Warning: Permanently added '10.128.0.233' (ECDSA) to the list of known hosts.
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 37.651593][ T26] audit: type=1400 audit(1647942623.123:75): avc: denied { execmem } for pid=3596 comm="syz-executor206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 37.678723][ T26] audit: type=1400 audit(1647942623.133:76): avc: denied { create } for pid=3604 comm="syz-executor206" dev="anon_inodefs" ino=28105 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 37.701345][ T26] audit: type=1400 audit(1647942623.133:77): avc: denied { map } for pid=3604 comm="syz-executor206" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28105 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
executing program
executing program
executing program
executing program
executing program
[ 37.745268][ T26] audit: type=1400 audit(1647942623.133:78): avc: denied { read write } for pid=3604 comm="syz-executor206" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28105 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[ 37.748449][ T3625] ==================================================================
[ 37.778328][ T3625] BUG: KASAN: use-after-free in __wake_up_common+0x637/0x650
[ 37.785695][ T3625] Read of size 8 at addr ffff8880145a55b0 by task syz-executor206/3625
[ 37.793918][ T3625]
[ 37.796237][ T3625] CPU: 0 PID: 3625 Comm: syz-executor206 Tainted: G W 5.17.0-syzkaller-01402-g8565d64430f8 #0
[ 37.807769][ T3625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 37.817802][ T3625] Call Trace:
[ 37.821065][ T3625]
[ 37.823983][ T3625] dump_stack_lvl+0xcd/0x134
[ 37.828573][ T3625] print_address_description.constprop.0.cold+0x8d/0x303
[ 37.835595][ T3625] ? __wake_up_common+0x637/0x650
[ 37.840613][ T3625] ? __wake_up_common+0x637/0x650
[ 37.845630][ T3625] kasan_report.cold+0x83/0xdf
[ 37.850393][ T3625] ? spin_bug+0x100/0x100
[ 37.854721][ T3625] ? __wake_up_common+0x637/0x650
[ 37.859737][ T3625] __wake_up_common+0x637/0x650
[ 37.864592][ T3625] __wake_up_common_lock+0xd0/0x130
[ 37.869785][ T3625] ? __wake_up_common+0x650/0x650
[ 37.874805][ T3625] ? _raw_spin_unlock_irqrestore+0x50/0x70
[ 37.880608][ T3625] ? trace_hardirqs_on+0x5b/0x1c0
[ 37.885623][ T3625] ? _raw_spin_unlock_irqrestore+0x3d/0x70
[ 37.891421][ T3625] ? tty_port_close+0x120/0x170
[ 37.896272][ T3625] tty_release+0x657/0x1200
[ 37.900769][ T3625] __fput+0x286/0x9f0
[ 37.904829][ T3625] ? tty_release_struct+0xe0/0xe0
[ 37.909847][ T3625] task_work_run+0xdd/0x1a0
[ 37.914345][ T3625] do_exit+0xaff/0x29d0
[ 37.918494][ T3625] ? lock_downgrade+0x6e0/0x6e0
[ 37.923338][ T3625] ? mm_update_next_owner+0x7a0/0x7a0
[ 37.928708][ T3625] do_group_exit+0xd2/0x2f0
[ 37.933204][ T3625] __x64_sys_exit_group+0x3a/0x50
[ 37.938226][ T3625] do_syscall_64+0x35/0xb0
[ 37.942641][ T3625] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 37.948528][ T3625] RIP: 0033:0x7f4b2dd54c69
[ 37.952931][ T3625] Code: Unable to access opcode bytes at RIP 0x7f4b2dd54c3f.
[ 37.960543][ T3625] RSP: 002b:00007ffe94d10d48 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[ 37.968947][ T3625] RAX: ffffffffffffffda RBX: 00007f4b2ddc9330 RCX: 00007f4b2dd54c69
[ 37.976911][ T3625] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000
[ 37.984872][ T3625] RBP: 0000000000000000 R08: ffffffffffffffc0 R09: 0000000030000000
[ 37.992834][ T3625] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b2ddc9330
[ 38.000801][ T3625] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
[ 38.008762][ T3625]
[ 38.011772][ T3625]
[ 38.014078][ T3625] Allocated by task 3623:
[ 38.018387][ T3625] kasan_save_stack+0x1e/0x40
[ 38.023061][ T3625] __kasan_kmalloc+0xa6/0xd0
[ 38.027647][ T3625] kmem_cache_alloc_trace+0x1ea/0x4a0
[ 38.033010][ T3625] io_arm_poll_handler+0x39d/0x940
[ 38.038110][ T3625] io_queue_sqe_arm_apoll+0x6d/0x430
[ 38.043391][ T3625] io_submit_sqes+0x7dda/0x9310
[ 38.048238][ T3625] __do_sys_io_uring_enter+0x9f1/0x1520
[ 38.053781][ T3625] do_syscall_64+0x35/0xb0
[ 38.058192][ T3625] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 38.064079][ T3625]
[ 38.066384][ T3625] Freed by task 3623:
[ 38.070343][ T3625] kasan_save_stack+0x1e/0x40
[ 38.075013][ T3625] kasan_set_track+0x21/0x30
[ 38.079592][ T3625] kasan_set_free_info+0x20/0x30
[ 38.084526][ T3625] ____kasan_slab_free+0xff/0x140
[ 38.089544][ T3625] kfree+0xf8/0x2b0
[ 38.093340][ T3625] io_clean_op+0x20a/0xd90
[ 38.097745][ T3625] __io_req_complete_post+0x88c/0xc90
[ 38.103108][ T3625] io_req_complete_post+0x56/0x1d0
[ 38.108206][ T3625] io_apoll_task_func+0x1df/0x230
[ 38.113225][ T3625] tctx_task_work+0x1a2/0x1380
[ 38.117980][ T3625] task_work_run+0xdd/0x1a0
[ 38.122471][ T3625] do_exit+0xaff/0x29d0
[ 38.126618][ T3625] do_group_exit+0xd2/0x2f0
[ 38.131118][ T3625] __x64_sys_exit_group+0x3a/0x50
[ 38.136138][ T3625] do_syscall_64+0x35/0xb0
[ 38.140548][ T3625] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 38.146431][ T3625]
[ 38.148746][ T3625] The buggy address belongs to the object at ffff8880145a5580
[ 38.148746][ T3625] which belongs to the cache kmalloc-96 of size 96
[ 38.162609][ T3625] The buggy address is located 48 bytes inside of
[ 38.162609][ T3625] 96-byte region [ffff8880145a5580, ffff8880145a55e0)
[ 38.175695][ T3625] The buggy address belongs to the page:
[ 38.181329][ T3625] page:ffffea0000516940 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff8880145a5780 pfn:0x145a5
[ 38.192769][ T3625] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff)
[ 38.200313][ T3625] raw: 00fff00000000200 ffffea0001d777c8 ffffea000064cec8 ffff888010c40300
[ 38.208886][ T3625] raw: ffff8880145a5780 ffff8880145a5000 000000010000001f 0000000000000000
[ 38.217447][ T3625] page dumped because: kasan: bad access detected
[ 38.223836][ T3625] page_owner tracks the page as allocated
[ 38.229530][ T3625] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x242040(__GFP_IO|__GFP_NOWARN|__GFP_COMP|__GFP_THISNODE), pid 2974, ts 16549490433, free_ts 16543260159
[ 38.246536][ T3625] get_page_from_freelist+0xa72/0x2f50
[ 38.251989][ T3625] __alloc_pages+0x1b2/0x500
[ 38.256566][ T3625] cache_grow_begin+0x75/0x390
[ 38.261322][ T3625] cache_alloc_refill+0x27f/0x380
[ 38.266335][ T3625] __kmalloc+0x3b3/0x4d0
[ 38.270566][ T3625] tomoyo_encode2.part.0+0xe9/0x3a0
[ 38.275757][ T3625] tomoyo_encode+0x28/0x50
[ 38.280166][ T3625] tomoyo_realpath_from_path+0x186/0x620
[ 38.285794][ T3625] tomoyo_check_open_permission+0x272/0x380
[ 38.291687][ T3625] tomoyo_file_open+0xa3/0xd0
[ 38.296371][ T3625] security_file_open+0x45/0xb0
[ 38.301223][ T3625] do_dentry_open+0x358/0x1250
[ 38.305992][ T3625] path_openat+0x1c9e/0x2940
[ 38.310577][ T3625] do_filp_open+0x1aa/0x400
[ 38.315072][ T3625] do_sys_openat2+0x16d/0x4d0
[ 38.319738][ T3625] __x64_sys_openat+0x13f/0x1f0
[ 38.324578][ T3625] page last free stack trace:
[ 38.329234][ T3625] free_pcp_prepare+0x374/0x870
[ 38.334079][ T3625] free_unref_page+0x19/0x690
[ 38.338742][ T3625] slabs_destroy+0x89/0xc0
[ 38.343152][ T3625] ___cache_free+0x303/0x600
[ 38.347736][ T3625] qlist_free_all+0x50/0x1a0
[ 38.352319][ T3625] kasan_quarantine_reduce+0x180/0x200
[ 38.357767][ T3625] __kasan_slab_alloc+0x97/0xb0
[ 38.362608][ T3625] kmem_cache_alloc+0x265/0x560
[ 38.367449][ T3625] getname_flags.part.0+0x50/0x4f0
[ 38.372558][ T3625] getname_flags+0x9a/0xe0
[ 38.376967][ T3625] vfs_fstatat+0x73/0xb0
[ 38.381205][ T3625] __do_sys_newfstatat+0x91/0x110
[ 38.386252][ T3625] do_syscall_64+0x35/0xb0
[ 38.390659][ T3625] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 38.396565][ T3625]
[ 38.398876][ T3625] Memory state around the buggy address:
[ 38.404488][ T3625] ffff8880145a5480: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[ 38.412536][ T3625] ffff8880145a5500: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[ 38.420583][ T3625] >ffff8880145a5580: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[ 38.428624][ T3625] ^
[ 38.434241][ T3625] ffff8880145a5600: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[ 38.442285][ T3625] ffff8880145a5680: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[ 38.450328][ T3625] ==================================================================
[ 38.458374][ T3625] Kernel panic - not syncing: panic_on_warn set ...
[ 38.464942][ T3625] CPU: 0 PID: 3625 Comm: syz-executor206 Tainted: G B W 5.17.0-syzkaller-01402-g8565d64430f8 #0
[ 38.476472][ T3625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 38.486521][ T3625] Call Trace:
[ 38.489802][ T3625]
[ 38.492722][ T3625] dump_stack_lvl+0xcd/0x134
[ 38.497316][ T3625] panic+0x2b0/0x6dd
[ 38.501209][ T3625] ? __warn_printk+0xf3/0xf3
[ 38.505798][ T3625] ? __wake_up_common+0x637/0x650
[ 38.510823][ T3625] ? __wake_up_common+0x637/0x650
[ 38.515843][ T3625] ? __wake_up_common+0x637/0x650
[ 38.520863][ T3625] end_report.cold+0x63/0x6f
[ 38.525452][ T3625] kasan_report.cold+0x71/0xdf
[ 38.530213][ T3625] ? spin_bug+0x100/0x100
[ 38.534537][ T3625] ? __wake_up_common+0x637/0x650
[ 38.539555][ T3625] __wake_up_common+0x637/0x650
[ 38.544403][ T3625] __wake_up_common_lock+0xd0/0x130
[ 38.549599][ T3625] ? __wake_up_common+0x650/0x650
[ 38.554624][ T3625] ? _raw_spin_unlock_irqrestore+0x50/0x70
[ 38.560433][ T3625] ? trace_hardirqs_on+0x5b/0x1c0
[ 38.565458][ T3625] ? _raw_spin_unlock_irqrestore+0x3d/0x70
[ 38.571265][ T3625] ? tty_port_close+0x120/0x170
[ 38.576115][ T3625] tty_release+0x657/0x1200
[ 38.580614][ T3625] __fput+0x286/0x9f0
[ 38.584588][ T3625] ? tty_release_struct+0xe0/0xe0
[ 38.589605][ T3625] task_work_run+0xdd/0x1a0
[ 38.594539][ T3625] do_exit+0xaff/0x29d0
[ 38.598691][ T3625] ? lock_downgrade+0x6e0/0x6e0
[ 38.603538][ T3625] ? mm_update_next_owner+0x7a0/0x7a0
[ 38.608904][ T3625] do_group_exit+0xd2/0x2f0
[ 38.613403][ T3625] __x64_sys_exit_group+0x3a/0x50
[ 38.618424][ T3625] do_syscall_64+0x35/0xb0
[ 38.622841][ T3625] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 38.628731][ T3625] RIP: 0033:0x7f4b2dd54c69
[ 38.633131][ T3625] Code: Unable to access opcode bytes at RIP 0x7f4b2dd54c3f.
[ 38.640478][ T3625] RSP: 002b:00007ffe94d10d48 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[ 38.648880][ T3625] RAX: ffffffffffffffda RBX: 00007f4b2ddc9330 RCX: 00007f4b2dd54c69
[ 38.656840][ T3625] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000
[ 38.664800][ T3625] RBP: 0000000000000000 R08: ffffffffffffffc0 R09: 0000000030000000
[ 38.672762][ T3625] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b2ddc9330
[ 38.680723][ T3625] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
[ 38.688685][ T3625]
[ 38.691849][ T3625] Kernel Offset: disabled
[ 38.696160][ T3625] Rebooting in 86400 seconds..