[v5.15] KASAN: use-after-free Read in advance_sched

5 views
Skip to first unread message

syzbot

unread,
Mar 23, 2024, 12:49:28 AMMar 23
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: b95c01af2113 Linux 5.15.152
git tree: linux-5.15.y
console output: https://syzkaller.appspot.com/x/log.txt?x=146d01f1180000
kernel config: https://syzkaller.appspot.com/x/.config?x=5794ebfbd890383f
dashboard link: https://syzkaller.appspot.com/bug?extid=ed06c0d525369e733ac6
compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40
userspace arch: arm64

Unfortunately, I don't have any reproducer for this issue yet.

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/ff79808f6ebe/disk-b95c01af.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/a4d83399ac47/vmlinux-b95c01af.xz
kernel image: https://storage.googleapis.com/syzbot-assets/f783260a6e28/Image-b95c01af.gz.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+ed06c0...@syzkaller.appspotmail.com

==================================================================
BUG: KASAN: use-after-free in advance_sched+0x7e0/0x858 net/sched/sch_taprio.c:734
Read of size 8 at addr ffff0000cab38310 by task kworker/u4:4/332

CPU: 0 PID: 332 Comm: kworker/u4:4 Not tainted 5.15.152-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Workqueue: bat_events batadv_nc_worker
Call trace:
dump_backtrace+0x0/0x530 arch/arm64/kernel/stacktrace.c:152
show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:216
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106
print_address_description+0x7c/0x3f0 mm/kasan/report.c:248
__kasan_report mm/kasan/report.c:434 [inline]
kasan_report+0x174/0x1e4 mm/kasan/report.c:451
__asan_report_load8_noabort+0x44/0x50 mm/kasan/report_generic.c:309
advance_sched+0x7e0/0x858 net/sched/sch_taprio.c:734
__run_hrtimer kernel/time/hrtimer.c:1686 [inline]
__hrtimer_run_queues+0x484/0xca4 kernel/time/hrtimer.c:1750
hrtimer_interrupt+0x2c0/0xb64 kernel/time/hrtimer.c:1812
timer_handler drivers/clocksource/arm_arch_timer.c:659 [inline]
arch_timer_handler_virt+0x74/0x88 drivers/clocksource/arm_arch_timer.c:670
handle_percpu_devid_irq+0x29c/0x7fc kernel/irq/chip.c:933
generic_handle_irq_desc include/linux/irqdesc.h:158 [inline]
handle_irq_desc kernel/irq/irqdesc.c:651 [inline]
handle_domain_irq+0xec/0x178 kernel/irq/irqdesc.c:706
gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:758
call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:899
do_interrupt_handler+0x74/0x94 arch/arm64/kernel/entry-common.c:267
el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454
el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470
el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:580
arch_local_irq_enable arch/arm64/include/asm/irqflags.h:35 [inline]
__local_bh_enable_ip+0x238/0x470 kernel/softirq.c:388
__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:176 [inline]
_raw_spin_unlock_bh+0xf8/0x180 kernel/locking/spinlock.c:210
spin_unlock_bh include/linux/spinlock.h:408 [inline]
batadv_nc_purge_paths+0x308/0x38c net/batman-adv/network-coding.c:475
batadv_nc_worker+0x2e4/0x580 net/batman-adv/network-coding.c:724
process_one_work+0x790/0x11b8 kernel/workqueue.c:2310
worker_thread+0x910/0x1034 kernel/workqueue.c:2457
kthread+0x37c/0x45c kernel/kthread.c:319
ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:870

Allocated by task 4208:
kasan_save_stack mm/kasan/common.c:38 [inline]
kasan_set_track mm/kasan/common.c:46 [inline]
set_alloc_info mm/kasan/common.c:434 [inline]
____kasan_kmalloc+0xbc/0xfc mm/kasan/common.c:513
__kasan_kmalloc+0x10/0x1c mm/kasan/common.c:522
kasan_kmalloc include/linux/kasan.h:264 [inline]
kmem_cache_alloc_trace+0x27c/0x47c mm/slub.c:3247
kmalloc include/linux/slab.h:591 [inline]
kzalloc include/linux/slab.h:721 [inline]
taprio_change+0x3b0/0x3694 net/sched/sch_taprio.c:1498
taprio_init+0x46c/0x514 net/sched/sch_taprio.c:1752
qdisc_create+0x6fc/0xf44 net/sched/sch_api.c:1264
tc_modify_qdisc+0x8fc/0x1364
rtnetlink_rcv_msg+0xa74/0xdac net/core/rtnetlink.c:5629
netlink_rcv_skb+0x20c/0x3b8 net/netlink/af_netlink.c:2505
rtnetlink_rcv+0x28/0x38 net/core/rtnetlink.c:5647
netlink_unicast_kernel net/netlink/af_netlink.c:1330 [inline]
netlink_unicast+0x664/0x938 net/netlink/af_netlink.c:1356
netlink_sendmsg+0x844/0xb38 net/netlink/af_netlink.c:1924
sock_sendmsg_nosec net/socket.c:704 [inline]
__sock_sendmsg net/socket.c:716 [inline]
____sys_sendmsg+0x584/0x870 net/socket.c:2431
___sys_sendmsg+0x214/0x294 net/socket.c:2485
__sys_sendmmsg+0x23c/0x648 net/socket.c:2571
__do_sys_sendmmsg net/socket.c:2600 [inline]
__se_sys_sendmmsg net/socket.c:2597 [inline]
__arm64_sys_sendmmsg+0xa0/0xbc net/socket.c:2597
__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52
el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181
el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:608
el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626
el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584

Freed by task 4214:
kasan_save_stack mm/kasan/common.c:38 [inline]
kasan_set_track+0x4c/0x84 mm/kasan/common.c:46
kasan_set_free_info+0x28/0x4c mm/kasan/generic.c:360
____kasan_slab_free+0x118/0x164 mm/kasan/common.c:366
__kasan_slab_free+0x18/0x28 mm/kasan/common.c:374
kasan_slab_free include/linux/kasan.h:230 [inline]
slab_free_hook mm/slub.c:1705 [inline]
slab_free_freelist_hook+0x128/0x1ec mm/slub.c:1731
slab_free mm/slub.c:3499 [inline]
kfree+0x178/0x410 mm/slub.c:4559
taprio_free_sched_cb+0x154/0x174 net/sched/sch_taprio.c:127
rcu_do_batch kernel/rcu/tree.c:2523 [inline]
rcu_core+0x830/0x1b34 kernel/rcu/tree.c:2763
rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776
__do_softirq+0x344/0xdb0 kernel/softirq.c:558

Last potentially related work creation:
kasan_save_stack+0x38/0x68 mm/kasan/common.c:38
kasan_record_aux_stack+0xd4/0x11c mm/kasan/generic.c:348
__call_rcu kernel/rcu/tree.c:3007 [inline]
call_rcu+0x118/0xb40 kernel/rcu/tree.c:3087
taprio_change+0x2c98/0x3694 net/sched/sch_taprio.c:1618
qdisc_change+0x228/0x548 net/sched/sch_api.c:1349
tc_modify_qdisc+0x116c/0x1364 net/sched/sch_api.c:1686
rtnetlink_rcv_msg+0xa74/0xdac net/core/rtnetlink.c:5629
netlink_rcv_skb+0x20c/0x3b8 net/netlink/af_netlink.c:2505
rtnetlink_rcv+0x28/0x38 net/core/rtnetlink.c:5647
netlink_unicast_kernel net/netlink/af_netlink.c:1330 [inline]
netlink_unicast+0x664/0x938 net/netlink/af_netlink.c:1356
netlink_sendmsg+0x844/0xb38 net/netlink/af_netlink.c:1924
sock_sendmsg_nosec net/socket.c:704 [inline]
__sock_sendmsg net/socket.c:716 [inline]
____sys_sendmsg+0x584/0x870 net/socket.c:2431
___sys_sendmsg+0x214/0x294 net/socket.c:2485
__sys_sendmmsg+0x23c/0x648 net/socket.c:2571
__do_sys_sendmmsg net/socket.c:2600 [inline]
__se_sys_sendmmsg net/socket.c:2597 [inline]
__arm64_sys_sendmmsg+0xa0/0xbc net/socket.c:2597
__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52
el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181
el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:608
el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626
el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584

The buggy address belongs to the object at ffff0000cab38300
which belongs to the cache kmalloc-128 of size 128
The buggy address is located 16 bytes inside of
128-byte region [ffff0000cab38300, ffff0000cab38380)
The buggy address belongs to the page:
page:000000000cf622fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10ab38
flags: 0x5ffc00000000200(slab|node=0|zone=2|lastcpupid=0x7ff)
raw: 05ffc00000000200 0000000000000000 0000000300000001 ffff0000c0002300
raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
ffff0000cab38200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffff0000cab38280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
>ffff0000cab38300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
^
ffff0000cab38380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
ffff0000cab38400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
==================================================================
==================================================================
BUG: KASAN: double-free or invalid-free in slab_free mm/slub.c:3499 [inline]
BUG: KASAN: double-free or invalid-free in kfree+0x178/0x410 mm/slub.c:4559

CPU: 0 PID: 7 Comm: kworker/0:0 Tainted: G B 5.15.152-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Workqueue: mld mld_dad_work
Call trace:
dump_backtrace+0x0/0x530 arch/arm64/kernel/stacktrace.c:152
show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:216
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106
print_address_description+0x7c/0x3f0 mm/kasan/report.c:248
kasan_report_invalid_free+0x64/0x94 mm/kasan/report.c:373
____kasan_slab_free+0x134/0x164
__kasan_slab_free+0x18/0x28 mm/kasan/common.c:374
kasan_slab_free include/linux/kasan.h:230 [inline]
slab_free_hook mm/slub.c:1705 [inline]
slab_free_freelist_hook+0x128/0x1ec mm/slub.c:1731
slab_free mm/slub.c:3499 [inline]
kfree+0x178/0x410 mm/slub.c:4559
taprio_free_sched_cb+0x154/0x174 net/sched/sch_taprio.c:127
rcu_do_batch kernel/rcu/tree.c:2523 [inline]
rcu_core+0x830/0x1b34 kernel/rcu/tree.c:2763
rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776
__do_softirq+0x344/0xdb0 kernel/softirq.c:558
do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline]
do_softirq+0xf8/0x1ac kernel/softirq.c:459
__local_bh_enable_ip+0x298/0x470 kernel/softirq.c:383
local_bh_enable+0x28/0x34 include/linux/bottom_half.h:32
rcu_read_unlock_bh include/linux/rcupdate.h:766 [inline]
ip6_finish_output2+0x13e8/0x1c4c net/ipv6/ip6_output.c:127
__ip6_finish_output+0x580/0x6ec net/ipv6/ip6_output.c:197
ip6_finish_output+0x40/0x218 net/ipv6/ip6_output.c:207
NF_HOOK_COND include/linux/netfilter.h:291 [inline]
ip6_output+0x270/0x594 net/ipv6/ip6_output.c:230
dst_output include/net/dst.h:443 [inline]
NF_HOOK+0x160/0x4ec include/linux/netfilter.h:302
mld_sendpack+0x828/0x1264 net/ipv6/mcast.c:1820
mld_send_initial_cr+0x324/0x3d4 net/ipv6/mcast.c:2239
mld_dad_work+0x48/0x360 net/ipv6/mcast.c:2262
process_one_work+0x790/0x11b8 kernel/workqueue.c:2310
worker_thread+0x910/0x1034 kernel/workqueue.c:2457
kthread+0x37c/0x45c kernel/kthread.c:319
ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:870

Allocated by task 4208:
kasan_save_stack mm/kasan/common.c:38 [inline]
kasan_set_track mm/kasan/common.c:46 [inline]
set_alloc_info mm/kasan/common.c:434 [inline]
____kasan_kmalloc+0xbc/0xfc mm/kasan/common.c:513
__kasan_kmalloc+0x10/0x1c mm/kasan/common.c:522
kasan_kmalloc include/linux/kasan.h:264 [inline]
kmem_cache_alloc_trace+0x27c/0x47c mm/slub.c:3247
kmalloc include/linux/slab.h:591 [inline]
kzalloc include/linux/slab.h:721 [inline]
taprio_change+0x3b0/0x3694 net/sched/sch_taprio.c:1498
taprio_init+0x46c/0x514 net/sched/sch_taprio.c:1752
qdisc_create+0x6fc/0xf44 net/sched/sch_api.c:1264
tc_modify_qdisc+0x8fc/0x1364
rtnetlink_rcv_msg+0xa74/0xdac net/core/rtnetlink.c:5629
netlink_rcv_skb+0x20c/0x3b8 net/netlink/af_netlink.c:2505
rtnetlink_rcv+0x28/0x38 net/core/rtnetlink.c:5647
netlink_unicast_kernel net/netlink/af_netlink.c:1330 [inline]
netlink_unicast+0x664/0x938 net/netlink/af_netlink.c:1356
netlink_sendmsg+0x844/0xb38 net/netlink/af_netlink.c:1924
sock_sendmsg_nosec net/socket.c:704 [inline]
__sock_sendmsg net/socket.c:716 [inline]
____sys_sendmsg+0x584/0x870 net/socket.c:2431
___sys_sendmsg+0x214/0x294 net/socket.c:2485
__sys_sendmmsg+0x23c/0x648 net/socket.c:2571
__do_sys_sendmmsg net/socket.c:2600 [inline]
__se_sys_sendmmsg net/socket.c:2597 [inline]
__arm64_sys_sendmmsg+0xa0/0xbc net/socket.c:2597
__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52
el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181
el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:608
el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626
el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584

Freed by task 0:
(stack is not available)

Last potentially related work creation:
kasan_save_stack+0x38/0x68 mm/kasan/common.c:38
kasan_record_aux_stack+0xd4/0x11c mm/kasan/generic.c:348
__call_rcu kernel/rcu/tree.c:3007 [inline]
call_rcu+0x118/0xb40 kernel/rcu/tree.c:3087
switch_schedules net/sched/sch_taprio.c:138 [inline]
advance_sched+0x4e4/0x858 net/sched/sch_taprio.c:757
__run_hrtimer kernel/time/hrtimer.c:1686 [inline]
__hrtimer_run_queues+0x484/0xca4 kernel/time/hrtimer.c:1750
hrtimer_interrupt+0x2c0/0xb64 kernel/time/hrtimer.c:1812
timer_handler drivers/clocksource/arm_arch_timer.c:659 [inline]
arch_timer_handler_virt+0x74/0x88 drivers/clocksource/arm_arch_timer.c:670
handle_percpu_devid_irq+0x29c/0x7fc kernel/irq/chip.c:933
generic_handle_irq_desc include/linux/irqdesc.h:158 [inline]
handle_irq_desc kernel/irq/irqdesc.c:651 [inline]
handle_domain_irq+0xec/0x178 kernel/irq/irqdesc.c:706
gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:758

Second to last potentially related work creation:
kasan_save_stack+0x38/0x68 mm/kasan/common.c:38
kasan_record_aux_stack+0xd4/0x11c mm/kasan/generic.c:348
__call_rcu kernel/rcu/tree.c:3007 [inline]
call_rcu+0x118/0xb40 kernel/rcu/tree.c:3087
taprio_change+0x2c98/0x3694 net/sched/sch_taprio.c:1618
qdisc_change+0x228/0x548 net/sched/sch_api.c:1349
tc_modify_qdisc+0x116c/0x1364 net/sched/sch_api.c:1686
rtnetlink_rcv_msg+0xa74/0xdac net/core/rtnetlink.c:5629
netlink_rcv_skb+0x20c/0x3b8 net/netlink/af_netlink.c:2505
rtnetlink_rcv+0x28/0x38 net/core/rtnetlink.c:5647
netlink_unicast_kernel net/netlink/af_netlink.c:1330 [inline]
netlink_unicast+0x664/0x938 net/netlink/af_netlink.c:1356
netlink_sendmsg+0x844/0xb38 net/netlink/af_netlink.c:1924
sock_sendmsg_nosec net/socket.c:704 [inline]
__sock_sendmsg net/socket.c:716 [inline]
____sys_sendmsg+0x584/0x870 net/socket.c:2431
___sys_sendmsg+0x214/0x294 net/socket.c:2485
__sys_sendmmsg+0x23c/0x648 net/socket.c:2571
__do_sys_sendmmsg net/socket.c:2600 [inline]
__se_sys_sendmmsg net/socket.c:2597 [inline]
__arm64_sys_sendmmsg+0xa0/0xbc net/socket.c:2597
__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52
el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181
el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:608
el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626
el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584

The buggy address belongs to the object at ffff0000cab38300
which belongs to the cache kmalloc-128 of size 128
The buggy address is located 0 bytes inside of
128-byte region [ffff0000cab38300, ffff0000cab38380)
The buggy address belongs to the page:
page:000000000cf622fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10ab38
flags: 0x5ffc00000000200(slab|node=0|zone=2|lastcpupid=0x7ff)
raw: 05ffc00000000200 0000000000000000 0000000300000001 ffff0000c0002300
raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
ffff0000cab38200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffff0000cab38280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
>ffff0000cab38300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
^
ffff0000cab38380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
ffff0000cab38400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
==================================================================
==================================================================
BUG: KASAN: double-free or invalid-free in slab_free mm/slub.c:3499 [inline]
BUG: KASAN: double-free or invalid-free in kmem_cache_free+0xdc/0x3c4 mm/slub.c:3515

CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G B 5.15.152-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Call trace:
dump_backtrace+0x0/0x530 arch/arm64/kernel/stacktrace.c:152
show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:216
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106
print_address_description+0x7c/0x3f0 mm/kasan/report.c:248
kasan_report_invalid_free+0x64/0x94 mm/kasan/report.c:373
____kasan_slab_free+0x134/0x164
__kasan_slab_free+0x18/0x28 mm/kasan/common.c:374
kasan_slab_free include/linux/kasan.h:230 [inline]
slab_free_hook mm/slub.c:1705 [inline]
slab_free_freelist_hook+0x128/0x1ec mm/slub.c:1731
slab_free mm/slub.c:3499 [inline]
kmem_cache_free+0xdc/0x3c4 mm/slub.c:3515
dst_destroy+0x270/0x3bc net/core/dst.c:123
dst_destroy_rcu+0x20/0x30 net/core/dst.c:136
rcu_do_batch kernel/rcu/tree.c:2523 [inline]
rcu_core+0x830/0x1b34 kernel/rcu/tree.c:2763
rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776
__do_softirq+0x344/0xdb0 kernel/softirq.c:558
run_ksoftirqd+0x68/0x258 kernel/softirq.c:921
smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164
kthread+0x37c/0x45c kernel/kthread.c:319
ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:870

Allocated by task 0:
(stack is not available)

Freed by task 7:
kasan_save_stack mm/kasan/common.c:38 [inline]
kasan_set_track+0x4c/0x84 mm/kasan/common.c:46
kasan_set_free_info+0x28/0x4c mm/kasan/generic.c:360
____kasan_slab_free+0x118/0x164 mm/kasan/common.c:366
__kasan_slab_free+0x18/0x28 mm/kasan/common.c:374
kasan_slab_free include/linux/kasan.h:230 [inline]
slab_free_hook mm/slub.c:1705 [inline]
slab_free_freelist_hook+0x128/0x1ec mm/slub.c:1731
slab_free mm/slub.c:3499 [inline]
kmem_cache_free+0xdc/0x3c4 mm/slub.c:3515
dst_destroy+0x270/0x3bc net/core/dst.c:123
dst_destroy_rcu+0x20/0x30 net/core/dst.c:136
rcu_do_batch kernel/rcu/tree.c:2523 [inline]
rcu_core+0x830/0x1b34 kernel/rcu/tree.c:2763
rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776
__do_softirq+0x344/0xdb0 kernel/softirq.c:558

Last potentially related work creation:
kasan_save_stack+0x38/0x68 mm/kasan/common.c:38
kasan_record_aux_stack+0xd4/0x11c mm/kasan/generic.c:348
__call_rcu kernel/rcu/tree.c:3007 [inline]
call_rcu+0x118/0xb40 kernel/rcu/tree.c:3087
dst_release+0xc4/0x150 net/core/dst.c:173
refdst_drop include/net/dst.h:255 [inline]
skb_dst_drop include/net/dst.h:267 [inline]
__dev_queue_xmit+0x614/0x2a6c net/core/dev.c:4204
dev_queue_xmit+0x24/0x34 net/core/dev.c:4281
neigh_hh_output include/net/neighbour.h:493 [inline]
neigh_output include/net/neighbour.h:507 [inline]
ip6_finish_output2+0x1314/0x1c4c net/ipv6/ip6_output.c:126
__ip6_finish_output+0x580/0x6ec net/ipv6/ip6_output.c:197
ip6_finish_output+0x40/0x218 net/ipv6/ip6_output.c:207
NF_HOOK_COND include/linux/netfilter.h:291 [inline]
ip6_output+0x270/0x594 net/ipv6/ip6_output.c:230
dst_output include/net/dst.h:443 [inline]
NF_HOOK include/linux/netfilter.h:302 [inline]
ndisc_send_skb+0xbf8/0x1788 net/ipv6/ndisc.c:509
ndisc_send_rs+0x494/0x5fc net/ipv6/ndisc.c:703
addrconf_rs_timer+0x308/0x5a8 net/ipv6/addrconf.c:3957
call_timer_fn+0x19c/0x8f0 kernel/time/timer.c:1421
expire_timers kernel/time/timer.c:1466 [inline]
__run_timers+0x554/0x718 kernel/time/timer.c:1737
run_timer_softirq+0x7c/0x114 kernel/time/timer.c:1750
__do_softirq+0x344/0xdb0 kernel/softirq.c:558

The buggy address belongs to the object at ffff0000c1cef8c0
which belongs to the cache ip6_dst_cache of size 232
The buggy address is located 88 bytes inside of
232-byte region [ffff0000c1cef8c0, ffff0000c1cef9a8)
The buggy address belongs to the page:
page:00000000c4d36afb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101cef
memcg:ffff0000d652a601
flags: 0x5ffc00000000200(slab|node=0|zone=2|lastcpupid=0x7ff)
raw: 05ffc00000000200 fffffc0003083dc0 0000000700000007 ffff0000d148d800
raw: 0000000000000000 00000000800c000c 00000001ffffffff ffff0000d652a601
page dumped because: kasan: bad access detected

Memory state around the buggy address:
ffff0000c1cef800: fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc
ffff0000c1cef880: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
>ffff0000c1cef900: fb fb fb 00 00 00 00 00 00 00 00 00 00 00 00 00
^
ffff0000c1cef980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffff0000c1cefa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title

If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)

If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report

If you want to undo deduplication, reply with:
#syz undup

syzbot

unread,
Mar 25, 2024, 8:01:40 AMMar 25
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: d7543167affd Linux 6.1.82
git tree: linux-6.1.y
console output: https://syzkaller.appspot.com/x/log.txt?x=145c6fc1180000
kernel config: https://syzkaller.appspot.com/x/.config?x=bde0f71b47fafe10
dashboard link: https://syzkaller.appspot.com/bug?extid=5af50b1b1bd6a984179d
compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40
userspace arch: arm64

Unfortunately, I don't have any reproducer for this issue yet.

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/1dc4836afbbe/disk-d7543167.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/dd967b6d61a8/vmlinux-d7543167.xz
kernel image: https://storage.googleapis.com/syzbot-assets/334421ea662d/Image-d7543167.gz.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+5af50b...@syzkaller.appspotmail.com

==================================================================
BUG: KASAN: use-after-free in advance_sched+0x1b0/0x858 net/sched/sch_taprio.c:717
Read of size 8 at addr ffff0000d838a210 by task udevd/3842

CPU: 0 PID: 3842 Comm: udevd Not tainted 6.1.82-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Call trace:
dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158
show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106
print_address_description mm/kasan/report.c:284 [inline]
print_report+0x174/0x4c0 mm/kasan/report.c:395
kasan_report+0xd4/0x130 mm/kasan/report.c:495
__asan_report_load8_noabort+0x2c/0x38 mm/kasan/report_generic.c:351
advance_sched+0x1b0/0x858 net/sched/sch_taprio.c:717
__run_hrtimer kernel/time/hrtimer.c:1686 [inline]
__hrtimer_run_queues+0x4b0/0xdc0 kernel/time/hrtimer.c:1750
hrtimer_interrupt+0x2c0/0xb64 kernel/time/hrtimer.c:1812
timer_handler drivers/clocksource/arm_arch_timer.c:655 [inline]
arch_timer_handler_virt+0x74/0x88 drivers/clocksource/arm_arch_timer.c:666
handle_percpu_devid_irq+0x174/0x354 kernel/irq/chip.c:930
generic_handle_irq_desc include/linux/irqdesc.h:158 [inline]
handle_irq_desc kernel/irq/irqdesc.c:651 [inline]
generic_handle_domain_irq+0x7c/0xc4 kernel/irq/irqdesc.c:707
__gic_handle_irq drivers/irqchip/irq-gic-v3.c:737 [inline]
__gic_handle_irq_from_irqson drivers/irqchip/irq-gic-v3.c:788 [inline]
gic_handle_irq+0x70/0x1e4 drivers/irqchip/irq-gic-v3.c:832
call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:893
do_interrupt_handler+0xd4/0x138 arch/arm64/kernel/entry-common.c:274
__el1_irq arch/arm64/kernel/entry-common.c:471 [inline]
el1_interrupt+0x34/0x68 arch/arm64/kernel/entry-common.c:486
el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:491
el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:581
preempt_schedule_common+0xf4/0x1e8 kernel/sched/core.c:6727
preempt_schedule+0x64/0x84 kernel/sched/core.c:6751
__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline]
_raw_spin_unlock_irqrestore+0xa8/0xac kernel/locking/spinlock.c:194
spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]
__wake_up_common_lock kernel/sched/wait.c:140 [inline]
__wake_up_sync_key+0x124/0x1ac kernel/sched/wait.c:208
sock_def_readable+0x150/0x278 net/core/sock.c:3304
__netlink_sendskb net/netlink/af_netlink.c:1273 [inline]
netlink_sendskb+0x98/0x154 net/netlink/af_netlink.c:1279
netlink_unicast+0x320/0x898 net/netlink/af_netlink.c:1367
netlink_sendmsg+0x834/0xb18 net/netlink/af_netlink.c:1874
sock_sendmsg_nosec net/socket.c:718 [inline]
__sock_sendmsg net/socket.c:730 [inline]
____sys_sendmsg+0x55c/0x848 net/socket.c:2514
___sys_sendmsg net/socket.c:2568 [inline]
__sys_sendmsg+0x26c/0x33c net/socket.c:2597
__do_sys_sendmsg net/socket.c:2606 [inline]
__se_sys_sendmsg net/socket.c:2604 [inline]
__arm64_sys_sendmsg+0x80/0x94 net/socket.c:2604
__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206
el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585

Allocated by task 4665:
kasan_save_stack mm/kasan/common.c:45 [inline]
kasan_set_track+0x4c/0x80 mm/kasan/common.c:52
kasan_save_alloc_info+0x24/0x30 mm/kasan/generic.c:505
____kasan_kmalloc mm/kasan/common.c:374 [inline]
__kasan_kmalloc+0xac/0xc4 mm/kasan/common.c:383
kasan_kmalloc include/linux/kasan.h:211 [inline]
kmalloc_trace+0x7c/0x94 mm/slab_common.c:1050
kmalloc include/linux/slab.h:556 [inline]
kzalloc include/linux/slab.h:692 [inline]
parse_sched_list net/sched/sch_taprio.c:863 [inline]
parse_taprio_schedule net/sched/sch_taprio.c:905 [inline]
taprio_change+0x2034/0x3834 net/sched/sch_taprio.c:1599
taprio_init+0x4a8/0x530 net/sched/sch_taprio.c:1821
qdisc_create+0x70c/0xe64 net/sched/sch_api.c:1314
tc_modify_qdisc+0xa14/0x186c
rtnetlink_rcv_msg+0x72c/0xd94 net/core/rtnetlink.c:6121
netlink_rcv_skb+0x20c/0x3b8 net/netlink/af_netlink.c:2508
rtnetlink_rcv+0x28/0x38 net/core/rtnetlink.c:6139
netlink_unicast_kernel net/netlink/af_netlink.c:1326 [inline]
netlink_unicast+0x65c/0x898 net/netlink/af_netlink.c:1352
netlink_sendmsg+0x834/0xb18 net/netlink/af_netlink.c:1874
sock_sendmsg_nosec net/socket.c:718 [inline]
__sock_sendmsg net/socket.c:730 [inline]
____sys_sendmsg+0x55c/0x848 net/socket.c:2514
___sys_sendmsg net/socket.c:2568 [inline]
__sys_sendmmsg+0x318/0x7d8 net/socket.c:2654
__do_sys_sendmmsg net/socket.c:2683 [inline]
__se_sys_sendmmsg net/socket.c:2680 [inline]
__arm64_sys_sendmmsg+0xa0/0xbc net/socket.c:2680
__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206
el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585

Freed by task 15:
kasan_save_stack mm/kasan/common.c:45 [inline]
kasan_set_track+0x4c/0x80 mm/kasan/common.c:52
kasan_save_free_info+0x38/0x5c mm/kasan/generic.c:516
____kasan_slab_free+0x144/0x1c0 mm/kasan/common.c:236
__kasan_slab_free+0x18/0x28 mm/kasan/common.c:244
kasan_slab_free include/linux/kasan.h:177 [inline]
slab_free_hook mm/slub.c:1724 [inline]
slab_free_freelist_hook mm/slub.c:1750 [inline]
slab_free mm/slub.c:3661 [inline]
__kmem_cache_free+0x2c0/0x4b4 mm/slub.c:3674
kfree+0xcc/0x1b8 mm/slab_common.c:1007
taprio_free_sched_cb+0x12c/0x174 net/sched/sch_taprio.c:124
rcu_do_batch kernel/rcu/tree.c:2296 [inline]
rcu_core+0x878/0x1c10 kernel/rcu/tree.c:2556
rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2573
__do_softirq+0x314/0xe38 kernel/softirq.c:571

The buggy address belongs to the object at ffff0000d838a200
which belongs to the cache kmalloc-128 of size 128
The buggy address is located 16 bytes inside of
128-byte region [ffff0000d838a200, ffff0000d838a280)

The buggy address belongs to the physical page:
page:00000000e1acae3a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11838a
flags: 0x5ffc00000000200(slab|node=0|zone=2|lastcpupid=0x7ff)
raw: 05ffc00000000200 fffffc00032a16c0 dead000000000003 ffff0000c0002300
raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
ffff0000d838a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
ffff0000d838a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
>ffff0000d838a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
^
ffff0000d838a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
ffff0000d838a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================
BUG: sleeping function called from invalid context at fs/file_table.c:304
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4250, name: syz-executor.0
preempt_count: 101, expected: 0
RCU nest depth: 0, expected: 0
INFO: lockdep is turned off.
Preemption disabled at:
[<ffff80000803315c>] local_bh_disable+0x28/0x34 include/linux/bottom_half.h:20
CPU: 0 PID: 4250 Comm: syz-executor.0 Tainted: G B W 6.1.82-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Call trace:
dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158
show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106
dump_stack+0x1c/0x58 lib/dump_stack.c:113
__might_resched+0x37c/0x4d8 kernel/sched/core.c:9942
__might_sleep+0x90/0xe4 kernel/sched/core.c:9871
__fput+0xd4/0x7bc fs/file_table.c:304
____fput+0x20/0x30 fs/file_table.c:348
rcu_do_batch kernel/rcu/tree.c:2296 [inline]
rcu_core+0x878/0x1c10 kernel/rcu/tree.c:2556
rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2573
__do_softirq+0x314/0xe38 kernel/softirq.c:571
____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:80
call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:893
do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:85
do_softirq+0xf8/0x1ac kernel/softirq.c:472
__local_bh_enable_ip+0x298/0x470 kernel/softirq.c:396
local_bh_enable+0x28/0x34 include/linux/bottom_half.h:33
put_cpu_fpsimd_context arch/arm64/kernel/fpsimd.c:274 [inline]
fpsimd_restore_current_state+0x110/0x26c arch/arm64/kernel/fpsimd.c:1730
do_notify_resume+0x1948/0x3474 arch/arm64/kernel/signal.c:1135
prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:137 [inline]
exit_to_user_mode arch/arm64/kernel/entry-common.c:142 [inline]
el0_svc+0x9c/0x168 arch/arm64/kernel/entry-common.c:638
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
------------[ cut here ]------------
kernel BUG at include/linux/fs.h:3074!
Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
Modules linked in:

CPU: 0 PID: 4250 Comm: syz-executor.0 Tainted: G B W 6.1.82-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : i_readcount_dec include/linux/fs.h:3074 [inline]
pc : put_file_access fs/internal.h:108 [inline]
pc : __fput+0x770/0x7bc fs/file_table.c:327
lr : i_readcount_dec include/linux/fs.h:3074 [inline]
lr : put_file_access fs/internal.h:108 [inline]
lr : __fput+0x770/0x7bc fs/file_table.c:327
sp : ffff800008007cc0
x29: ffff800008007d00
x28: 1fffe0001a03b5ef
x27: 1fffe0001a03b5e5

x26: ffff0000c085b520
x25: 00000000000a801d
x24: 00000000000a801d

x23: ffff000143131654
x22: dfff800000000000
x21: 0000000000000000

x20: ffff0000d01daf7c
x19: ffff0000d01daf00
x18: 1fffe00018c6e087

x17: 0000000000000000
x16: ffff8000084fb154
x15: 0000000000000000

x14: 0000000000000000
x13: 205d304320202020
x12: 0000000000000001

x11: 0000000000ff0100
x10: 0000000000000000
x9 : ffff800008a4b0b4

x8 : ffff0000c6370000
x7 : 205b5d3835343437
x6 : ffff800008348ef8

x5 : 0000000000000000
x4 : 0000000000000001
x3 : ffff800008a4ad80

x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000

Call trace:
i_readcount_dec include/linux/fs.h:3074 [inline]
put_file_access fs/internal.h:108 [inline]
__fput+0x770/0x7bc fs/file_table.c:327
____fput+0x20/0x30 fs/file_table.c:348
rcu_do_batch kernel/rcu/tree.c:2296 [inline]
rcu_core+0x878/0x1c10 kernel/rcu/tree.c:2556
rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2573
__do_softirq+0x314/0xe38 kernel/softirq.c:571
____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:80
call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:893
do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:85
do_softirq+0xf8/0x1ac kernel/softirq.c:472
__local_bh_enable_ip+0x298/0x470 kernel/softirq.c:396
local_bh_enable+0x28/0x34 include/linux/bottom_half.h:33
put_cpu_fpsimd_context arch/arm64/kernel/fpsimd.c:274 [inline]
fpsimd_restore_current_state+0x110/0x26c arch/arm64/kernel/fpsimd.c:1730
do_notify_resume+0x1948/0x3474 arch/arm64/kernel/signal.c:1135
prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:137 [inline]
exit_to_user_mode arch/arm64/kernel/entry-common.c:142 [inline]
el0_svc+0x9c/0x168 arch/arm64/kernel/entry-common.c:638
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
Code: aa1c03e0 97fcac50 17fffe98 97eac029 (d4210000)
---[ end trace 0000000000000000 ]---
Reply all
Reply to author
Forward
0 new messages