lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20210904042010.5henc6pn5zotdq6v@treble>
Date:   Fri, 3 Sep 2021 21:20:10 -0700
From:   Josh Poimboeuf <jpoimboe@...hat.com>
To:     syzbot <syzbot+30622fb04ddd72a4d167@...kaller.appspotmail.com>
Cc:     ardb@...nel.org, jbaron@...mai.com, linux-kernel@...r.kernel.org,
        peterz@...radead.org, rostedt@...dmis.org,
        syzkaller-bugs@...glegroups.com, Jussi Maki <joamaki@...il.com>,
        Daniel Borkmann <daniel@...earbox.net>
Subject: Re: [syzbot] WARNING in __static_key_slow_dec

Looks like a jump label usage bug ("jump label: negative count!") may
have been introduced, presumably with the following commit:

  9e2ee5c7e7c3 ("net, bonding: Add XDP support to the bonding driver")

Jussi, any idea?

On Fri, Sep 03, 2021 at 01:28:22PM -0700, syzbot wrote:
> Hello,
> 
> syzbot found the following issue on:
> 
> HEAD commit:    835d31d319d9 Merge tag 'media/v5.15-1' of git://git.kernel..
> git tree:       upstream
> console output: https://syzkaller.appspot.com/x/log.txt?x=15193486300000
> kernel config:  https://syzkaller.appspot.com/x/.config?x=d793523866f2daea
> dashboard link: https://syzkaller.appspot.com/bug?extid=30622fb04ddd72a4d167
> compiler:       Debian clang version 11.0.1-2, GNU ld (GNU Binutils for Debian) 2.35.1
> syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=1565e801300000
> C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=16bd5513300000
> 
> IMPORTANT: if you fix the issue, please add the following tag to the commit:
> Reported-by: syzbot+30622fb04ddd72a4d167@...kaller.appspotmail.com
> 
> 8021q: adding VLAN 0 to HW filter on device bond5
> ------------[ cut here ]------------
> jump label: negative count!
> WARNING: CPU: 0 PID: 8606 at kernel/jump_label.c:235 static_key_slow_try_dec kernel/jump_label.c:235 [inline]
> WARNING: CPU: 0 PID: 8606 at kernel/jump_label.c:235 __static_key_slow_dec_cpuslocked kernel/jump_label.c:243 [inline]
> WARNING: CPU: 0 PID: 8606 at kernel/jump_label.c:235 __static_key_slow_dec+0xfb/0x150 kernel/jump_label.c:255
> Modules linked in:
> CPU: 0 PID: 8606 Comm: syz-executor165 Not tainted 5.14.0-syzkaller #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
> RIP: 0010:static_key_slow_try_dec kernel/jump_label.c:235 [inline]
> RIP: 0010:__static_key_slow_dec_cpuslocked kernel/jump_label.c:243 [inline]
> RIP: 0010:__static_key_slow_dec+0xfb/0x150 kernel/jump_label.c:255
> Code: c3 40 0f 94 c6 31 ff e8 63 34 d9 ff 84 db 75 1e e8 8a 31 d9 ff eb 24 e8 83 31 d9 ff 48 c7 c7 40 75 59 8a 31 c0 e8 25 8b a4 ff <0f> 0b eb 9f e8 6c 31 d9 ff 4c 89 f7 e8 54 f6 ff ff 48 c7 c7 c0 88
> RSP: 0018:ffffc9000215e438 EFLAGS: 00010246
> RAX: 5e2d18889f3c9100 RBX: 00000000ffffffff RCX: ffff8880224d3900
> RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000
> RBP: 00000000ffffffff R08: ffffffff8166aff2 R09: ffffed1017383f2c
> R10: ffffed1017383f2c R11: 0000000000000000 R12: 0000000000000000
> R13: ffff8880356f00b0 R14: ffffffff90d9ec00 R15: 1ffff9200042bc01
> FS:  00000000017be300(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
> CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> CR2: 00000000200001c0 CR3: 0000000036bed000 CR4: 00000000001506f0
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
> Call Trace:
>  bond_xdp_set drivers/net/bonding/bond_main.c:5233 [inline]
>  bond_xdp+0x8dd/0xa10 drivers/net/bonding/bond_main.c:5264
>  bond_enslave+0x40b7/0x5e20 drivers/net/bonding/bond_main.c:2187
>  do_set_master net/core/rtnetlink.c:2521 [inline]
>  do_setlink+0xfc3/0x4250 net/core/rtnetlink.c:2726
>  __rtnl_newlink net/core/rtnetlink.c:3391 [inline]
>  rtnl_newlink+0x16ee/0x1cf0 net/core/rtnetlink.c:3506
>  rtnetlink_rcv_msg+0x91c/0xe50 net/core/rtnetlink.c:5572
>  netlink_rcv_skb+0x1f0/0x460 net/netlink/af_netlink.c:2504
>  netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]
>  netlink_unicast+0x7de/0x9b0 net/netlink/af_netlink.c:1340
>  netlink_sendmsg+0x9e7/0xe00 net/netlink/af_netlink.c:1929
>  sock_sendmsg_nosec net/socket.c:704 [inline]
>  sock_sendmsg net/socket.c:724 [inline]
>  ____sys_sendmsg+0x5a2/0x900 net/socket.c:2409
>  ___sys_sendmsg net/socket.c:2463 [inline]
>  __sys_sendmsg+0x319/0x400 net/socket.c:2492
>  do_syscall_x64 arch/x86/entry/common.c:50 [inline]
>  do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
>  entry_SYSCALL_64_after_hwframe+0x44/0xae
> RIP: 0033:0x440db9
> Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
> RSP: 002b:00007ffcd41b2788 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
> RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000440db9
> RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005
> RBP: 0000000000000000 R08: 0000000000f0b5ff R09: 0000000000f0b5ff
> R10: 0000000000f0b5ff R11: 0000000000000246 R12: 000000000000bd7b
> R13: 00007ffcd41b27b0 R14: 00007ffcd41b27a0 R15: 00007ffcd41b2794
> 
> 
> ---
> This report is generated by a bot. It may contain errors.
> See https://goo.gl/tpsmEJ for more information about syzbot.
> syzbot engineers can be reached at syzkaller@...glegroups.com.
> 
> syzbot will keep track of this issue. See:
> https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
> syzbot can test patches for this issue, for details see:
> https://goo.gl/tpsmEJ#testing-patches
> 

-- 
Josh

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ