./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1784431628
<...>
Warning: Permanently added '10.128.0.177' (ED25519) to the list of known hosts.
execve("./syz-executor1784431628", ["./syz-executor1784431628"], 0x7fff3773dd60 /* 10 vars */) = 0
brk(NULL) = 0x55556e6ae000
brk(0x55556e6aed00) = 0x55556e6aed00
arch_prctl(ARCH_SET_FS, 0x55556e6ae380) = 0
set_tid_address(0x55556e6ae650) = 5235
set_robust_list(0x55556e6ae660, 24) = 0
rseq(0x55556e6aeca0, 0x20, 0, 0x53053053) = 0
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
readlink("/proc/self/exe", "/root/syz-executor1784431628", 4096) = 28
getrandom("\xc5\xb6\xd4\xec\x47\x4e\x66\x1c", 8, GRND_NONBLOCK) = 8
brk(NULL) = 0x55556e6aed00
brk(0x55556e6cfd00) = 0x55556e6cfd00
brk(0x55556e6d0000) = 0x55556e6d0000
mprotect(0x7f5360dde000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
write(1, "executing program\n", 18executing program
) = 18
socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 4]) = 0
sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xdb", iov_len=1}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, MSG_OOB|MSG_DONTWAIT) = 1
recvmsg(3, {msg_name=NULL, msg_namelen=0, msg_iov=NULL, msg_iovlen=0, msg_controllen=0, msg_flags=MSG_OOB}, MSG_OOB|MSG_WAITFORONE) = 1
sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x11", iov_len=1}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, MSG_OOB|MSG_NOSIGNAL|MSG_MORE) = 1
recvfrom(3, "\x11", 125, MSG_DONTROUTE|MSG_TRUNC, NULL, NULL) = 1
[ 78.582550][ T5235] ==================================================================
[ 78.590850][ T5235] BUG: KASAN: slab-use-after-free in unix_stream_read_actor+0xa6/0xb0
[ 78.599093][ T5235] Read of size 4 at addr ffff8880326abcc4 by task syz-executor178/5235
[ 78.607332][ T5235]
[ 78.609769][ T5235] CPU: 0 UID: 0 PID: 5235 Comm: syz-executor178 Not tainted 6.11.0-rc5-syzkaller-00742-gfbdaffe41adc #0
[ 78.621065][ T5235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
[ 78.631157][ T5235] Call Trace:
[ 78.634452][ T5235]
[ 78.637394][ T5235] dump_stack_lvl+0x241/0x360
[ 78.642101][ T5235] ? __pfx_dump_stack_lvl+0x10/0x10
[ 78.647309][ T5235] ? __pfx__printk+0x10/0x10
[ 78.651910][ T5235] ? _printk+0xd5/0x120
[ 78.656075][ T5235] ? __virt_addr_valid+0x183/0x530
[ 78.661194][ T5235] ? __virt_addr_valid+0x183/0x530
[ 78.666334][ T5235] print_report+0x169/0x550
[ 78.670916][ T5235] ? __virt_addr_valid+0x183/0x530
[ 78.676055][ T5235] ? __virt_addr_valid+0x183/0x530
[ 78.681200][ T5235] ? __virt_addr_valid+0x45f/0x530
[ 78.686322][ T5235] ? __phys_addr+0xba/0x170
[ 78.690834][ T5235] ? unix_stream_read_actor+0xa6/0xb0
[ 78.696228][ T5235] kasan_report+0x143/0x180
[ 78.700761][ T5235] ? unix_stream_read_actor+0xa6/0xb0
[ 78.706155][ T5235] unix_stream_read_actor+0xa6/0xb0
[ 78.711477][ T5235] unix_stream_recv_urg+0x1df/0x320
[ 78.716983][ T5235] unix_stream_read_generic+0x2456/0x2520
[ 78.722985][ T5235] ? aa_label_sk_perm+0x4f0/0x6d0
[ 78.728033][ T5235] ? __pfx_aa_label_sk_perm+0x10/0x10
[ 78.733425][ T5235] ? mark_lock+0x9a/0x350
[ 78.737866][ T5235] ? __pfx_unix_stream_read_generic+0x10/0x10
[ 78.743957][ T5235] ? aa_sk_perm+0x96d/0xab0
[ 78.748498][ T5235] unix_stream_recvmsg+0x22b/0x2c0
[ 78.753629][ T5235] ? __pfx_unix_stream_recvmsg+0x10/0x10
[ 78.759376][ T5235] ? __pfx_unix_stream_read_actor+0x10/0x10
[ 78.765392][ T5235] ? __pfx___might_resched+0x10/0x10
[ 78.770749][ T5235] ? aa_sock_msg_perm+0x91/0x160
[ 78.775755][ T5235] ? bpf_lsm_socket_recvmsg+0x9/0x10
[ 78.781063][ T5235] ? security_socket_recvmsg+0x90/0xb0
[ 78.786713][ T5235] ? __pfx_unix_stream_recvmsg+0x10/0x10
[ 78.792445][ T5235] sock_recvmsg+0x22f/0x280
[ 78.796968][ T5235] ____sys_recvmsg+0x1db/0x470
[ 78.801762][ T5235] ? __pfx_____sys_recvmsg+0x10/0x10
[ 78.807185][ T5235] __sys_recvmsg+0x2f0/0x3e0
[ 78.811813][ T5235] ? __pfx___sys_recvmsg+0x10/0x10
[ 78.816978][ T5235] ? lockdep_hardirqs_on+0x99/0x150
[ 78.822195][ T5235] ? _raw_spin_unlock_irq+0x2e/0x50
[ 78.827434][ T5235] ? ptrace_notify+0x279/0x380
[ 78.832243][ T5235] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10
[ 78.838619][ T5235] ? do_syscall_64+0x100/0x230
[ 78.843759][ T5235] do_syscall_64+0xf3/0x230
[ 78.848319][ T5235] ? clear_bhb_loop+0x35/0x90
[ 78.853053][ T5235] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 78.858996][ T5235] RIP: 0033:0x7f5360d6b4e9
[ 78.863692][ T5235] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 78.883417][ T5235] RSP: 002b:00007fff29b3a458 EFLAGS: 00000246 ORIG_RAX: 000000000000002f
[ 78.891910][ T5235] RAX: ffffffffffffffda RBX: 00007fff29b3a638 RCX: 00007f5360d6b4e9
[ 78.899908][ T5235] RDX: 0000000000002001 RSI: 0000000020000640 RDI: 0000000000000003
[ 78.907910][ T5235] RBP: 00007f5360dde610 R08: 0000000000000000 R09: 0000000000000000
[ 78.915939][ T5235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 78.923975][ T5235] R13: 00007fff29b3a628 R14: 0000000000000001 R15: 0000000000000001
[ 78.932490][ T5235]
[ 78.935614][ T5235]
[ 78.937938][ T5235] Allocated by task 5235:
[ 78.942265][ T5235] kasan_save_track+0x3f/0x80
[ 78.946957][ T5235] __kasan_slab_alloc+0x66/0x80
[ 78.951982][ T5235] kmem_cache_alloc_node_noprof+0x16b/0x320
[ 78.957887][ T5235] __alloc_skb+0x1c3/0x440
[ 78.962656][ T5235] alloc_skb_with_frags+0xc3/0x770
[ 78.967779][ T5235] sock_alloc_send_pskb+0x91a/0xa60
[ 78.972993][ T5235] queue_oob+0x108/0x680
[ 78.977242][ T5235] unix_stream_sendmsg+0xd24/0xf80
[ 78.982357][ T5235] __sock_sendmsg+0x221/0x270
[ 78.987046][ T5235] ____sys_sendmsg+0x525/0x7d0
[ 78.991822][ T5235] __sys_sendmsg+0x2b0/0x3a0
[ 78.996418][ T5235] do_syscall_64+0xf3/0x230
[ 79.000929][ T5235] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 79.006922][ T5235]
[ 79.009244][ T5235] Freed by task 5235:
[ 79.013222][ T5235] kasan_save_track+0x3f/0x80
[ 79.018006][ T5235] kasan_save_free_info+0x40/0x50
[ 79.023145][ T5235] poison_slab_object+0xe0/0x150
[ 79.028099][ T5235] __kasan_slab_free+0x37/0x60
[ 79.032877][ T5235] kmem_cache_free+0x145/0x350
[ 79.037649][ T5235] unix_stream_read_generic+0x1ef6/0x2520
[ 79.043384][ T5235] unix_stream_recvmsg+0x22b/0x2c0
[ 79.048518][ T5235] sock_recvmsg+0x22f/0x280
[ 79.053137][ T5235] __sys_recvfrom+0x256/0x3e0
[ 79.057835][ T5235] __x64_sys_recvfrom+0xde/0x100
[ 79.062867][ T5235] do_syscall_64+0xf3/0x230
[ 79.067898][ T5235] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 79.073803][ T5235]
[ 79.076131][ T5235] The buggy address belongs to the object at ffff8880326abc80
[ 79.076131][ T5235] which belongs to the cache skbuff_head_cache of size 240
[ 79.090710][ T5235] The buggy address is located 68 bytes inside of
[ 79.090710][ T5235] freed 240-byte region [ffff8880326abc80, ffff8880326abd70)
[ 79.104518][ T5235]
[ 79.106863][ T5235] The buggy address belongs to the physical page:
[ 79.113288][ T5235] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x326ab
[ 79.122060][ T5235] ksm flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
[ 79.129523][ T5235] page_type: 0xfdffffff(slab)
[ 79.134205][ T5235] raw: 00fff00000000000 ffff88801eaee780 ffffea0000b7dc80 dead000000000003
[ 79.143318][ T5235] raw: 0000000000000000 00000000800c000c 00000001fdffffff 0000000000000000
[ 79.151897][ T5235] page dumped because: kasan: bad access detected
[ 79.158321][ T5235] page_owner tracks the page as allocated
[ 79.164036][ T5235] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x52cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 4686, tgid 4686 (udevadm), ts 32357469485, free_ts 28829011109
[ 79.183333][ T5235] post_alloc_hook+0x1f3/0x230
[ 79.188112][ T5235] get_page_from_freelist+0x2e4c/0x2f10
[ 79.193680][ T5235] __alloc_pages_noprof+0x256/0x6c0
[ 79.198890][ T5235] alloc_slab_page+0x5f/0x120
[ 79.203579][ T5235] allocate_slab+0x5a/0x2f0
[ 79.208089][ T5235] ___slab_alloc+0xcd1/0x14b0
[ 79.212771][ T5235] __slab_alloc+0x58/0xa0
[ 79.217103][ T5235] kmem_cache_alloc_node_noprof+0x1fe/0x320
[ 79.223003][ T5235] __alloc_skb+0x1c3/0x440
[ 79.227441][ T5235] alloc_uevent_skb+0x74/0x230
[ 79.232309][ T5235] kobject_uevent_net_broadcast+0x2fd/0x580
[ 79.238408][ T5235] kobject_uevent_env+0x57d/0x8e0
[ 79.243737][ T5235] kobject_synth_uevent+0x4ef/0xae0
[ 79.249059][ T5235] uevent_store+0x4b/0x70
[ 79.253501][ T5235] kernfs_fop_write_iter+0x3a1/0x500
[ 79.258935][ T5235] vfs_write+0xa72/0xc90
[ 79.263299][ T5235] page last free pid 1 tgid 1 stack trace:
[ 79.269458][ T5235] free_unref_page+0xd22/0xea0
[ 79.274240][ T5235] kasan_depopulate_vmalloc_pte+0x74/0x90
[ 79.279983][ T5235] __apply_to_page_range+0x8a8/0xe50
[ 79.285287][ T5235] kasan_release_vmalloc+0x9a/0xb0
[ 79.290411][ T5235] purge_vmap_node+0x3e3/0x770
[ 79.295185][ T5235] __purge_vmap_area_lazy+0x708/0xae0
[ 79.300563][ T5235] _vm_unmap_aliases+0x79d/0x840
[ 79.305533][ T5235] change_page_attr_set_clr+0x2fe/0xdb0
[ 79.311087][ T5235] set_memory_nx+0xf2/0x130
[ 79.315602][ T5235] free_initmem+0x79/0x110
[ 79.320039][ T5235] kernel_init+0x31/0x2b0
[ 79.324390][ T5235] ret_from_fork+0x4b/0x80
[ 79.328822][ T5235] ret_from_fork_asm+0x1a/0x30
[ 79.333694][ T5235]
[ 79.336019][ T5235] Memory state around the buggy address:
[ 79.341646][ T5235] ffff8880326abb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 79.349714][ T5235] ffff8880326abc00: fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc
[ 79.357796][ T5235] >ffff8880326abc80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 79.365875][ T5235] ^
[ 79.372034][ T5235] ffff8880326abd00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc
[ 79.380123][ T5235] ffff8880326abd80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[ 79.388366][ T5235] ==================================================================
[ 79.396830][ T5235] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 79.404170][ T5235] CPU: 1 UID: 0 PID: 5235 Comm: syz-executor178 Not tainted 6.11.0-rc5-syzkaller-00742-gfbdaffe41adc #0
[ 79.415308][ T5235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
[ 79.425391][ T5235] Call Trace:
[ 79.428777][ T5235]
[ 79.431714][ T5235] dump_stack_lvl+0x241/0x360
[ 79.436508][ T5235] ? __pfx_dump_stack_lvl+0x10/0x10
[ 79.441728][ T5235] ? __pfx__printk+0x10/0x10
[ 79.446415][ T5235] ? preempt_schedule+0xe1/0xf0
[ 79.451286][ T5235] ? vscnprintf+0x5d/0x90
[ 79.455635][ T5235] panic+0x349/0x860
[ 79.459649][ T5235] ? check_panic_on_warn+0x21/0xb0
[ 79.464773][ T5235] ? __pfx_panic+0x10/0x10
[ 79.469288][ T5235] ? _raw_spin_unlock_irqrestore+0x130/0x140
[ 79.475292][ T5235] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10
[ 79.481653][ T5235] ? print_report+0x502/0x550
[ 79.486444][ T5235] check_panic_on_warn+0x86/0xb0
[ 79.491398][ T5235] ? unix_stream_read_actor+0xa6/0xb0
[ 79.496784][ T5235] end_report+0x77/0x160
[ 79.501056][ T5235] kasan_report+0x154/0x180
[ 79.505587][ T5235] ? unix_stream_read_actor+0xa6/0xb0
[ 79.510990][ T5235] unix_stream_read_actor+0xa6/0xb0
[ 79.516217][ T5235] unix_stream_recv_urg+0x1df/0x320
[ 79.521437][ T5235] unix_stream_read_generic+0x2456/0x2520
[ 79.527174][ T5235] ? aa_label_sk_perm+0x4f0/0x6d0
[ 79.532235][ T5235] ? __pfx_aa_label_sk_perm+0x10/0x10
[ 79.537648][ T5235] ? mark_lock+0x9a/0x350
[ 79.542087][ T5235] ? __pfx_unix_stream_read_generic+0x10/0x10
[ 79.548215][ T5235] ? aa_sk_perm+0x96d/0xab0
[ 79.552738][ T5235] unix_stream_recvmsg+0x22b/0x2c0
[ 79.557863][ T5235] ? __pfx_unix_stream_recvmsg+0x10/0x10
[ 79.563512][ T5235] ? __pfx_unix_stream_read_actor+0x10/0x10
[ 79.569524][ T5235] ? __pfx___might_resched+0x10/0x10
[ 79.574834][ T5235] ? aa_sock_msg_perm+0x91/0x160
[ 79.579879][ T5235] ? bpf_lsm_socket_recvmsg+0x9/0x10
[ 79.585182][ T5235] ? security_socket_recvmsg+0x90/0xb0
[ 79.590657][ T5235] ? __pfx_unix_stream_recvmsg+0x10/0x10
[ 79.596304][ T5235] sock_recvmsg+0x22f/0x280
[ 79.600823][ T5235] ____sys_recvmsg+0x1db/0x470
[ 79.605607][ T5235] ? __pfx_____sys_recvmsg+0x10/0x10
[ 79.611099][ T5235] __sys_recvmsg+0x2f0/0x3e0
[ 79.615729][ T5235] ? __pfx___sys_recvmsg+0x10/0x10
[ 79.620959][ T5235] ? lockdep_hardirqs_on+0x99/0x150
[ 79.626189][ T5235] ? _raw_spin_unlock_irq+0x2e/0x50
[ 79.631412][ T5235] ? ptrace_notify+0x279/0x380
[ 79.636199][ T5235] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10
[ 79.642545][ T5235] ? do_syscall_64+0x100/0x230
[ 79.647517][ T5235] do_syscall_64+0xf3/0x230
[ 79.652121][ T5235] ? clear_bhb_loop+0x35/0x90
[ 79.656903][ T5235] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 79.662983][ T5235] RIP: 0033:0x7f5360d6b4e9
[ 79.667436][ T5235] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 79.687101][ T5235] RSP: 002b:00007fff29b3a458 EFLAGS: 00000246 ORIG_RAX: 000000000000002f
[ 79.695635][ T5235] RAX: ffffffffffffffda RBX: 00007fff29b3a638 RCX: 00007f5360d6b4e9
[ 79.703713][ T5235] RDX: 0000000000002001 RSI: 0000000020000640 RDI: 0000000000000003
[ 79.711805][ T5235] RBP: 00007f5360dde610 R08: 0000000000000000 R09: 0000000000000000
[ 79.719796][ T5235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 79.727787][ T5235] R13: 00007fff29b3a628 R14: 0000000000000001 R15: 0000000000000001
[ 79.735995][ T5235]
[ 79.739518][ T5235] Kernel Offset: disabled
[ 79.743863][ T5235] Rebooting in 86400 seconds..