binder: 11612:11619 ERROR: BC_REGISTER_LOOPER called without request binder: release 11612:11619 transaction 49 out, still active ================================================================== BUG: KASAN: use-after-free in take_option security/selinux/hooks.c:2619 [inline] BUG: KASAN: use-after-free in selinux_sb_copy_data+0x1cd/0x380 security/selinux/hooks.c:2674 Write of size 10 at addr ffff8801c30eb000 by task syz-executor3/11635 CPU: 0 PID: 11635 Comm: syz-executor3 Not tainted 4.9.122-g54068d6 #78 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801b92374c8 ffffffff81eb8829[ 201.638619] binder: unexpected work type, 4, not freed binder: undelivered TRANSACTION_COMPLETE binder: send failed reply for transaction 52 to 11612:11619 ffffea00070c3ac0 ffff8801c30eb000 0000000000000001 ffff8801c30eb000 000000000000000a ffff8801b9237500 ffffffff8156b6be ffff8801c30eb000 000000000000000a 0000000000000001 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] print_address_description+0x6c/0x234 mm/kasan/report.c:256 [] kasan_report_error mm/kasan/report.c:355 [inline] [] kasan_report.cold.6+0x242/0x2fe mm/kasan/report.c:412 [] check_memory_region_inline mm/kasan/kasan.c:318 [inline] [] check_memory_region+0x14f/0x1b0 mm/kasan/kasan.c:325 [] memcpy+0x37/0x50 mm/kasan/kasan.c:361 [] take_option security/selinux/hooks.c:2619 [inline] [] selinux_sb_copy_data+0x1cd/0x380 security/selinux/hooks.c:2674 [] security_sb_copy_data+0x7b/0xb0 security/security.c:283 [] parse_security_options+0x36/0x90 fs/btrfs/super.c:1493 [] btrfs_mount+0x2f3/0x2bc0 fs/btrfs/super.c:1572 [] mount_fs+0x28c/0x370 fs/super.c:1206 [] vfs_kern_mount.part.29+0xd1/0x3d0 fs/namespace.c:1000 [] vfs_kern_mount+0x40/0x60 fs/namespace.c:982 [] mount_subvol fs/btrfs/super.c:1395 [inline] [] btrfs_mount+0x40b/0x2bc0 fs/btrfs/super.c:1566 [] mount_fs+0x28c/0x370 fs/super.c:1206 [] vfs_kern_mount.part.29+0xd1/0x3d0 fs/namespace.c:1000 [] vfs_kern_mount fs/namespace.c:982 [inline] [] do_new_mount fs/namespace.c:2537 [inline] [] do_mount+0x3c9/0x2740 fs/namespace.c:2859 [] SYSC_mount fs/namespace.c:3075 [inline] [] SyS_mount+0xfe/0x110 fs/namespace.c:3052 [] do_syscall_64+0x1a6/0x490 arch/x86/entry/common.c:282 [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Allocated by task 2354: save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:57 save_stack+0x43/0xd0 mm/kasan/kasan.c:505 set_track mm/kasan/kasan.c:517 [inline] kasan_kmalloc+0xc7/0xe0 mm/kasan/kasan.c:609 kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:547 slab_post_alloc_hook mm/slab.h:417 [inline] slab_alloc_node mm/slub.c:2715 [inline] slab_alloc mm/slub.c:2723 [inline] kmem_cache_alloc+0xbe/0x290 mm/slub.c:2728 dup_mmap kernel/fork.c:619 [inline] dup_mm kernel/fork.c:1156 [inline] copy_mm kernel/fork.c:1210 [inline] copy_process.part.51+0x3eed/0x6330 kernel/fork.c:1678 copy_process kernel/fork.c:1503 [inline] _do_fork+0x1b0/0xdd0 kernel/fork.c:1963 SYSC_clone kernel/fork.c:2075 [inline] SyS_clone+0x37/0x50 kernel/fork.c:2069 do_syscall_64+0x1a6/0x490 arch/x86/entry/common.c:282 entry_SYSCALL_64_after_swapgs+0x5d/0xdb Freed by task 11386: save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:57 save_stack+0x43/0xd0 mm/kasan/kasan.c:505 set_track mm/kasan/kasan.c:517 [inline] kasan_slab_free+0x72/0xc0 mm/kasan/kasan.c:582 slab_free_hook mm/slub.c:1355 [inline] slab_free_freelist_hook mm/slub.c:1377 [inline] slab_free mm/slub.c:2958 [inline] kmem_cache_free+0xbe/0x310 mm/slub.c:2980 remove_vma+0x11f/0x160 mm/mmap.c:175 exit_mmap+0x2a3/0x3f0 mm/mmap.c:3032 __mmput kernel/fork.c:884 [inline] mmput+0xf3/0x2d0 kernel/fork.c:906 exec_mmap fs/exec.c:1053 [inline] flush_old_exec+0x88e/0x1bf0 fs/exec.c:1277 load_elf_binary+0x889/0x4be0 fs/binfmt_elf.c:842 search_binary_handler+0x14f/0x6f0 fs/exec.c:1621 exec_binprm fs/exec.c:1663 [inline] do_execveat_common.isra.40+0x11c5/0x1f30 fs/exec.c:1785 do_execve fs/exec.c:1829 [inline] SYSC_execve fs/exec.c:1910 [inline] SyS_execve+0x42/0x50 fs/exec.c:1905 do_syscall_64+0x1a6/0x490 arch/x86/entry/common.c:282 entry_SYSCALL_64_after_swapgs+0x5d/0xdb The buggy address belongs to the object at ffff8801c30eb000 which belongs to the cache vm_area_struct of size 184 The buggy address is located 0 bytes inside of 184-byte region [ffff8801c30eb000, ffff8801c30eb0b8) The buggy address belongs to the page: page:ffffea00070c3ac0 count:1 mapcount:0 mapping: (null) index:0x0 flags: 0x8000000000000080(slab) page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801c30eaf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801c30eaf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8801c30eb000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb binder: BINDER_SET_CONTEXT_MGR already set binder: 11612:11647 ioctl 40046207 0 returned -16 binder_alloc: 11612: binder_alloc_buf, no vma binder: 11612:11619 transaction failed 29189/-3, size 24-8 line 3136 binder: 11612:11619 ERROR: BC_REGISTER_LOOPER called without request binder: 11612:11619 got transaction to invalid handle binder: 11612:11619 transaction failed 29201/-22, size 0-0 line 3013 binder: release 11612:11619 transaction 49 in, still active binder: send failed reply for transaction 49, target dead binder: undelivered TRANSACTION_COMPLETE binder: undelivered TRANSACTION_ERROR: 29189 ^ ffff8801c30eb080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fb ffff8801c30eb100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ================================================================== SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8242 sclass=netlink_route_socket pig=11630 comm=syz-executor3 binder: undelivered TRANSACTION_ERROR: 29189 binder: undelivered TRANSACTION_ERROR: 29201 sd 0:0:1:0: [sg0] tag#859 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#859 CDB: opcode=0xab, sa=0x0 sd 0:0:1:0: [sg0] tag#859 CDB[00]: ab c0 b5 01 df 7e b6 00 d6 11 7a f1 c0 65 ee 58 sd 0:0:1:0: [sg0] tag#859 CDB[10]: e6 08 ae ea 11 9c e1 2e 64 a0 59 77 af a6 18 61 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8242 sclass=netlink_route_socket pig=11672 comm=syz-executor3 sd 0:0:1:0: [sg0] tag#859 CDB[20]: 3b