lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 18 Jan 2018 21:58:01 -0800
From:   syzbot <syzbot+22b2e8ffdc35d97b5942@...kaller.appspotmail.com>
To:     davem@...emloft.net, kuznet@....inr.ac.ru,
        linux-kernel@...r.kernel.org, netdev@...r.kernel.org,
        syzkaller-bugs@...glegroups.com, yoshfuji@...ux-ipv6.org
Subject: KASAN: use-after-free Read in fib6_ifup (2)

Hello,

syzbot hit the following crash on net-next commit
564737f981fb4b4b3266901508bb9b90d9d43de8

So far this crash happened 18 times on mmots, net-next.
C reproducer is attached.
syzkaller reproducer is attached.
Raw console output is attached.
compiler: gcc (GCC) 7.1.1 20170620
.config is attached.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+22b2e8ffdc35d97b5942@...kaller.appspotmail.com
It will help syzbot understand when the bug is fixed. See footer for  
details.
If you forward the report, please keep this part and the footer.

device lo entered promiscuous mode
device lo left promiscuous mode
device lo entered promiscuous mode
==================================================================
BUG: KASAN: use-after-free in fib6_ifup+0x212/0x220 net/ipv6/route.c:3573
Read of size 8 at addr ffff8801c83b2000 by task syzkaller920794/4756

CPU: 1 PID: 4756 Comm: syzkaller920794 Not tainted 4.15.0-rc7+ #189
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS  
Google 01/01/2011
Call Trace:
  __dump_stack lib/dump_stack.c:17 [inline]
  dump_stack+0x194/0x257 lib/dump_stack.c:53
  print_address_description+0x73/0x250 mm/kasan/report.c:252
  kasan_report_error mm/kasan/report.c:351 [inline]
  kasan_report+0x25b/0x340 mm/kasan/report.c:409
  __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:430
  fib6_ifup+0x212/0x220 net/ipv6/route.c:3573
  fib6_clean_node+0x389/0x580 net/ipv6/ip6_fib.c:1912
  fib6_walk_continue+0x46c/0x8a0 net/ipv6/ip6_fib.c:1838
  fib6_walk+0x91/0xf0 net/ipv6/ip6_fib.c:1886
  fib6_clean_tree+0x1e6/0x340 net/ipv6/ip6_fib.c:1963
  __fib6_clean_all+0x1f4/0x3a0 net/ipv6/ip6_fib.c:1979
  fib6_clean_all+0x27/0x30 net/ipv6/ip6_fib.c:1990
  rt6_sync_up+0x15e/0x1c0 net/ipv6/route.c:3592
  addrconf_notify+0x3f6/0x2310 net/ipv6/addrconf.c:3490
  notifier_call_chain+0x136/0x2c0 kernel/notifier.c:93
  __raw_notifier_call_chain kernel/notifier.c:394 [inline]
  raw_notifier_call_chain+0x2d/0x40 kernel/notifier.c:401
  call_netdevice_notifiers_info+0x32/0x70 net/core/dev.c:1708
  call_netdevice_notifiers net/core/dev.c:1726 [inline]
  __dev_notify_flags+0x15d/0x430 net/core/dev.c:6932
  dev_change_flags+0xf5/0x140 net/core/dev.c:6968
  devinet_ioctl+0x125b/0x19e0 net/ipv4/devinet.c:1083
  inet_ioctl+0x117/0x1c0 net/ipv4/af_inet.c:904
  packet_ioctl+0x1ff/0x310 net/packet/af_packet.c:4068
  sock_do_ioctl+0x65/0xb0 net/socket.c:958
  sock_ioctl+0x2c2/0x440 net/socket.c:1055
  vfs_ioctl fs/ioctl.c:46 [inline]
  do_vfs_ioctl+0x1b1/0x1520 fs/ioctl.c:686
  SYSC_ioctl fs/ioctl.c:701 [inline]
  SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692
  entry_SYSCALL_64_fastpath+0x23/0x9a
RIP: 0033:0x44ceb9
RSP: 002b:00007f40cf03fce8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00000000006dfc24 RCX: 000000000044ceb9
RDX: 00000000208a3fe0 RSI: 0000000000008914 RDI: 000000000000005c
RBP: 00000000006dfc20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffeedfab01f R14: 00007f40cf0409c0 R15: 0000000000000001

Allocated by task 4767:
  save_stack+0x43/0xd0 mm/kasan/kasan.c:447
  set_track mm/kasan/kasan.c:459 [inline]
  kasan_kmalloc+0xad/0xe0 mm/kasan/kasan.c:551
  kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:489
  kmem_cache_alloc+0x12e/0x760 mm/slab.c:3544
  dst_alloc+0x11f/0x1a0 net/core/dst.c:104
  __ip6_dst_alloc+0x35/0x90 net/ipv6/route.c:361
  ip6_dst_alloc+0x29/0xb0 net/ipv6/route.c:376
  ip6_route_info_create+0x4ff/0x2e20 net/ipv6/route.c:2538
  ip6_route_add+0xa2/0x190 net/ipv6/route.c:2779
  ipv6_route_ioctl+0x4db/0x6b0 net/ipv6/route.c:3299
  inet6_ioctl+0xef/0x1e0 net/ipv6/af_inet6.c:520
  sock_do_ioctl+0x65/0xb0 net/socket.c:958
  sock_ioctl+0x2c2/0x440 net/socket.c:1055
  vfs_ioctl fs/ioctl.c:46 [inline]
  do_vfs_ioctl+0x1b1/0x1520 fs/ioctl.c:686
  SYSC_ioctl fs/ioctl.c:701 [inline]
  SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692
  entry_SYSCALL_64_fastpath+0x23/0x9a

Freed by task 4756:
  save_stack+0x43/0xd0 mm/kasan/kasan.c:447
  set_track mm/kasan/kasan.c:459 [inline]
  kasan_slab_free+0x71/0xc0 mm/kasan/kasan.c:524
  __cache_free mm/slab.c:3488 [inline]
  kmem_cache_free+0x83/0x2a0 mm/slab.c:3746
  dst_destroy+0x257/0x370 net/core/dst.c:140
  dst_destroy_rcu+0x16/0x20 net/core/dst.c:153
  __rcu_reclaim kernel/rcu/rcu.h:195 [inline]
  rcu_do_batch kernel/rcu/tree.c:2758 [inline]
  invoke_rcu_callbacks kernel/rcu/tree.c:3012 [inline]
  __rcu_process_callbacks kernel/rcu/tree.c:2979 [inline]
  rcu_process_callbacks+0xd6c/0x17f0 kernel/rcu/tree.c:2996
  __do_softirq+0x2d7/0xb85 kernel/softirq.c:285

The buggy address belongs to the object at ffff8801c83b2000
  which belongs to the cache ip6_dst_cache of size 320
The buggy address is located 0 bytes inside of
  320-byte region [ffff8801c83b2000, ffff8801c83b2140)
The buggy address belongs to the page:
page:ffffea000720ec80 count:1 mapcount:0 mapping:ffff8801c83b2000 index:0x0
flags: 0x2fffc0000000100(slab)
raw: 02fffc0000000100 ffff8801c83b2000 0000000000000000 000000010000000a
raw: ffffea000730d720 ffffea00071e4160 ffff8801d32c9240 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
  ffff8801c83b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
  ffff8801c83b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
> ffff8801c83b2000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                    ^
  ffff8801c83b2080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
  ffff8801c83b2100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
==================================================================


---
This bug is generated by a dumb bot. It may contain errors.
See https://goo.gl/tpsmEJ for details.
Direct all questions to syzkaller@...glegroups.com.

syzbot will keep track of this bug report.
If you forgot to add the Reported-by tag, once the fix for this bug is  
merged
into any tree, please reply to this email with:
#syz fix: exact-commit-title
If you want to test a patch for this bug, please reply with:
#syz test: git://repo/address.git branch
and provide the patch inline or as an attachment.
To mark this as a duplicate of another syzbot report, please reply with:
#syz dup: exact-subject-of-another-report
If it's a one-off invalid bug report, please reply with:
#syz invalid
Note: if the crash happens again, it will cause creation of a new bug  
report.
Note: all commands must start from beginning of the line in the email body.

View attachment "raw.log.txt" of type "text/plain" (32529 bytes)

View attachment "repro.syz.txt" of type "text/plain" (2127 bytes)

View attachment "repro.c.txt" of type "text/plain" (19119 bytes)

View attachment "config.txt" of type "text/plain" (135039 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ