lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <7e6554dc-29e1-44b5-9fd0-3b3537f5b63c@I-love.SAKURA.ne.jp>
Date: Wed, 3 Jan 2024 18:59:49 +0900
From: Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>
To: syzbot <syzbot+d7521c1e3841ed075a42@...kaller.appspotmail.com>,
        syzkaller-bugs@...glegroups.com, linux-mm <linux-mm@...ck.org>,
        "linux-ext4@...r.kernel.org" <linux-ext4@...r.kernel.org>,
        "virtualization@...ts.linux-foundation.org"
 <virtualization@...ts.linux-foundation.org>
Subject: Re: [syzbot] [virtualization?] KMSAN: uninit-value in virtqueue_add
 (4)

Well, no suggestions from MM people? This is currently second top crasher
for syzbot and the reproducer is doing nothing special.

syzbot is reporting uninit-value at kmsan_handle_dma() in vring_map_one_sg().

----------
	if (!vq->use_dma_api) {
		/*
		 * If DMA is not used, KMSAN doesn't know that the scatterlist
		 * is initialized by the hardware. Explicitly check/unpoison it
		 * depending on the direction.
		 */
		kmsan_handle_dma(sg_page(sg), sg->offset, sg->length, direction);
		*addr = (dma_addr_t)sg_phys(sg);
		return 0;
	}
----------

syzbot is reporting the page was allocated in ext4_da_write_begin().

----------
	folio = __filemap_get_folio(mapping, index, FGP_WRITEBEGIN,
			mapping_gfp_mask(mapping));
	if (IS_ERR(folio))
		return PTR_ERR(folio);

	/* In case writeback began while the folio was unlocked */
	folio_wait_stable(folio);

#ifdef CONFIG_FS_ENCRYPTION
	ret = ext4_block_write_begin(folio, pos, len, ext4_da_get_block_prep);
#else
	ret = __block_write_begin(&folio->page, pos, len, ext4_da_get_block_prep);
#endif
----------

Since folio_wait_stable() calls folio_wait_writeback(), I'm guessing that
blk_mq_run_work_fn() is triggered by folio_wait_stable().

----------
void folio_wait_stable(struct folio *folio)
{
	if (mapping_stable_writes(folio_mapping(folio)))
		folio_wait_writeback(folio);
}
----------

If my guess is correct, I wonder how AS_STABLE_WRITES could be already set on a
folio struct returned by __filemap_get_folio() ? When AS_STABLE_WRITES is set?

Are there anything we can do for debugging this? Is adding a kernel config option that
does s/union/struct/g for helping debugger/printk() to inspect values in "struct folio"
possible?

Not directly related to this report, but I worry that
mapping_stable_writes(folio_mapping(folio)) might hit NULL pointer
dereference bug because folio_mapping() might return NULL and
mapping_stable_writes() assumes that the argument is not NULL.

On 2024/01/02 16:38, Tetsuo Handa wrote:
> #syz set subsystems: mm
> 
> On 2024/01/01 22:38, syzbot wrote:
>> Hello,
>>
>> syzbot found the following issue on:
>>
>> HEAD commit:    fbafc3e621c3 Merge tag 'for_linus' of git://git.kernel.org..
>> git tree:       upstream
>> console+strace: https://syzkaller.appspot.com/x/log.txt?x=173df3e9e80000
>> kernel config:  https://syzkaller.appspot.com/x/.config?x=e0c7078a6b901aa3
>> dashboard link: https://syzkaller.appspot.com/bug?extid=d7521c1e3841ed075a42
>> compiler:       Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40
>> syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=1300b4a1e80000
>> C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=130b0379e80000
>>
>> Downloadable assets:
>> disk image: https://storage.googleapis.com/syzbot-assets/1520f7b6daa4/disk-fbafc3e6.raw.xz
>> vmlinux: https://storage.googleapis.com/syzbot-assets/8b490af009d5/vmlinux-fbafc3e6.xz
>> kernel image: https://storage.googleapis.com/syzbot-assets/202ca200f4a4/bzImage-fbafc3e6.xz
>>
>> IMPORTANT: if you fix the issue, please add the following tag to the commit:
>> Reported-by: syzbot+d7521c1e3841ed075a42@...kaller.appspotmail.com
>>
>> =====================================================
>> BUG: KMSAN: uninit-value in vring_map_one_sg drivers/virtio/virtio_ring.c:380 [inline]
>> BUG: KMSAN: uninit-value in virtqueue_add_split drivers/virtio/virtio_ring.c:614 [inline]
>> BUG: KMSAN: uninit-value in virtqueue_add+0x21c6/0x6530 drivers/virtio/virtio_ring.c:2210
>>  vring_map_one_sg drivers/virtio/virtio_ring.c:380 [inline]
>>  virtqueue_add_split drivers/virtio/virtio_ring.c:614 [inline]
>>  virtqueue_add+0x21c6/0x6530 drivers/virtio/virtio_ring.c:2210
>>  virtqueue_add_sgs+0x186/0x1a0 drivers/virtio/virtio_ring.c:2244
>>  __virtscsi_add_cmd drivers/scsi/virtio_scsi.c:467 [inline]
>>  virtscsi_add_cmd+0x838/0xad0 drivers/scsi/virtio_scsi.c:501
>>  virtscsi_queuecommand+0x896/0xa60 drivers/scsi/virtio_scsi.c:598
>>  scsi_dispatch_cmd drivers/scsi/scsi_lib.c:1516 [inline]
>>  scsi_queue_rq+0x4874/0x5790 drivers/scsi/scsi_lib.c:1758
>>  blk_mq_dispatch_rq_list+0x13f8/0x3600 block/blk-mq.c:2049
>>  __blk_mq_do_dispatch_sched block/blk-mq-sched.c:170 [inline]
>>  blk_mq_do_dispatch_sched block/blk-mq-sched.c:184 [inline]
>>  __blk_mq_sched_dispatch_requests+0x10af/0x2500 block/blk-mq-sched.c:309
>>  blk_mq_sched_dispatch_requests+0x160/0x2d0 block/blk-mq-sched.c:333
>>  blk_mq_run_work_fn+0xd0/0x280 block/blk-mq.c:2434
>>  process_one_work kernel/workqueue.c:2627 [inline]
>>  process_scheduled_works+0x104e/0x1e70 kernel/workqueue.c:2700
>>  worker_thread+0xf45/0x1490 kernel/workqueue.c:2781
>>  kthread+0x3ed/0x540 kernel/kthread.c:388
>>  ret_from_fork+0x66/0x80 arch/x86/kernel/process.c:147
>>  ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242
>>
>> Uninit was created at:
>>  __alloc_pages+0x9a4/0xe00 mm/page_alloc.c:4591
>>  alloc_pages_mpol+0x62b/0x9d0 mm/mempolicy.c:2133
>>  alloc_pages mm/mempolicy.c:2204 [inline]
>>  folio_alloc+0x1da/0x380 mm/mempolicy.c:2211
>>  filemap_alloc_folio+0xa5/0x430 mm/filemap.c:974
>>  __filemap_get_folio+0xa5a/0x1760 mm/filemap.c:1918
>>  ext4_da_write_begin+0x7f8/0xec0 fs/ext4/inode.c:2891
>>  generic_perform_write+0x3f5/0xc40 mm/filemap.c:3918
>>  ext4_buffered_write_iter+0x564/0xaa0 fs/ext4/file.c:299
>>  ext4_file_write_iter+0x20f/0x3460
>>  __kernel_write_iter+0x329/0x930 fs/read_write.c:517
>>  dump_emit_page fs/coredump.c:888 [inline]
>>  dump_user_range+0x593/0xcd0 fs/coredump.c:915
>>  elf_core_dump+0x528d/0x5a40 fs/binfmt_elf.c:2077
>>  do_coredump+0x32c9/0x4920 fs/coredump.c:764
>>  get_signal+0x2185/0x2d10 kernel/signal.c:2890
>>  arch_do_signal_or_restart+0x53/0xca0 arch/x86/kernel/signal.c:309
>>  exit_to_user_mode_loop+0xe8/0x320 kernel/entry/common.c:168
>>  exit_to_user_mode_prepare+0x163/0x220 kernel/entry/common.c:204
>>  irqentry_exit_to_user_mode+0xd/0x30 kernel/entry/common.c:309
>>  irqentry_exit+0x16/0x40 kernel/entry/common.c:412
>>  exc_page_fault+0x246/0x6f0 arch/x86/mm/fault.c:1564
>>  asm_exc_page_fault+0x2b/0x30 arch/x86/include/asm/idtentry.h:570
>>
>> Bytes 0-4095 of 4096 are uninitialized
>> Memory access of size 4096 starts at ffff88812c79c000
>>
>> CPU: 0 PID: 997 Comm: kworker/0:1H Not tainted 6.7.0-rc7-syzkaller-00003-gfbafc3e621c3 #0
>> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
>> Workqueue: kblockd blk_mq_run_work_fn
>> =====================================================
> 


Powered by blists - more mailing lists