./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1784431628 <...> Warning: Permanently added '10.128.0.177' (ED25519) to the list of known hosts. execve("./syz-executor1784431628", ["./syz-executor1784431628"], 0x7fff3773dd60 /* 10 vars */) = 0 brk(NULL) = 0x55556e6ae000 brk(0x55556e6aed00) = 0x55556e6aed00 arch_prctl(ARCH_SET_FS, 0x55556e6ae380) = 0 set_tid_address(0x55556e6ae650) = 5235 set_robust_list(0x55556e6ae660, 24) = 0 rseq(0x55556e6aeca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor1784431628", 4096) = 28 getrandom("\xc5\xb6\xd4\xec\x47\x4e\x66\x1c", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55556e6aed00 brk(0x55556e6cfd00) = 0x55556e6cfd00 brk(0x55556e6d0000) = 0x55556e6d0000 mprotect(0x7f5360dde000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 write(1, "executing program\n", 18executing program ) = 18 socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 4]) = 0 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\xdb", iov_len=1}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, MSG_OOB|MSG_DONTWAIT) = 1 recvmsg(3, {msg_name=NULL, msg_namelen=0, msg_iov=NULL, msg_iovlen=0, msg_controllen=0, msg_flags=MSG_OOB}, MSG_OOB|MSG_WAITFORONE) = 1 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x11", iov_len=1}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, MSG_OOB|MSG_NOSIGNAL|MSG_MORE) = 1 recvfrom(3, "\x11", 125, MSG_DONTROUTE|MSG_TRUNC, NULL, NULL) = 1 [ 78.582550][ T5235] ================================================================== [ 78.590850][ T5235] BUG: KASAN: slab-use-after-free in unix_stream_read_actor+0xa6/0xb0 [ 78.599093][ T5235] Read of size 4 at addr ffff8880326abcc4 by task syz-executor178/5235 [ 78.607332][ T5235] [ 78.609769][ T5235] CPU: 0 UID: 0 PID: 5235 Comm: syz-executor178 Not tainted 6.11.0-rc5-syzkaller-00742-gfbdaffe41adc #0 [ 78.621065][ T5235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 78.631157][ T5235] Call Trace: [ 78.634452][ T5235] [ 78.637394][ T5235] dump_stack_lvl+0x241/0x360 [ 78.642101][ T5235] ? __pfx_dump_stack_lvl+0x10/0x10 [ 78.647309][ T5235] ? __pfx__printk+0x10/0x10 [ 78.651910][ T5235] ? _printk+0xd5/0x120 [ 78.656075][ T5235] ? __virt_addr_valid+0x183/0x530 [ 78.661194][ T5235] ? __virt_addr_valid+0x183/0x530 [ 78.666334][ T5235] print_report+0x169/0x550 [ 78.670916][ T5235] ? __virt_addr_valid+0x183/0x530 [ 78.676055][ T5235] ? __virt_addr_valid+0x183/0x530 [ 78.681200][ T5235] ? __virt_addr_valid+0x45f/0x530 [ 78.686322][ T5235] ? __phys_addr+0xba/0x170 [ 78.690834][ T5235] ? unix_stream_read_actor+0xa6/0xb0 [ 78.696228][ T5235] kasan_report+0x143/0x180 [ 78.700761][ T5235] ? unix_stream_read_actor+0xa6/0xb0 [ 78.706155][ T5235] unix_stream_read_actor+0xa6/0xb0 [ 78.711477][ T5235] unix_stream_recv_urg+0x1df/0x320 [ 78.716983][ T5235] unix_stream_read_generic+0x2456/0x2520 [ 78.722985][ T5235] ? aa_label_sk_perm+0x4f0/0x6d0 [ 78.728033][ T5235] ? __pfx_aa_label_sk_perm+0x10/0x10 [ 78.733425][ T5235] ? mark_lock+0x9a/0x350 [ 78.737866][ T5235] ? __pfx_unix_stream_read_generic+0x10/0x10 [ 78.743957][ T5235] ? aa_sk_perm+0x96d/0xab0 [ 78.748498][ T5235] unix_stream_recvmsg+0x22b/0x2c0 [ 78.753629][ T5235] ? __pfx_unix_stream_recvmsg+0x10/0x10 [ 78.759376][ T5235] ? __pfx_unix_stream_read_actor+0x10/0x10 [ 78.765392][ T5235] ? __pfx___might_resched+0x10/0x10 [ 78.770749][ T5235] ? aa_sock_msg_perm+0x91/0x160 [ 78.775755][ T5235] ? bpf_lsm_socket_recvmsg+0x9/0x10 [ 78.781063][ T5235] ? security_socket_recvmsg+0x90/0xb0 [ 78.786713][ T5235] ? __pfx_unix_stream_recvmsg+0x10/0x10 [ 78.792445][ T5235] sock_recvmsg+0x22f/0x280 [ 78.796968][ T5235] ____sys_recvmsg+0x1db/0x470 [ 78.801762][ T5235] ? __pfx_____sys_recvmsg+0x10/0x10 [ 78.807185][ T5235] __sys_recvmsg+0x2f0/0x3e0 [ 78.811813][ T5235] ? __pfx___sys_recvmsg+0x10/0x10 [ 78.816978][ T5235] ? lockdep_hardirqs_on+0x99/0x150 [ 78.822195][ T5235] ? _raw_spin_unlock_irq+0x2e/0x50 [ 78.827434][ T5235] ? ptrace_notify+0x279/0x380 [ 78.832243][ T5235] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 78.838619][ T5235] ? do_syscall_64+0x100/0x230 [ 78.843759][ T5235] do_syscall_64+0xf3/0x230 [ 78.848319][ T5235] ? clear_bhb_loop+0x35/0x90 [ 78.853053][ T5235] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 78.858996][ T5235] RIP: 0033:0x7f5360d6b4e9 [ 78.863692][ T5235] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 78.883417][ T5235] RSP: 002b:00007fff29b3a458 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 78.891910][ T5235] RAX: ffffffffffffffda RBX: 00007fff29b3a638 RCX: 00007f5360d6b4e9 [ 78.899908][ T5235] RDX: 0000000000002001 RSI: 0000000020000640 RDI: 0000000000000003 [ 78.907910][ T5235] RBP: 00007f5360dde610 R08: 0000000000000000 R09: 0000000000000000 [ 78.915939][ T5235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.923975][ T5235] R13: 00007fff29b3a628 R14: 0000000000000001 R15: 0000000000000001 [ 78.932490][ T5235] [ 78.935614][ T5235] [ 78.937938][ T5235] Allocated by task 5235: [ 78.942265][ T5235] kasan_save_track+0x3f/0x80 [ 78.946957][ T5235] __kasan_slab_alloc+0x66/0x80 [ 78.951982][ T5235] kmem_cache_alloc_node_noprof+0x16b/0x320 [ 78.957887][ T5235] __alloc_skb+0x1c3/0x440 [ 78.962656][ T5235] alloc_skb_with_frags+0xc3/0x770 [ 78.967779][ T5235] sock_alloc_send_pskb+0x91a/0xa60 [ 78.972993][ T5235] queue_oob+0x108/0x680 [ 78.977242][ T5235] unix_stream_sendmsg+0xd24/0xf80 [ 78.982357][ T5235] __sock_sendmsg+0x221/0x270 [ 78.987046][ T5235] ____sys_sendmsg+0x525/0x7d0 [ 78.991822][ T5235] __sys_sendmsg+0x2b0/0x3a0 [ 78.996418][ T5235] do_syscall_64+0xf3/0x230 [ 79.000929][ T5235] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.006922][ T5235] [ 79.009244][ T5235] Freed by task 5235: [ 79.013222][ T5235] kasan_save_track+0x3f/0x80 [ 79.018006][ T5235] kasan_save_free_info+0x40/0x50 [ 79.023145][ T5235] poison_slab_object+0xe0/0x150 [ 79.028099][ T5235] __kasan_slab_free+0x37/0x60 [ 79.032877][ T5235] kmem_cache_free+0x145/0x350 [ 79.037649][ T5235] unix_stream_read_generic+0x1ef6/0x2520 [ 79.043384][ T5235] unix_stream_recvmsg+0x22b/0x2c0 [ 79.048518][ T5235] sock_recvmsg+0x22f/0x280 [ 79.053137][ T5235] __sys_recvfrom+0x256/0x3e0 [ 79.057835][ T5235] __x64_sys_recvfrom+0xde/0x100 [ 79.062867][ T5235] do_syscall_64+0xf3/0x230 [ 79.067898][ T5235] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.073803][ T5235] [ 79.076131][ T5235] The buggy address belongs to the object at ffff8880326abc80 [ 79.076131][ T5235] which belongs to the cache skbuff_head_cache of size 240 [ 79.090710][ T5235] The buggy address is located 68 bytes inside of [ 79.090710][ T5235] freed 240-byte region [ffff8880326abc80, ffff8880326abd70) [ 79.104518][ T5235] [ 79.106863][ T5235] The buggy address belongs to the physical page: [ 79.113288][ T5235] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x326ab [ 79.122060][ T5235] ksm flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 79.129523][ T5235] page_type: 0xfdffffff(slab) [ 79.134205][ T5235] raw: 00fff00000000000 ffff88801eaee780 ffffea0000b7dc80 dead000000000003 [ 79.143318][ T5235] raw: 0000000000000000 00000000800c000c 00000001fdffffff 0000000000000000 [ 79.151897][ T5235] page dumped because: kasan: bad access detected [ 79.158321][ T5235] page_owner tracks the page as allocated [ 79.164036][ T5235] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x52cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 4686, tgid 4686 (udevadm), ts 32357469485, free_ts 28829011109 [ 79.183333][ T5235] post_alloc_hook+0x1f3/0x230 [ 79.188112][ T5235] get_page_from_freelist+0x2e4c/0x2f10 [ 79.193680][ T5235] __alloc_pages_noprof+0x256/0x6c0 [ 79.198890][ T5235] alloc_slab_page+0x5f/0x120 [ 79.203579][ T5235] allocate_slab+0x5a/0x2f0 [ 79.208089][ T5235] ___slab_alloc+0xcd1/0x14b0 [ 79.212771][ T5235] __slab_alloc+0x58/0xa0 [ 79.217103][ T5235] kmem_cache_alloc_node_noprof+0x1fe/0x320 [ 79.223003][ T5235] __alloc_skb+0x1c3/0x440 [ 79.227441][ T5235] alloc_uevent_skb+0x74/0x230 [ 79.232309][ T5235] kobject_uevent_net_broadcast+0x2fd/0x580 [ 79.238408][ T5235] kobject_uevent_env+0x57d/0x8e0 [ 79.243737][ T5235] kobject_synth_uevent+0x4ef/0xae0 [ 79.249059][ T5235] uevent_store+0x4b/0x70 [ 79.253501][ T5235] kernfs_fop_write_iter+0x3a1/0x500 [ 79.258935][ T5235] vfs_write+0xa72/0xc90 [ 79.263299][ T5235] page last free pid 1 tgid 1 stack trace: [ 79.269458][ T5235] free_unref_page+0xd22/0xea0 [ 79.274240][ T5235] kasan_depopulate_vmalloc_pte+0x74/0x90 [ 79.279983][ T5235] __apply_to_page_range+0x8a8/0xe50 [ 79.285287][ T5235] kasan_release_vmalloc+0x9a/0xb0 [ 79.290411][ T5235] purge_vmap_node+0x3e3/0x770 [ 79.295185][ T5235] __purge_vmap_area_lazy+0x708/0xae0 [ 79.300563][ T5235] _vm_unmap_aliases+0x79d/0x840 [ 79.305533][ T5235] change_page_attr_set_clr+0x2fe/0xdb0 [ 79.311087][ T5235] set_memory_nx+0xf2/0x130 [ 79.315602][ T5235] free_initmem+0x79/0x110 [ 79.320039][ T5235] kernel_init+0x31/0x2b0 [ 79.324390][ T5235] ret_from_fork+0x4b/0x80 [ 79.328822][ T5235] ret_from_fork_asm+0x1a/0x30 [ 79.333694][ T5235] [ 79.336019][ T5235] Memory state around the buggy address: [ 79.341646][ T5235] ffff8880326abb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 79.349714][ T5235] ffff8880326abc00: fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc [ 79.357796][ T5235] >ffff8880326abc80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 79.365875][ T5235] ^ [ 79.372034][ T5235] ffff8880326abd00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc [ 79.380123][ T5235] ffff8880326abd80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 79.388366][ T5235] ================================================================== [ 79.396830][ T5235] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 79.404170][ T5235] CPU: 1 UID: 0 PID: 5235 Comm: syz-executor178 Not tainted 6.11.0-rc5-syzkaller-00742-gfbdaffe41adc #0 [ 79.415308][ T5235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 79.425391][ T5235] Call Trace: [ 79.428777][ T5235] [ 79.431714][ T5235] dump_stack_lvl+0x241/0x360 [ 79.436508][ T5235] ? __pfx_dump_stack_lvl+0x10/0x10 [ 79.441728][ T5235] ? __pfx__printk+0x10/0x10 [ 79.446415][ T5235] ? preempt_schedule+0xe1/0xf0 [ 79.451286][ T5235] ? vscnprintf+0x5d/0x90 [ 79.455635][ T5235] panic+0x349/0x860 [ 79.459649][ T5235] ? check_panic_on_warn+0x21/0xb0 [ 79.464773][ T5235] ? __pfx_panic+0x10/0x10 [ 79.469288][ T5235] ? _raw_spin_unlock_irqrestore+0x130/0x140 [ 79.475292][ T5235] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 79.481653][ T5235] ? print_report+0x502/0x550 [ 79.486444][ T5235] check_panic_on_warn+0x86/0xb0 [ 79.491398][ T5235] ? unix_stream_read_actor+0xa6/0xb0 [ 79.496784][ T5235] end_report+0x77/0x160 [ 79.501056][ T5235] kasan_report+0x154/0x180 [ 79.505587][ T5235] ? unix_stream_read_actor+0xa6/0xb0 [ 79.510990][ T5235] unix_stream_read_actor+0xa6/0xb0 [ 79.516217][ T5235] unix_stream_recv_urg+0x1df/0x320 [ 79.521437][ T5235] unix_stream_read_generic+0x2456/0x2520 [ 79.527174][ T5235] ? aa_label_sk_perm+0x4f0/0x6d0 [ 79.532235][ T5235] ? __pfx_aa_label_sk_perm+0x10/0x10 [ 79.537648][ T5235] ? mark_lock+0x9a/0x350 [ 79.542087][ T5235] ? __pfx_unix_stream_read_generic+0x10/0x10 [ 79.548215][ T5235] ? aa_sk_perm+0x96d/0xab0 [ 79.552738][ T5235] unix_stream_recvmsg+0x22b/0x2c0 [ 79.557863][ T5235] ? __pfx_unix_stream_recvmsg+0x10/0x10 [ 79.563512][ T5235] ? __pfx_unix_stream_read_actor+0x10/0x10 [ 79.569524][ T5235] ? __pfx___might_resched+0x10/0x10 [ 79.574834][ T5235] ? aa_sock_msg_perm+0x91/0x160 [ 79.579879][ T5235] ? bpf_lsm_socket_recvmsg+0x9/0x10 [ 79.585182][ T5235] ? security_socket_recvmsg+0x90/0xb0 [ 79.590657][ T5235] ? __pfx_unix_stream_recvmsg+0x10/0x10 [ 79.596304][ T5235] sock_recvmsg+0x22f/0x280 [ 79.600823][ T5235] ____sys_recvmsg+0x1db/0x470 [ 79.605607][ T5235] ? __pfx_____sys_recvmsg+0x10/0x10 [ 79.611099][ T5235] __sys_recvmsg+0x2f0/0x3e0 [ 79.615729][ T5235] ? __pfx___sys_recvmsg+0x10/0x10 [ 79.620959][ T5235] ? lockdep_hardirqs_on+0x99/0x150 [ 79.626189][ T5235] ? _raw_spin_unlock_irq+0x2e/0x50 [ 79.631412][ T5235] ? ptrace_notify+0x279/0x380 [ 79.636199][ T5235] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 79.642545][ T5235] ? do_syscall_64+0x100/0x230 [ 79.647517][ T5235] do_syscall_64+0xf3/0x230 [ 79.652121][ T5235] ? clear_bhb_loop+0x35/0x90 [ 79.656903][ T5235] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.662983][ T5235] RIP: 0033:0x7f5360d6b4e9 [ 79.667436][ T5235] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 79.687101][ T5235] RSP: 002b:00007fff29b3a458 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 79.695635][ T5235] RAX: ffffffffffffffda RBX: 00007fff29b3a638 RCX: 00007f5360d6b4e9 [ 79.703713][ T5235] RDX: 0000000000002001 RSI: 0000000020000640 RDI: 0000000000000003 [ 79.711805][ T5235] RBP: 00007f5360dde610 R08: 0000000000000000 R09: 0000000000000000 [ 79.719796][ T5235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 79.727787][ T5235] R13: 00007fff29b3a628 R14: 0000000000000001 R15: 0000000000000001 [ 79.735995][ T5235] [ 79.739518][ T5235] Kernel Offset: disabled [ 79.743863][ T5235] Rebooting in 86400 seconds..