lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 3 May 2017 18:33:05 +0200
From:   Andrey Konovalov <andreyknvl@...gle.com>
To:     David Ahern <dsahern@...il.com>
Cc:     "David S. Miller" <davem@...emloft.net>,
        Alexey Kuznetsov <kuznet@....inr.ac.ru>,
        James Morris <jmorris@...ei.org>,
        Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org>,
        Patrick McHardy <kaber@...sh.net>,
        netdev <netdev@...r.kernel.org>,
        LKML <linux-kernel@...r.kernel.org>,
        Dmitry Vyukov <dvyukov@...gle.com>,
        Kostya Serebryany <kcc@...gle.com>,
        Eric Dumazet <edumazet@...gle.com>,
        Cong Wang <xiyou.wangcong@...il.com>,
        syzkaller <syzkaller@...glegroups.com>
Subject: net/ipv6: GPF in rt6_device_match

Hi David,

Got another report related to fib6.

I'm on 89c9fea3c8034cdb2fd745f551cde0b507fd6893 with your last patch applied.

A reproducer and .config are attached.

kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] SMP KASAN
Modules linked in:
CPU: 1 PID: 4059 Comm: a.out Not tainted 4.11.0+ #312
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011
task: ffff880064d11600 task.stack: ffff88006b0e8000
RIP: 0010:rt6_device_match net/ipv6/route.c:515
RIP: 0010:ip6_pol_route_lookup+0x2f2/0xa90 net/ipv6/route.c:885
RSP: 0018:ffff88006b0ef0b8 EFLAGS: 00010246
RAX: 1ffff1000d00f20b RBX: ffff880066dd96c0 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffff88006b0ef5b8 RDI: ffff880068079058
RBP: ffff88006b0ef1e0 R08: 0000000000000002 R09: 4e43247300000000
R10: ffff88006b0ef0b8 R11: dffffc0000000000 R12: 0000000000090000
R13: ffff880068078f00 R14: 0000000000000000 R15: dffffc0000000000
FS:  00007fd68b4d5700(0000) GS:ffff88006cb00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000208e2fe0 CR3: 0000000064c9b000 CR4: 00000000000006e0
Call Trace:
 fib6_rule_action+0x261/0x8a0 net/ipv6/fib6_rules.c:100
 fib_rules_lookup+0x3cf/0xca0 net/core/fib_rules.c:279
 fib6_rule_lookup+0x175/0x360 net/ipv6/fib6_rules.c:44
 rt6_lookup+0x267/0x3b0 net/ipv6/route.c:924
 ip6gre_tnl_link_config+0x774/0xc00 net/ipv6/ip6_gre.c:746
 ip6gre_tunnel_locate+0x4ab/0x7c0 net/ipv6/ip6_gre.c:340
 ip6gre_tunnel_ioctl+0x5cd/0x21f0 net/ipv6/ip6_gre.c:878
 dev_ifsioc+0x53f/0x9f0 net/core/dev_ioctl.c:338
 dev_ioctl+0xc3c/0x1160 net/core/dev_ioctl.c:555
 sock_ioctl+0x169/0x440 net/socket.c:944
 vfs_ioctl fs/ioctl.c:45
 do_vfs_ioctl+0x1bf/0x1660 fs/ioctl.c:685
 SYSC_ioctl fs/ioctl.c:700
 SyS_ioctl+0x8f/0xc0 fs/ioctl.c:691
 entry_SYSCALL_64_fastpath+0x1f/0xbe arch/x86/entry/entry_64.S:204
RIP: 0033:0x7fd68abe7b79
RSP: 002b:00007ffce50c8aa8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007ffce50c8c00 RCX: 00007fd68abe7b79
RDX: 000000002036afd8 RSI: 00000000000089f1 RDI: 0000000000000004
RBP: 00000000004004e0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000
R13: 00007ffce50c8c00 R14: 0000000000000000 R15: 0000000000000000
Code: 95 b1 7d fd 49 8d bd 58 01 00 00 48 89 f8 48 c1 e8 03 42 80 3c
38 00 0f 85 5f 07 00 00 4d 8b b5 58 01 00 00 4c 89 f2 48 c1 ea 03 <42>
80 3c 3a 00 0f 85 39 07 00 00 4d 8b 36 49 8d be 08 01 00 00
RIP: ip6_pol_route_lookup+0x2f2/0xa90 RSP: ffff88006b0ef0b8
---[ end trace 68c87c92d8d28615 ]---

View attachment "rt6_device_match-gpf-poc.c" of type "text/x-csrc" (7277 bytes)

Download attachment ".config" of type "application/octet-stream" (128481 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ