lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <b5f5acba-c93d-4a91-bfc6-abb0b572bbad@oracle.com>
Date:   Wed, 1 Nov 2023 09:39:26 -0500
From:   Dave Kleikamp <dave.kleikamp@...cle.com>
To:     Osama Muhammad <osmtendev@...il.com>
Cc:     jfs-discussion@...ts.sourceforge.net, linux-kernel@...r.kernel.org,
        syzbot+39ba34a099ac2e9bd3cb@...kaller.appspotmail.com
Subject: Re: [PATCH] FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree

On 10/11/23 1:46PM, Osama Muhammad wrote:
> Syzkaller reported the following issue:
> 
> UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:2867:6
> index 196694 is out of range for type 's8[1365]' (aka 'signed char[1365]')
> CPU: 1 PID: 109 Comm: jfsCommit Not tainted 6.6.0-rc3-syzkaller #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
> Call Trace:
>   <TASK>
>   __dump_stack lib/dump_stack.c:88 [inline]
>   dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106
>   ubsan_epilogue lib/ubsan.c:217 [inline]
>   __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348
>   dbAdjTree+0x474/0x4f0 fs/jfs/jfs_dmap.c:2867
>   dbJoin+0x210/0x2d0 fs/jfs/jfs_dmap.c:2834
>   dbFreeBits+0x4eb/0xda0 fs/jfs/jfs_dmap.c:2331
>   dbFreeDmap fs/jfs/jfs_dmap.c:2080 [inline]
>   dbFree+0x343/0x650 fs/jfs/jfs_dmap.c:402
>   txFreeMap+0x798/0xd50 fs/jfs/jfs_txnmgr.c:2534
>   txUpdateMap+0x342/0x9e0
>   txLazyCommit fs/jfs/jfs_txnmgr.c:2664 [inline]
>   jfs_lazycommit+0x47a/0xb70 fs/jfs/jfs_txnmgr.c:2732
>   kthread+0x2d3/0x370 kernel/kthread.c:388
>   ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:147
>   ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304
>   </TASK>
> ================================================================================
> Kernel panic - not syncing: UBSAN: panic_on_warn set ...
> CPU: 1 PID: 109 Comm: jfsCommit Not tainted 6.6.0-rc3-syzkaller #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
> Call Trace:
>   <TASK>
>   __dump_stack lib/dump_stack.c:88 [inline]
>   dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106
>   panic+0x30f/0x770 kernel/panic.c:340
>   check_panic_on_warn+0x82/0xa0 kernel/panic.c:236
>   ubsan_epilogue lib/ubsan.c:223 [inline]
>   __ubsan_handle_out_of_bounds+0x13c/0x150 lib/ubsan.c:348
>   dbAdjTree+0x474/0x4f0 fs/jfs/jfs_dmap.c:2867
>   dbJoin+0x210/0x2d0 fs/jfs/jfs_dmap.c:2834
>   dbFreeBits+0x4eb/0xda0 fs/jfs/jfs_dmap.c:2331
>   dbFreeDmap fs/jfs/jfs_dmap.c:2080 [inline]
>   dbFree+0x343/0x650 fs/jfs/jfs_dmap.c:402
>   txFreeMap+0x798/0xd50 fs/jfs/jfs_txnmgr.c:2534
>   txUpdateMap+0x342/0x9e0
>   txLazyCommit fs/jfs/jfs_txnmgr.c:2664 [inline]
>   jfs_lazycommit+0x47a/0xb70 fs/jfs/jfs_txnmgr.c:2732
>   kthread+0x2d3/0x370 kernel/kthread.c:388
>   ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:147
>   ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304
>   </TASK>
> Kernel Offset: disabled
> Rebooting in 86400 seconds..
> 
> The issue is caused when the value of lp becomes greater than
> CTLTREESIZE which is the max size of stree. Adding a simple check
> solves this issue. I was not sure about error return as a function
> does not return. If there is something needed in that regard please
> do point out.

There isn't too much we can do here without a bit of a code reorg. Even 
the calling functions are void. We can't mark the filesystem dirty 
easily either because we don't have a way to get to the superblock from 
this function. I think I will change the test to
if (WARN_ON_ONCE(lp >= CTLTREESIZE))
for the lack of a better option.

Shaggy

> 
> The patch is tested via syzbot.
> 
> Reported-by: syzbot+39ba34a099ac2e9bd3cb@...kaller.appspotmail.com
> Link: https://syzkaller.appspot.com/bug?extid=39ba34a099ac2e9bd3cb
> Signed-off-by: Osama Muhammad <osmtendev@...il.com>
> ---
>   fs/jfs/jfs_dmap.c | 3 +++
>   1 file changed, 3 insertions(+)
> 
> diff --git a/fs/jfs/jfs_dmap.c b/fs/jfs/jfs_dmap.c
> index a3eb1e826947..decb3be66a86 100644
> --- a/fs/jfs/jfs_dmap.c
> +++ b/fs/jfs/jfs_dmap.c
> @@ -2854,6 +2854,9 @@ static void dbAdjTree(dmtree_t * tp, int leafno, int newval)
>   	/* is the current value the same as the old value ?  if so,
>   	 * there is nothing to do.
>   	 */
> +	if (lp >= CTLTREESIZE)
> +		return;
> +
>   	if (tp->dmt_stree[lp] == newval)
>   		return;
>   

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ