syzbot


KASAN: use-after-free Read in vma_interval_tree_augment_rotate (2)

Status: premoderation: reported on 2025/05/01 03:29
Reported-by: syzbot+e5fdc967ab78801cbb7c@syzkaller.appspotmail.com
First crash: 9d01h, last: 9d01h
Similar bugs (1)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-5-15 KASAN: use-after-free Read in vma_interval_tree_augment_rotate 2 438d 440d 0/2 auto-obsoleted due to no activity on 2024/05/26 05:21

Sample crash report:
==================================================================
BUG: KASAN: use-after-free in vma_pages include/linux/mm.h:2827 [inline]
BUG: KASAN: use-after-free in vma_last_pgoff mm/interval_tree.c:20 [inline]
BUG: KASAN: use-after-free in vma_interval_tree_augment_compute_max mm/interval_tree.c:23 [inline]
BUG: KASAN: use-after-free in vma_interval_tree_augment_rotate+0xb6/0x1f0 mm/interval_tree.c:23
Read of size 8 at addr ffff8881bfffffb0 by task syz-executor/9311

CPU: 0 PID: 9311 Comm: syz-executor Tainted: G        W         5.15.180-syzkaller-00024-g88c4075c39ed #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
Call Trace:
 <TASK>
 __dump_stack+0x21/0x30 lib/dump_stack.c:88
 dump_stack_lvl+0xee/0x150 lib/dump_stack.c:106
 print_address_description+0x7f/0x2c0 mm/kasan/report.c:248
 __kasan_report mm/kasan/report.c:427 [inline]
 kasan_report+0xf1/0x140 mm/kasan/report.c:444
 __asan_report_load8_noabort+0x14/0x20 mm/kasan/report_generic.c:309
 vma_pages include/linux/mm.h:2827 [inline]
 vma_last_pgoff mm/interval_tree.c:20 [inline]
 vma_interval_tree_augment_compute_max mm/interval_tree.c:23 [inline]
 vma_interval_tree_augment_rotate+0xb6/0x1f0 mm/interval_tree.c:23
 __rb_insert include/linux/rbtree_augmented.h:-1 [inline]
 __rb_insert_augmented+0x6df/0x720 lib/rbtree.c:459
 rb_insert_augmented include/linux/rbtree_augmented.h:50 [inline]
 vma_interval_tree_insert_after+0x2a1/0x2b0 mm/interval_tree.c:57
 dup_mmap kernel/fork.c:632 [inline]
 dup_mm kernel/fork.c:1522 [inline]
 copy_mm+0xb1a/0x1390 kernel/fork.c:1574
 copy_process+0x1159/0x3250 kernel/fork.c:2263
 kernel_clone+0x23f/0x940 kernel/fork.c:2661
 __do_sys_clone kernel/fork.c:2787 [inline]
 __se_sys_clone kernel/fork.c:2771 [inline]
 __x64_sys_clone+0x176/0x1d0 kernel/fork.c:2771
 x64_sys_call+0x41f/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:57
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7f30e2edc1d3
Code: 1f 84 00 00 00 00 00 64 48 8b 04 25 10 00 00 00 45 31 c0 31 d2 31 f6 bf 11 00 20 01 4c 8d 90 d0 02 00 00 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 89 c2 85 c0 75 2c 64 48 8b 04 25 10 00 00
RSP: 002b:00007ffdf86f0918 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f30e2edc1d3
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001
R10: 00005555574477d0 R11: 0000000000000246 R12: 0000000000000001
R13: 00000000000927c0 R14: 00000000000662bb R15: 00007ffdf86f0ab0
 </TASK>

The buggy address belongs to the page:
page:ffffea0006ffffc0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1bffff
flags: 0x4000000000000000(zone=1)
raw: 4000000000000000 ffffea00070b0008 ffffea0006ffff88 0000000000000000
raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x506dc2(GFP_HIGHUSER|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_ZERO|__GFP_ACCOUNT), pid 8897, ts 386102595490, free_ts 417545477611
 set_page_owner include/linux/page_owner.h:33 [inline]
 post_alloc_hook+0x192/0x1b0 mm/page_alloc.c:2605
 prep_new_page+0x1c/0x110 mm/page_alloc.c:2611
 get_page_from_freelist+0x2cc5/0x2d50 mm/page_alloc.c:4485
 __alloc_pages+0x18f/0x440 mm/page_alloc.c:5781
 vm_area_alloc_pages mm/vmalloc.c:-1 [inline]
 __vmalloc_area_node mm/vmalloc.c:2956 [inline]
 __vmalloc_node_range+0x440/0x840 mm/vmalloc.c:3087
 __bpf_map_area_alloc kernel/bpf/syscall.c:328 [inline]
 bpf_map_area_alloc+0xd5/0xe0 kernel/bpf/syscall.c:335
 prealloc_init kernel/bpf/hashtab.c:323 [inline]
 htab_map_alloc+0xb29/0x14f0 kernel/bpf/hashtab.c:554
 find_and_alloc_map kernel/bpf/syscall.c:129 [inline]
 map_create+0x455/0x21b0 kernel/bpf/syscall.c:857
 __sys_bpf+0x2cf/0x730 kernel/bpf/syscall.c:4612
 __do_sys_bpf kernel/bpf/syscall.c:4734 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:4732 [inline]
 __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:4732
 x64_sys_call+0x4b9/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:322
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x66/0xd0
page last free stack trace:
 reset_page_owner include/linux/page_owner.h:26 [inline]
 free_pages_prepare mm/page_alloc.c:1472 [inline]
 free_pcp_prepare mm/page_alloc.c:1544 [inline]
 free_unref_page_prepare+0x542/0x550 mm/page_alloc.c:3534
 free_unref_page+0xa2/0x550 mm/page_alloc.c:3616
 free_the_page mm/page_alloc.c:805 [inline]
 __free_pages+0x6c/0x100 mm/page_alloc.c:5857
 __vunmap+0x84d/0x9e0 mm/vmalloc.c:2652
 __vfree mm/vmalloc.c:2701 [inline]
 vfree+0x8b/0xc0 mm/vmalloc.c:2732
 kvfree+0x26/0x40 mm/util.c:662
 bpf_map_area_free+0x15/0x20 kernel/bpf/syscall.c:345
 htab_free_elems kernel/bpf/hashtab.c:286 [inline]
 prealloc_init kernel/bpf/hashtab.c:370 [inline]
 htab_map_alloc+0x10a0/0x14f0 kernel/bpf/hashtab.c:554
 find_and_alloc_map kernel/bpf/syscall.c:129 [inline]
 map_create+0x455/0x21b0 kernel/bpf/syscall.c:857
 __sys_bpf+0x2cf/0x730 kernel/bpf/syscall.c:4612
 __do_sys_bpf kernel/bpf/syscall.c:4734 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:4732 [inline]
 __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:4732
 x64_sys_call+0x4b9/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:322
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x66/0xd0

Memory state around the buggy address:
 ffff8881bffffe80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
 ffff8881bfffff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
>ffff8881bfffff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                     ^
 ffff8881c0000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 ffff8881c0000080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
==================================================================

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/05/01 03:28 android13-5.15-lts 88c4075c39ed ce7952f4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-15-perf KASAN: use-after-free Read in vma_interval_tree_augment_rotate
* Struck through repros no longer work on HEAD.