lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAAeHK+ww-PunDvAZqScLbFYiG=4jTt7cQTLEo+oDGzeQPY+oOg@mail.gmail.com> Date: Thu, 17 Sep 2015 15:01:24 +0200 From: Andrey Konovalov <andreyknvl@...gle.com> To: "Theodore Ts'o" <tytso@....edu>, Andreas Dilger <adilger.kernel@...ger.ca>, linux-ext4@...r.kernel.org, linux-kernel@...r.kernel.org Cc: Dmitry Vyukov <dvyukov@...gle.com>, Alexander Potapenko <glider@...gle.com> Subject: User-memory-access in ext4_orphan_del Hi! While fuzzing the kernel (d25ed277fbd) with KASAN and Trinity I got the report below. This report is followed by: kernel BUG at fs/buffer.c:3025 BUG: KASan: use after free in mutex_optimistic_spin Crash log is here: https://gist.github.com/xairy/3b7fcf1cd2541c64c8d1 Here is another crash log that I got in a separate run (starts with kernel BUG at fs/ext4/ext4.h:2610!), but it seems somewhat similar: https://gist.github.com/xairy/6ab010c20eb437ec23af ================================================================== BUG: KASan: user-memory-access on address dead000000000108 Write of size 8 by task rs:main Q:Reg/2999 CPU: 0 PID: 2999 Comm: rs:main Q:Reg Not tainted 4.3.0-rc1-kasan #9 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2007 ffff880034067990 ffff880034507a40 ffffffff814a3aac 0000000000000297 ffff880034507a60 ffffffff812107a9 ffff8800340679d0 dead000000000200 ffff880034507a98 ffffffff8120f1ca dead000000000108 ffff880034507a98 Call Trace: [<ffffffff814a3aac>] dump_stack+0x44/0x58 lib/dump_stack.c:15 [<ffffffff812107a9>] kasan_report_user_access+0x89/0xb0 ??:0 [<ffffffff8120f1ca>] __asan_store8+0x8a/0xa0 ??:0 [< inline >] ? __list_del include/linux/list.h:89 [< inline >] ? __list_del_entry include/linux/list.h:102 [< inline >] ? list_del_init include/linux/list.h:145 [<ffffffff812e8874>] ? ext4_orphan_del+0x114/0x3a0 fs/ext4/namei.c:2859 [< inline >] __list_del include/linux/list.h:89 [< inline >] __list_del_entry include/linux/list.h:102 [< inline >] list_del_init include/linux/list.h:145 [<ffffffff812e8874>] ext4_orphan_del+0x114/0x3a0 fs/ext4/namei.c:2859 [<ffffffff812d89cc>] ext4_truncate+0x50c/0x640 fs/ext4/inode.c:3797 [<ffffffff812d9248>] ext4_da_write_begin+0x228/0x3a0 fs/ext4/truncate.h:14 [<ffffffff811a1e62>] generic_perform_write+0x112/0x2e0 mm/filemap.c:2476 [<ffffffff811a49f3>] __generic_file_write_iter+0x253/0x2f0 mm/filemap.c:2622 [<ffffffff81115e9a>] ? get_futex_key_refs.isra.12+0x1a/0x50 kernel/futex.c:399 [< inline >] ? iov_iter_truncate include/linux/uio.h:136 [<ffffffff811a236e>] ? generic_write_checks+0x12e/0x210 mm/filemap.c:2333 [<ffffffff812c95ab>] ext4_file_write_iter+0x16b/0x5f0 file.c:0 [<ffffffff811165fc>] ? futex_wake+0x8c/0x1d0 kernel/futex.c:611 [<ffffffff814be772>] ? iov_iter_init+0x82/0xc0 ??:0 [<ffffffff81217818>] __vfs_write+0x128/0x170 ??:0 [<ffffffff812180ab>] vfs_write+0xeb/0x250 ??:0 [<ffffffff81219283>] SyS_write+0x53/0xb0 ??:0 [<ffffffff81d4ed62>] tracesys_phase2+0x84/0x89 arch/x86/entry/entry_64.S:269 ================================================================== general protection fault: 0000 [#1] SMP KASAN Modules linked in: CPU: 0 PID: 2999 Comm: rs:main Q:Reg Not tainted 4.3.0-rc1-kasan #9 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2007 task: ffff880033d75940 ti: ffff880034500000 task.ti: ffff880034500000 RIP: 0010:[<ffffffff812e887b>] [<ffffffff812e887b>] ext4_orphan_del+0x11b/0x3a0 RSP: 0018:ffff880034507aa8 EFLAGS: 00010297 RAX: dead000000000100 RBX: ffff8800340679d0 RCX: 0000000000000042 RDX: 1ffffffff04a6bd0 RSI: 0000000000000297 RDI: dead000000000200 RBP: ffff880034507b30 R08: 000000000000003d R09: 000000000000003d R10: ffffffff824c057b R11: 3d3d3d3d3d3d3d3d R12: dead000000000200 R13: ffff880034ac40c0 R14: 0000000000000000 R15: ffff880034067990 FS: 00007f8731819700(0000) GS:ffff880036400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fffc6cbdfc8 CR3: 0000000032b96000 CR4: 00000000000006f0 DR0: 00007f0dd31d7000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Stack: ffff8800340679f8 ffff880034ac42d0 dead000000000200 ffff880034067910 dead000000000100 ffff880034216b80 ffff8800341f9238 0000000000000b00 ffff880000000002 ffff8800341f9238 0000000000000b00 ffff880000000002 Call Trace: [<ffffffff812d89cc>] ext4_truncate+0x50c/0x640 fs/ext4/inode.c:3797 [<ffffffff812d9248>] ext4_da_write_begin+0x228/0x3a0 fs/ext4/truncate.h:14 [<ffffffff811a1e62>] generic_perform_write+0x112/0x2e0 mm/filemap.c:2476 [<ffffffff811a49f3>] __generic_file_write_iter+0x253/0x2f0 mm/filemap.c:2622 [<ffffffff81115e9a>] ? get_futex_key_refs.isra.12+0x1a/0x50 kernel/futex.c:399 [< inline >] ? iov_iter_truncate include/linux/uio.h:136 [<ffffffff811a236e>] ? generic_write_checks+0x12e/0x210 mm/filemap.c:2333 [<ffffffff812c95ab>] ext4_file_write_iter+0x16b/0x5f0 file.c:0 [<ffffffff811165fc>] ? futex_wake+0x8c/0x1d0 kernel/futex.c:611 [<ffffffff814be772>] ? iov_iter_init+0x82/0xc0 ??:0 [<ffffffff81217818>] __vfs_write+0x128/0x170 ??:0 [<ffffffff812180ab>] vfs_write+0xeb/0x250 ??:0 [<ffffffff81219283>] SyS_write+0x53/0xb0 ??:0 [<ffffffff81d4ed62>] tracesys_phase2+0x84/0x89 arch/x86/entry/entry_64.S:269 Code: ff 48 8b 43 c0 49 8d 7c 24 08 48 89 45 98 e8 9d 6c f2 ff 48 8b 45 98 4c 8b 63 c8 48 8d 78 08 e8 cc 68 f2 ff 48 8b 45 98 4c 89 e7 <4c> 89 60 08 e8 bc 68 f2 ff 48 8b 45 98 45 85 f6 49 89 04 24 4c RIP [< inline >] __list_del include/linux/list.h:90 RIP [< inline >] __list_del_entry include/linux/list.h:102 RIP [< inline >] list_del_init include/linux/list.h:145 RIP [<ffffffff812e887b>] ext4_orphan_del+0x11b/0x3a0 fs/ext4/namei.c:2859 RSP <ffff880034507aa8> ---[ end trace 73c806d9f233bae7 ]--- -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists