lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 14 Mar 2022 10:08:35 +0100
From:   Dmitry Vyukov <dvyukov@...gle.com>
To:     syzbot <syzbot+0600986d88e2d4d7ebb8@...kaller.appspotmail.com>
Cc:     davem@...emloft.net, dsahern@...nel.org, kuba@...nel.org,
        linux-kernel@...r.kernel.org, netdev@...r.kernel.org,
        syzkaller-bugs@...glegroups.com, yoshfuji@...ux-ipv6.org,
        linux-riscv <linux-riscv@...ts.infradead.org>
Subject: Re: [syzbot] kernel panic: corrupted stack end in rtnl_newlink

On Mon, 14 Mar 2022 at 09:22, Dmitry Vyukov <dvyukov@...gle.com> wrote:
>
> On Mon, 14 Mar 2022 at 09:17, syzbot
> <syzbot+0600986d88e2d4d7ebb8@...kaller.appspotmail.com> wrote:
> >
> > Hello,
> >
> > syzbot found the following issue on:
> >
> > HEAD commit:    0966d385830d riscv: Fix auipc+jalr relocation range checks
> > git tree:       git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes
> > console output: https://syzkaller.appspot.com/x/log.txt?x=17fe80c5700000
> > kernel config:  https://syzkaller.appspot.com/x/.config?x=6295d67591064921
> > dashboard link: https://syzkaller.appspot.com/bug?extid=0600986d88e2d4d7ebb8
> > compiler:       riscv64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
> > userspace arch: riscv64
>
> +linux-riscv
>
> Riscv needs to increase stack size under KASAN.
> I will send a patch.

FTR proposed fix:
https://lore.kernel.org/linux-riscv/20220314090652.1607915-1-dvyukov@google.com/T/#u

> > Unfortunately, I don't have any reproducer for this issue yet.
> >
> > IMPORTANT: if you fix the issue, please add the following tag to the commit:
> > Reported-by: syzbot+0600986d88e2d4d7ebb8@...kaller.appspotmail.com
> >
> > Kernel panic - not syncing: corrupted stack end detected inside scheduler
> > CPU: 0 PID: 2049 Comm: syz-executor.0 Not tainted 5.17.0-rc1-syzkaller-00002-g0966d385830d #0
> > Hardware name: riscv-virtio,qemu (DT)
> > Call Trace:
> > [<ffffffff8000a228>] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:113
> > [<ffffffff831668cc>] show_stack+0x34/0x40 arch/riscv/kernel/stacktrace.c:119
> > [<ffffffff831756ba>] __dump_stack lib/dump_stack.c:88 [inline]
> > [<ffffffff831756ba>] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:106
> > [<ffffffff83175742>] dump_stack+0x1c/0x24 lib/dump_stack.c:113
> > [<ffffffff83166fa8>] panic+0x24a/0x634 kernel/panic.c:233
> > [<ffffffff831a688a>] schedule_debug kernel/sched/core.c:5541 [inline]
> > [<ffffffff831a688a>] schedule+0x0/0x14c kernel/sched/core.c:6187
> > [<ffffffff831a6b00>] preempt_schedule_common+0x4e/0xde kernel/sched/core.c:6462
> > [<ffffffff831a6bc4>] preempt_schedule+0x34/0x36 kernel/sched/core.c:6487
> > [<ffffffff831afd78>] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline]
> > [<ffffffff831afd78>] _raw_spin_unlock_irqrestore+0x8c/0x98 kernel/locking/spinlock.c:194
> > [<ffffffff80b09fdc>] __debug_check_no_obj_freed lib/debugobjects.c:1002 [inline]
> > [<ffffffff80b09fdc>] debug_check_no_obj_freed+0x14c/0x24a lib/debugobjects.c:1023
> > [<ffffffff80410994>] free_pages_prepare mm/page_alloc.c:1358 [inline]
> > [<ffffffff80410994>] free_pcp_prepare+0x24e/0x45e mm/page_alloc.c:1404
> > [<ffffffff804142fe>] free_unref_page_prepare mm/page_alloc.c:3325 [inline]
> > [<ffffffff804142fe>] free_unref_page+0x6a/0x31e mm/page_alloc.c:3404
> > [<ffffffff8041471e>] free_the_page mm/page_alloc.c:706 [inline]
> > [<ffffffff8041471e>] __free_pages+0xe2/0x112 mm/page_alloc.c:5474
> > [<ffffffff8046d728>] __free_slab+0x122/0x27c mm/slub.c:2028
> > [<ffffffff8046d8ce>] free_slab mm/slub.c:2043 [inline]
> > [<ffffffff8046d8ce>] discard_slab+0x4c/0x7a mm/slub.c:2049
> > [<ffffffff8046deec>] __unfreeze_partials+0x16a/0x18e mm/slub.c:2536
> > [<ffffffff8046e006>] put_cpu_partial+0xf6/0x162 mm/slub.c:2612
> > [<ffffffff8046d0ec>] __slab_free+0x166/0x29c mm/slub.c:3378
> > [<ffffffff8047258c>] do_slab_free mm/slub.c:3497 [inline]
> > [<ffffffff8047258c>] ___cache_free+0x17c/0x354 mm/slub.c:3516
> > [<ffffffff8047692e>] qlink_free mm/kasan/quarantine.c:157 [inline]
> > [<ffffffff8047692e>] qlist_free_all+0x7c/0x132 mm/kasan/quarantine.c:176
> > [<ffffffff80476ed4>] kasan_quarantine_reduce+0x14c/0x1c8 mm/kasan/quarantine.c:283
> > [<ffffffff804742b2>] __kasan_slab_alloc+0x5c/0x98 mm/kasan/common.c:446
> > [<ffffffff8046fa8a>] kasan_slab_alloc include/linux/kasan.h:260 [inline]
> > [<ffffffff8046fa8a>] slab_post_alloc_hook mm/slab.h:732 [inline]
> > [<ffffffff8046fa8a>] slab_alloc_node mm/slub.c:3230 [inline]
> > [<ffffffff8046fa8a>] slab_alloc mm/slub.c:3238 [inline]
> > [<ffffffff8046fa8a>] __kmalloc+0x156/0x318 mm/slub.c:4420
> > [<ffffffff82bde908>] kmalloc include/linux/slab.h:586 [inline]
> > [<ffffffff82bde908>] kzalloc include/linux/slab.h:715 [inline]
> > [<ffffffff82bde908>] fib_create_info+0xade/0x2d8e net/ipv4/fib_semantics.c:1464
> > [<ffffffff82becedc>] fib_table_insert+0x1a0/0xebe net/ipv4/fib_trie.c:1224
> > [<ffffffff82bd1222>] fib_magic+0x3f4/0x438 net/ipv4/fib_frontend.c:1087
> > [<ffffffff82bd6178>] fib_add_ifaddr+0xd2/0x2e2 net/ipv4/fib_frontend.c:1109
> > [<ffffffff82bd66ea>] fib_netdev_event+0x362/0x4b0 net/ipv4/fib_frontend.c:1466
> > [<ffffffff800aac84>] notifier_call_chain+0xb8/0x188 kernel/notifier.c:84
> > [<ffffffff800aad7e>] raw_notifier_call_chain+0x2a/0x38 kernel/notifier.c:392
> > [<ffffffff8271d086>] call_netdevice_notifiers_info+0x9e/0x10c net/core/dev.c:1919
> > [<ffffffff827422c8>] call_netdevice_notifiers_extack net/core/dev.c:1931 [inline]
> > [<ffffffff827422c8>] call_netdevice_notifiers net/core/dev.c:1945 [inline]
> > [<ffffffff827422c8>] __dev_notify_flags+0x108/0x1fa net/core/dev.c:8179
> > [<ffffffff827436f6>] dev_change_flags+0x9c/0xba net/core/dev.c:8215
> > [<ffffffff82767e16>] do_setlink+0x5d6/0x21c4 net/core/rtnetlink.c:2729
> > [<ffffffff8276a6a2>] __rtnl_newlink+0x99e/0xfa0 net/core/rtnetlink.c:3412
> > [<ffffffff8276ad04>] rtnl_newlink+0x60/0x8c net/core/rtnetlink.c:3527
> > [<ffffffff8276b46c>] rtnetlink_rcv_msg+0x338/0x9a0 net/core/rtnetlink.c:5592
> > [<ffffffff8296ded2>] netlink_rcv_skb+0xf8/0x2be net/netlink/af_netlink.c:2494
> > [<ffffffff827624f4>] rtnetlink_rcv+0x26/0x30 net/core/rtnetlink.c:5610
> > [<ffffffff8296cbcc>] netlink_unicast_kernel net/netlink/af_netlink.c:1317 [inline]
> > [<ffffffff8296cbcc>] netlink_unicast+0x40e/0x5fe net/netlink/af_netlink.c:1343
> > [<ffffffff8296d29c>] netlink_sendmsg+0x4e0/0x994 net/netlink/af_netlink.c:1919
> > [<ffffffff826d264e>] sock_sendmsg_nosec net/socket.c:705 [inline]
> > [<ffffffff826d264e>] sock_sendmsg+0xa0/0xc4 net/socket.c:725
> > [<ffffffff826d7026>] __sys_sendto+0x1f2/0x2e0 net/socket.c:2040
> > [<ffffffff826d7152>] __do_sys_sendto net/socket.c:2052 [inline]
> > [<ffffffff826d7152>] sys_sendto+0x3e/0x52 net/socket.c:2048
> > [<ffffffff80005716>] ret_from_syscall+0x0/0x2
> > SMP: stopping secondary CPUs
> > Rebooting in 86400 seconds..
> >
> >
> > ---
> > This report is generated by a bot. It may contain errors.
> > See https://goo.gl/tpsmEJ for more information about syzbot.
> > syzbot engineers can be reached at syzkaller@...glegroups.com.
> >
> > syzbot will keep track of this issue. See:
> > https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

Powered by blists - more mailing lists