On Sat, Dec 3, 2016 at 11:38 AM, Johannes Thumshirn <jthumshirn@xxxxxxx> wrote: > On Fri, Dec 02, 2016 at 05:50:39PM +0100, Dmitry Vyukov wrote: >> On Fri, Nov 25, 2016 at 8:08 PM, Dmitry Vyukov <dvyukov@xxxxxxxxxx> wrote: > > [...] > >> >> +David did some debugging of a similar case. His 0x400 at location >> 0x2000efdc refers to 0xffff at 0x20012fdc in the provided reproducer: >> NONFAILING(*(uint32_t*)0x20012fdc = (uint32_t)0xffff); >> Here is his explanation: >> ===== >> That's not nice, it's passing a reply_len mismatch of 0x400 which is going >> to cause an sg_write warning (in 988 bytes, out 38 bytes). input_size >> will be 74 since count == 80, the mxsize is 0x400 (!) so after subtracting >> SZ_SG_HEADER we get the 988 bytes in. This forces SG_DXFER_TO_FROM_DEV >> when we really want SG_DXFER_TO_DEV. If you set the value at 0x2000efdc >> to 0x24 rather than 0x400 so there's a legitimate reply_len equal to >> SG_DXFER_TO_FROM_DEV, I'd assume this passes just fine, assuming your >> container can get enough memory. >> ===== >> >> I've tried to replace 0xffff in the provided reproducer with 0x24 and >> it indeed does not crash. > > This is somewhat expected, AFAICS the value at 0x20012fdc ends up as > hp->dxfer_len in the SG driver. I did a lot of debugging (actually I spend the > whole last work week soley on this) but I can't find where it does the actual > use-after-free, so if you have anything to share I'd be glad. Hi Johannes, Thanks for looking into this! As I noted I don't think this is use-after-free, more likely it is an out-of-bounds access against non-slab range. Report says that we are copying 0x1000 bytes starting at 0xffff880062c6e02a. The first bad address is 0xffff880062c6f000, this address was freed previously and that's why KASAN reports UAF. But this is already next page, and KASAN does not insert redzones around pages (only around slab allocations). So most likely the code should have not touch 0xffff880062c6f000 as it is not his memory. Also I noticed that the report happens after few minutes of repeatedly running this program, so I would expect that this is some kind of race -- either between kernel threads, or maybe between user space threads and kernel. Or maybe it's just that the next page is not always marked as free, so we just don't detect the bad access. Does it all make any sense to you? Can you think of any additional sanity checks that will ensure that this code copies only memory it owns? -- To unsubscribe from this list: send the line "unsubscribe linux-block" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html