KASAN: slab-use-after-free Write in binder_add_device
==================================================================
BUG: KASAN: slab-use-after-free in hlist_add_head include/linux/list.h:1026 [inline]
BUG: KASAN: slab-use-after-free in binder_add_device+0x5f/0xa0 drivers/android/binder.c:6932
Write of size 8 at addr ffff888102f87b08 by task syz-executor/321
CPU: 0 UID: 0 PID: 321 Comm: syz-executor Not tainted 6.14.0-rc3-syzkaller-00295-g27102b38b8ca #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x184/0x200 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:408 [inline]
print_report+0x163/0x570 mm/kasan/report.c:521
kasan_report+0x15f/0x190 mm/kasan/report.c:634
__asan_report_store8_noabort+0x17/0x20 mm/kasan/report_generic.c:386
hlist_add_head include/linux/list.h:1026 [inline]
binder_add_device+0x5f/0xa0 drivers/android/binder.c:6932
binderfs_binder_device_create+0x841/0xaa0 drivers/android/binderfs.c:210
binderfs_fill_super+0x8fb/0xdd0 drivers/android/binderfs.c:729
vfs_get_super fs/super.c:1280 [inline]
get_tree_nodev+0xb9/0x160 fs/super.c:1299
binderfs_fs_context_get_tree+0x1c/0x30 drivers/android/binderfs.c:749
vfs_get_tree+0x8c/0x2c0 fs/super.c:1814
do_new_mount+0x2ba/0xb40 fs/namespace.c:3560
path_mount+0x67c/0x1000 fs/namespace.c:3887
do_mount fs/namespace.c:3900 [inline]
__do_sys_mount fs/namespace.c:4111 [inline]
__se_sys_mount+0x2c1/0x3b0 fs/namespace.c:4088
__x64_sys_mount+0xbf/0xe0 fs/namespace.c:4088
x64_sys_call+0x2c9e/0x2df0 arch/x86/include/generated/asm/syscalls_64.h:166
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x50/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7f7a6b38e58a
Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff47c82bd8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007f7a6b40e663 RCX: 00007f7a6b38e58a
RDX: 00007f7a6b41dda7 RSI: 00007f7a6b40e663 RDI: 00007f7a6b41dda7
RBP: 00007f7a6b40e8ac R08: 0000000000000000 R09: 00000000000001ff
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7a6b3eb1a8
R13: 00007f7a6b3eb180 R14: 0000000000000009 R15: 0000000000000000
Allocated by task 316:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3b/0x70 mm/kasan/common.c:68
kasan_save_alloc_info+0x38/0x50 mm/kasan/generic.c:562
poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
__kasan_kmalloc+0x99/0xb0 mm/kasan/common.c:394
kasan_kmalloc include/linux/kasan.h:260 [inline]
__kmalloc_cache_noprof+0x15f/0x2d0 mm/slub.c:4325
kmalloc_noprof include/linux/slab.h:901 [inline]
kzalloc_noprof include/linux/slab.h:1037 [inline]
binderfs_binder_device_create+0x159/0xaa0 drivers/android/binderfs.c:147
binderfs_fill_super+0x8fb/0xdd0 drivers/android/binderfs.c:729
vfs_get_super fs/super.c:1280 [inline]
get_tree_nodev+0xb9/0x160 fs/super.c:1299
binderfs_fs_context_get_tree+0x1c/0x30 drivers/android/binderfs.c:749
vfs_get_tree+0x8c/0x2c0 fs/super.c:1814
do_new_mount+0x2ba/0xb40 fs/namespace.c:3560
path_mount+0x67c/0x1000 fs/namespace.c:3887
do_mount fs/namespace.c:3900 [inline]
__do_sys_mount fs/namespace.c:4111 [inline]
__se_sys_mount+0x2c1/0x3b0 fs/namespace.c:4088
__x64_sys_mount+0xbf/0xe0 fs/namespace.c:4088
x64_sys_call+0x2c9e/0x2df0 arch/x86/include/generated/asm/syscalls_64.h:166
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x50/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x76/0x7e
Freed by task 316:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3b/0x70 mm/kasan/common.c:68
kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:576
poison_slab_object mm/kasan/common.c:247 [inline]
__kasan_slab_free+0x53/0x70 mm/kasan/common.c:264
kasan_slab_free include/linux/kasan.h:233 [inline]
slab_free_hook mm/slub.c:2353 [inline]
slab_free mm/slub.c:4609 [inline]
kfree+0x13b/0x350 mm/slub.c:4757
binderfs_evict_inode+0x187/0x220 drivers/android/binderfs.c:278
evict+0x4a7/0x930 fs/inode.c:796
iput_final fs/inode.c:1946 [inline]
iput+0x5ff/0x920 fs/inode.c:1972
dentry_unlink_inode+0x389/0x460 fs/dcache.c:440
__dentry_kill+0x207/0x640 fs/dcache.c:643
shrink_kill fs/dcache.c:1088 [inline]
shrink_dentry_list+0x315/0x510 fs/dcache.c:1115
shrink_dcache_parent+0xce/0x340
do_one_tree+0x27/0xf0 fs/dcache.c:1578
shrink_dcache_for_umount+0xa3/0x140 fs/dcache.c:1595
generic_shutdown_super+0x69/0x300 fs/super.c:620
kill_anon_super+0x46/0x1e0 fs/super.c:1237
kill_litter_super+0x56/0x60 fs/super.c:1247
binderfs_kill_super+0x41/0x60 drivers/android/binderfs.c:791
deactivate_locked_super+0xd8/0x290 fs/super.c:473
deactivate_super+0xc6/0xf0 fs/super.c:506
cleanup_mnt+0x42d/0x4d0 fs/namespace.c:1413
__cleanup_mnt+0x19/0x20 fs/namespace.c:1420
task_work_run+0x252/0x2e0 kernel/task_work.c:227
exit_task_work include/linux/task_work.h:40 [inline]
do_exit+0xb39/0x2ab0 kernel/exit.c:938
do_group_exit+0x21b/0x2d0 kernel/exit.c:1087
get_signal+0x1553/0x1690 kernel/signal.c:3036
arch_do_signal_or_restart+0x92/0x7d0 arch/x86/kernel/signal.c:337
exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline]
__syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
syscall_exit_to_user_mode+0x5f/0x110 kernel/entry/common.c:218
do_syscall_64+0x5c/0x110 arch/x86/entry/common.c:89
entry_SYSCALL_64_after_hwframe+0x76/0x7e
The buggy address belongs to the object at ffff888102f87b00
which belongs to the cache kmalloc-192 of size 192
The buggy address is located 8 bytes inside of
freed 192-byte region [ffff888102f87b00, ffff888102f87bc0)
The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f87
flags: 0x4000000000000000(zone=1)
page_type: f5(slab)
raw: 4000000000000000 ffff8881000413c0 ffffea00040be440 dead000000000004
raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x52c00(GFP_NOIO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 1, tgid 1 (swapper/0), ts 2735412607, free_ts 0
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x1db/0x200 mm/page_alloc.c:1551
prep_new_page mm/page_alloc.c:1559 [inline]
get_page_from_freelist+0x47ee/0x4880 mm/page_alloc.c:3477
__alloc_frozen_pages_noprof+0x3c3/0x7d0 mm/page_alloc.c:4739
allocate_slab+0x76/0x420 mm/slub.c:2587
new_slab mm/slub.c:2640 [inline]
___slab_alloc+0x767/0xc00 mm/slub.c:3826
__slab_alloc+0x5d/0xb0 mm/slub.c:3916
__slab_alloc_node mm/slub.c:3991 [inline]
slab_alloc_node mm/slub.c:4152 [inline]
__do_kmalloc_node mm/slub.c:4293 [inline]
__kmalloc_noprof+0x206/0x3f0 mm/slub.c:4306
kmalloc_noprof include/linux/slab.h:905 [inline]
usb_alloc_urb+0x44/0x160 drivers/usb/core/urb.c:75
usb_internal_control_msg drivers/usb/core/message.c:96 [inline]
usb_control_msg+0x185/0x4c0 drivers/usb/core/message.c:154
get_hub_status drivers/usb/core/hub.c:587 [inline]
hub_hub_status+0xc1/0x580 drivers/usb/core/hub.c:991
hub_configure drivers/usb/core/hub.c:1668 [inline]
hub_probe+0x1bac/0x2ae0 drivers/usb/core/hub.c:1977
usb_probe_interface+0x668/0xbb0 drivers/usb/core/driver.c:396
really_probe+0x2b9/0x830 drivers/base/dd.c:658
__driver_probe_device+0x19d/0x310 drivers/base/dd.c:800
driver_probe_device+0x54/0x3e0 drivers/base/dd.c:830
__device_attach_driver+0x2e6/0x490 drivers/base/dd.c:958
page_owner free stack trace missing
Memory state around the buggy address:
ffff888102f87a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
ffff888102f87a80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
>ffff888102f87b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
^
ffff888102f87b80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
ffff888102f87c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================
[ 4.534241][ T105] udevd[105]: starting eudev-3.2.11
[ 4.537136][ T104] udevd (104) used greatest stack depth: 22640 bytes left
[ 21.157636][ T30] kauditd_printk_skb: 50 callbacks suppressed
[ 21.157657][ T30] audit: type=1400 audit(1740328324.350:61): avc: denied { transition } for pid=278 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 21.165752][ T30] audit: type=1400 audit(1740328324.350:62): avc: denied { noatsecure } for pid=278 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 21.171120][ T30] audit: type=1400 audit(1740328324.350:63): avc: denied { write } for pid=278 comm="sh" path="pipe:[2168]" dev="pipefs" ino=2168 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1
[ 21.177103][ T30] audit: type=1400 audit(1740328324.350:64): avc: denied { rlimitinh } for pid=278 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 21.186093][ T30] audit: type=1400 audit(1740328324.350:65): avc: denied { siginh } for pid=278 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 23.032900][ T282] sftp-server (282) used greatest stack depth: 22544 bytes left
[ 23.042571][ T279] sshd (279) used greatest stack depth: 21584 bytes left
Warning: Permanently added '10.128.1.92' (ED25519) to the list of known hosts.
2025/02/23 16:32:13 ignoring optional flag "sandboxArg"="0"
2025/02/23 16:32:14 parsed 1 programs
[ 31.297802][ T30] audit: type=1400 audit(1740328334.490:66): avc: denied { node_bind } for pid=299 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 32.474725][ T30] audit: type=1400 audit(1740328335.660:67): avc: denied { mounton } for pid=308 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 32.476105][ T308] cgroup: Unknown subsys name 'net'
[ 32.497220][ T30] audit: type=1400 audit(1740328335.660:68): avc: denied { mount } for pid=308 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 32.524195][ T30] audit: type=1400 audit(1740328335.690:69): avc: denied { unmount } for pid=308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 32.524364][ T308] cgroup: Unknown subsys name 'devices'
[ 32.647664][ T308] cgroup: Unknown subsys name 'cpuset'
[ 32.653583][ T308] cgroup: Unknown subsys name 'hugetlb'
[ 32.659118][ T308] cgroup: Unknown subsys name 'rlimit'
[ 32.664437][ T308] cgroup: Unknown subsys name 'memory'
[ 32.778420][ T30] audit: type=1400 audit(1740328335.970:70): avc: denied { setattr } for pid=308 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 32.800988][ T313] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 32.801476][ T30] audit: type=1400 audit(1740328335.970:71): avc: denied { create } for pid=308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 32.830414][ T30] audit: type=1400 audit(1740328335.970:72): avc: denied { write } for pid=308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 32.836139][ T308] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 32.850703][ T30] audit: type=1400 audit(1740328335.970:73): avc: denied { read } for pid=308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 32.879016][ T30] audit: type=1400 audit(1740328335.970:74): avc: denied { module_request } for pid=308 comm="syz-executor" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 32.900565][ T30] audit: type=1400 audit(1740328335.970:75): avc: denied { mounton } for pid=308 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 33.561343][ T316] request_module fs-gadgetfs succeeded, but still no fs?
[ 33.719415][ T321] ==================================================================
[ 33.727463][ T321] BUG: KASAN: slab-use-after-free in binder_add_device+0x5f/0xa0
[ 33.734962][ T321] Write of size 8 at addr ffff888102f87b08 by task syz-executor/321
[ 33.742781][ T321]
[ 33.744949][ T321] CPU: 0 UID: 0 PID: 321 Comm: syz-executor Not tainted 6.14.0-rc3-syzkaller-00295-g27102b38b8ca #0
[ 33.744967][ T321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
[ 33.744979][ T321] Call Trace:
[ 33.744984][ T321]
[ 33.744990][ T321] dump_stack_lvl+0x184/0x200
[ 33.745008][ T321] ? __pfx_dump_stack_lvl+0x10/0x10
[ 33.745022][ T321] ? vprintk+0x1d/0x30
[ 33.745038][ T321] ? _printk+0xd1/0x120
[ 33.745055][ T321] print_report+0x163/0x570
[ 33.745070][ T321] ? __virt_addr_valid+0x2a4/0x380
[ 33.745090][ T321] ? kasan_complete_mode_report_info+0x71/0x210
[ 33.745110][ T321] kasan_report+0x15f/0x190
[ 33.745124][ T321] ? binder_add_device+0x5f/0xa0
[ 33.745147][ T321] ? binder_add_device+0x5f/0xa0
[ 33.745168][ T321] __asan_report_store8_noabort+0x17/0x20
[ 33.745188][ T321] binder_add_device+0x5f/0xa0
[ 33.745208][ T321] binderfs_binder_device_create+0x841/0xaa0
[ 33.745231][ T321] binderfs_fill_super+0x8fb/0xdd0
[ 33.745253][ T321] ? __pfx_binderfs_fill_super+0x10/0x10
[ 33.745277][ T321] ? shrinker_register+0x166/0x220
[ 33.745293][ T321] ? sget_fc+0x95b/0xa50
[ 33.745312][ T321] ? __pfx_set_anon_super_fc+0x10/0x10
[ 33.745336][ T321] get_tree_nodev+0xb9/0x160
[ 33.745357][ T321] ? __pfx_binderfs_fill_super+0x10/0x10
[ 33.745377][ T321] binderfs_fs_context_get_tree+0x1c/0x30
[ 33.745410][ T321] vfs_get_tree+0x8c/0x2c0
[ 33.745423][ T321] do_new_mount+0x2ba/0xb40
[ 33.745450][ T321] ? __pfx_do_new_mount+0x10/0x10
[ 33.745463][ T321] ? security_capable+0x7c/0x90
[ 33.745476][ T321] ? ns_capable+0x8a/0xf0
[ 33.745496][ T321] path_mount+0x67c/0x1000
[ 33.745510][ T321] __se_sys_mount+0x2c1/0x3b0
[ 33.745524][ T321] ? __pfx___se_sys_mount+0x10/0x10
[ 33.745540][ T321] __x64_sys_mount+0xbf/0xe0
[ 33.745554][ T321] x64_sys_call+0x2c9e/0x2df0
[ 33.745568][ T321] do_syscall_64+0x50/0x110
[ 33.745583][ T321] ? clear_bhb_loop+0x35/0x90
[ 33.745600][ T321] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 33.745618][ T321] RIP: 0033:0x7f7a6b38e58a
[ 33.745635][ T321] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 33.745646][ T321] RSP: 002b:00007fff47c82bd8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[ 33.745662][ T321] RAX: ffffffffffffffda RBX: 00007f7a6b40e663 RCX: 00007f7a6b38e58a
[ 33.745672][ T321] RDX: 00007f7a6b41dda7 RSI: 00007f7a6b40e663 RDI: 00007f7a6b41dda7
[ 33.745681][ T321] RBP: 00007f7a6b40e8ac R08: 0000000000000000 R09: 00000000000001ff
[ 33.745690][ T321] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7a6b3eb1a8
[ 33.745698][ T321] R13: 00007f7a6b3eb180 R14: 0000000000000009 R15: 0000000000000000
[ 33.745709][ T321]
[ 33.745713][ T321]
[ 34.010929][ T321] Allocated by task 316:
[ 34.015008][ T321] kasan_save_track+0x3b/0x70
[ 34.019520][ T321] kasan_save_alloc_info+0x38/0x50
[ 34.024466][ T321] __kasan_kmalloc+0x99/0xb0
[ 34.028895][ T321] __kmalloc_cache_noprof+0x15f/0x2d0
[ 34.034099][ T321] binderfs_binder_device_create+0x159/0xaa0
[ 34.039917][ T321] binderfs_fill_super+0x8fb/0xdd0
[ 34.044870][ T321] get_tree_nodev+0xb9/0x160
[ 34.049291][ T321] binderfs_fs_context_get_tree+0x1c/0x30
[ 34.054846][ T321] vfs_get_tree+0x8c/0x2c0
[ 34.059100][ T321] do_new_mount+0x2ba/0xb40
[ 34.063436][ T321] path_mount+0x67c/0x1000
[ 34.067689][ T321] __se_sys_mount+0x2c1/0x3b0
[ 34.072202][ T321] __x64_sys_mount+0xbf/0xe0
[ 34.076632][ T321] x64_sys_call+0x2c9e/0x2df0
[ 34.081143][ T321] do_syscall_64+0x50/0x110
[ 34.085484][ T321] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 34.091213][ T321]
[ 34.093381][ T321] Freed by task 316:
[ 34.097112][ T321] kasan_save_track+0x3b/0x70
[ 34.101629][ T321] kasan_save_free_info+0x40/0x50
[ 34.106489][ T321] __kasan_slab_free+0x53/0x70
[ 34.111083][ T321] kfree+0x13b/0x350
[ 34.114818][ T321] binderfs_evict_inode+0x187/0x220
[ 34.119852][ T321] evict+0x4a7/0x930
[ 34.123585][ T321] iput+0x5ff/0x920
[ 34.127232][ T321] dentry_unlink_inode+0x389/0x460
[ 34.132175][ T321] __dentry_kill+0x207/0x640
[ 34.136602][ T321] shrink_dentry_list+0x315/0x510
[ 34.141462][ T321] shrink_dcache_parent+0xce/0x340
[ 34.146413][ T321] do_one_tree+0x27/0xf0
[ 34.150489][ T321] shrink_dcache_for_umount+0xa3/0x140
[ 34.155786][ T321] generic_shutdown_super+0x69/0x300
[ 34.160909][ T321] kill_anon_super+0x46/0x1e0
[ 34.165419][ T321] kill_litter_super+0x56/0x60
[ 34.170069][ T321] binderfs_kill_super+0x41/0x60
[ 34.174789][ T321] deactivate_locked_super+0xd8/0x290
[ 34.180000][ T321] deactivate_super+0xc6/0xf0
[ 34.184514][ T321] cleanup_mnt+0x42d/0x4d0
[ 34.188765][ T321] __cleanup_mnt+0x19/0x20
[ 34.193015][ T321] task_work_run+0x252/0x2e0
[ 34.197446][ T321] do_exit+0xb39/0x2ab0
[ 34.201436][ T321] do_group_exit+0x21b/0x2d0
[ 34.205864][ T321] get_signal+0x1553/0x1690
[ 34.210204][ T321] arch_do_signal_or_restart+0x92/0x7d0
[ 34.215672][ T321] syscall_exit_to_user_mode+0x5f/0x110
[ 34.221050][ T321] do_syscall_64+0x5c/0x110
[ 34.225396][ T321] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 34.231118][ T321]
[ 34.233288][ T321] The buggy address belongs to the object at ffff888102f87b00
[ 34.233288][ T321] which belongs to the cache kmalloc-192 of size 192
[ 34.247175][ T321] The buggy address is located 8 bytes inside of
[ 34.247175][ T321] freed 192-byte region [ffff888102f87b00, ffff888102f87bc0)
[ 34.260630][ T321]
[ 34.262797][ T321] The buggy address belongs to the physical page:
[ 34.269049][ T321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f87
[ 34.277729][ T321] flags: 0x4000000000000000(zone=1)
[ 34.282761][ T321] page_type: f5(slab)
[ 34.286589][ T321] raw: 4000000000000000 ffff8881000413c0 ffffea00040be440 dead000000000004
[ 34.295091][ T321] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[ 34.303502][ T321] page dumped because: kasan: bad access detected
[ 34.309759][ T321] page_owner tracks the page as allocated
[ 34.315308][ T321] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x52c00(GFP_NOIO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 1, tgid 1 (swapper/0), ts 2735412607, free_ts 0
[ 34.332497][ T321] post_alloc_hook+0x1db/0x200
[ 34.337093][ T321] get_page_from_freelist+0x47ee/0x4880
[ 34.342473][ T321] __alloc_frozen_pages_noprof+0x3c3/0x7d0
[ 34.348122][ T321] allocate_slab+0x76/0x420
[ 34.352455][ T321] ___slab_alloc+0x767/0xc00
[ 34.356879][ T321] __slab_alloc+0x5d/0xb0
[ 34.361045][ T321] __kmalloc_noprof+0x206/0x3f0
[ 34.365732][ T321] usb_alloc_urb+0x44/0x160
[ 34.370073][ T321] usb_control_msg+0x185/0x4c0
[ 34.374673][ T321] hub_hub_status+0xc1/0x580
[ 34.379098][ T321] hub_probe+0x1bac/0x2ae0
[ 34.383352][ T321] usb_probe_interface+0x668/0xbb0
[ 34.388307][ T321] really_probe+0x2b9/0x830
[ 34.392643][ T321] __driver_probe_device+0x19d/0x310
[ 34.397759][ T321] driver_probe_device+0x54/0x3e0
[ 34.402620][ T321] __device_attach_driver+0x2e6/0x490
[ 34.407828][ T321] page_owner free stack trace missing
[ 34.413035][ T321]
[ 34.415204][ T321] Memory state around the buggy address:
[ 34.420677][ T321] ffff888102f87a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 34.428575][ T321] ffff888102f87a80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 34.436532][ T321] >ffff888102f87b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 34.444373][ T321] ^
[ 34.448535][ T321] ffff888102f87b80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 34.456433][ T321] ffff888102f87c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 34.464331][ T321] ==================================================================
[ 34.473116][ T321] Disabling lock debugging due to kernel taint
[ 34.564971][ T326] bridge0: port 1(bridge_slave_0) entered blocking state
[ 34.571885][ T326] bridge0: port 1(bridge_slave_0) entered disabled state
[ 34.578813][ T326] bridge_slave_0: entered allmulticast mode
[ 34.584912][ T326] bridge_slave_0: entered promiscuous mode
[ 34.591209][ T326] bridge0: port 2(bridge_slave_1) entered blocking state
[ 34.598249][ T326] bridge0: port 2(bridge_slave_1) entered disabled state
[ 34.605098][ T326] bridge_slave_1: entered allmulticast mode
[ 34.611275][ T326] bridge_slave_1: entered promiscuous mode
[ 34.663442][ T326] bridge0: port 2(bridge_slave_1) entered blocking state
[ 34.670372][ T326] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 34.677460][ T326] bridge0: port 1(bridge_slave_0) entered blocking state
[ 34.684305][ T326] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 34.706621][ T11] bridge0: port 1(bridge_slave_0) entered disabled state
[ 34.713717][ T11] bridge0: port 2(bridge_slave_1) entered disabled state
[ 34.723387][ T12] bridge0: port 1(bridge_slave_0) entered blocking state
[ 34.730250][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 34.738971][ T11] bridge0: port 2(bridge_slave_1) entered blocking state
[ 34.745814][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 34.770203][ T326] veth0_vlan: entered promiscuous mode
[ 34.780867][ T326] veth1_macvtap: entered promiscuous mode
[ 34.818696][ T11] bridge_slave_1: left allmulticast mode
[ 34.818768][ T326] syz-executor (326) used greatest stack depth: 20600 bytes left
[ 34.824157][ T11] bridge_slave_1: left promiscuous mode
[ 34.838645][ T11] bridge0: port 2(bridge_slave_1) entered disabled state
[ 34.846164][ T11] bridge_slave_0: left allmulticast mode
[ 34.852565][ T11] bridge_slave_0: left promiscuous mode
[ 34.858291][ T11] bridge0: port 1(bridge_slave_0) entered disabled state
[ 34.969551][ T11] veth1_macvtap: left promiscuous mode
[ 34.975872][ T11] veth0_vlan: left promiscuous mode
2025/02/23 16:32:18 executed programs: 0
[ 35.732993][ T377] bridge0: port 1(bridge_slave_0) entered blocking state
[ 35.739950][ T377] bridge0: port 1(bridge_slave_0) entered disabled state
[ 35.746879][ T377] bridge_slave_0: entered allmulticast mode
[ 35.752904][ T377] bridge_slave_0: entered promiscuous mode
[ 35.759533][ T377] bridge0: port 2(bridge_slave_1) entered blocking state
[ 35.766415][ T377] bridge0: port 2(bridge_slave_1) entered disabled state
[ 35.773312][ T377] bridge_slave_1: entered allmulticast mode
[ 35.779331][ T377] bridge_slave_1: entered promiscuous mode
[ 35.835078][ T377] bridge0: port 2(bridge_slave_1) entered blocking state
[ 35.841945][ T377] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 35.849143][ T377] bridge0: port 1(bridge_slave_0) entered blocking state
[ 35.855900][ T377] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 35.879854][ T12] bridge0: port 1(bridge_slave_0) entered disabled state
[ 35.887098][ T12] bridge0: port 2(bridge_slave_1) entered disabled state
[ 35.895994][ T335] bridge0: port 1(bridge_slave_0) entered blocking state
[ 35.902941][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 35.911839][ T12] bridge0: port 2(bridge_slave_1) entered blocking state
[ 35.918693][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 35.944471][ T377] veth0_vlan: entered promiscuous mode
[ 35.955053][ T377] veth1_macvtap: entered promiscuous mode
[ 36.021854][ T11] bridge_slave_1: left allmulticast mode
[ 36.027374][ T11] bridge_slave_1: left promiscuous mode
[ 36.032792][ T11] bridge0: port 2(bridge_slave_1) entered disabled state
[ 36.040439][ T11] bridge_slave_0: left allmulticast mode
[ 36.045896][ T11] bridge_slave_0: left promiscuous mode
[ 36.051705][ T11] bridge0: port 1(bridge_slave_0) entered disabled state
syzkaller build log:
go env (err=)
GO111MODULE='auto'
GOARCH='amd64'
GOBIN=''
GOCACHE='/syzkaller/.cache/go-build'
GOENV='/syzkaller/.config/go/env'
GOEXE=''
GOEXPERIMENT=''
GOFLAGS=''
GOHOSTARCH='amd64'
GOHOSTOS='linux'
GOINSECURE=''
GOMODCACHE='/syzkaller/jobs-2/linux/gopath/pkg/mod'
GONOPROXY=''
GONOSUMDB=''
GOOS='linux'
GOPATH='/syzkaller/jobs-2/linux/gopath'
GOPRIVATE=''
GOPROXY='https://proxy.golang.org,direct'
GOROOT='/syzkaller/jobs-2/linux/gopath/pkg/mod/golang.org/toolchain@v0.0.1-go1.23.6.linux-amd64'
GOSUMDB='sum.golang.org'
GOTMPDIR=''
GOTOOLCHAIN='auto'
GOTOOLDIR='/syzkaller/jobs-2/linux/gopath/pkg/mod/golang.org/toolchain@v0.0.1-go1.23.6.linux-amd64/pkg/tool/linux_amd64'
GOVCS=''
GOVERSION='go1.23.6'
GODEBUG=''
GOTELEMETRY='local'
GOTELEMETRYDIR='/syzkaller/.config/go/telemetry'
GCCGO='gccgo'
GOAMD64='v1'
AR='ar'
CC='gcc'
CXX='g++'
CGO_ENABLED='1'
GOMOD='/syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/go.mod'
GOWORK=''
CGO_CFLAGS='-O2 -g'
CGO_CPPFLAGS=''
CGO_CXXFLAGS='-O2 -g'
CGO_FFLAGS='-O2 -g'
CGO_LDFLAGS='-O2 -g'
PKG_CONFIG='pkg-config'
GOGCCFLAGS='-fPIC -m64 -pthread -Wl,--no-gc-sections -fmessage-length=0 -ffile-prefix-map=/tmp/go-build3853750283=/tmp/go-build -gno-record-gcc-switches'
git status (err=)
HEAD detached at ef44b750e8
nothing to commit, working tree clean
tput: No value for $TERM and no -T specified
tput: No value for $TERM and no -T specified
Makefile:31: run command via tools/syz-env for best compatibility, see:
Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env
go list -f '{{.Stale}}' ./sys/syz-sysgen | grep -q false || go install ./sys/syz-sysgen
make .descriptions
tput: No value for $TERM and no -T specified
tput: No value for $TERM and no -T specified
Makefile:31: run command via tools/syz-env for best compatibility, see:
Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env
bin/syz-sysgen
touch .descriptions
GOOS=linux GOARCH=amd64 go build "-ldflags=-s -w -X github.com/google/syzkaller/prog.GitRevision=ef44b750e8fab8d6d5cb84920680581b13e0d470 -X 'github.com/google/syzkaller/prog.gitRevisionDate=20250207-152458'" -o ./bin/linux_amd64/syz-execprog github.com/google/syzkaller/tools/syz-execprog
mkdir -p ./bin/linux_amd64
g++ -o ./bin/linux_amd64/syz-executor executor/executor.cc \
-m64 -O2 -pthread -Wall -Werror -Wparentheses -Wunused-const-variable -Wframe-larger-than=16384 -Wno-stringop-overflow -Wno-array-bounds -Wno-format-overflow -Wno-unused-but-set-variable -Wno-unused-command-line-argument -static-pie -std=c++17 -I. -Iexecutor/_include -DGOOS_linux=1 -DGOARCH_amd64=1 \
-DHOSTGOOS_linux=1 -DGIT_REVISION=\"ef44b750e8fab8d6d5cb84920680581b13e0d470\"
/usr/bin/ld: /tmp/ccKjwzqJ.o: in function `Connection::Connect(char const*, char const*)':
executor.cc:(.text._ZN10Connection7ConnectEPKcS1_[_ZN10Connection7ConnectEPKcS1_]+0x104): warning: Using 'gethostbyname' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking