syzbot


KASAN: slab-use-after-free Read in lockref_get

Status: upstream: reported C repro on 2024/07/16 02:02
Subsystems: wireless fs
[Documentation on labels]
Reported-by: syzbot+d5dc2801166df6d34774@syzkaller.appspotmail.com
First crash: 344d, last: 9d07h
Cause bisection: introduced by (bisect log) :
commit 0a3d898ee9a8303d5b3982b97ef0703919c3ea76
Author: Benjamin Berg <benjamin.berg@intel.com>
Date: Wed Dec 20 02:38:01 2023 +0000

  wifi: mac80211: add/remove driver debugfs entries as appropriate

Crash: KASAN: slab-use-after-free Read in lockref_get (log)
Repro: C syz .config
  
Fix bisection: the issue occurs on the latest tested release (bisect log)
  
Discussions (3)
Title Replies (including bot) Last reply
Managing debugfs entries and https://syzkaller.appspot.com/bug?extid=d5dc2801166df6d34774 2 (2) 2024/07/19 09:38
[syzbot] [fs?] KASAN: slab-use-after-free Read in lockref_get 8 (17) 2024/07/18 14:18
[PATCH] wifi: wireless: fix more UBSAN noise in cfg80211_conn_scan() 2 (2) 2024/07/16 18:21
Last patch testing requests (17)
Created Duration User Patch Repo Result
2025/04/30 14:10 23m retest repro net report log
2025/04/14 15:59 25m retest repro net-next report log
2025/04/14 15:59 31m retest repro net-next report log
2025/04/14 15:59 19m retest repro net-next report log
2025/04/14 15:19 14m retest repro upstream report log
2025/04/14 14:44 22m retest repro net report log
2025/03/18 19:42 31m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci report log
2025/03/18 19:42 27m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci report log
2025/01/26 10:45 17m retest repro net-next error
2025/01/26 10:45 18m retest repro net-next error
2024/07/18 10:40 1h35m hdanton@sina.com patch https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next.git 58f9416d413a OK log
2024/07/17 14:07 1h37m eadavis@qq.com patch git://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git 58f9416d413a OK log
2024/07/17 13:19 18m eadavis@qq.com patch git://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git 58f9416d413a report log
2024/07/17 11:39 1h09m eadavis@qq.com patch git://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git 58f9416d413a report log
2024/07/17 10:59 17m hdanton@sina.com patch https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next.git 58f9416d413a report log
2024/07/17 03:24 21m eadavis@qq.com patch git://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git 58f9416d413a report log
2024/07/16 11:20 1h13m hdanton@sina.com patch https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next.git 58f9416d413a report log

Sample crash report:
wlan1: authentication with 08:02:11:00:00:00 timed out
==================================================================
BUG: KASAN: slab-use-after-free in __lock_acquire+0x2d90/0x3c40 kernel/locking/lockdep.c:5091
Read of size 8 at addr ffff8880363b40d0 by task kworker/u32:1/13

CPU: 1 UID: 0 PID: 13 Comm: kworker/u32:1 Not tainted 6.14.0-rc7-syzkaller-00186-gd07de43e3f05 #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Workqueue: events_unbound cfg80211_wiphy_work
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:408 [inline]
 print_report+0xc3/0x670 mm/kasan/report.c:521
 kasan_report+0xd9/0x110 mm/kasan/report.c:634
 __lock_acquire+0x2d90/0x3c40 kernel/locking/lockdep.c:5091
 lock_acquire.part.0+0x11b/0x380 kernel/locking/lockdep.c:5851
 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
 _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
 spin_lock include/linux/spinlock.h:351 [inline]
 lockref_get+0x15/0x50 lib/lockref.c:50
 dget include/linux/dcache.h:352 [inline]
 simple_recursive_removal+0x45/0x8e0 fs/libfs.c:610
 debugfs_remove+0x5d/0x80 fs/debugfs/inode.c:805
 ieee80211_sta_debugfs_remove+0x38/0x80 net/mac80211/debugfs_sta.c:1284
 __sta_info_destroy_part2+0x32c/0x540 net/mac80211/sta_info.c:1508
 __sta_info_destroy net/mac80211/sta_info.c:1524 [inline]
 __sta_info_destroy net/mac80211/sta_info.c:1515 [inline]
 sta_info_destroy_addr+0x98/0x150 net/mac80211/sta_info.c:1536
 ieee80211_destroy_auth_data+0x173/0x300 net/mac80211/mlme.c:4414
 ieee80211_sta_work+0x2332/0x2ff0 net/mac80211/mlme.c:8020
 ieee80211_iface_work+0x4aa/0xf50 net/mac80211/iface.c:1685
 cfg80211_wiphy_work+0x3ed/0x570 net/wireless/core.c:435
 process_one_work+0x9c5/0x1ba0 kernel/workqueue.c:3238
 process_scheduled_works kernel/workqueue.c:3319 [inline]
 worker_thread+0x6c8/0xf00 kernel/workqueue.c:3400
 kthread+0x3af/0x750 kernel/kthread.c:464
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>

Allocated by task 64:
 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
 kasan_save_track+0x14/0x30 mm/kasan/common.c:68
 unpoison_slab_object mm/kasan/common.c:319 [inline]
 __kasan_slab_alloc+0x89/0x90 mm/kasan/common.c:345
 kasan_slab_alloc include/linux/kasan.h:250 [inline]
 slab_post_alloc_hook mm/slub.c:4115 [inline]
 slab_alloc_node mm/slub.c:4164 [inline]
 kmem_cache_alloc_lru_noprof+0x226/0x3d0 mm/slub.c:4183
 __d_alloc+0x31/0xaa0 fs/dcache.c:1664
 d_alloc+0x4a/0x1e0 fs/dcache.c:1743
 d_alloc_parallel+0xe7/0x12b0 fs/dcache.c:2507
 __lookup_slow+0x194/0x470 fs/namei.c:1778
 lookup_one_len+0x181/0x1b0 fs/namei.c:2907
 start_creating.part.0+0x12f/0x3a0 fs/debugfs/inode.c:391
 start_creating fs/debugfs/inode.c:364 [inline]
 debugfs_create_dir+0x6c/0x5f0 fs/debugfs/inode.c:586
 ieee80211_sta_debugfs_add+0x136/0x970 net/mac80211/debugfs_sta.c:1259
 sta_info_insert_finish net/mac80211/sta_info.c:899 [inline]
 sta_info_insert_rcu+0xd8f/0x1b70 net/mac80211/sta_info.c:967
 sta_info_insert+0x16/0xd0 net/mac80211/sta_info.c:972
 ieee80211_prep_connection+0x10eb/0x18b0 net/mac80211/mlme.c:8564
 ieee80211_mgd_auth+0xe14/0x1950 net/mac80211/mlme.c:8829
 rdev_auth net/wireless/rdev-ops.h:486 [inline]
 cfg80211_mlme_auth+0x565/0x990 net/wireless/mlme.c:291
 cfg80211_conn_do_work+0x65f/0xff0 net/wireless/sme.c:183
 cfg80211_conn_work+0x26b/0x3d0 net/wireless/sme.c:273
 process_one_work+0x9c5/0x1ba0 kernel/workqueue.c:3238
 process_scheduled_works kernel/workqueue.c:3319 [inline]
 worker_thread+0x6c8/0xf00 kernel/workqueue.c:3400
 kthread+0x3af/0x750 kernel/kthread.c:464
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

Freed by task 30:
 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
 kasan_save_track+0x14/0x30 mm/kasan/common.c:68
 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:576
 poison_slab_object mm/kasan/common.c:247 [inline]
 __kasan_slab_free+0x51/0x70 mm/kasan/common.c:264
 kasan_slab_free include/linux/kasan.h:233 [inline]
 slab_free_hook mm/slub.c:2353 [inline]
 slab_free mm/slub.c:4609 [inline]
 kmem_cache_free+0x2e2/0x4d0 mm/slub.c:4711
 rcu_do_batch kernel/rcu/tree.c:2546 [inline]
 rcu_core+0x79d/0x14d0 kernel/rcu/tree.c:2802
 handle_softirqs+0x213/0x8f0 kernel/softirq.c:561
 run_ksoftirqd kernel/softirq.c:950 [inline]
 run_ksoftirqd+0x3a/0x60 kernel/softirq.c:942
 smpboot_thread_fn+0x661/0xa30 kernel/smpboot.c:164
 kthread+0x3af/0x750 kernel/kthread.c:464
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

Last potentially related work creation:
 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
 kasan_record_aux_stack+0xb8/0xd0 mm/kasan/generic.c:548
 __call_rcu_common.constprop.0+0x9a/0x870 kernel/rcu/tree.c:3065
 dentry_free+0xc2/0x160 fs/dcache.c:416
 __dentry_kill+0x498/0x600 fs/dcache.c:662
 dput.part.0+0x4b1/0x9b0 fs/dcache.c:885
 dput+0x1f/0x30 fs/dcache.c:875
 find_next_child fs/libfs.c:603 [inline]
 simple_recursive_removal+0x28c/0x8e0 fs/libfs.c:618
 debugfs_remove+0x5d/0x80 fs/debugfs/inode.c:805
 ieee80211_debugfs_remove_netdev net/mac80211/debugfs_netdev.c:1021 [inline]
 ieee80211_debugfs_recreate_netdev+0xb6/0x17c0 net/mac80211/debugfs_netdev.c:1034
 drv_remove_interface+0x2bf/0x650 net/mac80211/driver-ops.c:125
 _ieee80211_change_mac net/mac80211/iface.c:277 [inline]
 ieee80211_change_mac+0xa50/0x1480 net/mac80211/iface.c:309
 dev_set_mac_address+0x301/0x4a0 net/core/dev.c:9515
 dev_set_mac_address_user+0x30/0x50 net/core/dev.c:9534
 dev_ifsioc+0xb8d/0x10d0 net/core/dev_ioctl.c:575
 dev_ioctl+0x224/0x10c0 net/core/dev_ioctl.c:826
 sock_do_ioctl+0x19e/0x280 net/socket.c:1213
 sock_ioctl+0x228/0x6c0 net/socket.c:1318
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:906 [inline]
 __se_sys_ioctl fs/ioctl.c:892 [inline]
 __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

The buggy address belongs to the object at ffff8880363b4000
 which belongs to the cache dentry of size 312
The buggy address is located 208 bytes inside of
 freed 312-byte region [ffff8880363b4000, ffff8880363b4138)

The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x363b4
head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff)
page_type: f5(slab)
raw: 00fff00000000040 ffff88801c2e3e00 dead000000000122 0000000000000000
raw: 0000000000000000 0000000000150015 00000000f5000000 0000000000000000
head: 00fff00000000040 ffff88801c2e3e00 dead000000000122 0000000000000000
head: 0000000000000000 0000000000150015 00000000f5000000 0000000000000000
head: 00fff00000000001 ffffea0000d8ed01 ffffffffffffffff 0000000000000000
head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 1, migratetype Reclaimable, gfp_mask 0xd20d0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_RECLAIMABLE), pid 64, tgid 64 (kworker/2:1), ts 48738899026, free_ts 0
 set_page_owner include/linux/page_owner.h:32 [inline]
 post_alloc_hook+0x181/0x1b0 mm/page_alloc.c:1551
 prep_new_page mm/page_alloc.c:1559 [inline]
 get_page_from_freelist+0xfce/0x2f80 mm/page_alloc.c:3477
 __alloc_frozen_pages_noprof+0x221/0x2470 mm/page_alloc.c:4740
 alloc_pages_mpol+0x1fc/0x540 mm/mempolicy.c:2270
 alloc_slab_page mm/slub.c:2423 [inline]
 allocate_slab mm/slub.c:2587 [inline]
 new_slab+0x23d/0x330 mm/slub.c:2640
 ___slab_alloc+0xc5d/0x1720 mm/slub.c:3826
 __slab_alloc.constprop.0+0x56/0xb0 mm/slub.c:3916
 __slab_alloc_node mm/slub.c:3991 [inline]
 slab_alloc_node mm/slub.c:4152 [inline]
 kmem_cache_alloc_lru_noprof+0xff/0x3d0 mm/slub.c:4183
 __d_alloc+0x31/0xaa0 fs/dcache.c:1664
 d_alloc+0x4a/0x1e0 fs/dcache.c:1743
 d_alloc_parallel+0xe7/0x12b0 fs/dcache.c:2507
 __lookup_slow+0x194/0x470 fs/namei.c:1778
 lookup_one_len+0x181/0x1b0 fs/namei.c:2907
 start_creating.part.0+0x12f/0x3a0 fs/debugfs/inode.c:391
 start_creating fs/debugfs/inode.c:364 [inline]
 debugfs_create_dir+0x6c/0x5f0 fs/debugfs/inode.c:586
 ieee80211_sta_debugfs_add+0x136/0x970 net/mac80211/debugfs_sta.c:1259
page_owner free stack trace missing

Memory state around the buggy address:
 ffff8880363b3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff8880363b4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
>ffff8880363b4080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                                                 ^
 ffff8880363b4100: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fa
 ffff8880363b4180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================

Crashes (21):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/03/21 20:58 upstream d07de43e3f05 c6512ef7 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream KASAN: slab-use-after-free Read in lockref_get
2024/12/12 09:55 net 15bfb14727bc ff949d25 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce KASAN: slab-use-after-free Read in lockref_get
2024/12/12 08:51 net 15bfb14727bc ff949d25 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce KASAN: slab-use-after-free Read in lockref_get
2024/07/16 06:16 net-next 58f9416d413a e8709b21 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci2-upstream-net-next-test-gce KASAN: slab-use-after-free Read in lockref_get
2024/07/16 04:14 net-next 58f9416d413a e8709b21 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci2-upstream-net-next-test-gce KASAN: slab-use-after-free Read in lockref_get
2024/07/16 02:01 net-next 58f9416d413a e8709b21 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci2-upstream-net-next-test-gce KASAN: slab-use-after-free Read in lockref_get
2025/02/26 02:23 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a1c24ab82279 d34966d1 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: slab-use-after-free Read in lockref_get
2025/02/25 03:26 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a1c24ab82279 d34966d1 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: slab-use-after-free Read in lockref_get
2025/05/07 22:56 upstream 707df3375124 dbf35fa1 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: slab-use-after-free Read in lockref_get
2025/03/31 14:23 upstream 4e82c87058f4 d3999433 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: slab-use-after-free Read in lockref_get
2025/03/30 08:04 upstream 93d52288679e d3999433 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: slab-use-after-free Read in lockref_get
2025/02/18 06:43 upstream 2408a807bfc3 429ea007 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: slab-use-after-free Read in lockref_get
2025/01/12 09:38 upstream b62cef9a5c67 6dbc6a9b .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: slab-use-after-free Read in lockref_get
2024/12/27 10:08 upstream d6ef8b40d075 d3ccff63 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: slab-use-after-free Read in lockref_get
2024/12/15 09:45 upstream 2d8308bf5b67 7cbfbb3a .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: slab-use-after-free Read in lockref_get
2024/06/07 02:07 net-next 749332814479 121701b6 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-net-next-test-gce KASAN: slab-use-after-free Read in lockref_get
2024/06/07 02:07 net-next 749332814479 121701b6 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-net-next-test-gce KASAN: slab-use-after-free Read in lockref_get
2024/12/26 02:21 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 573067a5a685 444551c4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: slab-use-after-free Read in lockref_get
2025/03/04 19:15 upstream 99fa936e8e4f c3901742 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: wild-memory-access Read in lockref_get
2025/03/04 14:17 upstream 99fa936e8e4f c3901742 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: wild-memory-access Read in lockref_get
2025/03/04 07:12 upstream 99fa936e8e4f c3901742 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: wild-memory-access Read in lockref_get
* Struck through repros no longer work on HEAD.