lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <fb62f495-7efa-b470-804d-734d71c3fe68@suse.cz>
Date:	Wed, 27 Jul 2016 11:21:09 +0200
From:	Vlastimil Babka <vbabka@...e.cz>
To:	Eric Van Hensbergen <ericvh@...il.com>,
	Ron Minnich <rminnich@...dia.gov>,
	Latchesar Ionkov <lucho@...kov.net>
Cc:	"David S. Miller" <davem@...emloft.net>,
	v9fs-developer@...ts.sourceforge.net, netdev@...r.kernel.org,
	LKML <linux-kernel@...r.kernel.org>
Subject: gpf in p9_client_read

Hi,

I was fuzzing with trinity in qemu via the virtme script, i.e. using 
these opts:

virtme-run --kdir /home/vbabka/wrk/linus.git --rwdir 
/home/vbabka/tmp/trinity/ --dry-run --show-command --qemu-opts --smp 8 
-drive file=/home/vbabka/tmp/trinity.img,if=ide,format=raw,media=disk
/usr/bin/qemu-system-x86_64 -fsdev 
local,id=virtfs1,path=/,security_model=none,readonly -device 
virtio-9p-pci,fsdev=virtfs1,mount_tag=/dev/root -fsdev 
local,id=virtfs5,path=/usr/local/share/virtme-guest-0,security_model=none,readonly 
-device virtio-9p-pci,fsdev=virtfs5,mount_tag=virtme.guesttools -fsdev 
local,id=virtfs9,path=/home/vbabka/tmp/trinity/,security_model=none 
-device virtio-9p-pci,fsdev=virtfs9,mount_tag=virtme.initmount0 -machine 
accel=kvm:tcg -watchdog i6300esb -cpu host -parallel none -net none 
-echr 1 -serial none -chardev stdio,id=console,signal=off,mux=on -serial 
chardev:console -mon chardev=console -vga none -display none -kernel 
/home/vbabka/wrk/linus.git/arch/x86/boot/bzImage -append 
'virtme_initmount0=home/vbabka/tmp/trinity 
earlyprintk=serial,ttyS0,115200 console=ttyS0 psmouse.proto=exps 
"virtme_stty_con=rows 53 cols 189 iutf8" TERM=xterm rootfstype=9p 
rootflags=version=9p2000.L,trans=virtio,access=any raid=noautodetect ro 
init=/bin/sh -- -c "mount -t tmpfs run /run;mkdir -p 
/run/virtme/guesttools;/bin/mount -n -t 9p -o 
ro,version=9p2000.L,trans=virtio,access=any virtme.guesttools 
/run/virtme/guesttools;exec /run/virtme/guesttools/virtme-init"' --smp 8 
-drive file=/home/vbabka/tmp/trinity.img,if=ide,format=raw,media=disk

So the fuzzer's working directory is on ext4 created on disk backed by 
trinity.img, but the rest is provided from host via virtio-9p, as virtme 
does.

Very deterministically after few minutes of fuzzing, I get OOMs followed 
by this:

general protection fault: 0000 [#1] SMP
CPU: 2 PID: 17712 Comm: trinity-c10 Not tainted 4.7.0 #45
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
rel-1.9.1-0-gb3ef39f-prebuilt.qemu-project.org 04/01/2014
0[m )  178.898319] task: ffff880003a67000 ti: ffff880001984000 task.ti: 
ffff880001984000
RIP: 0010:[<ffffffff818eb530>]  [<ffffffff818eb530>] 
p9_client_read+0x70/0x270
RSP: 0000:ffff880001987c48  EFLAGS: 00010246
RAX: 559b48bf06527000 RBX: 0000000000001000 RCX: ffff880001987cdc
RDX: 0000000000001000 RSI: 000000000000c000 RDI: ffff880005e6b7c0
RBP: ffff880001987cc8 R08: 0000000000001000 R09: 0000000000000020
R10: ffff880001987cd0 R11: 0000000000000040 R12: ffff880005e6b780
R13: 000000000000c000 R14: ffff880005e6b240 R15: 00000000024201ca
FS:  00007fcdb1a74700(0000) GS:ffff880007c80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000040c840 CR3: 00000000019fb000 CR4: 00000000001406e0
DR0: 00007fcdb09b3000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000050602
Stack:
  ffff880001987c90 ffffffff81130f6f ffff880001987c58 ffff880001987c58
  ffff880007c91840 ffff880005e6b7c0 ffff880001987cdc ffffea0000000000
  ffff880001987cf0 0000100001987ce8 ffffffff81131621 ffffea000010abc0
Call Trace:
  [<ffffffff812afab3>] v9fs_fid_readpage+0x73/0x180 fs/9p/vfs_addr.c:69
  [<ffffffff812afbd0>] v9fs_vfs_readpage+0x10/0x20 fs/9p/vfs_addr.c:98
  [<     inline     >] page_cache_read mm/filemap.c:1908
  [<ffffffff81124ec5>] filemap_fault+0x335/0x4b0 mm/filemap.c:2087
  [<ffffffff8114cf91>] __do_fault+0x61/0xe0 mm/memory.c:2839
  [<     inline     >] do_read_fault mm/memory.c:3030
  [<     inline     >] do_fault mm/memory.c:3189
  [<     inline     >] handle_pte_fault mm/memory.c:3364
  [<     inline     >] __handle_mm_fault mm/memory.c:3488
  [<ffffffff81150151>] handle_mm_fault+0xd41/0x13d0 mm/memory.c:3517
  [<ffffffff8104b591>] __do_page_fault+0x1c1/0x490 arch/x86/mm/fault.c:1356
  [<ffffffff8104b86c>] do_page_fault+0xc/0x10 arch/x86/mm/fault.c:1419
  [<ffffffff818f9942>] page_fault+0x22/0x30 arch/x86/entry/entry_64.S:920
Code: 89 c2 89 45 cc 41 8b 5e 20 41 8b 44 24 04 83 e8 18 85 db 0f 84 f8 
00 00 00 39 c3 0f 87 f0 00 00 00 49 8b 44 24 10 39 d3 0f 4f da <48> 83 
78 50 00 74 0c 81 fb 00 04 00 00 0f 8f ef 00 00 00 41 8b
RIP  [<ffffffff818eb530>] p9_client_read+0x70/0x270 net/9p/client.c:1562
  RSP <ffff880001987c48>
---[ end trace 0192b39ea4ee4e9b ]---
Kernel panic - not syncing: Fatal exception
Kernel Offset: disabled
---[ end Kernel panic - not syncing: Fatal exception

All code
========
    0:   89 c2                   mov    %eax,%edx
    2:   89 45 cc                mov    %eax,-0x34(%rbp)
    5:   41 8b 5e 20             mov    0x20(%r14),%ebx
    9:   41 8b 44 24 04          mov    0x4(%r12),%eax
    e:   83 e8 18                sub    $0x18,%eax
   11:   85 db                   test   %ebx,%ebx
   13:   0f 84 f8 00 00 00       je     0x111
   19:   39 c3                   cmp    %eax,%ebx
   1b:   0f 87 f0 00 00 00       ja     0x111
   21:   49 8b 44 24 10          mov    0x10(%r12),%rax
   26:   39 d3                   cmp    %edx,%ebx
   28:   0f 4f da                cmovg  %edx,%ebx
   2b:*  48 83 78 50 00          cmpq   $0x0,0x50(%rax)          <-- 
trapping instruction
   30:   74 0c                   je     0x3e
   32:   81 fb 00 04 00 00       cmp    $0x400,%ebx
   38:   0f 8f ef 00 00 00       jg     0x12d
   3e:   41                      rex.B
   3f:   8b                      .byte 0x8b

the line in question is:

          if (clnt->trans_mod->zc_request && rsize > 1024)

trans_mod is in rax which is 559b48bf06527000, e.g. clearly bogus
clnt is in r12 which is ffff880005e6b780, I guess either it's wrong 
pointer (use-after-free?), or something overwrote the struct?

Thanks,
Vlastimil

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ