/0x190 kernel/softirq.c:391
  [<ffffffff85c8d91b>] __do_softirq+0x22b/0x8da kernel/softirq.c:273
  [<     inline     >] invoke_softirq kernel/softirq.c:350
  [<ffffffff8131690d>] irq_exit+0x15d/0x190 kernel/softirq.c:391
  [<     inline     >] exiting_irq ./arch/x86/include/asm/apic.h:658
  [<ffffffff85c8d0c6>] do_IRQ+0x86/0x1a0 arch/x86/kernel/irq.c:252
  [<ffffffff85c8b50c>] common_interrupt+0x8c/0x8c 
arch/x86/entry/entry_64.S:454
  [<     inline     >] ? copy_pte_range mm/memory.c:945
  [<     inline     >] ? copy_pmd_range mm/memory.c:1003
  [<     inline     >] ? copy_pud_range mm/memory.c:1025
  [<ffffffff816accd9>] ? copy_page_range+0xa69/0x19d0 mm/memory.c:1087
  [<     inline     >] ? copy_pte_range mm/memory.c:945
  [<     inline     >] ? copy_pmd_range mm/memory.c:1003
  [<     inline     >] ? copy_pud_range mm/memory.c:1025
  [<ffffffff816accba>] ? copy_page_range+0xa4a/0x19d0 mm/memory.c:1087
  [<     inline     >] ? rb_insert_augmented 
include/linux/rbtree_augmented.h:60
  [<     inline     >] ? __anon_vma_interval_tree_insert 
mm/interval_tree.c:72
  [<ffffffff81694b83>] ? anon_vma_interval_tree_insert+0x233/0x2d0 
mm/interval_tree.c:83
  [<ffffffff816ac270>] ? vm_iomap_memory+0x130/0x130 mm/memory.c:1836
  [<     inline     >] ? vma_rb_insert include/linux/rbtree_augmented.h:60
  [<ffffffff816b7795>] ? __vma_link_rb+0x445/0x5d0 mm/mmap.c:531
  [<     inline     >] dup_mmap kernel/fork.c:513
  [<     inline     >] dup_mm kernel/fork.c:937
  [<     inline     >] copy_mm kernel/fork.c:991
  [<ffffffff812ffeed>] copy_process.part.37+0x468d/0x5a50 kernel/fork.c:1456
  [<ffffffff812fb860>] ? __cleanup_sighand+0x50/0x50 kernel/fork.c:1105
  [<     inline     >] copy_process kernel/fork.c:1282
  [<ffffffff813015c9>] _do_fork+0x1a9/0xcd0 kernel/fork.c:1731
  [<ffffffff81301420>] ? fork_idle+0x110/0x110 include/linux/list.h:601
  [<ffffffff8183628e>] ? __fsnotify_parent+0x5e/0x2b0 
fs/notify/fsnotify.c:98
  [<     inline     >] ? inc_syscr include/linux/sched.h:3178
  [<ffffffff81764623>] ? vfs_read+0x223/0x310 fs/read_write.c:499
  [<     inline     >] SYSC_clone kernel/fork.c:1840
  [<ffffffff813021c7>] SyS_clone+0x37/0x50 kernel/fork.c:1834
  [<ffffffff85c8ad30>] ? ptregs_sys_rt_sigreturn+0x10/0x10 
arch/x86/include/generated/asm/syscalls_64.h:16
  [<ffffffff8100653d>] do_syscall_64+0x1ad/0x4b0 arch/x86/entry/common.c:350
  [<ffffffff81302190>] ? sys_vfork+0x30/0x30 kernel/fork.c:1813
  [<ffffffff85c8ac43>] entry_SYSCALL64_slow_path+0x25/0x25 
arch/x86/entry/entry_64.S:248
Memory state around the buggy address:
  ffff880038027880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  ffff880038027900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
>ffff880038027980: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb
                                            ^
  ffff880038027a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
  ffff880038027a80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
==================================================================


Best Regards,
Baozeng Ding

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ