syzbot


KASAN: use-after-free Read in ceph_destroy_options

Status: upstream: reported syz repro on 2019/04/30 23:53
Reported-by: syzbot+d9a7c18769f25c93c630@syzkaller.appspotmail.com
First crash: 1793d, last: 1050d
Fix bisection: failed (error log, bisect log)
  
Similar bugs (1)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream KASAN: use-after-free Read in ceph_destroy_options ceph net 1 2044d 2043d 10/26 fixed on 2018/09/26 21:51
Last patch testing requests (2)
Created Duration User Patch Repo Result
2023/02/07 14:32 10m retest repro linux-4.14.y report log
2022/09/17 10:29 11m retest repro linux-4.14.y report log
Fix bisection attempts (7)
Created Duration User Patch Repo Result
2021/02/25 00:54 0m bisect fix linux-4.14.y error job log (0)
2021/02/11 18:53 0m bisect fix linux-4.14.y error job log (0)
2020/12/23 19:24 35m bisect fix linux-4.14.y job log (0) log
2020/11/15 05:43 27m bisect fix linux-4.14.y job log (0) log
2020/10/16 05:10 32m bisect fix linux-4.14.y job log (0) log
2020/09/16 04:41 29m bisect fix linux-4.14.y job log (0) log
2020/04/07 21:08 32m bisect fix linux-4.14.y job log (0) log

Sample crash report:
syz-executor.3: page allocation failure: order:5, mode:0x14040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null)
syz-executor.4: page allocation failure: order:5, mode:0x14040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null)
page allocation failure: order:5, mode:0x14040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null)
syz-executor.4: page allocation failure: order:5, mode:0x14040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null)
==================================================================
BUG: KASAN: use-after-free in ceph_destroy_options+0xe9/0x110 net/ceph/ceph_common.c:283
Read of size 8 at addr ffff888087aaf290 by task syz-executor.1/10204

CPU: 1 PID: 10204 Comm: syz-executor.1 Not tainted 4.14.114 #4
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x138/0x19c lib/dump_stack.c:53
 print_address_description.cold+0x7c/0x1dc mm/kasan/report.c:252
 kasan_report_error mm/kasan/report.c:351 [inline]
 kasan_report mm/kasan/report.c:409 [inline]
 kasan_report.cold+0xaf/0x2b5 mm/kasan/report.c:393
 __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:430
 ceph_destroy_options+0xe9/0x110 net/ceph/ceph_common.c:283
 ceph_mount+0xb6d/0x1709 fs/ceph/super.c:1002
 mount_fs+0x9d/0x2a7 fs/super.c:1237
 vfs_kern_mount.part.0+0x5e/0x3d0 fs/namespace.c:1046
 vfs_kern_mount fs/namespace.c:1036 [inline]
 do_new_mount fs/namespace.c:2549 [inline]
 do_mount+0x417/0x27d0 fs/namespace.c:2879
 SYSC_mount fs/namespace.c:3095 [inline]
 SyS_mount+0xab/0x120 fs/namespace.c:3072
 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x458da9
RSP: 002b:00007f6977eedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458da9
RDX: 0000000020000100 RSI: 0000000020000200 RDI: 0000000020000040
RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6977eee6d4
R13: 00000000004c4da1 R14: 00000000004d8a08 R15: 00000000ffffffff

Allocated by task 10204:
 save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:59
 save_stack+0x45/0xd0 mm/kasan/kasan.c:447
 set_track mm/kasan/kasan.c:459 [inline]
 kasan_kmalloc mm/kasan/kasan.c:551 [inline]
 kasan_kmalloc+0xce/0xf0 mm/kasan/kasan.c:529
 kmem_cache_alloc_trace+0x152/0x790 mm/slab.c:3618
 kmalloc include/linux/slab.h:488 [inline]
 kzalloc include/linux/slab.h:661 [inline]
 ceph_parse_options+0xb8/0xe90 net/ceph/ceph_common.c:349
 parse_mount_options fs/ceph/super.c:466 [inline]
 ceph_mount+0x3c1/0x1709 fs/ceph/super.c:991
 mount_fs+0x9d/0x2a7 fs/super.c:1237
 vfs_kern_mount.part.0+0x5e/0x3d0 fs/namespace.c:1046
 vfs_kern_mount fs/namespace.c:1036 [inline]
 do_new_mount fs/namespace.c:2549 [inline]
 do_mount+0x417/0x27d0 fs/namespace.c:2879
 SYSC_mount fs/namespace.c:3095 [inline]
 SyS_mount+0xab/0x120 fs/namespace.c:3072
 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
 entry_SYSCALL_64_after_hwframe+0x42/0xb7

Freed by task 10204:
 save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:59
 save_stack+0x45/0xd0 mm/kasan/kasan.c:447
 set_track mm/kasan/kasan.c:459 [inline]
 kasan_slab_free+0x75/0xc0 mm/kasan/kasan.c:524
 __cache_free mm/slab.c:3496 [inline]
 kfree+0xcc/0x270 mm/slab.c:3815
 ceph_destroy_options+0xdc/0x110 net/ceph/ceph_common.c:289
 ceph_destroy_client+0x9d/0xc0 net/ceph/ceph_common.c:671
 create_fs_client fs/ceph/super.c:649 [inline]
 ceph_mount+0xb46/0x1709 fs/ceph/super.c:998
 mount_fs+0x9d/0x2a7 fs/super.c:1237
 vfs_kern_mount.part.0+0x5e/0x3d0 fs/namespace.c:1046
 vfs_kern_mount fs/namespace.c:1036 [inline]
 do_new_mount fs/namespace.c:2549 [inline]
 do_mount+0x417/0x27d0 fs/namespace.c:2879
 SYSC_mount fs/namespace.c:3095 [inline]
 SyS_mount+0xab/0x120 fs/namespace.c:3072
 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
 entry_SYSCALL_64_after_hwframe+0x42/0xb7

The buggy address belongs to the object at ffff888087aaf1c0
 which belongs to the cache kmalloc-256 of size 256
The buggy address is located 208 bytes inside of
 256-byte region [ffff888087aaf1c0, ffff888087aaf2c0)
The buggy address belongs to the page:
page:ffffea00021eabc0 count:1 mapcount:0 mapping:ffff888087aaf080 index:0x0
flags: 0x1fffc0000000100(slab)
raw: 01fffc0000000100 ffff888087aaf080 0000000000000000 000000010000000c
raw: ffffea00024c4260 ffffea0001488460 ffff8880aa8007c0 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff888087aaf180: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb
 ffff888087aaf200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
>ffff888087aaf280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
                         ^
 ffff888087aaf300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 ffff888087aaf380: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
==================================================================
==================================================================
BUG: KASAN: double-free or invalid-free in ceph_destroy_options+0xd4/0x110 net/ceph/ceph_common.c:288

CPU: 0 PID: 9986 Comm: syz-executor.0 Tainted: G    B           4.14.114 #4
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x138/0x19c lib/dump_stack.c:53
 print_address_description.cold+0x7c/0x1dc mm/kasan/report.c:252
 kasan_report_double_free+0x56/0x80 mm/kasan/report.c:333
 kasan_slab_free+0xa7/0xc0 mm/kasan/kasan.c:514
 __cache_free mm/slab.c:3496 [inline]
 kfree+0xcc/0x270 mm/slab.c:3815
 ceph_destroy_options+0xd4/0x110 net/ceph/ceph_common.c:288
 ceph_mount+0xb6d/0x1709 fs/ceph/super.c:1002
 mount_fs+0x9d/0x2a7 fs/super.c:1237
 vfs_kern_mount.part.0+0x5e/0x3d0 fs/namespace.c:1046
 vfs_kern_mount fs/namespace.c:1036 [inline]
 do_new_mount fs/namespace.c:2549 [inline]
 do_mount+0x417/0x27d0 fs/namespace.c:2879
 SYSC_mount fs/namespace.c:3095 [inline]
 SyS_mount+0xab/0x120 fs/namespace.c:3072
 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x458da9
RSP: 002b:00007f3ae1dcfc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458da9
RDX: 0000000020000100 RSI: 0000000020000200 RDI: 0000000020000040
RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ae1dd06d4
R13: 00000000004c4da1 R14: 00000000004d8a08 R15: 00000000ffffffff

Allocated by task 9986:
 save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:59
 save_stack+0x45/0xd0 mm/kasan/kasan.c:447
 set_track mm/kasan/kasan.c:459 [inline]
 kasan_kmalloc mm/kasan/kasan.c:551 [inline]
 kasan_kmalloc+0xce/0xf0 mm/kasan/kasan.c:529
 kmem_cache_alloc_trace+0x152/0x790 mm/slab.c:3618
 kmalloc include/linux/slab.h:488 [inline]
 kmalloc_array include/linux/slab.h:606 [inline]
 kcalloc include/linux/slab.h:618 [inline]
 ceph_parse_options+0xfe/0xe90 net/ceph/ceph_common.c:352
 parse_mount_options fs/ceph/super.c:466 [inline]
 ceph_mount+0x3c1/0x1709 fs/ceph/super.c:991
 mount_fs+0x9d/0x2a7 fs/super.c:1237
 vfs_kern_mount.part.0+0x5e/0x3d0 fs/namespace.c:1046
 vfs_kern_mount fs/namespace.c:1036 [inline]
 do_new_mount fs/namespace.c:2549 [inline]
 do_mount+0x417/0x27d0 fs/namespace.c:2879
 SYSC_mount fs/namespace.c:3095 [inline]
 SyS_mount+0xab/0x120 fs/namespace.c:3072
 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
 entry_SYSCALL_64_after_hwframe+0x42/0xb7

Freed by task 9986:
 save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:59
 save_stack+0x45/0xd0 mm/kasan/kasan.c:447
 set_track mm/kasan/kasan.c:459 [inline]
 kasan_slab_free+0x75/0xc0 mm/kasan/kasan.c:524
 __cache_free mm/slab.c:3496 [inline]
 kfree+0xcc/0x270 mm/slab.c:3815
 ceph_destroy_options+0xd4/0x110 net/ceph/ceph_common.c:288
 ceph_destroy_client+0x9d/0xc0 net/ceph/ceph_common.c:671
 create_fs_client fs/ceph/super.c:649 [inline]
 ceph_mount+0xb46/0x1709 fs/ceph/super.c:998
 mount_fs+0x9d/0x2a7 fs/super.c:1237
 vfs_kern_mount.part.0+0x5e/0x3d0 fs/namespace.c:1046
 vfs_kern_mount fs/namespace.c:1036 [inline]
 do_new_mount fs/namespace.c:2549 [inline]
 do_mount+0x417/0x27d0 fs/namespace.c:2879
 SYSC_mount fs/namespace.c:3095 [inline]
 SyS_mount+0xab/0x120 fs/namespace.c:3072
 do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
 entry_SYSCALL_64_after_hwframe+0x42/0xb7

The buggy address belongs to the object at ffff8881cdf40e00
 which belongs to the cache kmalloc-8192 of size 8192
The buggy address is located 0 bytes inside of
 8192-byte region [ffff8881cdf40e00, ffff8881cdf42e00)
The buggy address belongs to the page:
page:ffffea000737d000 count:1 mapcount:0 mapping:ffff8881cdf40e00 index:0x0 compound_mapcount: 0
flags: 0x6fffc0000008100(slab|head)
raw: 06fffc0000008100 ffff8881cdf40e00 0000000000000000 0000000100000001
raw: ffffea0007669120 ffffea00071f5220 ffff8880aa802080 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff8881cdf40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff8881cdf40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
>ffff8881cdf40e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                   ^
 ffff8881cdf40e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff8881cdf40f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================

Crashes (55):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2019/04/30 22:52 linux-4.14.y fa5941f45d7e 618456b4 .config console log report syz ci2-linux-4-14
2021/05/12 21:29 linux-4.14.y 7d7d1c0ab3eb ed7d41c5 .config console log report info ci2-linux-4-14 KASAN: use-after-free Read in ceph_destroy_options
2021/04/24 02:15 linux-4.14.y cf256fbcbe34 17f0b706 .config console log report info ci2-linux-4-14 KASAN: use-after-free Read in ceph_destroy_options
2021/01/12 18:11 linux-4.14.y ec822b3e8bf4 2c1f2513 .config console log report info ci2-linux-4-14
2021/01/10 08:51 linux-4.14.y ec822b3e8bf4 2c1f2513 .config console log report info ci2-linux-4-14
2020/11/23 19:24 linux-4.14.y 0df445b0f0da 878fb17a .config console log report info ci2-linux-4-14
2020/11/19 10:30 linux-4.14.y 8961076ed318 0767f13f .config console log report info ci2-linux-4-14
2020/08/17 04:41 linux-4.14.y 14b58326976d 5ce13532 .config console log report ci2-linux-4-14
2020/08/14 19:12 linux-4.14.y 14b58326976d 5ce13532 .config console log report ci2-linux-4-14
2020/08/14 16:20 linux-4.14.y 14b58326976d 5ce13532 .config console log report ci2-linux-4-14
2020/07/27 17:14 linux-4.14.y 69b94dd6dcd1 cb93dc6a .config console log report ci2-linux-4-14
2020/07/23 14:28 linux-4.14.y 69b94dd6dcd1 340ea530 .config console log report ci2-linux-4-14
2020/07/02 19:15 linux-4.14.y b850307b279c f30c14bf .config console log report ci2-linux-4-14
2020/06/19 18:57 linux-4.14.y b850307b279c 123cf502 .config console log report ci2-linux-4-14
2020/06/19 13:13 linux-4.14.y b850307b279c bc258b50 .config console log report ci2-linux-4-14
2020/06/18 22:45 linux-4.14.y b850307b279c 3ea11d3f .config console log report ci2-linux-4-14
2020/06/16 18:13 linux-4.14.y b850307b279c 4ea9d964 .config console log report ci2-linux-4-14
2020/06/15 09:35 linux-4.14.y b850307b279c 8e3ab941 .config console log report ci2-linux-4-14
2020/06/14 23:25 linux-4.14.y b850307b279c 2a22c77a .config console log report ci2-linux-4-14
2020/06/12 01:40 linux-4.14.y b850307b279c 1beaee21 .config console log report ci2-linux-4-14
2020/06/06 08:49 linux-4.14.y c6db52a88798 c3e9afb3 .config console log report ci2-linux-4-14
2020/05/21 04:28 linux-4.14.y a41ba30d9df2 4afdfa20 .config console log report ci2-linux-4-14
2020/05/19 18:30 linux-4.14.y ab9dfda23248 6d882fd2 .config console log report ci2-linux-4-14
2020/05/16 07:53 linux-4.14.y ab9dfda23248 37bccd4e .config console log report ci2-linux-4-14
2020/05/16 07:53 linux-4.14.y ab9dfda23248 37bccd4e .config console log report ci2-linux-4-14
2020/05/16 01:15 linux-4.14.y ab9dfda23248 37bccd4e .config console log report ci2-linux-4-14
2020/05/15 03:54 linux-4.14.y ab9dfda23248 2d572622 .config console log report ci2-linux-4-14
2020/05/02 05:43 linux-4.14.y 050272a0423e bc734e7a .config console log report ci2-linux-4-14
2020/04/24 10:27 linux-4.14.y 050272a0423e 03d97a1b .config console log report ci2-linux-4-14
2020/03/08 21:08 linux-4.14.y 78d697fc93f9 2e9971bb .config console log report ci2-linux-4-14
2020/03/01 14:24 linux-4.14.y 78d697fc93f9 c88c7b75 .config console log report ci2-linux-4-14
2020/02/28 07:13 linux-4.14.y 98db2bf27b9e c88c7b75 .config console log report ci2-linux-4-14
2020/02/27 03:39 linux-4.14.y 98db2bf27b9e 251aabb7 .config console log report ci2-linux-4-14
2020/02/23 16:56 linux-4.14.y 98db2bf27b9e 2c36e7a7 .config console log report ci2-linux-4-14
2020/02/09 00:52 linux-4.14.y e0f8b8a65a47 06150bf1 .config console log report ci2-linux-4-14
2020/02/08 11:31 linux-4.14.y e0f8b8a65a47 06150bf1 .config console log report ci2-linux-4-14
2020/02/01 14:02 linux-4.14.y 9fa690a2a016 326d4c78 .config console log report ci2-linux-4-14
2020/01/24 12:30 linux-4.14.y 8bac50406cca 2e95ab33 .config console log report ci2-linux-4-14
2020/01/02 18:59 linux-4.14.y 4c5bf01e16a7 25a0186e .config console log report ci2-linux-4-14
2019/12/23 09:40 linux-4.14.y e1f7d50ae3a3 8b967267 .config console log report ci2-linux-4-14
2019/12/18 15:24 linux-4.14.y bfb9e5c03076 64ca0a37 .config console log report ci2-linux-4-14
2019/12/17 13:58 linux-4.14.y a844dc4c5442 d13d7958 .config console log report ci2-linux-4-14
2019/12/13 22:13 linux-4.14.y a844dc4c5442 a5c1ab05 .config console log report ci2-linux-4-14
2019/12/07 08:25 linux-4.14.y a844dc4c5442 85f26751 .config console log report ci2-linux-4-14
2019/11/30 13:49 linux-4.14.y 43598c571e7e 3a75be00 .config console log report ci2-linux-4-14
2019/11/24 22:20 linux-4.14.y 43598c571e7e 598ca6c8 .config console log report ci2-linux-4-14
2019/11/18 00:48 linux-4.14.y 775d01b65b5d d5696d51 .config console log report ci2-linux-4-14
2019/11/12 18:59 linux-4.14.y 4762bcd451a9 048f2d49 .config console log report ci2-linux-4-14
2019/11/01 04:36 linux-4.14.y ddef1e8e3f6e a41ca8fa .config console log report ci2-linux-4-14
2019/10/28 02:27 linux-4.14.y b98aebd29824 25bb509e .config console log report ci2-linux-4-14
2019/08/30 20:55 linux-4.14.y 01fd1694b93c 9adfa876 .config console log report ci2-linux-4-14
2019/08/08 22:27 linux-4.14.y b19ffe6e7205 bcc419e9 .config console log report ci2-linux-4-14
2019/08/04 23:22 linux-4.14.y 7d80e1218adf 6affd8e8 .config console log report ci2-linux-4-14
2019/08/02 10:06 linux-4.14.y 10d6aa565d05 835dffe7 .config console log report ci2-linux-4-14
2019/06/10 16:20 linux-4.14.y e6a95d8851f1 0159583c .config console log report ci2-linux-4-14
* Struck through repros no longer work on HEAD.