Warning: Permanently added '10.128.1.119' (ED25519) to the list of known hosts. executing program [ 33.588945][ T30] audit: type=1400 audit(1699673931.370:66): avc: denied { execmem } for pid=298 comm="syz-executor396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 42.820304][ T943] ================================================================== [ 42.828209][ T943] BUG: KASAN: use-after-free in unix_stream_read_actor+0xa3/0xb0 [ 42.835777][ T943] Read of size 4 at addr ffff88811ed1ce04 by task syz-executor396/943 [ 42.843820][ T943] [ 42.845991][ T943] CPU: 0 PID: 943 Comm: syz-executor396 Not tainted 5.15.137-syzkaller-01792-g61cfd264993d #0 [ 42.856067][ T943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 42.865953][ T943] Call Trace: [ 42.869077][ T943] [ 42.871857][ T943] dump_stack_lvl+0x151/0x1b7 [ 42.876369][ T943] ? io_uring_drop_tctx_refs+0x190/0x190 [ 42.881838][ T943] ? panic+0x751/0x751 [ 42.885745][ T943] print_address_description+0x87/0x3b0 [ 42.891125][ T943] kasan_report+0x179/0x1c0 [ 42.895470][ T943] ? unix_stream_read_actor+0xa3/0xb0 [ 42.900672][ T943] ? unix_stream_read_actor+0xa3/0xb0 [ 42.905878][ T943] __asan_report_load4_noabort+0x14/0x20 [ 42.911465][ T943] unix_stream_read_actor+0xa3/0xb0 [ 42.916500][ T943] unix_stream_recv_urg+0x1b4/0x2f0 [ 42.921544][ T943] unix_stream_read_generic+0x2147/0x2240 [ 42.927088][ T943] ? avc_denied+0x1b0/0x1b0 [ 42.931440][ T943] ? avc_has_perm+0x16f/0x260 [ 42.935941][ T943] ? avc_has_perm_noaudit+0x430/0x430 [ 42.941150][ T943] ? unix_stream_read_actor+0xb0/0xb0 [ 42.946355][ T943] ? selinux_socket_recvmsg+0x243/0x340 [ 42.951743][ T943] ? selinux_socket_sendmsg+0x340/0x340 [ 42.957123][ T943] unix_stream_recvmsg+0x22d/0x2c0 [ 42.962933][ T943] ? unix_stream_sendmsg+0x1060/0x1060 [ 42.968228][ T943] ? __unix_stream_recvmsg+0x210/0x210 [ 42.973521][ T943] ? security_socket_recvmsg+0x87/0xb0 [ 42.978818][ T943] ? unix_stream_sendmsg+0x1060/0x1060 [ 42.984109][ T943] ____sys_recvmsg+0x286/0x530 [ 42.988717][ T943] ? __sys_recvmsg_sock+0x50/0x50 [ 42.993571][ T943] ? import_iovec+0xe5/0x120 [ 42.997999][ T943] ___sys_recvmsg+0x1ec/0x690 [ 43.002604][ T943] ? __sys_recvmsg+0x260/0x260 [ 43.007202][ T943] ? __fdget+0x1bc/0x240 [ 43.011275][ T943] __x64_sys_recvmsg+0x1dc/0x2b0 [ 43.016049][ T943] ? ___sys_recvmsg+0x690/0x690 [ 43.020744][ T943] ? switch_fpu_return+0x1ed/0x3d0 [ 43.025692][ T943] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 43.031593][ T943] ? exit_to_user_mode_prepare+0x39/0xa0 [ 43.037056][ T943] do_syscall_64+0x3d/0xb0 [ 43.041309][ T943] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.047034][ T943] RIP: 0033:0x7f01363844e9 [ 43.051291][ T943] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 43.070740][ T943] RSP: 002b:00007f0136303228 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 43.079090][ T943] RAX: ffffffffffffffda RBX: 0000000000000028 RCX: 00007f01363844e9 [ 43.086889][ T943] RDX: 0000000040010083 RSI: 0000000020000140 RDI: 0000000000000004 [ 43.094700][ T943] RBP: 00007f013640e348 R08: 00007f01363036c0 R09: 00007f01363036c0 [ 43.102512][ T943] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f013640e340 [ 43.110320][ T943] R13: 00007f013640e34c R14: 00007ffca2664350 R15: 00007ffca2664438 [ 43.118137][ T943] [ 43.121000][ T943] [ 43.123169][ T943] Allocated by task 942: [ 43.127246][ T943] __kasan_slab_alloc+0xb1/0xe0 [ 43.131935][ T943] slab_post_alloc_hook+0x53/0x2c0 [ 43.136880][ T943] kmem_cache_alloc+0xf5/0x200 [ 43.141479][ T943] __alloc_skb+0xbe/0x550 [ 43.145648][ T943] alloc_skb_with_frags+0xa6/0x680 [ 43.150595][ T943] sock_alloc_send_pskb+0x915/0xa50 [ 43.155635][ T943] sock_alloc_send_skb+0x32/0x40 [ 43.160408][ T943] queue_oob+0xfd/0x8c0 [ 43.164393][ T943] unix_stream_sendmsg+0xe06/0x1060 [ 43.169427][ T943] ____sys_sendmsg+0x59e/0x8f0 [ 43.174045][ T943] ___sys_sendmsg+0x252/0x2e0 [ 43.178542][ T943] __se_sys_sendmsg+0x19a/0x260 [ 43.183230][ T943] __x64_sys_sendmsg+0x7b/0x90 [ 43.187827][ T943] do_syscall_64+0x3d/0xb0 [ 43.192081][ T943] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.197811][ T943] [ 43.199980][ T943] Freed by task 942: [ 43.203710][ T943] kasan_set_track+0x4b/0x70 [ 43.208139][ T943] kasan_set_free_info+0x23/0x40 [ 43.212911][ T943] ____kasan_slab_free+0x126/0x160 [ 43.217859][ T943] __kasan_slab_free+0x11/0x20 [ 43.222461][ T943] slab_free_freelist_hook+0xbd/0x190 [ 43.227669][ T943] kmem_cache_free+0x116/0x2e0 [ 43.232266][ T943] kfree_skbmem+0x104/0x170 [ 43.236610][ T943] consume_skb+0xb4/0x250 [ 43.240774][ T943] queue_oob+0x522/0x8c0 [ 43.244856][ T943] unix_stream_sendmsg+0xe06/0x1060 [ 43.249891][ T943] ____sys_sendmsg+0x59e/0x8f0 [ 43.254485][ T943] ___sys_sendmsg+0x252/0x2e0 [ 43.258999][ T943] __se_sys_sendmsg+0x19a/0x260 [ 43.263695][ T943] __x64_sys_sendmsg+0x7b/0x90 [ 43.268287][ T943] do_syscall_64+0x3d/0xb0 [ 43.272542][ T943] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.278268][ T943] [ 43.280441][ T943] The buggy address belongs to the object at ffff88811ed1cdc0 [ 43.280441][ T943] which belongs to the cache skbuff_head_cache of size 248 [ 43.294847][ T943] The buggy address is located 68 bytes inside of [ 43.294847][ T943] 248-byte region [ffff88811ed1cdc0, ffff88811ed1ceb8) [ 43.307868][ T943] The buggy address belongs to the page: [ 43.313334][ T943] page:ffffea00047b4700 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11ed1c [ 43.323401][ T943] flags: 0x4000000000000200(slab|zone=1) [ 43.328879][ T943] raw: 4000000000000200 0000000000000000 dead000000000122 ffff888100351b00 [ 43.337294][ T943] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 [ 43.345711][ T943] page dumped because: kasan: bad access detected [ 43.351956][ T943] page_owner tracks the page as allocated [ 43.357509][ T943] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 938, ts 42766038655, free_ts 42713201046 [ 43.373428][ T943] post_alloc_hook+0x1a3/0x1b0 [ 43.378029][ T943] prep_new_page+0x1b/0x110 [ 43.382368][ T943] get_page_from_freelist+0x3550/0x35d0 [ 43.387746][ T943] __alloc_pages+0x206/0x5e0 [ 43.392175][ T943] new_slab+0x9a/0x4e0 [ 43.396078][ T943] ___slab_alloc+0x39e/0x830 [ 43.400504][ T943] __slab_alloc+0x4a/0x90 [ 43.404670][ T943] kmem_cache_alloc+0x134/0x200 [ 43.409359][ T943] __alloc_skb+0xbe/0x550 [ 43.413525][ T943] alloc_skb_with_frags+0xa6/0x680 [ 43.418472][ T943] sock_alloc_send_pskb+0x915/0xa50 [ 43.423507][ T943] sock_alloc_send_skb+0x32/0x40 [ 43.428277][ T943] queue_oob+0xfd/0x8c0 [ 43.432273][ T943] unix_stream_sendmsg+0xe06/0x1060 [ 43.437311][ T943] ____sys_sendmsg+0x59e/0x8f0 [ 43.441905][ T943] ___sys_sendmsg+0x252/0x2e0 [ 43.446420][ T943] page last free stack trace: [ 43.450934][ T943] free_unref_page_prepare+0x7c8/0x7d0 [ 43.456226][ T943] free_unref_page+0xe6/0x730 [ 43.460740][ T943] __free_pages+0x61/0xf0 [ 43.464908][ T943] free_pages+0x7c/0x90 [ 43.468900][ T943] tlb_finish_mmu+0x253/0x320 [ 43.473418][ T943] exit_mmap+0x3ef/0x6f0 [ 43.477492][ T943] __mmput+0x95/0x310 [ 43.481309][ T943] mmput+0x5b/0x170 [ 43.484953][ T943] do_exit+0xbb4/0x2b60 [ 43.488947][ T943] do_group_exit+0x141/0x310 [ 43.493375][ T943] get_signal+0x7a3/0x1630 [ 43.497626][ T943] arch_do_signal_or_restart+0xbd/0x1680 [ 43.503097][ T943] exit_to_user_mode_loop+0xa0/0xe0 [ 43.508128][ T943] exit_to_user_mode_prepare+0x5a/0xa0 [ 43.513423][ T943] syscall_exit_to_user_mode+0x26/0x160 [ 43.518803][ T943] do_syscall_64+0x49/0xb0 [ 43.523066][ T943] [ 43.525490][ T943] Memory state around the buggy address: [ 43.530969][ T943] ffff88811ed1cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 43.538855][ T943] ffff88811ed1cd80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 43.546753][ T943] >ffff88811ed1ce00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.554657][ T943] ^ [ 43.558556][ T943] ffff88811ed1ce80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc executing program [ 43.566458][ T943] ffff88811ed1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.574390][ T943] ================================================================== [ 43.582256][ T943] Disabling lock debugging due to kernel taint executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program