linux-wireless.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* use-after free bug in hacked 4.16 kernel, related to fq_flow_dequeue
@ 2018-08-01 20:06 Ben Greear
  2018-08-02 19:45 ` Toke Høiland-Jørgensen
  0 siblings, 1 reply; 6+ messages in thread
From: Ben Greear @ 2018-08-01 20:06 UTC (permalink / raw)
  To: linux-wireless@vger.kernel.org

This is from my hacked kernel, could be my fault.  I thought the fq guys might
want to know however...

==================================================================
BUG: KASAN: use-after-free in fq_flow_dequeue+0x353/0x3c0 [mac80211]
Read of size 4 at addr ffff88013d92a700 by task rmmod/813

audit: type=1130 audit(1533153605.287:233): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=sysstat-collect comm="systemd" exe="/usr/lib/systemd/s'
CPU: 0 PID: 813 Comm: rmmod Tainted: G        W        4.16.18+ #24
Hardware name: _ _/, BIOS 5.11 08/26/2016
Call Trace:
  dump_stack+0x7c/0xbf
  print_address_description+0x70/0x280
audit: type=1131 audit(1533153605.287:234): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=sysstat-collect comm="systemd" exe="/usr/lib/systemd/s'
  ? fq_flow_dequeue+0x353/0x3c0 [mac80211]
  kasan_report+0x25c/0x350
  fq_flow_dequeue+0x353/0x3c0 [mac80211]
  fq_flow_reset.constprop.56+0x2b/0x2d0 [mac80211]
  fq_reset.constprop.53+0x79/0x110 [mac80211]
  ieee80211_txq_teardown_flows+0xc2/0x100 [mac80211]
  ieee80211_unregister_hw+0x17b/0x260 [mac80211]
  ath10k_mac_unregister+0x35/0x1a0 [ath10k_core]
  ath10k_core_unregister+0x60/0x160 [ath10k_core]
  ath10k_pci_remove+0x53/0x100 [ath10k_pci]
  pci_device_remove+0x97/0x1d0
  device_release_driver_internal+0x26f/0x520
  driver_detach+0x9d/0x140
  bus_remove_driver+0xde/0x2c0
  pci_unregister_driver+0x28/0x1a0
  ath10k_pci_exit+0xc/0x14 [ath10k_pci]
  SyS_delete_module+0x39a/0x4a0
  ? free_module+0x7d0/0x7d0
  ? exit_to_usermode_loop+0x75/0xf0
  ? free_module+0x7d0/0x7d0
  do_syscall_64+0x193/0x5e0
  entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x7f65a31ac5e7
RSP: 002b:00007ffd0781e9a8 EFLAGS: 00000206 ORIG_RAX: 00000000000000b0
RAX: ffffffffffffffda RBX: 00007ffd0781e9f8 RCX: 00007f65a31ac5e7
RDX: 000000000000000a RSI: 0000000000000800 RDI: 000055e08a426248
RBP: 000055e08a4261e0 R08: 000000000000000a R09: 1999999999999999
R10: 00007f65a321c1a0 R11: 0000000000000206 R12: 00007ffd0781ebc0
R13: 00007ffd07820643 R14: 0000000000000000 R15: 000055e08a4261e0

The buggy address belongs to the page:
page:ffffea0004f64a80 count:0 mapcount:0 mapping:0000000000000000 index:0xffff88013d92a640
flags: 0x5fff8000000000()
raw: 005fff8000000000 0000000000000000 ffff88013d92a640 00000000ffffffff
raw: 0000000000000000 dead000000000200 ffff88014c02a600 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
  ffff88013d92a600: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
  ffff88013d92a680: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
 >ffff88013d92a700: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                    ^
  ffff88013d92a780: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
  ffff88013d92a800: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================


Thanks,
Ben

-- 
Ben Greear <greearb@candelatech.com>
Candela Technologies Inc  http://www.candelatech.com

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2018-08-13 14:49 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2018-08-01 20:06 use-after free bug in hacked 4.16 kernel, related to fq_flow_dequeue Ben Greear
2018-08-02 19:45 ` Toke Høiland-Jørgensen
2018-08-02 19:54   ` Ben Greear
2018-08-02 20:20     ` Toke Høiland-Jørgensen
2018-08-12 21:07       ` Ben Greear
2018-08-13 12:07         ` Toke Høiland-Jørgensen

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).