lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAO4S-meaS3Oa3WZggmO2tDfvuKCxsXb5HJot3bHq+m_dLeCJmg@mail.gmail.com>
Date:   Wed, 31 Aug 2022 14:28:07 +0800
From:   Jiacheng Xu <578001344xu@...il.com>
To:     linux-kernel@...r.kernel.org, viro@...iv.linux.org.uk,
        jlayton@...nel.org, chuck.lever@...cle.com
Cc:     linux-fsdevel@...r.kernel.org
Subject: HARDIRQ-safe - HARDIRQ-unsafe lock order detected

Hello,

When using modified Syzkaller to fuzz the Linux kernel-5.19, the
following crash was triggered. Though the issue seems to get fixed on
syzbot, it could still be triggered with the following repro.
We would appreciate a CVE ID if this is a security issue.

HEAD commit: 3d7cb6b04c3f Linux-5.19
git tree: upstream

kernel config: https://drive.google.com/file/d/1wgIUDwP5ho29AM-K7HhysSTfWFpfXYkG/view?usp=sharing
syz repro: https://drive.google.com/file/d/1w96wKldLL-p22lpv4k0IfenVwQWcSIIj/view?usp=sharing
C reproducer: https://drive.google.com/file/d/1qSEQ7cYmEh8t5e72E5D6gPtu4aA5tvmq/view?usp=sharing

Environment:
Ubuntu 20.04 on Linux 5.4.0
QEMU 4.2.1:
qemu-system-x86_64 \
  -m 2G \
  -smp 2 \
  -kernel /home/workdir/bzImage \
  -append "console=ttyS0 root=/dev/sda earlyprintk=serial net.ifnames=0" \
  -drive file=/home/workdir/stretch.img,format=raw \
  -net user,host=10.0.2.10,hostfwd=tcp:127.0.0.1:10021-:22 \
  -net nic,model=e1000 \
  -enable-kvm \
  -nographic \
  -pidfile vm.pid \
  2>&1 | tee vm.log

If you fix this issue, please add the following tag to the commit:
Reported-by Jiacheng Xu<578001344xu@...il.com>

 =====================================================
 WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected
 5.19.0 #1 Not tainted
 -----------------------------------------------------
 is trying to acquire:
 ffff88801b918630 (&f->f_owner.lock){....}-{2:2}, at:
send_sigio+0x24/0x380 (fs/fcntl.c:777).

 and this task is already holding:
 ffff88804616c018 (&new->fa_lock){....}-{2:2}, at:
kill_fasync+0x136/0x470 (fs/fcntl.c:995).
 which would create a new lock dependency:
  (&new->fa_lock){....}-{2:2} -> (&f->f_owner.lock){....}-{2:2}

 but this new dependency connects a HARDIRQ-irq-safe lock:
  (&dev->event_lock#2){-...}-{2:2}

 ... which became HARDIRQ-irq-safe at:
   lock_acquire+0x1ab/0x580
   _raw_spin_lock_irqsave+0x39/0x50
   input_event+0x7b/0xb0
   psmouse_report_standard_buttons+0x2c/0x80
   psmouse_process_byte+0x1e1/0x890
   psmouse_handle_byte+0x41/0x1b0
   psmouse_interrupt+0x304/0xf00
   serio_interrupt+0x88/0x150
   i8042_interrupt+0x270/0x520
   __handle_irq_event_percpu+0x236/0x880
   handle_irq_event_percpu+0x14/0xd0
   handle_irq_event+0xa1/0x130
   handle_edge_irq+0x24a/0x8a0
   __common_interrupt+0x9d/0x210
   common_interrupt+0xa4/0xc0
   asm_common_interrupt+0x22/0x40
   nohz_run_idle_balance+0x2/0x1c0
   do_idle+0x7a/0x570
   cpu_startup_entry+0x14/0x20
   start_secondary+0x21d/0x2b0
   secondary_startup_64_no_verify+0xce/0xdb

 to a HARDIRQ-irq-unsafe lock:
  (tasklist_lock){.+.+}-{2:2}

 ... which became HARDIRQ-irq-unsafe at:
 ...
   lock_acquire+0x1ab/0x580
   _raw_read_lock+0x5b/0x70
   do_wait+0x28c/0xce0
   kernel_wait+0x9c/0x150
   call_usermodehelper_exec_work+0xf5/0x180
   process_one_work+0x9cc/0x1650
   worker_thread+0x623/0x1070
   kthread+0x2e9/0x3a0
   ret_from_fork+0x1f/0x30

 other info that might help us debug this:

 Chain exists of:
   &dev->event_lock#2 --> &new->fa_lock --> tasklist_lock

  Possible interrupt unsafe locking scenario:

        CPU0                    CPU1
        ----                    ----
   lock(tasklist_lock);
                                local_irq_disable();
                                lock(&dev->event_lock#2);
                                lock(&new->fa_lock);
   <Interrupt>
     lock(&dev->event_lock#2);

  *** DEADLOCK ***

 8 locks held by repro/6439:
  #0: ffff888045e74110 (&evdev->mutex){+.+.}-{3:3}, at: evdev_write+0x1d3/0x760
  #1: ffff888014fb4230 (&dev->event_lock#2){-...}-{2:2}, at:
input_inject_event+0xa6/0x320
  #2: ffffffff8bd86e60 (rcu_read_lock){....}-{1:2}, at:
input_inject_event+0x92/0x320
  #3: ffffffff8bd86e60 (rcu_read_lock){....}-{1:2}, at:
input_pass_values.part.0+0x0/0x710
  #4: ffffffff8bd86e60 (rcu_read_lock){....}-{1:2}, at: evdev_events+0x59/0x3e0
  #5: ffff888046c55028 (&client->buffer_lock){....}-{2:2}, at:
evdev_pass_values.part.0+0xf7/0x920
  #6: ffffffff8bd86e60 (rcu_read_lock){....}-{1:2}, at: kill_fasync+0x41/0x470
  #7: ffff88804616c018 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x136/0x470

 the dependencies between HARDIRQ-irq-safe lock and the holding lock:
   -> (&dev->event_lock#2){-...}-{2:2} {
      IN-HARDIRQ-W at:
                         lock_acquire+0x1ab/0x580
                         _raw_spin_lock_irqsave+0x39/0x50
                         input_event+0x7b/0xb0
                         psmouse_report_standard_buttons+0x2c/0x80
                         psmouse_process_byte+0x1e1/0x890
                         psmouse_handle_byte+0x41/0x1b0
                         psmouse_interrupt+0x304/0xf00
                         serio_interrupt+0x88/0x150
                         i8042_interrupt+0x270/0x520
                         __handle_irq_event_percpu+0x236/0x880
                         handle_irq_event_percpu+0x14/0xd0
                         handle_irq_event+0xa1/0x130
                         handle_edge_irq+0x24a/0x8a0
                         __common_interrupt+0x9d/0x210
                         common_interrupt+0xa4/0xc0
                         asm_common_interrupt+0x22/0x40
                         nohz_run_idle_balance+0x2/0x1c0
                         do_idle+0x7a/0x570
                         cpu_startup_entry+0x14/0x20
                         start_secondary+0x21d/0x2b0
                         secondary_startup_64_no_verify+0xce/0xdb
      INITIAL USE at:
                        lock_acquire+0x1ab/0x580
                        _raw_spin_lock_irqsave+0x39/0x50
                        input_inject_event+0xa6/0x320
                        led_set_brightness_nopm+0x48/0xf0
                        led_set_brightness+0x11c/0x240
                        led_trigger_event+0xb0/0x200
                        kbd_led_trigger_activate+0xc9/0x100
                        led_trigger_set+0x5d7/0xaf0
                        led_trigger_set_default+0x1a6/0x230
                        led_classdev_register_ext+0x56c/0x760
                        input_leds_connect+0x4bd/0x860
                        input_attach_handler+0x182/0x1f0
                        input_register_device.cold+0xfc/0x312
                        atkbd_connect+0x6bd/0x930
                        serio_connect_driver+0x46/0x70
                        really_probe+0x23e/0xa80
                        __driver_probe_device+0x338/0x4d0
                        driver_probe_device+0x4c/0x1a0
                        __driver_attach+0x1da/0x420
                        bus_for_each_dev+0x147/0x1d0
                        serio_handle_event+0x54c/0x850
                        process_one_work+0x9cc/0x1650
                        worker_thread+0x623/0x1070
                        kthread+0x2e9/0x3a0
                        ret_from_fork+0x1f/0x30
    }
 __key.38226+0x0/0x40
  -> (&client->buffer_lock){....}-{2:2} {
     INITIAL USE at:
                      lock_acquire+0x1ab/0x580
                      _raw_spin_lock+0x2a/0x40
                      evdev_pass_values.part.0+0xf7/0x920
                      evdev_events+0x359/0x3e0
                      input_to_handler+0x2a0/0x4c0
                      input_pass_values.part.0+0x230/0x710
                      input_handle_event+0x37a/0x1460
                      input_inject_event+0x1bd/0x320
                      evdev_write+0x430/0x760
                      vfs_write+0x269/0xab0
                      ksys_write+0x1e8/0x250
                      do_syscall_64+0x35/0xb0
                      entry_SYSCALL_64_after_hwframe+0x63/0xcd
   }
 __key.39514+0x0/0x40
   ... acquired at:
    lock_acquire+0x1ab/0x580
    _raw_spin_lock+0x2a/0x40
    evdev_pass_values.part.0+0xf7/0x920
    evdev_events+0x359/0x3e0
    input_to_handler+0x2a0/0x4c0
    input_pass_values.part.0+0x230/0x710
    input_handle_event+0x37a/0x1460
    input_inject_event+0x1bd/0x320
    evdev_write+0x430/0x760
    vfs_write+0x269/0xab0
    ksys_write+0x1e8/0x250
    do_syscall_64+0x35/0xb0
    entry_SYSCALL_64_after_hwframe+0x63/0xcd

 -> (&new->fa_lock){....}-{2:2} {
    INITIAL READ USE at:
                         lock_acquire+0x1ab/0x580
                         _raw_read_lock_irqsave+0x70/0x90
                         kill_fasync+0x136/0x470
                         evdev_pass_values.part.0+0x59d/0x920
                         evdev_events+0x359/0x3e0
                         input_to_handler+0x2a0/0x4c0
                         input_pass_values.part.0+0x230/0x710
                         input_handle_event+0x37a/0x1460
                         input_inject_event+0x1bd/0x320
                         evdev_write+0x430/0x760
                         vfs_write+0x269/0xab0
                         ksys_write+0x1e8/0x250
                         do_syscall_64+0x35/0xb0
                         entry_SYSCALL_64_after_hwframe+0x63/0xcd
  }
 __key.46908+0x0/0x40
  ... acquired at:
    lock_acquire+0x1ab/0x580
    _raw_read_lock_irqsave+0x70/0x90
    kill_fasync+0x136/0x470
    evdev_pass_values.part.0+0x59d/0x920
    evdev_events+0x359/0x3e0
    input_to_handler+0x2a0/0x4c0
    input_pass_values.part.0+0x230/0x710
    input_handle_event+0x37a/0x1460
    input_inject_event+0x1bd/0x320
    evdev_write+0x430/0x760
    vfs_write+0x269/0xab0
    ksys_write+0x1e8/0x250
    do_syscall_64+0x35/0xb0
    entry_SYSCALL_64_after_hwframe+0x63/0xcd


 the dependencies between the lock to be acquired
  and HARDIRQ-irq-unsafe lock:
  -> (tasklist_lock){.+.+}-{2:2} {
     HARDIRQ-ON-R at:
                       lock_acquire+0x1ab/0x580
                       _raw_read_lock+0x5b/0x70
                       do_wait+0x28c/0xce0
                       kernel_wait+0x9c/0x150
                       call_usermodehelper_exec_work+0xf5/0x180
                       process_one_work+0x9cc/0x1650
                       worker_thread+0x623/0x1070
                       kthread+0x2e9/0x3a0
                       ret_from_fork+0x1f/0x30
     SOFTIRQ-ON-R at:
                       lock_acquire+0x1ab/0x580
                       _raw_read_lock+0x5b/0x70
                       do_wait+0x28c/0xce0
                       kernel_wait+0x9c/0x150
                       call_usermodehelper_exec_work+0xf5/0x180
                       process_one_work+0x9cc/0x1650
                       worker_thread+0x623/0x1070
                       kthread+0x2e9/0x3a0
                       ret_from_fork+0x1f/0x30
     INITIAL USE at:
                      lock_acquire+0x1ab/0x580
                      _raw_write_lock_irq+0x32/0x50
                      copy_process+0x3362/0x6ec0
                      kernel_clone+0xe7/0x1040
                      user_mode_thread+0xad/0xe0
                      rest_init+0x23/0x2b0
                      arch_call_rest_init+0xf/0x14
                      start_kernel+0x46e/0x48f
                      secondary_startup_64_no_verify+0xce/0xdb
     INITIAL READ USE at:
                           lock_acquire+0x1ab/0x580
                           _raw_read_lock+0x5b/0x70
                           do_wait+0x28c/0xce0
                           kernel_wait+0x9c/0x150
                           call_usermodehelper_exec_work+0xf5/0x180
                           process_one_work+0x9cc/0x1650
                           worker_thread+0x623/0x1070
                           kthread+0x2e9/0x3a0
                           ret_from_fork+0x1f/0x30
   }
 tasklist_lock+0x18/0x40
   ... acquired at:
    lock_acquire+0x1ab/0x580
    _raw_read_lock+0x5b/0x70
    send_sigio+0xab/0x380
    dnotify_handle_event+0x148/0x280
    fsnotify_handle_inode_event.isra.0+0x22e/0x360
    fsnotify+0xe7a/0x13a0
    path_openat+0xf57/0x2890
    do_filp_open+0x1c1/0x290
    do_sys_openat2+0x61b/0x990
    do_sys_open+0xc3/0x140
    do_syscall_64+0x35/0xb0
    entry_SYSCALL_64_after_hwframe+0x63/0xcd

 -> (&f->f_owner.lock){....}-{2:2} {
    INITIAL USE at:
                    lock_acquire+0x1ab/0x580
                    _raw_write_lock_irq+0x32/0x50
                    f_modown+0x2a/0x390
                    f_setown+0xd7/0x230
                    do_fcntl+0x6e0/0x1040
                    __x64_sys_fcntl+0x15f/0x1d0
                    do_syscall_64+0x35/0xb0
                    entry_SYSCALL_64_after_hwframe+0x63/0xcd
    INITIAL READ USE at:
                         lock_acquire+0x1ab/0x580
                         _raw_read_lock_irqsave+0x70/0x90
                         send_sigio+0x24/0x380
                         dnotify_handle_event+0x148/0x280
                         fsnotify_handle_inode_event.isra.0+0x22e/0x360
                         fsnotify+0xe7a/0x13a0
                         path_openat+0xf57/0x2890
                         do_filp_open+0x1c1/0x290
                         do_sys_openat2+0x61b/0x990
                         do_sys_open+0xc3/0x140
                         do_syscall_64+0x35/0xb0
                         entry_SYSCALL_64_after_hwframe+0x63/0xcd
  }
 __key.49376+0x0/0x40
  ... acquired at:
    __lock_acquire+0x2e06/0x5840
    lock_acquire+0x1ab/0x580
    _raw_read_lock_irqsave+0x70/0x90
    send_sigio+0x24/0x380
    kill_fasync+0x1f8/0x470
    evdev_pass_values.part.0+0x59d/0x920
    evdev_events+0x359/0x3e0
    input_to_handler+0x2a0/0x4c0
    input_pass_values.part.0+0x230/0x710
    input_handle_event+0x37a/0x1460
    input_inject_event+0x1bd/0x320
    evdev_write+0x430/0x760
    vfs_write+0x269/0xab0
    ksys_write+0x1e8/0x250
    do_syscall_64+0x35/0xb0
    entry_SYSCALL_64_after_hwframe+0x63/0xcd

 stack backtrace:
 CPU: 1 PID: 6439 Comm: repro Not tainted 5.19.0 #1
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.13.0-1ubuntu1.1 04/01/2014
 Call Trace:
  <TASK>
  dump_stack_lvl+0xcd/0x134
  check_irq_usage.cold+0x54a/0x7a1
  ? print_shortest_lock_dependencies_backwards+0x80/0x80
  ? SOFTIRQ_verbose+0x10/0x10
  ? __kernel_text_address+0x9/0x30
  ? create_prof_cpu_mask+0x20/0x20
  ? check_path.constprop.0+0x24/0x50
  ? check_noncircular+0x142/0x310
  ? print_circular_bug.isra.0+0x480/0x480
  ? check_prev_add+0x177/0x24f0
  check_prev_add+0x177/0x24f0
  ? alloc_list_entry+0x46/0x2e0
  ? __sanitizer_cov_trace_pc+0x1a/0x40
  __lock_acquire+0x2e06/0x5840
  ? lockdep_hardirqs_on_prepare+0x400/0x400
  ? rcu_read_lock_sched_held+0x9c/0xd0
  lock_acquire+0x1ab/0x580
  ? send_sigio+0x24/0x380
  ? lock_release+0x6d0/0x6d0
  ? lock_release+0x6d0/0x6d0
  _raw_read_lock_irqsave+0x70/0x90
  ? send_sigio+0x24/0x380
  send_sigio+0x24/0x380
  kill_fasync+0x1f8/0x470
  evdev_pass_values.part.0+0x59d/0x920
  ? evdev_open+0x540/0x540
  ? rcu_read_lock_held+0x9c/0xb0
  ? rcu_read_lock_sched_held+0xd0/0xd0
  evdev_events+0x359/0x3e0
  ? evdev_pass_values.part.0+0x920/0x920
  input_to_handler+0x2a0/0x4c0
  input_pass_values.part.0+0x230/0x710
  ? write_comp_data+0x1c/0x70
  input_handle_event+0x37a/0x1460
  input_inject_event+0x1bd/0x320
  evdev_write+0x430/0x760
  ? evdev_read+0xe40/0xe40
  ? __sanitizer_cov_trace_pc+0x1a/0x40
  ? security_file_permission+0x490/0x6b0
  ? evdev_read+0xe40/0xe40
  vfs_write+0x269/0xab0
  ksys_write+0x1e8/0x250
  ? __ia32_sys_read+0xb0/0xb0
  ? syscall_enter_from_user_mode+0x21/0x70
  ? syscall_enter_from_user_mode+0x21/0x70
  do_syscall_64+0x35/0xb0
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
 RIP: 0033:0x7f47878e4469
 Code: 00 f3 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48
89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 8
 RSP: 002b:00007ffff5cee4a8 EFLAGS: 00000217 ORIG_RAX: 0000000000000001
 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f47878e4469
 RDX: 000000000000fc57 RSI: 0000000020000080 RDI: 0000000000000005
 RBP: 00007ffff5cee4c0 R08: 00007ffff5cee5a0 R09: 00007ffff5cee5a0
 R10: 00007ffff5cee5a0 R11: 0000000000000217 R12: 000055c454c00710
 R13: 00007ffff5cee5a0 R14: 0000000000000000 R15: 0000000000000000
  </TASK>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ