linux-bluetooth.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [syzbot] [bluetooth?] memory leak in prepare_creds (4)
@ 2023-09-29 13:08 syzbot
  2023-11-08  7:31 ` syzbot
  0 siblings, 1 reply; 2+ messages in thread
From: syzbot @ 2023-09-29 13:08 UTC (permalink / raw)
  To: johan.hedberg, linux-bluetooth, linux-kernel, luiz.dentz, marcel,
	syzkaller-bugs

Hello,

syzbot found the following issue on:

HEAD commit:    6465e260f487 Linux 6.6-rc3
git tree:       upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=11b402cc680000
kernel config:  https://syzkaller.appspot.com/x/.config?x=aa96152f5a3192e3
dashboard link: https://syzkaller.appspot.com/bug?extid=2a478080bd86d36bb5ea
compiler:       gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40
syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=11d97bd4680000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/8d4a973843e8/disk-6465e260.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/7d5718938500/vmlinux-6465e260.xz
kernel image: https://storage.googleapis.com/syzbot-assets/409606a5d458/bzImage-6465e260.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+2a478080bd86d36bb5ea@syzkaller.appspotmail.com

BUG: memory leak
unreferenced object 0xffff888120320240 (size 192):
  comm "syz-executor.1", pid 5087, jiffies 4294976980 (age 8.630s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff812deb3b>] prepare_creds+0x2b/0x460 kernel/cred.c:263
    [<ffffffff812df934>] copy_creds+0x44/0x2c0 kernel/cred.c:368
    [<ffffffff81290f0a>] copy_process+0x6aa/0x2570 kernel/fork.c:2361
    [<ffffffff81292f7b>] kernel_clone+0x11b/0x690 kernel/fork.c:2909
    [<ffffffff8129356c>] __do_sys_clone+0x7c/0xb0 kernel/fork.c:3052
    [<ffffffff84b32fc8>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [<ffffffff84b32fc8>] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
    [<ffffffff84c0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff8881009e7dc0 (size 16):
  comm "syz-executor.1", pid 5087, jiffies 4294976980 (age 8.630s)
  hex dump (first 16 bytes):
    00 00 00 00 00 00 00 00 a8 dd 07 00 81 88 ff ff  ................
  backtrace:
    [<ffffffff815748bb>] __do_kmalloc_node mm/slab_common.c:1022 [inline]
    [<ffffffff815748bb>] __kmalloc+0x4b/0x150 mm/slab_common.c:1036
    [<ffffffff82349a61>] kmalloc include/linux/slab.h:603 [inline]
    [<ffffffff82349a61>] kzalloc include/linux/slab.h:720 [inline]
    [<ffffffff82349a61>] lsm_cred_alloc security/security.c:577 [inline]
    [<ffffffff82349a61>] security_prepare_creds+0x121/0x140 security/security.c:2950
    [<ffffffff812dedec>] prepare_creds+0x2dc/0x460 kernel/cred.c:294
    [<ffffffff812df934>] copy_creds+0x44/0x2c0 kernel/cred.c:368
    [<ffffffff81290f0a>] copy_process+0x6aa/0x2570 kernel/fork.c:2361
    [<ffffffff81292f7b>] kernel_clone+0x11b/0x690 kernel/fork.c:2909
    [<ffffffff8129356c>] __do_sys_clone+0x7c/0xb0 kernel/fork.c:3052
    [<ffffffff84b32fc8>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [<ffffffff84b32fc8>] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
    [<ffffffff84c0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff88812014a7e0 (size 96):
  comm "kworker/0:5", pid 5153, jiffies 4294977028 (age 8.150s)
  hex dump (first 32 bytes):
    fa 50 25 82 2e 06 06 00 00 00 00 00 00 00 00 00  .P%.............
    00 00 00 00 00 00 00 00 28 00 00 00 01 00 06 10  ........(.......
  backtrace:
    [<ffffffff815748bb>] __do_kmalloc_node mm/slab_common.c:1022 [inline]
    [<ffffffff815748bb>] __kmalloc+0x4b/0x150 mm/slab_common.c:1036
    [<ffffffff8474bca8>] kmalloc include/linux/slab.h:603 [inline]
    [<ffffffff8474bca8>] kzalloc include/linux/slab.h:720 [inline]
    [<ffffffff8474bca8>] cfg80211_inform_single_bss_frame_data+0x198/0x8d0 net/wireless/scan.c:2852
    [<ffffffff8474e2fd>] cfg80211_inform_bss_frame_data+0x6d/0x140 net/wireless/scan.c:2912
    [<ffffffff84801ec7>] ieee80211_bss_info_update+0x177/0x320 net/mac80211/scan.c:211
    [<ffffffff848110c4>] ieee80211_rx_bss_info net/mac80211/ibss.c:1124 [inline]
    [<ffffffff848110c4>] ieee80211_rx_mgmt_probe_beacon net/mac80211/ibss.c:1613 [inline]
    [<ffffffff848110c4>] ieee80211_ibss_rx_queued_mgmt+0x894/0x1210 net/mac80211/ibss.c:1642
    [<ffffffff84813c81>] ieee80211_iface_process_skb net/mac80211/iface.c:1604 [inline]
    [<ffffffff84813c81>] ieee80211_iface_work+0x601/0x790 net/mac80211/iface.c:1658
    [<ffffffff84731458>] cfg80211_wiphy_work+0xf8/0x110 net/wireless/core.c:435
    [<ffffffff812c8d9d>] process_one_work+0x23d/0x530 kernel/workqueue.c:2630
    [<ffffffff812c9947>] process_scheduled_works kernel/workqueue.c:2703 [inline]
    [<ffffffff812c9947>] worker_thread+0x327/0x590 kernel/workqueue.c:2784
    [<ffffffff812d6e1b>] kthread+0x12b/0x170 kernel/kthread.c:388
    [<ffffffff81149f25>] ret_from_fork+0x45/0x50 arch/x86/kernel/process.c:147
    [<ffffffff81002be1>] ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304

BUG: memory leak
unreferenced object 0xffff88812014a780 (size 96):
  comm "kworker/0:5", pid 5153, jiffies 4294977028 (age 8.150s)
  hex dump (first 32 bytes):
    5c 51 25 82 2e 06 06 00 00 00 00 00 00 00 00 00  \Q%.............
    00 00 00 00 00 00 00 00 28 00 00 00 01 00 06 10  ........(.......
  backtrace:
    [<ffffffff815748bb>] __do_kmalloc_node mm/slab_common.c:1022 [inline]
    [<ffffffff815748bb>] __kmalloc+0x4b/0x150 mm/slab_common.c:1036
    [<ffffffff8474bca8>] kmalloc include/linux/slab.h:603 [inline]
    [<ffffffff8474bca8>] kzalloc include/linux/slab.h:720 [inline]
    [<ffffffff8474bca8>] cfg80211_inform_single_bss_frame_data+0x198/0x8d0 net/wireless/scan.c:2852
    [<ffffffff8474e2fd>] cfg80211_inform_bss_frame_data+0x6d/0x140 net/wireless/scan.c:2912
    [<ffffffff84801ec7>] ieee80211_bss_info_update+0x177/0x320 net/mac80211/scan.c:211
    [<ffffffff848110c4>] ieee80211_rx_bss_info net/mac80211/ibss.c:1124 [inline]
    [<ffffffff848110c4>] ieee80211_rx_mgmt_probe_beacon net/mac80211/ibss.c:1613 [inline]
    [<ffffffff848110c4>] ieee80211_ibss_rx_queued_mgmt+0x894/0x1210 net/mac80211/ibss.c:1642
    [<ffffffff84813c81>] ieee80211_iface_process_skb net/mac80211/iface.c:1604 [inline]
    [<ffffffff84813c81>] ieee80211_iface_work+0x601/0x790 net/mac80211/iface.c:1658
    [<ffffffff84731458>] cfg80211_wiphy_work+0xf8/0x110 net/wireless/core.c:435
    [<ffffffff812c8d9d>] process_one_work+0x23d/0x530 kernel/workqueue.c:2630
    [<ffffffff812c9947>] process_scheduled_works kernel/workqueue.c:2703 [inline]
    [<ffffffff812c9947>] worker_thread+0x327/0x590 kernel/workqueue.c:2784
    [<ffffffff812d6e1b>] kthread+0x12b/0x170 kernel/kthread.c:388
    [<ffffffff81149f25>] ret_from_fork+0x45/0x50 arch/x86/kernel/process.c:147
    [<ffffffff81002be1>] ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304



---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzkaller@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

If the bug is already fixed, let syzbot know by replying with:
#syz fix: exact-commit-title

If you want syzbot to run the reproducer, reply with:
#syz test: git://repo/address.git branch-or-commit-hash
If you attach or paste a git patch, syzbot will apply it before testing.

If you want to overwrite bug's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)

If the bug is a duplicate of another bug, reply with:
#syz dup: exact-subject-of-another-report

If you want to undo deduplication, reply with:
#syz undup

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [syzbot] [bluetooth?] memory leak in prepare_creds (4)
  2023-09-29 13:08 [syzbot] [bluetooth?] memory leak in prepare_creds (4) syzbot
@ 2023-11-08  7:31 ` syzbot
  0 siblings, 0 replies; 2+ messages in thread
From: syzbot @ 2023-11-08  7:31 UTC (permalink / raw)
  To: johan.hedberg, linux-bluetooth, linux-kernel, luiz.dentz, marcel,
	syzkaller-bugs

syzbot has found a reproducer for the following issue on:

HEAD commit:    13d88ac54ddd Merge tag 'vfs-6.7.fsid' of git://git.kernel...
git tree:       upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=10740c7b680000
kernel config:  https://syzkaller.appspot.com/x/.config?x=ecfdf78a410c834
dashboard link: https://syzkaller.appspot.com/bug?extid=2a478080bd86d36bb5ea
compiler:       gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40
syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=12d8fd7f680000
C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=107b137f680000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/9bb27a01f17c/disk-13d88ac5.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/fb496feed171/vmlinux-13d88ac5.xz
kernel image: https://storage.googleapis.com/syzbot-assets/f4da22719ffa/bzImage-13d88ac5.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+2a478080bd86d36bb5ea@syzkaller.appspotmail.com

Warning: Permanently added '10.128.0.113' (ED25519) to the list of known hosts.
executing program
executing program
BUG: memory leak
unreferenced object 0xffff888107c20600 (size 192):
  comm "syz-executor418", pid 5027, jiffies 4294942544 (age 13.100s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff81630798>] kmemleak_alloc_recursive include/linux/kmemleak.h:42 [inline]
    [<ffffffff81630798>] slab_post_alloc_hook mm/slab.h:766 [inline]
    [<ffffffff81630798>] slab_alloc_node mm/slub.c:3478 [inline]
    [<ffffffff81630798>] slab_alloc mm/slub.c:3486 [inline]
    [<ffffffff81630798>] __kmem_cache_alloc_lru mm/slub.c:3493 [inline]
    [<ffffffff81630798>] kmem_cache_alloc+0x298/0x430 mm/slub.c:3502
    [<ffffffff812e0d5b>] prepare_creds+0x2b/0x4e0 kernel/cred.c:269
    [<ffffffff812e17c4>] copy_creds+0x44/0x280 kernel/cred.c:373
    [<ffffffff812927ba>] copy_process+0x6aa/0x25c0 kernel/fork.c:2366
    [<ffffffff8129487b>] kernel_clone+0x11b/0x690 kernel/fork.c:2907
    [<ffffffff81294e6c>] __do_sys_clone+0x7c/0xb0 kernel/fork.c:3050
    [<ffffffff84b67d8f>] do_syscall_x64 arch/x86/entry/common.c:51 [inline]
    [<ffffffff84b67d8f>] do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:82
    [<ffffffff84c0008b>] entry_SYSCALL_64_after_hwframe+0x63/0x6b

BUG: memory leak
unreferenced object 0xffff888107470a80 (size 16):
  comm "syz-executor418", pid 5027, jiffies 4294942544 (age 13.100s)
  hex dump (first 16 bytes):
    00 00 00 00 00 00 00 00 00 c3 87 00 81 88 ff ff  ................
  backtrace:
    [<ffffffff8163331d>] kmemleak_alloc_recursive include/linux/kmemleak.h:42 [inline]
    [<ffffffff8163331d>] slab_post_alloc_hook mm/slab.h:766 [inline]
    [<ffffffff8163331d>] slab_alloc_node mm/slub.c:3478 [inline]
    [<ffffffff8163331d>] __kmem_cache_alloc_node+0x2dd/0x3f0 mm/slub.c:3517
    [<ffffffff8157e81b>] __do_kmalloc_node mm/slab_common.c:1006 [inline]
    [<ffffffff8157e81b>] __kmalloc+0x4b/0x150 mm/slab_common.c:1020
    [<ffffffff82364631>] kmalloc include/linux/slab.h:604 [inline]
    [<ffffffff82364631>] kzalloc include/linux/slab.h:721 [inline]
    [<ffffffff82364631>] lsm_cred_alloc security/security.c:577 [inline]
    [<ffffffff82364631>] security_prepare_creds+0x121/0x140 security/security.c:2950
    [<ffffffff812e1059>] prepare_creds+0x329/0x4e0 kernel/cred.c:300
    [<ffffffff812e17c4>] copy_creds+0x44/0x280 kernel/cred.c:373
    [<ffffffff812927ba>] copy_process+0x6aa/0x25c0 kernel/fork.c:2366
    [<ffffffff8129487b>] kernel_clone+0x11b/0x690 kernel/fork.c:2907
    [<ffffffff81294e6c>] __do_sys_clone+0x7c/0xb0 kernel/fork.c:3050
    [<ffffffff84b67d8f>] do_syscall_x64 arch/x86/entry/common.c:51 [inline]
    [<ffffffff84b67d8f>] do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:82
    [<ffffffff84c0008b>] entry_SYSCALL_64_after_hwframe+0x63/0x6b



---
If you want syzbot to run the reproducer, reply with:
#syz test: git://repo/address.git branch-or-commit-hash
If you attach or paste a git patch, syzbot will apply it before testing.

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2023-11-08  7:31 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-09-29 13:08 [syzbot] [bluetooth?] memory leak in prepare_creds (4) syzbot
2023-11-08  7:31 ` syzbot

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).