lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <000000000000b9bb9b05e17c21a8@google.com>
Date:   Wed, 15 Jun 2022 06:02:21 -0700
From:   syzbot <syzbot+b17d3e853d5dce65f981@...kaller.appspotmail.com>
To:     Hillf Danton <hdanton@...a.com>
Cc:     hdanton@...a.com, linux-kernel@...r.kernel.org,
        syzkaller-bugs@...glegroups.com
Subject: Re: [syzbot] KASAN: stack-out-of-bounds Read in __show_regs

> On Tue, 14 Jun 2022 12:05:35 -0700
>> syzbot has found a reproducer for the following issue on:
>> 
>> HEAD commit:    2f3064574275 README.md: ORC is no more a problem
>> git tree:       https://github.com/google/kmsan.git master
>> console output: https://syzkaller.appspot.com/x/log.txt?x=169a2310080000
>> kernel config:  https://syzkaller.appspot.com/x/.config?x=8e6293529531e9ca
>> dashboard link: https://syzkaller.appspot.com/bug?extid=b17d3e853d5dce65f981
>> compiler:       clang version 15.0.0 (https://github.com/llvm/llvm-project.git 9ffb5944a699b6a0d69c169ceff97636395ee30f), GNU ld (GNU Binutils for Debian) 2.35.2
>> syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=14917c2ff00000
>> C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=1303752ff00000
>> 
>> IMPORTANT: if you fix the issue, please add the following tag to the commit:
>> Reported-by: syzbot+b17d3e853d5dce65f981@...kaller.appspotmail.com
>> 
>> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
>> RIP: 0010:j1939_session_deactivate net/can/j1939/transport.c:1090 [inline]
>> RIP: 0010:j1939_session_deactivate_activate_next+0x271/0x480 net/can/j1939/transport.c:1100
>> Code: f4 e9 ed fd ff ff 8b 7d d4 e8 fb 31 13 f4 e9 24 fe ff ff 44 89 ff e8 ee 31 13 f4 41 83 fc 02 0f 83 68 fe ff ff e8 df 70 82 f3 <0f> 0b e9 61 fe ff ff 8b 7d d4 e8 d0 31 13 f4 e9 68 fe ff ff 44 89
>> RSP: 0018:ffff888102e3f5c8 EFLAGS: 00010246
>> =====================================================
>> BUG: KMSAN: uninit-value in __show_regs+0xe6/0x1040 arch/x86/kernel/process_64.c:76
>>  __show_regs+0xe6/0x1040 arch/x86/kernel/process_64.c:76
>>  show_regs+0xc0/0x160 arch/x86/kernel/dumpstack.c:463
>>  __warn+0x3c2/0x730 kernel/panic.c:596
>>  report_bug+0x8eb/0xae0 lib/bug.c:199
>>  handle_bug+0x41/0x70 arch/x86/kernel/traps.c:315
>>  exc_invalid_op+0x1b/0x50 arch/x86/kernel/traps.c:335
>>  asm_exc_invalid_op+0x12/0x20
>>  j1939_session_deactivate_activate_next+0x271/0x480 net/can/j1939/transport.c:1100
>>  j1939_xtp_rx_abort_one+0x861/0x900 net/can/j1939/transport.c:1340
>>  j1939_xtp_rx_abort net/can/j1939/transport.c:1351 [inline]
>>  j1939_tp_cmd_recv net/can/j1939/transport.c:2100 [inline]
>>  j1939_tp_recv+0x1534/0x1cd0 net/can/j1939/transport.c:2133
>>  j1939_can_recv+0xed0/0x1070 net/can/j1939/main.c:108
>>  deliver net/can/af_can.c:574 [inline]
>>  can_rcv_filter+0x74b/0x1110 net/can/af_can.c:608
>>  can_receive+0x4fb/0x6d0 net/can/af_can.c:665
>>  can_rcv+0x1f0/0x490 net/can/af_can.c:696
>>  __netif_receive_skb_one_core net/core/dev.c:5405 [inline]
>>  __netif_receive_skb+0x1f1/0x640 net/core/dev.c:5519
>>  process_backlog+0x4e7/0xb50 net/core/dev.c:5847
>>  __napi_poll+0x14e/0xb80 net/core/dev.c:6413
>>  napi_poll net/core/dev.c:6480 [inline]
>>  net_rx_action+0x7e8/0x1830 net/core/dev.c:6567
>>  __do_softirq+0x206/0x809 kernel/softirq.c:558
>>  run_ksoftirqd+0x37/0x50 kernel/softirq.c:921
>>  smpboot_thread_fn+0x626/0xbf0 kernel/smpboot.c:164
>>  kthread+0x3c7/0x500 kernel/kthread.c:376
>>  ret_from_fork+0x1f/0x30
>> 
>> Local variable mic created at:
>>  ieee80211_rx_h_michael_mic_verify+0x54/0x10f0 net/mac80211/wpa.c:100
>>  ieee80211_rx_handlers+0x2d31/0xf170 net/mac80211/rx.c:3929
>> 
>> CPU: 0 PID: 13 Comm: ksoftirqd/0 Not tainted 5.18.0-syzkaller-16253-g2f3064574275 #0
>> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
>> =====================================================
>
> See if session is already deactivated.
>
> #syz test https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git  24625f7d

KMSAN bugs can only be tested on https://github.com/google/kmsan.git tree
because KMSAN tool is not upstreamed yet.
See https://goo.gl/tpsmEJ#kmsan-bugs for details.

>
> diff -pur a/net/can/j1939/transport.c b/net/can/j1939/transport.c
> --- a/net/can/j1939/transport.c	2022-06-15 18:48:27.235848700 +0800
> +++ b/net/can/j1939/transport.c	2022-06-15 20:51:11.711001100 +0800
> @@ -1085,9 +1085,9 @@ static bool j1939_session_deactivate(str
>  
>  	j1939_session_list_lock(priv);
>  	/* This function should be called with a session ref-count of at
> -	 * least 2.
> +	 * least 2 if the session is not deactivated yet.
>  	 */
> -	WARN_ON_ONCE(kref_read(&session->kref) < 2);
> +	WARN_ON_ONCE(session->err != ESHUTDOWN && kref_read(&session->kref) < 2);
>  	active = j1939_session_deactivate_locked(session);
>  	j1939_session_list_unlock(priv);
>  
> --

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ