lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20171104134021.qwlkall6ck7urt76@codemonkey.org.uk>
Date:   Sat, 4 Nov 2017 09:40:21 -0400
From:   Dave Jones <davej@...emonkey.org.uk>
To:     netdev@...r.kernel.org
Subject: ipset related DEBUG_VIRTUAL crash.

I have a script that hourly replaces an ipset list. This has been in
place for a year or so, but last night it triggered this on 4.14-rc7

[455951.731181] kernel BUG at arch/x86/mm/physaddr.c:26!
[455951.737016] invalid opcode: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC KASAN
[455951.742525] CPU: 0 PID: 3850 Comm: ipset Not tainted 4.14.0-rc7-firewall+ #1 
[455951.753293] task: ffff88013033cfc0 task.stack: ffff8801c3d48000
[455951.758567] RIP: 0010:__phys_addr+0x5b/0x80
[455951.763742] RSP: 0018:ffff8801c3d4f528 EFLAGS: 00010287
[455951.768838] RAX: 00007800849b62b6 RBX: 00000000849b62b6 RCX: ffffffff9f072a5d
[455951.773881] RDX: dffffc0000000000 RSI: dffffc0000000000 RDI: ffffffffa06917e0
[455951.778844] RBP: 00007800049b62b6 R08: 0000000000000002 R09: 0000000000000000
[455951.783729] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff9fca8b05
[455951.788524] R13: ffff8801ce844268 R14: 00000000049b62b6 R15: ffff8801ce8442ea
[455951.793239] FS:  00007fb44e656c80(0000) GS:ffff8801d3200000(0000) knlGS:0000000000000000
[455951.797904] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[455951.802479] CR2: 00007ffeeafd70a8 CR3: 00000001b6cd2001 CR4: 00000000000606f0
[455951.806998] Call Trace:
[455951.811404]  kfree+0x4c/0x310
[455951.815714]  hash_ip4_ahash_destroy+0x85/0xd0
[455951.819944]  hash_ip4_destroy+0x64/0x90
[455951.824069]  ip_set_destroy+0x4f0/0x500
[455951.828098]  ? ip_set_destroy+0x5/0x500
[455951.832029]  ? __rcu_read_unlock+0xd3/0x190
[455951.835867]  ? ip_set_utest+0x560/0x560
[455951.839610]  ? ip_set_utest+0x560/0x560
[455951.843239]  nfnetlink_rcv_msg+0x73e/0x770
[455951.846780]  ? nfnetlink_rcv_msg+0x352/0x770
[455951.850229]  ? nfnetlink_rcv+0xe90/0xe90
[455951.853571]  ? native_sched_clock+0xe8/0x190
[455951.856822]  ? lock_release+0x5d3/0x7d0
[455951.859976]  netlink_rcv_skb+0x121/0x230
[455951.863037]  ? nfnetlink_rcv+0xe90/0xe90
[455951.865999]  ? netlink_ack+0x4c0/0x4c0
[455951.868866]  ? ns_capable_common+0x68/0xc0
[455951.871638]  nfnetlink_rcv+0x1ad/0xe90
[455951.874312]  ? lock_acquire+0x380/0x380
[455951.876891]  ? __rcu_read_unlock+0xd3/0x190
[455951.879378]  ? __rcu_read_lock+0x30/0x30
[455951.881764]  ? rcu_is_watching+0xa4/0xf0
[455951.884048]  ? netlink_connect+0x1e0/0x1e0
[455951.886236]  ? nfnl_err_reset+0x180/0x180
[455951.888329]  ? netlink_deliver_tap+0x128/0x560
[455951.890333]  ? netlink_deliver_tap+0x5/0x560
[455951.892229]  ? iov_iter_advance+0x172/0x7f0
[455951.894029]  ? netlink_getname+0x150/0x150
[455951.895736]  ? can_nice.part.77+0x20/0x20
[455951.897342]  ? iov_iter_copy_from_user_atomic+0x7d0/0x7d0
[455951.898877]  ? netlink_trim+0x111/0x1b0
[455951.900394]  ? netlink_skb_destructor+0xf0/0xf0
[455951.901908]  netlink_unicast+0x2b1/0x340
[455951.903397]  ? netlink_detachskb+0x30/0x30
[455951.904862]  ? lock_acquire+0x380/0x380
[455951.906299]  ? lockdep_rcu_suspicious+0x100/0x100
[455951.907729]  netlink_sendmsg+0x4f2/0x650
[455951.909141]  ? netlink_broadcast_filtered+0x9e0/0x9e0
[455951.910565]  ? _copy_from_user+0x86/0xc0
[455951.911964]  ? netlink_broadcast_filtered+0x9e0/0x9e0
[455951.913364]  SYSC_sendto+0x2f0/0x3c0
[455951.914741]  ? SYSC_connect+0x210/0x210
[455951.916111]  ? bad_area_access_error+0x230/0x230
[455951.917479]  ? ___sys_recvmsg+0x320/0x320
[455951.918811]  ? sock_wake_async+0xc0/0xc0
[455951.920112]  ? SyS_brk+0x3ae/0x3d0
[455951.921381]  ? prepare_exit_to_usermode+0xde/0x230
[455951.922642]  ? enter_from_user_mode+0x30/0x30
[455951.923913]  ? mark_held_locks+0x1b/0xa0
[455951.925179]  ? entry_SYSCALL_64_fastpath+0x5/0xad
[455951.926459]  ? trace_hardirqs_on_caller+0x185/0x260
[455951.927747]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[455951.929031]  entry_SYSCALL_64_fastpath+0x18/0xad
[455951.930314] RIP: 0033:0x7fb44df4ac53
[455951.931592] RSP: 002b:00007ffeeafb6a08 EFLAGS: 00000246
[455951.932914]  ORIG_RAX: 000000000000002c
[455951.934231] RAX: ffffffffffffffda RBX: 000055b8f35d26d0 RCX: 00007fb44df4ac53
[455951.935603] RDX: 000000000000002c RSI: 000055b8f35d14b8 RDI: 0000000000000003
[455951.936991] RBP: 000055b8f35cf010 R08: 00007fb44dc5dbe0 R09: 000000000000000c
[455951.938387] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb44e43b020
[455951.939795] R13: 00007ffeeafb6acc R14: 0000000000000000 R15: 000055b8f1ca68e0
[455951.941208] Code: 80 48 39 eb 72 25 48 c7 c7 09 d6 a4 a0 e8 3e 28 2c 00 0f b6 0d 80 ab 9d 01 48 8d 45 00 48 d3 e8 48 85 c0 75 06 5b 48 89 e8 5d c3 <0f> 0b 48 c7 c7 10 c0 62 a0 e8 a7 2a 2c 00 48 8b 2d 60 95 5b 01 
[455951.993251] RIP: __phys_addr+0x5b/0x80 RSP: ffff8801c3d4f528
[455982.040898] ---[ end trace dfb8a0f07b7c5316 ]---
[459428.674105] ==================================================================
[459428.679829] BUG: KASAN: use-after-free in __mutex_lock+0x26c/0xf30
[459428.685463] Read of size 4 at addr ffff88013033d020 by task ipset/4611
[459428.696474] CPU: 0 PID: 4611 Comm: ipset Tainted: G      D         4.14.0-rc7-firewall+ #1 
[459428.707271] Call Trace:
[459428.712489]  dump_stack+0xb4/0x124
[459428.717615]  ? _atomic_dec_and_lock+0xec/0xec
[459428.722657]  ? __mutex_lock+0x26c/0xf30
[459428.727612]  print_address_description+0x91/0x260
[459428.732494]  ? __mutex_lock+0x26c/0xf30
[459428.737275]  kasan_report+0x264/0x350
[459428.741935]  __mutex_lock+0x26c/0xf30
[459428.746486]  ? __mutex_lock+0x1d5/0xf30
[459428.750990]  ? __zone_watermark_ok+0x200/0x200
[459428.755410]  ? nfnetlink_rcv_msg+0x58d/0x770
[459428.759731]  ? __ww_mutex_wakeup_for_backoff+0x100/0x100
[459428.763970]  ? __lock_acquire+0x15a/0x2000
[459428.768052]  ? __lock_acquire+0x15a/0x2000
[459428.772013]  ? radix_tree_next_chunk+0x5b6/0x700
[459428.775887]  ? debug_show_all_locks+0x2e0/0x2e0
[459428.779670]  ? debug_show_all_locks+0x2e0/0x2e0
[459428.783342]  ? __lock_acquire+0x15a/0x2000
[459428.786916]  ? lockdep_rcu_suspicious+0x100/0x100
[459428.790432]  ? __lock_acquire+0x15a/0x2000
[459428.794076]  ? do_raw_spin_trylock+0xb3/0x100
[459428.797615]  ? __lock_acquire+0x15a/0x2000
[459428.801052]  ? do_raw_spin_lock+0x120/0x120
[459428.804402]  ? stack_access_ok+0x41/0xb0
[459428.807656]  ? debug_show_all_locks+0x2e0/0x2e0
[459428.810811]  ? stop_critical_timings+0x220/0x220
[459428.813871]  ? trace_preempt_on+0x220/0x220
[459428.816833]  ? stop_critical_timings+0x220/0x220
[459428.819695]  ? __lock_acquire+0x15a/0x2000
[459428.822447]  ? unwind_next_frame+0x53b/0xae0
[459428.825127]  ? debug_lockdep_rcu_enabled+0x22/0x40
[459428.827719]  ? nfnetlink_rcv_msg+0x562/0x770
[459428.830194]  ? lock_acquire+0x380/0x380
[459428.832567]  ? __read_once_size_nocheck.constprop.6+0x10/0x10
[459428.834869]  ? __rcu_read_unlock+0xd3/0x190
[459428.837064]  ? __rcu_read_lock+0x30/0x30
[459428.839158]  ? nla_parse+0xba/0x1f0
[459428.841135]  ? nla_policy_len+0x80/0x80
[459428.843004]  ? lockdep_rcu_suspicious+0x100/0x100
[459428.844789]  ? ftrace_profile_pages_init+0x140/0x140
[459428.846475]  nfnetlink_rcv_msg+0x58d/0x770
[459428.848061]  ? nfnetlink_rcv_msg+0x352/0x770
[459428.849614]  ? nfnetlink_rcv+0xe90/0xe90
[459428.851132]  ? save_stack+0x8b/0xb0
[459428.852623]  netlink_rcv_skb+0x121/0x230
[459428.854094]  ? nfnetlink_rcv+0xe90/0xe90
[459428.855549]  ? netlink_ack+0x4c0/0x4c0
[459428.856956]  ? ns_capable_common+0x68/0xc0
[459428.858356]  nfnetlink_rcv+0x1ad/0xe90
[459428.859754]  ? lock_acquire+0x380/0x380
[459428.861149]  ? __rcu_read_unlock+0xd3/0x190
[459428.862547]  ? __rcu_read_lock+0x30/0x30
[459428.863925]  ? netlink_lookup+0x41d/0x750
[459428.865297]  ? netlink_connect+0x1e0/0x1e0
[459428.866665]  ? nfnl_err_reset+0x180/0x180
[459428.868043]  ? netlink_deliver_tap+0x128/0x560
[459428.869423]  ? netlink_deliver_tap+0x5/0x560
[459428.870786]  ? iov_iter_advance+0x172/0x7f0
[459428.872146]  ? netlink_getname+0x150/0x150
[459428.873495]  ? __phys_addr_symbol+0x23/0x40
[459428.874838]  ? iov_iter_copy_from_user_atomic+0x7d0/0x7d0
[459428.876221]  ? netlink_trim+0x111/0x1b0
[459428.877598]  ? netlink_skb_destructor+0xf0/0xf0
[459428.878973]  netlink_unicast+0x2b1/0x340
[459428.880366]  ? netlink_detachskb+0x30/0x30
[459428.881764]  ? lock_acquire+0x380/0x380
[459428.883153]  ? lockdep_rcu_suspicious+0x100/0x100
[459428.884550]  ? debug_lockdep_rcu_enabled+0x22/0x40
[459428.885950]  netlink_sendmsg+0x4f2/0x650
[459428.887344]  ? netlink_broadcast_filtered+0x9e0/0x9e0
[459428.888755]  ? _copy_from_user+0x86/0xc0
[459428.890162]  ? netlink_broadcast_filtered+0x9e0/0x9e0
[459428.891587]  SYSC_sendto+0x2f0/0x3c0
[459428.893002]  ? SYSC_connect+0x210/0x210
[459428.894410]  ? bad_area_access_error+0x230/0x230
[459428.895824]  ? ___sys_recvmsg+0x320/0x320
[459428.897233]  ? sock_wake_async+0xc0/0xc0
[459428.898637]  ? SyS_brk+0x3ae/0x3d0
[459428.900026]  ? prepare_exit_to_usermode+0xde/0x230
[459428.901433]  ? enter_from_user_mode+0x30/0x30
[459428.902838]  ? SyS_socket+0xd9/0x130
[459428.904227]  ? trace_hardirqs_off_caller+0x1a/0x100
[459428.905626]  ? trace_hardirqs_on_caller+0x11/0x260
[459428.907031]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[459428.908424]  entry_SYSCALL_64_fastpath+0x18/0xad
[459428.909821] RIP: 0033:0x7ff9e38b2c53
[459428.911211] RSP: 002b:00007ffcca4a8408 EFLAGS: 00000246
[459428.912618]  ORIG_RAX: 000000000000002c
[459428.914070] RAX: ffffffffffffffda RBX: 0000000000000008 RCX: 00007ff9e38b2c53
[459428.915527] RDX: 000000000000001c RSI: 00007ffcca4a8440 RDI: 0000000000000003
[459428.917007] RBP: 00007ffcca4a8440 R08: 00007ff9e35c5be0 R09: 000000000000000c
[459428.918484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[459428.919968] R13: 00007ffcca4a841c R14: 0000000000000001 R15: 0000000000000000

[459428.922917] Allocated by task 4557:
[459428.924403]  save_stack+0x33/0xb0
[459428.925880]  kasan_kmalloc+0xb3/0xe0
[459428.927259]  kmem_cache_alloc+0xfc/0x300
[459428.928639]  getname_flags+0x41/0x210
[459428.930026]  user_path_at_empty+0x1d/0x40
[459428.931416]  vfs_statx+0xb6/0x130
[459428.932801]  SYSC_newstat+0x6d/0xc0
[459428.934186]  entry_SYSCALL_64_fastpath+0x18/0xad

[459428.936968] Freed by task 4557:
[459428.938362]  save_stack+0x33/0xb0
[459428.939753]  kasan_slab_free+0x74/0xc0
[459428.941147]  kmem_cache_free+0x8d/0x2c0
[459428.942525]  filename_lookup+0x18d/0x250
[459428.943893]  vfs_statx+0xb6/0x130
[459428.945255]  SYSC_newstat+0x6d/0xc0
[459428.946612]  entry_SYSCALL_64_fastpath+0x18/0xad

[459428.949333] The buggy address belongs to the object at ffff88013033c740
                 which belongs to the cache names_cache of size 4096
[459428.952145] The buggy address is located 2272 bytes inside of
                 4096-byte region [ffff88013033c740, ffff88013033d740)
[459428.955044] The buggy address belongs to the page:
[459428.956588] page:ffffea0004c0ce00 count:1 mapcount:0 mapping:          (null) index:0x0
[459428.958184]  compound_mapcount: 0
[459428.959752] flags: 0x8000000000008100(slab|head)
[459428.961346] raw: 8000000000008100 0000000000000000 0000000000000000 0000000100070007
[459428.962998] raw: ffffea0006890020 ffffea0006e32420 ffff8801d12c90c0 0000000000000000
[459428.964660] page dumped because: kasan: bad access detected

[459428.967979] Memory state around the buggy address:
[459428.969660]  ffff88013033cf00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[459428.971385]  ffff88013033cf80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[459428.973091] >ffff88013033d000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[459428.974774]                                ^
[459428.976458]  ffff88013033d080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[459428.978209]  ffff88013033d100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[459428.979938] ==================================================================

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ