[syzbot] [bridge?] [coreteam?] KASAN: vmalloc-out-of-bounds Read in __ebt_unregister_table

13 views
Skip to first unread message

syzbot

unread,
Feb 17, 2023, 12:35:51 PM2/17/23
to bri...@lists.linux-foundation.org, core...@netfilter.org, da...@davemloft.net, edum...@google.com, f...@strlen.de, kad...@netfilter.org, ku...@kernel.org, linux-...@vger.kernel.org, net...@vger.kernel.org, netfilt...@vger.kernel.org, pab...@redhat.com, pa...@netfilter.org, ra...@blackwall.org, ro...@nvidia.com, syzkall...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 3ac88fa4605e Merge tag 'net-6.2-final' of git://git.kernel..
git tree: upstream
console+strace: https://syzkaller.appspot.com/x/log.txt?x=12986e58c80000
kernel config: https://syzkaller.appspot.com/x/.config?x=fe56f7d193926860
dashboard link: https://syzkaller.appspot.com/bug?extid=f61594de72d6705aea03
compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=14123acf480000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=143058d7480000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/37b6278f1cdc/disk-3ac88fa4.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/0a0d5eb58ca1/vmlinux-3ac88fa4.xz
kernel image: https://storage.googleapis.com/syzbot-assets/6c92dbf4b7ab/bzImage-3ac88fa4.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+f61594...@syzkaller.appspotmail.com

==================================================================
BUG: KASAN: vmalloc-out-of-bounds in __ebt_unregister_table+0xc00/0xcd0 net/bridge/netfilter/ebtables.c:1168
Read of size 4 at addr ffffc90005425000 by task kworker/u4:4/74

CPU: 0 PID: 74 Comm: kworker/u4:4 Not tainted 6.2.0-rc8-syzkaller-00083-g3ac88fa4605e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023
Workqueue: netns cleanup_net
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106
print_address_description mm/kasan/report.c:306 [inline]
print_report+0x15e/0x45d mm/kasan/report.c:417
kasan_report+0xbf/0x1f0 mm/kasan/report.c:517
__ebt_unregister_table+0xc00/0xcd0 net/bridge/netfilter/ebtables.c:1168
ebt_unregister_table+0x35/0x40 net/bridge/netfilter/ebtables.c:1372
ops_exit_list+0xb0/0x170 net/core/net_namespace.c:169
cleanup_net+0x4ee/0xb10 net/core/net_namespace.c:613
process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289
worker_thread+0x669/0x1090 kernel/workqueue.c:2436
kthread+0x2e8/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
</TASK>

Memory state around the buggy address:
ffffc90005424f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
ffffc90005424f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
>ffffc90005425000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
^
ffffc90005425080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
ffffc90005425100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
==================================================================


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
syzbot can test patches for this issue, for details see:
https://goo.gl/tpsmEJ#testing-patches

syzbot

unread,
Feb 17, 2023, 5:12:26 PM2/17/23
to f...@strlen.de, syzkall...@googlegroups.com
Hello,

syzbot has tested the proposed patch and the reproducer did not trigger any issue:

Reported-and-tested-by: syzbot+f61594...@syzkaller.appspotmail.com

Tested on:

commit: 9594ed90 ebtables: fix double-free of table blob
git tree: git://git.kernel.org/pub/scm/linux/kernel/git/fwestphal/nf.git ebt_uaf
console output: https://syzkaller.appspot.com/x/log.txt?x=11d3ebdb480000
kernel config: https://syzkaller.appspot.com/x/.config?x=d0a3a010fd18407b
dashboard link: https://syzkaller.appspot.com/bug?extid=f61594de72d6705aea03
compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2

Note: no patches were applied.
Note: testing is done by a robot and is best-effort only.

Hillf Danton

unread,
Feb 17, 2023, 8:52:52 PM2/17/23
to syzbot, linux-...@vger.kernel.org, syzkall...@googlegroups.com
On 17 Feb 2023 09:35:49 -0800
>
> HEAD commit: 3ac88fa4605e Merge tag 'net-6.2-final' of git://git.kernel..
> git tree: upstream
> C reproducer: https://syzkaller.appspot.com/x/repro.c?x=143058d7480000

Delete table from list before freeing it.

#syz test https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 3ac88fa4605e

--- x/net/bridge/netfilter/ebtables.c
+++ y/net/bridge/netfilter/ebtables.c
@@ -1161,7 +1161,8 @@ free_newinfo:
static void __ebt_unregister_table(struct net *net, struct ebt_table *table)
{
mutex_lock(&ebt_mutex);
- list_del(&table->list);
+ if (!list_empty(&table->list))
+ list_del_init(&table->list);
mutex_unlock(&ebt_mutex);
audit_log_nfcfg(table->name, AF_BRIDGE, table->private->nentries,
AUDIT_XT_OP_UNREGISTER, GFP_KERNEL);
@@ -1337,7 +1338,7 @@ void ebt_unregister_template(const struc
}
EXPORT_SYMBOL(ebt_unregister_template);

-static struct ebt_table *__ebt_find_table(struct net *net, const char *name)
+static struct ebt_table *__ebt_find_table(struct net *net, const char *name, int del)
{
struct ebt_pernet *ebt_net = net_generic(net, ebt_pernet_id);
struct ebt_table *t;
@@ -1346,6 +1347,8 @@ static struct ebt_table *__ebt_find_tabl

list_for_each_entry(t, &ebt_net->tables, list) {
if (strcmp(t->name, name) == 0) {
+ if (del)
+ list_del_init(&t->list);
mutex_unlock(&ebt_mutex);
return t;
}
@@ -1357,7 +1360,7 @@ static struct ebt_table *__ebt_find_tabl

void ebt_unregister_table_pre_exit(struct net *net, const char *name)
{
- struct ebt_table *table = __ebt_find_table(net, name);
+ struct ebt_table *table = __ebt_find_table(net, name, 0);

if (table)
nf_unregister_net_hooks(net, table->ops, hweight32(table->valid_hooks));
@@ -1366,7 +1369,7 @@ EXPORT_SYMBOL(ebt_unregister_table_pre_e

void ebt_unregister_table(struct net *net, const char *name)
{
- struct ebt_table *table = __ebt_find_table(net, name);
+ struct ebt_table *table = __ebt_find_table(net, name, 1);

if (table)
__ebt_unregister_table(net, table);
--

syzbot

unread,
Feb 18, 2023, 12:28:27 AM2/18/23
to hda...@sina.com, linux-...@vger.kernel.org, syzkall...@googlegroups.com
Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
KASAN: vmalloc-out-of-bounds Read in __ebt_unregister_table

==================================================================
BUG: KASAN: vmalloc-out-of-bounds in __ebt_unregister_table+0xc0d/0xd00 net/bridge/netfilter/ebtables.c:1169
Read of size 4 at addr ffffc9000309c000 by task kworker/u4:5/1164

CPU: 0 PID: 1164 Comm: kworker/u4:5 Not tainted 6.2.0-rc8-syzkaller-00083-g3ac88fa4605e-dirty #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023
Workqueue: netns cleanup_net
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106
print_address_description mm/kasan/report.c:306 [inline]
print_report+0x15e/0x45d mm/kasan/report.c:417
kasan_report+0xbf/0x1f0 mm/kasan/report.c:517
__ebt_unregister_table+0xc0d/0xd00 net/bridge/netfilter/ebtables.c:1169
ebt_unregister_table+0x3a/0x50 net/bridge/netfilter/ebtables.c:1375
ops_exit_list+0xb0/0x170 net/core/net_namespace.c:169
cleanup_net+0x4ee/0xb10 net/core/net_namespace.c:613
process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289
worker_thread+0x669/0x1090 kernel/workqueue.c:2436
kthread+0x2e8/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
</TASK>

Memory state around the buggy address:
ffffc9000309bf00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
ffffc9000309bf80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
>ffffc9000309c000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
^
ffffc9000309c080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
ffffc9000309c100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
==================================================================


Tested on:

commit: 3ac88fa4 Merge tag 'net-6.2-final' of git://git.kernel..
git tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
console output: https://syzkaller.appspot.com/x/log.txt?x=1126d8f7480000
kernel config: https://syzkaller.appspot.com/x/.config?x=fe56f7d193926860
dashboard link: https://syzkaller.appspot.com/bug?extid=f61594de72d6705aea03
compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
patch: https://syzkaller.appspot.com/x/patch.diff?x=1274f127480000

Hillf Danton

unread,
Feb 18, 2023, 4:14:05 AM2/18/23
to syzbot, linux-...@vger.kernel.org, syzkall...@googlegroups.com
On 17 Feb 2023 09:35:49 -0800
>
> HEAD commit: 3ac88fa4605e Merge tag 'net-6.2-final' of git://git.kernel..
> git tree: upstream
> C reproducer: https://syzkaller.appspot.com/x/repro.c?x=143058d7480000

Delete table from list before freeing it.

#syz test https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 3ac88fa4605e

--- x/net/bridge/netfilter/ebtables.c
+++ y/net/bridge/netfilter/ebtables.c
@@ -1270,8 +1270,6 @@ int ebt_register_table(struct net *net,

table->ops = ops;
ret = nf_register_net_hooks(net, ops, num_ops);
- if (ret)
- __ebt_unregister_table(net, table);

audit_log_nfcfg(repl->name, AF_BRIDGE, repl->nentries,
AUDIT_XT_OP_REGISTER, GFP_KERNEL);
--

syzbot

unread,
Feb 18, 2023, 4:28:22 AM2/18/23
to hda...@sina.com, linux-...@vger.kernel.org, syzkall...@googlegroups.com
Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
KASAN: vmalloc-out-of-bounds Read in ebt_unregister_table

==================================================================
BUG: KASAN: vmalloc-out-of-bounds in __ebt_unregister_table net/bridge/netfilter/ebtables.c:1168 [inline]
BUG: KASAN: vmalloc-out-of-bounds in ebt_unregister_table+0xc08/0xcf0 net/bridge/netfilter/ebtables.c:1370
Read of size 4 at addr ffffc90003173000 by task kworker/u4:0/9

CPU: 1 PID: 9 Comm: kworker/u4:0 Not tainted 6.2.0-rc8-syzkaller-00083-g3ac88fa4605e-dirty #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023
Workqueue: netns cleanup_net
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106
print_address_description mm/kasan/report.c:306 [inline]
print_report+0x15e/0x45d mm/kasan/report.c:417
kasan_report+0xbf/0x1f0 mm/kasan/report.c:517
__ebt_unregister_table net/bridge/netfilter/ebtables.c:1168 [inline]
ebt_unregister_table+0xc08/0xcf0 net/bridge/netfilter/ebtables.c:1370
ops_exit_list+0xb0/0x170 net/core/net_namespace.c:169
cleanup_net+0x4ee/0xb10 net/core/net_namespace.c:613
process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289
worker_thread+0x669/0x1090 kernel/workqueue.c:2436
kthread+0x2e8/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
</TASK>

Memory state around the buggy address:
ffffc90003172f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
ffffc90003172f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
>ffffc90003173000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
^
ffffc90003173080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
ffffc90003173100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
==================================================================


Tested on:

commit: 3ac88fa4 Merge tag 'net-6.2-final' of git://git.kernel..
git tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
console output: https://syzkaller.appspot.com/x/log.txt?x=11ebf6cf480000
kernel config: https://syzkaller.appspot.com/x/.config?x=fe56f7d193926860
dashboard link: https://syzkaller.appspot.com/bug?extid=f61594de72d6705aea03
compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
patch: https://syzkaller.appspot.com/x/patch.diff?x=139e35d7480000

Hillf Danton

unread,
Feb 18, 2023, 8:51:51 AM2/18/23
to syzbot, linux-...@vger.kernel.org, syzkall...@googlegroups.com
On 17 Feb 2023 09:35:49 -0800
>
> HEAD commit: 3ac88fa4605e Merge tag 'net-6.2-final' of git://git.kernel..
> git tree: upstream
> C reproducer: https://syzkaller.appspot.com/x/repro.c?x=143058d7480000

Check and delete table from list before freeing it.

#syz test https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 3ac88fa4605e

--- x/net/bridge/netfilter/ebtables.c
+++ y/net/bridge/netfilter/ebtables.c
@@ -1160,9 +1160,19 @@ free_newinfo:

static void __ebt_unregister_table(struct net *net, struct ebt_table *table)
{
+ struct ebt_pernet *ebt_net = net_generic(net, ebt_pernet_id);
+ struct ebt_table *t = NULL;
+
mutex_lock(&ebt_mutex);
- list_del(&table->list);
+ list_for_each_entry(t, &ebt_net->tables, list) {
+ if (t == table) {
+ list_del(&t->list);
+ break;
+ }
+ }
mutex_unlock(&ebt_mutex);
+ if (t != table)
+ return;
audit_log_nfcfg(table->name, AF_BRIDGE, table->private->nentries,
AUDIT_XT_OP_UNREGISTER, GFP_KERNEL);
EBT_ENTRY_ITERATE(table->private->entries, table->private->entries_size,
--

syzbot

unread,
Feb 18, 2023, 9:06:24 AM2/18/23
to hda...@sina.com, linux-...@vger.kernel.org, syzkall...@googlegroups.com
Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
KASAN: vmalloc-out-of-bounds Read in __ebt_unregister_table

==================================================================
BUG: KASAN: vmalloc-out-of-bounds in __ebt_unregister_table+0xf43/0xfc0 net/bridge/netfilter/ebtables.c:1178
Read of size 4 at addr ffffc90003263000 by task kworker/u4:6/3167

CPU: 0 PID: 3167 Comm: kworker/u4:6 Not tainted 6.2.0-rc8-syzkaller-00083-g3ac88fa4605e-dirty #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023
Workqueue: netns cleanup_net
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106
print_address_description mm/kasan/report.c:306 [inline]
print_report+0x15e/0x45d mm/kasan/report.c:417
kasan_report+0xbf/0x1f0 mm/kasan/report.c:517
__ebt_unregister_table+0xf43/0xfc0 net/bridge/netfilter/ebtables.c:1178
ebt_unregister_table+0x35/0x40 net/bridge/netfilter/ebtables.c:1382
ops_exit_list+0xb0/0x170 net/core/net_namespace.c:169
cleanup_net+0x4ee/0xb10 net/core/net_namespace.c:613
process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289
worker_thread+0x669/0x1090 kernel/workqueue.c:2436
kthread+0x2e8/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
</TASK>

Memory state around the buggy address:
ffffc90003262f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
ffffc90003262f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
>ffffc90003263000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
^
ffffc90003263080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
ffffc90003263100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
==================================================================


Tested on:

commit: 3ac88fa4 Merge tag 'net-6.2-final' of git://git.kernel..
git tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
console output: https://syzkaller.appspot.com/x/log.txt?x=12fc4f6f480000
kernel config: https://syzkaller.appspot.com/x/.config?x=fe56f7d193926860
dashboard link: https://syzkaller.appspot.com/bug?extid=f61594de72d6705aea03
compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
patch: https://syzkaller.appspot.com/x/patch.diff?x=173470f0c80000

Hillf Danton

unread,
Feb 18, 2023, 9:42:28 PM2/18/23
to syzbot, linux-...@vger.kernel.org, syzkall...@googlegroups.com
On 17 Feb 2023 09:35:49 -0800
>
> HEAD commit: 3ac88fa4605e Merge tag 'net-6.2-final' of git://git.kernel..
> git tree: upstream
> C reproducer: https://syzkaller.appspot.com/x/repro.c?x=143058d7480000

Check and delete table from list before freeing it.

#syz test https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 3ac88fa4605e

--- x/net/bridge/netfilter/ebtables.c
+++ y/net/bridge/netfilter/ebtables.c
@@ -1158,14 +1158,47 @@ free_newinfo:
return ret;
}

+#define __EBT_ENTRY_ITERATE(entries, size, fn, args...) \
+({ \
+ unsigned int __i; \
+ int __ret = 0; \
+ struct ebt_entry *__entry; \
+ \
+ for (__i = 0; __i + sizeof(struct ebt_entries) < (size);) { \
+ __entry = (void *)(entries) + __i; \
+ __ret = fn(__entry , ## args); \
+ if (__ret != 0) \
+ break; \
+ if (__entry->bitmask != 0) \
+ __i += __entry->next_offset; \
+ else \
+ __i += sizeof(struct ebt_entries); \
+ } \
+ if (__ret == 0) { \
+ if (__i != (size)) \
+ __ret = -EINVAL; \
+ } \
+ __ret; \
+})
+
static void __ebt_unregister_table(struct net *net, struct ebt_table *table)
{
+ struct ebt_pernet *ebt_net = net_generic(net, ebt_pernet_id);
+ struct ebt_table *t = NULL;
+
mutex_lock(&ebt_mutex);
- list_del(&table->list);
+ list_for_each_entry(t, &ebt_net->tables, list) {
+ if (t == table) {
+ list_del(&t->list);
+ break;
+ }
+ }
mutex_unlock(&ebt_mutex);
+ if (t != table)
+ return;
audit_log_nfcfg(table->name, AF_BRIDGE, table->private->nentries,
AUDIT_XT_OP_UNREGISTER, GFP_KERNEL);
- EBT_ENTRY_ITERATE(table->private->entries, table->private->entries_size,
+ __EBT_ENTRY_ITERATE(table->private->entries, table->private->entries_size,
ebt_cleanup_entry, net, NULL);
if (table->private->nentries)
module_put(table->me);
--

syzbot

unread,
Feb 18, 2023, 9:57:28 PM2/18/23
to hda...@sina.com, linux-...@vger.kernel.org, syzkall...@googlegroups.com
Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
KASAN: vmalloc-out-of-bounds Read in __ebt_unregister_table

==================================================================
BUG: KASAN: vmalloc-out-of-bounds in __ebt_unregister_table+0xf4a/0xfc0 net/bridge/netfilter/ebtables.c:1201
Read of size 4 at addr ffffc90002d9c000 by task kworker/u4:4/74

CPU: 1 PID: 74 Comm: kworker/u4:4 Not tainted 6.2.0-rc8-syzkaller-00083-g3ac88fa4605e-dirty #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023
Workqueue: netns cleanup_net
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106
print_address_description mm/kasan/report.c:306 [inline]
print_report+0x15e/0x45d mm/kasan/report.c:417
kasan_report+0xbf/0x1f0 mm/kasan/report.c:517
__ebt_unregister_table+0xf4a/0xfc0 net/bridge/netfilter/ebtables.c:1201
ebt_unregister_table+0x35/0x40 net/bridge/netfilter/ebtables.c:1405
ops_exit_list+0xb0/0x170 net/core/net_namespace.c:169
cleanup_net+0x4ee/0xb10 net/core/net_namespace.c:613
process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289
worker_thread+0x669/0x1090 kernel/workqueue.c:2436
kthread+0x2e8/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
</TASK>

Memory state around the buggy address:
ffffc90002d9bf00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
ffffc90002d9bf80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
>ffffc90002d9c000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
^
ffffc90002d9c080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
ffffc90002d9c100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
==================================================================


Tested on:

commit: 3ac88fa4 Merge tag 'net-6.2-final' of git://git.kernel..
git tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
console output: https://syzkaller.appspot.com/x/log.txt?x=17733430c80000
kernel config: https://syzkaller.appspot.com/x/.config?x=fe56f7d193926860
dashboard link: https://syzkaller.appspot.com/bug?extid=f61594de72d6705aea03
compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
patch: https://syzkaller.appspot.com/x/patch.diff?x=161cf127480000

Hillf Danton

unread,
Feb 19, 2023, 2:15:16 AM2/19/23
to syzbot, linux-...@vger.kernel.org, syzkall...@googlegroups.com
On 17 Feb 2023 09:35:49 -0800
>
> HEAD commit: 3ac88fa4605e Merge tag 'net-6.2-final' of git://git.kernel..
> git tree: upstream
> C reproducer: https://syzkaller.appspot.com/x/repro.c?x=143058d7480000

Check and delete table from list before freeing it.

#syz test https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 3ac88fa4605e

--- x/net/bridge/netfilter/ebtables.c
+++ y/net/bridge/netfilter/ebtables.c
@@ -652,6 +652,13 @@ ebt_cleanup_watcher(struct ebt_entry_wat
return 0;
}

+static inline int ebt_entry_dryrun(struct ebt_entry *e, struct net *net, unsigned int *cnt)
+{
+ if (cnt && (*cnt)-- == 0)
+ return 1;
+ return 0;
+}
+
static inline int
ebt_cleanup_entry(struct ebt_entry *e, struct net *net, unsigned int *cnt)
{
@@ -1233,6 +1240,10 @@ int ebt_register_table(struct net *net,
goto free_chainstack;

table->private = newinfo;
+ ret = EBT_ENTRY_ITERATE(table->private->entries, table->private->entries_size,
+ ebt_entry_dryrun, net, NULL);
+ if (ret)
+ goto free_chainstack;
rwlock_init(&table->lock);
mutex_lock(&ebt_mutex);
list_for_each_entry(t, &ebt_net->tables, list) {
--

syzbot

unread,
Feb 19, 2023, 2:29:18 AM2/19/23
to hda...@sina.com, linux-...@vger.kernel.org, syzkall...@googlegroups.com
Hello,

syzbot has tested the proposed patch but the reproducer is still triggering an issue:
KASAN: vmalloc-out-of-bounds Read in __ebt_unregister_table

==================================================================
BUG: KASAN: vmalloc-out-of-bounds in __ebt_unregister_table+0xc00/0xcd0 net/bridge/netfilter/ebtables.c:1175
Read of size 4 at addr ffffc90003755000 by task kworker/u4:2/41

CPU: 0 PID: 41 Comm: kworker/u4:2 Not tainted 6.2.0-rc8-syzkaller-00083-g3ac88fa4605e-dirty #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023
Workqueue: netns cleanup_net
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106
print_address_description mm/kasan/report.c:306 [inline]
print_report+0x15e/0x45d mm/kasan/report.c:417
kasan_report+0xbf/0x1f0 mm/kasan/report.c:517
__ebt_unregister_table+0xc00/0xcd0 net/bridge/netfilter/ebtables.c:1175
ebt_unregister_table+0x35/0x40 net/bridge/netfilter/ebtables.c:1383
ops_exit_list+0xb0/0x170 net/core/net_namespace.c:169
cleanup_net+0x4ee/0xb10 net/core/net_namespace.c:613
process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289
worker_thread+0x669/0x1090 kernel/workqueue.c:2436
kthread+0x2e8/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
</TASK>

Memory state around the buggy address:
ffffc90003754f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
ffffc90003754f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
>ffffc90003755000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
^
ffffc90003755080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
ffffc90003755100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
==================================================================


Tested on:

commit: 3ac88fa4 Merge tag 'net-6.2-final' of git://git.kernel..
git tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
console output: https://syzkaller.appspot.com/x/log.txt?x=15693b58c80000
kernel config: https://syzkaller.appspot.com/x/.config?x=fe56f7d193926860
dashboard link: https://syzkaller.appspot.com/bug?extid=f61594de72d6705aea03
compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
patch: https://syzkaller.appspot.com/x/patch.diff?x=11afbd80c80000

Hillf Danton

unread,
Feb 19, 2023, 6:40:30 AM2/19/23
to syzbot, linux-...@vger.kernel.org, syzkall...@googlegroups.com
On 17 Feb 2023 09:35:49 -0800
>
> HEAD commit: 3ac88fa4605e Merge tag 'net-6.2-final' of git://git.kernel..
> git tree: upstream
> C reproducer: https://syzkaller.appspot.com/x/repro.c?x=143058d7480000

Check and delete table from list before freeing it.

#syz test https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 3ac88fa4605e

--- x/net/bridge/netfilter/ebtables.c
+++ y/net/bridge/netfilter/ebtables.c
@@ -1212,6 +1212,9 @@ int ebt_register_table(struct net *net,

memcpy(p, repl->entries, repl->entries_size);
newinfo->entries = p;
+ ret = ebt_verify_pointers(repl, newinfo);
+ if (ret != 0)
+ goto free_chainstack;

newinfo->entries_size = repl->entries_size;
newinfo->nentries = repl->nentries;
--

syzbot

unread,
Feb 19, 2023, 6:46:20 AM2/19/23
to hda...@sina.com, linux-...@vger.kernel.org, syzkall...@googlegroups.com
Hello,

syzbot tried to test the proposed patch but the build/boot failed:

net/bridge/netfilter/ebtables.c:1215:28: error: passing argument 1 of 'ebt_verify_pointers' from incompatible pointer type [-Werror=incompatible-pointer-types]


Tested on:

commit: 3ac88fa4 Merge tag 'net-6.2-final' of git://git.kernel..
git tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
dashboard link: https://syzkaller.appspot.com/bug?extid=f61594de72d6705aea03
compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
patch: https://syzkaller.appspot.com/x/patch.diff?x=170d73d7480000

Hillf Danton

unread,
Feb 20, 2023, 2:25:47 AM2/20/23
to syzbot, linux-...@vger.kernel.org, syzkall...@googlegroups.com
On 17 Feb 2023 09:35:49 -0800
>
> HEAD commit: 3ac88fa4605e Merge tag 'net-6.2-final' of git://git.kernel..
> git tree: upstream
> C reproducer: https://syzkaller.appspot.com/x/repro.c?x=143058d7480000

Extend the vmalloc chunk to catch the oob.

#syz test https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 3ac88fa4605e

--- x/net/bridge/netfilter/ebtables.c
+++ y/net/bridge/netfilter/ebtables.c
@@ -1189,7 +1189,7 @@ int ebt_register_table(struct net *net,
void *p;

if (input_table == NULL || (repl = input_table->table) == NULL ||
- repl->entries == NULL || repl->entries_size == 0 ||
+ repl->entries == NULL || repl->entries_size < sizeof(struct ebt_entry) ||
repl->counters != NULL || input_table->private != NULL)
return -EINVAL;

@@ -1206,7 +1206,7 @@ int ebt_register_table(struct net *net,
if (!newinfo)
goto free_table;

- p = vmalloc(repl->entries_size);
+ p = vmalloc(repl->entries_size + 16);
if (!p)
goto free_newinfo;

--

syzbot

unread,
Feb 20, 2023, 2:40:22 AM2/20/23
to hda...@sina.com, linux-...@vger.kernel.org, syzkall...@googlegroups.com
Hello,

syzbot tried to test the proposed patch but the build/boot failed:

BUG: program execution failed: executor NUM: exit status NUM

executing program
2023/02/20 07:39:21 SYZFATAL: BUG: program execution failed: executor 0: exit status 67
SYZFAIL: ebtable checkpoint: getsockopt(EBT_SO_GET_INIT_INFO) failed
table=broute (errno 22: Invalid argument)
loop exited with status 67

SYZFAIL: ebtable checkpoint: getsockopt(EBT_SO_GET_INIT_INFO) failed
table=broute (errno 22: Invalid argument)
loop exited with status 67


forked to background, child pid 4644
no interfaces have a carri[ 21.644085][ T4645] 8021q: adding VLAN 0 to HW filter on device bond0
er
[ 21.654665][ T4645] eql: remember to turn off Van-Jacobson compression on your slave devices
Starting sshd: OK

syzkaller
Warning: Permanently added '10.128.1.147' (ECDSA) to the list of known hosts.
2023/02/20 07:39:16 fuzzer started
2023/02/20 07:39:16 connecting to host at 10.128.0.169:38103
2023/02/20 07:39:16 checking machine...
2023/02/20 07:39:16 checking revisions...
2023/02/20 07:39:16 testing simple program...
syzkaller login: [ 41.158159][ T5072] cgroup: Unknown subsys name 'net'
[ 41.280558][ T5072] cgroup: Unknown subsys name 'rlimit'
[ 41.458767][ T47] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 41.466801][ T47] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 41.474302][ T47] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 41.482242][ T47] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 41.489962][ T47] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3
[ 41.497314][ T47] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 41.575513][ T5074] chnl_net:caif_netlink_parms(): no params data found
[ 41.605498][ T5074] bridge0: port 1(bridge_slave_0) entered blocking state
[ 41.612704][ T5074] bridge0: port 1(bridge_slave_0) entered disabled state
[ 41.621073][ T5074] device bridge_slave_0 entered promiscuous mode
[ 41.629011][ T5074] bridge0: port 2(bridge_slave_1) entered blocking state
[ 41.636311][ T5074] bridge0: port 2(bridge_slave_1) entered disabled state
[ 41.644219][ T5074] device bridge_slave_1 entered promiscuous mode
[ 41.660216][ T5074] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 41.670509][ T5074] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 41.687969][ T5074] team0: Port device team_slave_0 added
[ 41.694592][ T5074] team0: Port device team_slave_1 added
[ 41.707841][ T5074] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 41.714774][ T5074] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 41.740979][ T5074] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 41.753328][ T5074] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 41.760417][ T5074] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 41.786578][ T5074] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 41.808751][ T5074] device hsr_slave_0 entered promiscuous mode
[ 41.815328][ T5074] device hsr_slave_1 entered promiscuous mode
[ 41.868811][ T5074] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 41.878202][ T5074] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 41.886794][ T5074] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 41.894950][ T5074] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 41.910541][ T5074] bridge0: port 2(bridge_slave_1) entered blocking state
[ 41.917682][ T5074] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 41.925140][ T5074] bridge0: port 1(bridge_slave_0) entered blocking state
[ 41.932231][ T5074] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 41.961982][ T5074] 8021q: adding VLAN 0 to HW filter on device bond0
[ 41.975137][ T5074] 8021q: adding VLAN 0 to HW filter on device team0
[ 41.982463][ T5085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 41.991359][ T5085] bridge0: port 1(bridge_slave_0) entered disabled state
[ 41.999460][ T5085] bridge0: port 2(bridge_slave_1) entered disabled state
[ 42.007256][ T5085] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 42.019018][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 42.027409][ T22] bridge0: port 1(bridge_slave_0) entered blocking state
[ 42.034725][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 42.057701][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 42.066041][ T22] bridge0: port 2(bridge_slave_1) entered blocking state
[ 42.073143][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 42.081105][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 42.089690][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 42.097954][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 42.105963][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 42.114939][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 42.124330][ T5074] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 42.210712][ T5074] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 42.218113][ T5085] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 42.225438][ T5085] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 42.239448][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 42.253747][ T5074] device veth0_vlan entered promiscuous mode
[ 42.260990][ T5086] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 42.269189][ T5086] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 42.277611][ T5086] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 42.287989][ T5074] device veth1_vlan entered promiscuous mode
[ 42.301815][ T5086] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 42.309984][ T5086] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 42.318401][ T5086] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 42.329281][ T5074] device veth0_macvtap entered promiscuous mode
[ 42.338518][ T5074] device veth1_macvtap entered promiscuous mode
[ 42.350723][ T5074] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 42.358825][ T5085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 42.368262][ T5085] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 42.378872][ T5074] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 42.386287][ T5086] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 42.396632][ T5074] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 42.405419][ T5074] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 42.414360][ T5074] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 42.423211][ T5074] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 42.463113][ T55] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 42.471160][ T55] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 42.482258][ T5085] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 42.491386][ T55] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 42.499597][ T55] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 42.507812][ T5085] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
executing program
2023/02/20 07:39:21 SYZFATAL: BUG: program execution failed: executor 0: exit status 67
SYZFAIL: ebtable checkpoint: getsockopt(EBT_SO_GET_INIT_INFO) failed
table=broute (errno 22: Invalid argument)
loop exited with status 67

SYZFAIL: ebtable checkpoint: getsockopt(EBT_SO_GET_INIT_INFO) failed
table=broute (errno 22: Invalid argument)
loop exited with status 67
[ 46.245969][ T3557] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0


syzkaller build log:
go env (err=<nil>)
GO111MODULE="auto"
GOARCH="amd64"
GOBIN=""
GOCACHE="/syzkaller/.cache/go-build"
GOENV="/syzkaller/.config/go/env"
GOEXE=""
GOEXPERIMENT=""
GOFLAGS=""
GOHOSTARCH="amd64"
GOHOSTOS="linux"
GOINSECURE=""
GOMODCACHE="/syzkaller/jobs/linux/gopath/pkg/mod"
GONOPROXY=""
GONOSUMDB=""
GOOS="linux"
GOPATH="/syzkaller/jobs/linux/gopath"
GOPRIVATE=""
GOPROXY="https://proxy.golang.org,direct"
GOROOT="/usr/local/go"
GOSUMDB="sum.golang.org"
GOTMPDIR=""
GOTOOLDIR="/usr/local/go/pkg/tool/linux_amd64"
GOVCS=""
GOVERSION="go1.17"
GCCGO="gccgo"
AR="ar"
CC="gcc"
CXX="g++"
CGO_ENABLED="1"
GOMOD="/syzkaller/jobs/linux/gopath/src/github.com/google/syzkaller/go.mod"
CGO_CFLAGS="-g -O2"
CGO_CPPFLAGS=""
CGO_CXXFLAGS="-g -O2"
CGO_FFLAGS="-g -O2"
CGO_LDFLAGS="-g -O2"
PKG_CONFIG="pkg-config"
GOGCCFLAGS="-fPIC -m64 -pthread -fmessage-length=0 -fdebug-prefix-map=/tmp/go-build2682014572=/tmp/go-build -gno-record-gcc-switches"

git status (err=<nil>)
HEAD detached at 851bc19a3
nothing to commit, working tree clean


tput: No value for $TERM and no -T specified
tput: No value for $TERM and no -T specified
Makefile:32: run command via tools/syz-env for best compatibility, see:
Makefile:33: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env
go list -f '{{.Stale}}' ./sys/syz-sysgen | grep -q false || go install ./sys/syz-sysgen
make .descriptions
tput: No value for $TERM and no -T specified
tput: No value for $TERM and no -T specified
bin/syz-sysgen
touch .descriptions
GOOS=linux GOARCH=amd64 go build "-ldflags=-s -w -X github.com/google/syzkaller/prog.GitRevision=851bc19a3c4615f6653414b6deec9b9e84c8ca58 -X 'github.com/google/syzkaller/prog.gitRevisionDate=20230216-173454'" "-tags=syz_target syz_os_linux syz_arch_amd64 " -o ./bin/linux_amd64/syz-fuzzer github.com/google/syzkaller/syz-fuzzer
GOOS=linux GOARCH=amd64 go build "-ldflags=-s -w -X github.com/google/syzkaller/prog.GitRevision=851bc19a3c4615f6653414b6deec9b9e84c8ca58 -X 'github.com/google/syzkaller/prog.gitRevisionDate=20230216-173454'" "-tags=syz_target syz_os_linux syz_arch_amd64 " -o ./bin/linux_amd64/syz-execprog github.com/google/syzkaller/tools/syz-execprog
GOOS=linux GOARCH=amd64 go build "-ldflags=-s -w -X github.com/google/syzkaller/prog.GitRevision=851bc19a3c4615f6653414b6deec9b9e84c8ca58 -X 'github.com/google/syzkaller/prog.gitRevisionDate=20230216-173454'" "-tags=syz_target syz_os_linux syz_arch_amd64 " -o ./bin/linux_amd64/syz-stress github.com/google/syzkaller/tools/syz-stress
mkdir -p ./bin/linux_amd64
gcc -o ./bin/linux_amd64/syz-executor executor/executor.cc \
-m64 -O2 -pthread -Wall -Werror -Wparentheses -Wunused-const-variable -Wframe-larger-than=16384 -Wno-stringop-overflow -Wno-array-bounds -Wno-format-overflow -Wno-unused-but-set-variable -Wno-unused-command-line-argument -static-pie -fpermissive -w -DGOOS_linux=1 -DGOARCH_amd64=1 \
-DHOSTGOOS_linux=1 -DGIT_REVISION=\"851bc19a3c4615f6653414b6deec9b9e84c8ca58\"



Tested on:

commit: 3ac88fa4 Merge tag 'net-6.2-final' of git://git.kernel..
git tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel config: https://syzkaller.appspot.com/x/.config?x=fe56f7d193926860
dashboard link: https://syzkaller.appspot.com/bug?extid=f61594de72d6705aea03
compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
patch: https://syzkaller.appspot.com/x/patch.diff?x=17c96c30c80000

Dmitry Vyukov

unread,
Feb 20, 2023, 2:51:43 AM2/20/23
to hda...@sina.com, linux-...@vger.kernel.org, syzkall...@googlegroups.com, syzbot
Hi Hillf,

I see that Florian also tested a fix for this:
https://syzkaller.appspot.com/bug?extid=f61594de72d6705aea03
It looks like Florian figured out something about this bug.
> --
> You received this message because you are subscribed to the Google Groups "syzkaller-bugs" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to syzkaller-bug...@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/msgid/syzkaller-bugs/00000000000074a5d005f51cc69c%40google.com.
Reply all
Reply to author
Forward
0 new messages