syzbot


KASAN: out-of-bounds Read in kfence_guarded_free

Status: fixed on 2021/06/11 13:40
Subsystems: kasan mm
[Documentation on labels]
Fix commit: 2b8305260fb3 kfence, kasan: make KFENCE compatible with KASAN
First crash: 1244d, last: 1233d
Cause bisection: failed (error log, bisect log)
  

Sample crash report:
==================================================================
BUG: KASAN: out-of-bounds in check_canary_byte mm/kfence/core.c:211 [inline]
BUG: KASAN: out-of-bounds in for_each_canary mm/kfence/core.c:245 [inline]
BUG: KASAN: out-of-bounds in kfence_guarded_free+0x7f1/0x8f0 mm/kfence/core.c:374
Read of size 1 at addr ffff88823bdcafe4 by task syz-executor939/26003

CPU: 1 PID: 26003 Comm: syz-executor939 Not tainted 5.10.0-next-20201223-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:79 [inline]
 dump_stack+0x107/0x163 lib/dump_stack.c:120
 print_address_description.constprop.0.cold+0x5b/0x2f8 mm/kasan/report.c:230
 __kasan_report mm/kasan/report.c:396 [inline]
 kasan_report.cold+0x79/0xd5 mm/kasan/report.c:413
 check_canary_byte mm/kfence/core.c:211 [inline]
 for_each_canary mm/kfence/core.c:245 [inline]
 kfence_guarded_free+0x7f1/0x8f0 mm/kfence/core.c:374
 __kfence_free+0x70/0x150 mm/kfence/core.c:756
 do_slab_free mm/slub.c:3145 [inline]
 slab_free mm/slub.c:3158 [inline]
 kfree+0x57c/0x5c0 mm/slub.c:4156
 crypto_destroy_tfm+0xc0/0x210 crypto/api.c:574
 crypto_exit_ops crypto/api.c:308 [inline]
 crypto_destroy_tfm+0xab/0x210 crypto/api.c:572
 alg_do_release crypto/af_alg.c:115 [inline]
 alg_sock_destruct+0x85/0xe0 crypto/af_alg.c:369
 __sk_destruct+0x4b/0x900 net/core/sock.c:1778
 sk_destruct+0xbd/0xe0 net/core/sock.c:1822
 __sk_free+0xef/0x3d0 net/core/sock.c:1833
 sk_free+0x78/0xa0 net/core/sock.c:1844
 sock_put include/net/sock.h:1797 [inline]
 af_alg_release+0xdb/0x110 crypto/af_alg.c:122
 __sock_release+0xcd/0x280 net/socket.c:597
 sock_close+0x18/0x20 net/socket.c:1256
 __fput+0x283/0x920 fs/file_table.c:280
 task_work_run+0xdd/0x190 kernel/task_work.c:140
 exit_task_work include/linux/task_work.h:30 [inline]
 do_exit+0xb89/0x29e0 kernel/exit.c:823
 do_group_exit+0x125/0x310 kernel/exit.c:920
 __do_sys_exit_group kernel/exit.c:931 [inline]
 __se_sys_exit_group kernel/exit.c:929 [inline]
 __x64_sys_exit_group+0x3a/0x50 kernel/exit.c:929
 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x43feb8
Code: Unable to access opcode bytes at RIP 0x43fe8e.
RSP: 002b:00007ffefb4cacd8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000043feb8
RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000
RBP: 00000000004bf790 R08: 00000000000000e7 R09: ffffffffffffffd0
R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001
R13: 00000000006d1180 R14: 0000000000000000 R15: 0000000000000000

Allocated by task 2846403498:
------------[ cut here ]------------
slab index 831406 out of bounds (390) for stack id adacafae
WARNING: CPU: 1 PID: 26003 at lib/stackdepot.c:211 stack_depot_fetch+0x6d/0xa0 lib/stackdepot.c:211
Modules linked in:
CPU: 1 PID: 26003 Comm: syz-executor939 Not tainted 5.10.0-next-20201223-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:stack_depot_fetch+0x6d/0xa0 lib/stackdepot.c:211
Code: 48 c1 e0 04 25 f0 3f 00 00 48 01 d0 48 8d 50 18 48 89 13 8b 40 0c 48 83 c4 10 5b c3 89 f9 48 c7 c7 58 8d d2 8a e8 6a b6 de 04 <0f> 0b 48 83 c4 10 31 c0 5b c3 48 83 c4 10 31 c0 5b c3 48 c7 c7 20
RSP: 0018:ffffc900022579e8 EFLAGS: 00010082
RAX: 0000000000000000 RBX: ffffc90002257a08 RCX: 0000000000000000
RDX: ffff888029838000 RSI: ffffffff815b3355 RDI: fffff5200044af2f
RBP: ffffea0008ef7280 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff815ac52e R11: 0000000000000000 R12: ffff88823bdcafe4
R13: ffff88823bdca000 R14: ffff88823bdca040 R15: 00000000ffffffad
FS:  0000000000000000(0000) GS:ffff8880b9f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000004bf7c8 CR3: 000000000b08e000 CR4: 00000000001506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 print_stack+0x9/0x18 mm/kasan/report.c:114
 describe_object_stacks mm/kasan/report.c:176 [inline]
 describe_object mm/kasan/report.c:206 [inline]
 print_address_description.constprop.0.cold+0x21a/0x2f8 mm/kasan/report.c:237
 __kasan_report mm/kasan/report.c:396 [inline]
 kasan_report.cold+0x79/0xd5 mm/kasan/report.c:413
 check_canary_byte mm/kfence/core.c:211 [inline]
 for_each_canary mm/kfence/core.c:245 [inline]
 kfence_guarded_free+0x7f1/0x8f0 mm/kfence/core.c:374
 __kfence_free+0x70/0x150 mm/kfence/core.c:756
 do_slab_free mm/slub.c:3145 [inline]
 slab_free mm/slub.c:3158 [inline]
 kfree+0x57c/0x5c0 mm/slub.c:4156
 crypto_destroy_tfm+0xc0/0x210 crypto/api.c:574
 crypto_exit_ops crypto/api.c:308 [inline]
 crypto_destroy_tfm+0xab/0x210 crypto/api.c:572
 alg_do_release crypto/af_alg.c:115 [inline]
 alg_sock_destruct+0x85/0xe0 crypto/af_alg.c:369
 __sk_destruct+0x4b/0x900 net/core/sock.c:1778
 sk_destruct+0xbd/0xe0 net/core/sock.c:1822
 __sk_free+0xef/0x3d0 net/core/sock.c:1833
 sk_free+0x78/0xa0 net/core/sock.c:1844
 sock_put include/net/sock.h:1797 [inline]
 af_alg_release+0xdb/0x110 crypto/af_alg.c:122
 __sock_release+0xcd/0x280 net/socket.c:597
 sock_close+0x18/0x20 net/socket.c:1256
 __fput+0x283/0x920 fs/file_table.c:280
 task_work_run+0xdd/0x190 kernel/task_work.c:140
 exit_task_work include/linux/task_work.h:30 [inline]
 do_exit+0xb89/0x29e0 kernel/exit.c:823
 do_group_exit+0x125/0x310 kernel/exit.c:920
 __do_sys_exit_group kernel/exit.c:931 [inline]
 __se_sys_exit_group kernel/exit.c:929 [inline]
 __x64_sys_exit_group+0x3a/0x50 kernel/exit.c:929
 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x43feb8
Code: Unable to access opcode bytes at RIP 0x43fe8e.
RSP: 002b:00007ffefb4cacd8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000043feb8
RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000
RBP: 00000000004bf790 R08: 00000000000000e7 R09: ffffffffffffffd0
R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001
R13: 00000000006d1180 R14: 0000000000000000 R15: 0000000000000000

Crashes (20):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2020/12/28 02:41 linux-next d7a03a44a5e9 2242f77f .config console log report syz C ci-upstream-linux-next-kasan-gce-root
2020/12/28 01:38 linux-next d7a03a44a5e9 2242f77f .config console log report syz C ci-upstream-linux-next-kasan-gce-root
2020/12/27 10:03 linux-next d7a03a44a5e9 821e0b09 .config console log report syz C ci-upstream-linux-next-kasan-gce-root
2020/12/24 21:18 linux-next d7a03a44a5e9 c2c1d1dd .config console log report syz C ci-upstream-linux-next-kasan-gce-root
2021/01/03 10:01 linux-next d7a03a44a5e9 79264ae3 .config console log report info ci-upstream-linux-next-kasan-gce-root
2020/12/31 11:36 linux-next d7a03a44a5e9 5cc121d6 .config console log report info ci-upstream-linux-next-kasan-gce-root
2020/12/31 10:26 linux-next d7a03a44a5e9 5cc121d6 .config console log report info ci-upstream-linux-next-kasan-gce-root
2020/12/31 06:02 linux-next d7a03a44a5e9 5cc121d6 .config console log report info ci-upstream-linux-next-kasan-gce-root
2020/12/31 05:15 linux-next d7a03a44a5e9 5cc121d6 .config console log report info ci-upstream-linux-next-kasan-gce-root
2020/12/30 17:47 linux-next d7a03a44a5e9 ecb8c012 .config console log report info ci-upstream-linux-next-kasan-gce-root
2020/12/30 13:23 linux-next d7a03a44a5e9 ecb8c012 .config console log report info ci-upstream-linux-next-kasan-gce-root
2020/12/30 09:24 linux-next d7a03a44a5e9 0fa352f2 .config console log report info ci-upstream-linux-next-kasan-gce-root
2020/12/30 00:45 linux-next d7a03a44a5e9 80910769 .config console log report info ci-upstream-linux-next-kasan-gce-root
2020/12/29 23:07 linux-next d7a03a44a5e9 80910769 .config console log report info ci-upstream-linux-next-kasan-gce-root
2020/12/28 19:34 linux-next d7a03a44a5e9 8259d56c .config console log report info ci-upstream-linux-next-kasan-gce-root
2020/12/28 15:05 linux-next d7a03a44a5e9 8259d56c .config console log report info ci-upstream-linux-next-kasan-gce-root
2020/12/27 19:18 linux-next d7a03a44a5e9 2242f77f .config console log report info ci-upstream-linux-next-kasan-gce-root
2020/12/27 15:14 linux-next d7a03a44a5e9 2242f77f .config console log report info ci-upstream-linux-next-kasan-gce-root
2020/12/25 14:10 linux-next d7a03a44a5e9 b982b3ea .config console log report info ci-upstream-linux-next-kasan-gce-root
2020/12/23 09:49 linux-next d7a03a44a5e9 04201c06 .config console log report info ci-upstream-linux-next-kasan-gce-root
* Struck through repros no longer work on HEAD.