syzbot


KASAN: slab-out-of-bounds Write in tcf_queue_work

Status: auto-closed as invalid on 2020/07/18 11:59
Reported-by: syzbot+ce592d1424bb95d8d938@syzkaller.appspotmail.com
First crash: 1497d, last: 1497d

Sample crash report:
device veth1_macvtap left promiscuous mode
device veth0_macvtap left promiscuous mode
device veth1_vlan left promiscuous mode
device veth0_vlan left promiscuous mode
==================================================================
BUG: KASAN: slab-out-of-bounds in __lockdep_init_map+0x529/0x5a0 kernel/locking/lockdep.c:3179
Write of size 8 at addr ffff888098f2fb90 by task kworker/u4:7/20604

CPU: 0 PID: 20604 Comm: kworker/u4:7 Not tainted 4.19.112-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: netns cleanup_net
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x188/0x20d lib/dump_stack.c:118
 print_address_description.cold+0x7c/0x212 mm/kasan/report.c:256
 kasan_report_error mm/kasan/report.c:354 [inline]
 kasan_report mm/kasan/report.c:412 [inline]
 kasan_report.cold+0x88/0x2b9 mm/kasan/report.c:396
 __lockdep_init_map+0x529/0x5a0 kernel/locking/lockdep.c:3179
 tcf_queue_work+0x5b/0xf0 net/sched/cls_api.c:137
 route4_queue_work net/sched/cls_route.c:276 [inline]
 route4_destroy+0x4a9/0x7e0 net/sched/cls_route.c:302
 tcf_proto_destroy+0x5d/0xe0 net/sched/cls_api.c:190
 tcf_chain_flush+0x1ed/0x330 net/sched/cls_api.c:362
 tcf_block_put_ext.part.0+0x418/0x9a0 net/sched/cls_api.c:770
 tcf_block_put_ext net/sched/cls_api.c:754 [inline]
 tcf_block_put+0xad/0xf8 net/sched/cls_api.c:797
 hfsc_destroy_qdisc+0xe0/0x280 net/sched/sch_hfsc.c:1509
 qdisc_destroy+0x17c/0x6b0 net/sched/sch_generic.c:982
 dev_shutdown+0x2b5/0x47a net/sched/sch_generic.c:1300
 rollback_registered_many+0x64a/0xc40 net/core/dev.c:8173
 unregister_netdevice_many.part.0+0x16/0x1e0 net/core/dev.c:9294
 unregister_netdevice_many net/core/dev.c:9293 [inline]
 default_device_exit_batch+0x2ff/0x3c0 net/core/dev.c:9765
 ops_exit_list.isra.0+0xef/0x140 net/core/net_namespace.c:156
 cleanup_net+0x3bf/0x850 net/core/net_namespace.c:553
 process_one_work+0x91f/0x1640 kernel/workqueue.c:2155
 worker_thread+0x96/0xe20 kernel/workqueue.c:2298
 kthread+0x34a/0x420 kernel/kthread.c:246
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

Allocated by task 30470:
 set_track mm/kasan/kasan.c:460 [inline]
 kasan_kmalloc mm/kasan/kasan.c:553 [inline]
 kasan_kmalloc+0xbf/0xe0 mm/kasan/kasan.c:531
 __do_kmalloc mm/slab.c:3727 [inline]
 __kmalloc+0x15b/0x770 mm/slab.c:3736
 kmalloc include/linux/slab.h:520 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 crypto_create_tfm+0x79/0x2f0 crypto/api.c:463
 crypto_spawn_tfm2+0x5c/0xb0 crypto/algapi.c:709
 crypto_spawn_ahash include/crypto/internal/hash.h:189 [inline]
 crypto_authenc_init_tfm+0x3f/0x290 crypto/authenc.c:332
 crypto_aead_init_tfm+0x138/0x1a0 crypto/aead.c:113
 crypto_create_tfm+0xd5/0x2f0 crypto/api.c:470
 crypto_alloc_tfm+0xff/0x2d0 crypto/api.c:542
 esp_init_authenc+0x1d5/0x8c0 net/ipv6/esp6.c:818
 esp6_init_state+0x309/0x3a0 net/ipv6/esp6.c:890
 __xfrm_init_state+0x55c/0xf20 net/xfrm/xfrm_state.c:2314
 xfrm_state_construct net/xfrm/xfrm_user.c:625 [inline]
 xfrm_add_sa+0x1f8a/0x3527 net/xfrm/xfrm_user.c:682
 xfrm_user_rcv_msg+0x40c/0x6b0 net/xfrm/xfrm_user.c:2677
 netlink_rcv_skb+0x160/0x410 net/netlink/af_netlink.c:2455
 xfrm_netlink_rcv+0x6b/0x90 net/xfrm/xfrm_user.c:2685
 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline]
 netlink_unicast+0x4d7/0x6a0 net/netlink/af_netlink.c:1344
 netlink_sendmsg+0x80b/0xcd0 net/netlink/af_netlink.c:1909
 sock_sendmsg_nosec net/socket.c:622 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:632
 sock_no_sendpage+0xf8/0x140 net/core/sock.c:2645
 kernel_sendpage+0x82/0xd0 net/socket.c:3378
 sock_sendpage+0x84/0xa0 net/socket.c:847
 pipe_to_sendpage+0x263/0x320 fs/splice.c:452
 splice_from_pipe_feed fs/splice.c:503 [inline]
 __splice_from_pipe+0x38f/0x7a0 fs/splice.c:627
 splice_from_pipe+0xd9/0x140 fs/splice.c:662
 do_splice_from fs/splice.c:852 [inline]
 do_splice+0x5ea/0x1250 fs/splice.c:1154
 __do_sys_splice fs/splice.c:1428 [inline]
 __se_sys_splice fs/splice.c:1408 [inline]
 __x64_sys_splice+0x2b5/0x320 fs/splice.c:1408
 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe

Freed by task 23:
 set_track mm/kasan/kasan.c:460 [inline]
 __kasan_slab_free+0xf7/0x140 mm/kasan/kasan.c:521
 __cache_free mm/slab.c:3503 [inline]
 kfree+0xce/0x220 mm/slab.c:3822
 route4_delete_filter_work+0x17/0x20 net/sched/cls_route.c:270
 process_one_work+0x91f/0x1640 kernel/workqueue.c:2155
 worker_thread+0x96/0xe20 kernel/workqueue.c:2298
 kthread+0x34a/0x420 kernel/kthread.c:246
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

The buggy address belongs to the object at ffff888098f2fb00
 which belongs to the cache kmalloc-192 of size 192
The buggy address is located 144 bytes inside of
 192-byte region [ffff888098f2fb00, ffff888098f2fbc0)
The buggy address belongs to the page:
page:ffffea000263cbc0 count:1 mapcount:0 mapping:ffff88812c3dc040 index:0x0
flags: 0xfffe0000000100(slab)
raw: 00fffe0000000100 ffffea0002955548 ffffea00023c2008 ffff88812c3dc040
raw: 0000000000000000 ffff888098f2f000 0000000100000010 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff888098f2fa80: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff888098f2fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>ffff888098f2fb80: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
                         ^
 ffff888098f2fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 ffff888098f2fc80: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc
==================================================================

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2020/03/20 11:58 linux-4.19.y 14cfdbd39e31 2c31c529 .config console log report ci2-linux-4-19
* Struck through repros no longer work on HEAD.