KASAN: slab-use-after-free Write in binder_add_device
==================================================================
BUG: KASAN: slab-use-after-free in hlist_add_head include/linux/list.h:1026 [inline]
BUG: KASAN: slab-use-after-free in binder_add_device+0x5f/0xa0 drivers/android/binder.c:6932
Write of size 8 at addr ffff8880307ce408 by task syz-executor/5728
CPU: 1 UID: 0 PID: 5728 Comm: syz-executor Not tainted 6.13.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0x169/0x550 mm/kasan/report.c:489
kasan_report+0x143/0x180 mm/kasan/report.c:602
hlist_add_head include/linux/list.h:1026 [inline]
binder_add_device+0x5f/0xa0 drivers/android/binder.c:6932
binderfs_binder_device_create+0x7bf/0x9c0 drivers/android/binderfs.c:210
binderfs_fill_super+0x944/0xd90 drivers/android/binderfs.c:729
vfs_get_super fs/super.c:1280 [inline]
get_tree_nodev+0xb7/0x140 fs/super.c:1299
vfs_get_tree+0x90/0x290 fs/super.c:1814
do_new_mount+0x2be/0xb40 fs/namespace.c:3560
do_mount fs/namespace.c:3900 [inline]
__do_sys_mount fs/namespace.c:4111 [inline]
__se_sys_mount+0x2d6/0x3c0 fs/namespace.c:4088
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x82/0x160 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7f905a58e54a
Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc9110f3c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007f905a60e663 RCX: 00007f905a58e54a
RDX: 00007f905a61dda7 RSI: 00007f905a60e663 RDI: 00007f905a61dda7
RBP: 00007f905a60e8ac R08: 0000000000000000 R09: 00000000000001ff
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f905a5eb1a8
R13: 00007f905a5eb180 R14: 0000000000000009 R15: 0000000000000000
Allocated by task 5718:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
__kasan_kmalloc+0x7d/0x90 mm/kasan/common.c:394
kasan_kmalloc include/linux/kasan.h:260 [inline]
__kmalloc_cache_noprof+0x23e/0x360 mm/slub.c:4325
kmalloc_noprof include/linux/slab.h:901 [inline]
kzalloc_noprof include/linux/slab.h:1037 [inline]
binderfs_binder_device_create+0x16c/0x9c0 drivers/android/binderfs.c:147
binderfs_fill_super+0x944/0xd90 drivers/android/binderfs.c:729
vfs_get_super fs/super.c:1280 [inline]
get_tree_nodev+0xb7/0x140 fs/super.c:1299
vfs_get_tree+0x90/0x290 fs/super.c:1814
do_new_mount+0x2be/0xb40 fs/namespace.c:3560
do_mount fs/namespace.c:3900 [inline]
__do_sys_mount fs/namespace.c:4111 [inline]
__se_sys_mount+0x2d6/0x3c0 fs/namespace.c:4088
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x82/0x160 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x76/0x7e
Freed by task 5718:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:576
poison_slab_object mm/kasan/common.c:247 [inline]
__kasan_slab_free+0x36/0x50 mm/kasan/common.c:264
kasan_slab_free include/linux/kasan.h:233 [inline]
slab_free_hook mm/slub.c:2353 [inline]
slab_free mm/slub.c:4609 [inline]
kfree+0x181/0x430 mm/slub.c:4757
evict+0x4e8/0x9a0 fs/inode.c:796
__dentry_kill+0x200/0x610 fs/dcache.c:643
shrink_kill+0xa9/0x2c0 fs/dcache.c:1088
shrink_dentry_list+0x2c0/0x5b0 fs/dcache.c:1115
shrink_dcache_parent+0xcb/0x3b0
do_one_tree+0x23/0xe0 fs/dcache.c:1578
shrink_dcache_for_umount+0xb4/0x180 fs/dcache.c:1595
generic_shutdown_super+0x6a/0x2d0 fs/super.c:620
kill_anon_super fs/super.c:1237 [inline]
kill_litter_super+0x76/0xb0 fs/super.c:1247
binderfs_kill_super+0x44/0x90 drivers/android/binderfs.c:791
deactivate_locked_super+0xc4/0x120 fs/super.c:473
cleanup_mnt+0x41f/0x4b0 fs/namespace.c:1413
task_work_run+0x24f/0x310 kernel/task_work.c:227
exit_task_work include/linux/task_work.h:40 [inline]
do_exit+0xa2a/0x28d0 kernel/exit.c:938
do_group_exit+0x207/0x2c0 kernel/exit.c:1087
get_signal+0x16a6/0x1740 kernel/signal.c:3036
arch_do_signal_or_restart+0x96/0x830 arch/x86/kernel/signal.c:337
exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline]
__syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
syscall_exit_to_user_mode+0xcd/0x330 kernel/entry/common.c:218
do_syscall_64+0x8e/0x160 arch/x86/entry/common.c:89
entry_SYSCALL_64_after_hwframe+0x76/0x7e
The buggy address belongs to the object at ffff8880307ce400
which belongs to the cache kmalloc-512 of size 512
The buggy address is located 8 bytes inside of
freed 512-byte region [ffff8880307ce400, ffff8880307ce600)
The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x307cc
head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
anon flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff)
page_type: f5(slab)
raw: 00fff00000000040 ffff88801a041c80 0000000000000000 dead000000000001
raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
head: 00fff00000000040 ffff88801a041c80 0000000000000000 dead000000000001
head: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
head: 00fff00000000002 ffffea0000c1f301 ffffffffffffffff 0000000000000000
head: ffff888000000004 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5076, tgid 5076 (udevd), ts 42016799217, free_ts 41985395284
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x1ec/0x220 mm/page_alloc.c:1551
prep_new_page mm/page_alloc.c:1559 [inline]
get_page_from_freelist+0x3607/0x3750 mm/page_alloc.c:3477
__alloc_frozen_pages_noprof+0x256/0x690 mm/page_alloc.c:4739
alloc_pages_mpol+0x311/0x660 mm/mempolicy.c:2270
alloc_slab_page mm/slub.c:2423 [inline]
allocate_slab+0x8f/0x3a0 mm/slub.c:2587
new_slab mm/slub.c:2640 [inline]
___slab_alloc+0xc35/0x14a0 mm/slub.c:3826
__slab_alloc+0x58/0xa0 mm/slub.c:3916
__slab_alloc_node mm/slub.c:3991 [inline]
slab_alloc_node mm/slub.c:4152 [inline]
__kmalloc_cache_noprof+0x276/0x360 mm/slub.c:4320
kmalloc_noprof include/linux/slab.h:901 [inline]
kzalloc_noprof include/linux/slab.h:1037 [inline]
kernfs_fop_open+0x3e0/0xd10 fs/kernfs/file.c:623
do_dentry_open+0xdea/0x1960 fs/open.c:955
vfs_open+0x3b/0x370 fs/open.c:1085
do_open fs/namei.c:3830 [inline]
path_openat+0x2c7d/0x3590 fs/namei.c:3989
do_filp_open+0x27f/0x4e0 fs/namei.c:4016
do_sys_openat2+0x13e/0x1d0 fs/open.c:1427
do_sys_open fs/open.c:1442 [inline]
__do_sys_openat fs/open.c:1458 [inline]
__se_sys_openat fs/open.c:1453 [inline]
__x64_sys_openat+0x247/0x2a0 fs/open.c:1453
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x82/0x160 arch/x86/entry/common.c:83
page last free pid 5080 tgid 5080 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1127 [inline]
free_frozen_pages+0xdf5/0x10b0 mm/page_alloc.c:2660
__slab_free+0x2c2/0x380 mm/slub.c:4520
qlink_free mm/kasan/quarantine.c:163 [inline]
qlist_free_all+0x9a/0x140 mm/kasan/quarantine.c:179
kasan_quarantine_reduce+0x14f/0x170 mm/kasan/quarantine.c:286
__kasan_slab_alloc+0x23/0x60 mm/kasan/common.c:329
kasan_slab_alloc include/linux/kasan.h:250 [inline]
slab_post_alloc_hook mm/slub.c:4115 [inline]
slab_alloc_node mm/slub.c:4164 [inline]
__do_kmalloc_node mm/slub.c:4293 [inline]
__kmalloc_noprof+0x231/0x490 mm/slub.c:4306
kmalloc_noprof include/linux/slab.h:905 [inline]
tomoyo_realpath_from_path+0xcf/0x5e0 security/tomoyo/realpath.c:251
tomoyo_get_realpath security/tomoyo/file.c:151 [inline]
tomoyo_path_number_perm+0x236/0x860 security/tomoyo/file.c:723
tomoyo_path_mknod+0x176/0x1b0 security/tomoyo/tomoyo.c:252
security_path_mknod+0x181/0x3a0 security/security.c:1899
may_o_create fs/namei.c:3470 [inline]
lookup_open fs/namei.c:3614 [inline]
open_last_lookups fs/namei.c:3750 [inline]
path_openat+0xe3c/0x3590 fs/namei.c:3986
do_filp_open+0x27f/0x4e0 fs/namei.c:4016
do_sys_openat2+0x13e/0x1d0 fs/open.c:1427
do_sys_open fs/open.c:1442 [inline]
__do_sys_openat fs/open.c:1458 [inline]
__se_sys_openat fs/open.c:1453 [inline]
__x64_sys_openat+0x247/0x2a0 fs/open.c:1453
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x82/0x160 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x76/0x7e
Memory state around the buggy address:
ffff8880307ce300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
ffff8880307ce380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
>ffff8880307ce400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
^
ffff8880307ce480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
ffff8880307ce500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================
Warning: Permanently added '10.128.1.12' (ED25519) to the list of known hosts.
2025/02/01 22:52:08 ignoring optional flag "sandboxArg"="0"
2025/02/01 22:52:09 parsed 1 programs
[ 71.273150][ T5702] cgroup: Unknown subsys name 'net'
[ 71.447757][ T5702] cgroup: Unknown subsys name 'cpuset'
[ 71.456177][ T5702] cgroup: Unknown subsys name 'rlimit'
[ 71.461930][ T5702] cgroup: Unknown subsys name 'memory'
[ 71.769883][ T1277] ieee802154 phy0 wpan0: encryption failed: -22
[ 71.776588][ T1277] ieee802154 phy1 wpan1: encryption failed: -22
[ 72.966568][ T5702] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 76.096459][ T5713] chnl_net:caif_netlink_parms(): no params data found
[ 76.505651][ T5713] bridge0: port 1(bridge_slave_0) entered blocking state
[ 76.512826][ T5713] bridge0: port 1(bridge_slave_0) entered disabled state
[ 76.527951][ T5713] bridge_slave_0: entered allmulticast mode
[ 76.537233][ T5713] bridge_slave_0: entered promiscuous mode
[ 76.547489][ T5713] bridge0: port 2(bridge_slave_1) entered blocking state
[ 76.555944][ T5713] bridge0: port 2(bridge_slave_1) entered disabled state
[ 76.563279][ T5713] bridge_slave_1: entered allmulticast mode
[ 76.570482][ T5713] bridge_slave_1: entered promiscuous mode
[ 76.624194][ T5713] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 76.638650][ T5713] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 76.691694][ T5713] team0: Port device team_slave_0 added
[ 76.700946][ T5713] team0: Port device team_slave_1 added
[ 76.750540][ T5713] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 76.759291][ T5713] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 76.788675][ T5713] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 76.794014][ T5728] ==================================================================
[ 76.803048][ T5713] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 76.807367][ T5728] BUG: KASAN: slab-use-after-free in binder_add_device+0x5f/0xa0
[ 76.807412][ T5728] Write of size 8 at addr ffff8880307ce408 by task syz-executor/5728
[ 76.807429][ T5728]
[ 76.807447][ T5728] CPU: 1 UID: 0 PID: 5728 Comm: syz-executor Not tainted 6.13.0-syzkaller #0
[ 76.807467][ T5728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
[ 76.807484][ T5728] Call Trace:
[ 76.807492][ T5728]
[ 76.807500][ T5728] dump_stack_lvl+0x241/0x360
[ 76.807524][ T5728] ? __pfx_dump_stack_lvl+0x10/0x10
[ 76.807546][ T5728] ? __pfx__printk+0x10/0x10
[ 76.807569][ T5728] ? _printk+0xd5/0x120
[ 76.807588][ T5728] ? __virt_addr_valid+0x183/0x530
[ 76.807614][ T5728] ? __virt_addr_valid+0x183/0x530
[ 76.807639][ T5728] print_report+0x169/0x550
[ 76.807667][ T5728] ? __virt_addr_valid+0x183/0x530
[ 76.807697][ T5728] ? __virt_addr_valid+0x183/0x530
[ 76.807719][ T5728] ? __virt_addr_valid+0x45f/0x530
[ 76.807743][ T5728] ? __phys_addr+0xba/0x170
[ 76.807769][ T5728] ? binder_add_device+0x5f/0xa0
[ 76.807789][ T5728] kasan_report+0x143/0x180
[ 76.807820][ T5728] ? binder_add_device+0x5f/0xa0
[ 76.807842][ T5728] binder_add_device+0x5f/0xa0
[ 76.807863][ T5728] binderfs_binder_device_create+0x7bf/0x9c0
[ 76.807900][ T5728] binderfs_fill_super+0x944/0xd90
[ 76.807935][ T5728] ? __pfx_binderfs_fill_super+0x10/0x10
[ 76.807979][ T5728] ? shrinker_register+0x160/0x230
[ 76.808006][ T5728] ? sget_fc+0x909/0x9c0
[ 76.808037][ T5728] ? __pfx_set_anon_super_fc+0x10/0x10
[ 76.808058][ T5728] ? __pfx_binderfs_fill_super+0x10/0x10
[ 76.808090][ T5728] get_tree_nodev+0xb7/0x140
[ 76.808112][ T5728] vfs_get_tree+0x90/0x290
[ 76.808135][ T5728] do_new_mount+0x2be/0xb40
[ 76.808162][ T5728] ? __pfx_do_new_mount+0x10/0x10
[ 76.808191][ T5728] __se_sys_mount+0x2d6/0x3c0
[ 76.808216][ T5728] ? lockdep_hardirqs_on_prepare+0x43d/0x7a0
[ 76.808245][ T5728] ? __pfx___se_sys_mount+0x10/0x10
[ 76.808273][ T5728] ? __x64_sys_mount+0x20/0xc0
[ 76.808298][ T5728] do_syscall_64+0x82/0x160
[ 76.808329][ T5728] ? clear_bhb_loop+0x25/0x80
[ 76.808359][ T5728] ? clear_bhb_loop+0x25/0x80
[ 76.808389][ T5728] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 76.808424][ T5728] RIP: 0033:0x7f905a58e54a
[ 76.808447][ T5728] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 76.808464][ T5728] RSP: 002b:00007ffc9110f3c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[ 76.808487][ T5728] RAX: ffffffffffffffda RBX: 00007f905a60e663 RCX: 00007f905a58e54a
[ 76.808503][ T5728] RDX: 00007f905a61dda7 RSI: 00007f905a60e663 RDI: 00007f905a61dda7
[ 76.808518][ T5728] RBP: 00007f905a60e8ac R08: 0000000000000000 R09: 00000000000001ff
[ 76.808532][ T5728] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f905a5eb1a8
[ 76.808546][ T5728] R13: 00007f905a5eb180 R14: 0000000000000009 R15: 0000000000000000
[ 76.808567][ T5728]
[ 76.808575][ T5728]
[ 76.817323][ T5713] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 76.822327][ T5728] Allocated by task 5718:
[ 76.822341][ T5728] kasan_save_track+0x3f/0x80
[ 76.830458][ T5713] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 76.832709][ T5728] __kasan_kmalloc+0x7d/0x90
[ 77.155422][ T5728] __kmalloc_cache_noprof+0x23e/0x360
[ 77.160807][ T5728] binderfs_binder_device_create+0x16c/0x9c0
[ 77.167099][ T5728] binderfs_fill_super+0x944/0xd90
[ 77.172246][ T5728] get_tree_nodev+0xb7/0x140
[ 77.176864][ T5728] vfs_get_tree+0x90/0x290
[ 77.181317][ T5728] do_new_mount+0x2be/0xb40
[ 77.185937][ T5728] __se_sys_mount+0x2d6/0x3c0
[ 77.190647][ T5728] do_syscall_64+0x82/0x160
[ 77.195197][ T5728] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 77.201176][ T5728]
[ 77.203518][ T5728] Freed by task 5718:
[ 77.207513][ T5728] kasan_save_track+0x3f/0x80
[ 77.212197][ T5728] kasan_save_free_info+0x40/0x50
[ 77.217252][ T5728] __kasan_slab_free+0x36/0x50
[ 77.222035][ T5728] kfree+0x181/0x430
[ 77.225980][ T5728] evict+0x4e8/0x9a0
[ 77.229907][ T5728] __dentry_kill+0x200/0x610
[ 77.234595][ T5728] shrink_kill+0xa9/0x2c0
[ 77.238955][ T5728] shrink_dentry_list+0x2c0/0x5b0
[ 77.243988][ T5728] shrink_dcache_parent+0xcb/0x3b0
[ 77.249122][ T5728] do_one_tree+0x23/0xe0
[ 77.253385][ T5728] shrink_dcache_for_umount+0xb4/0x180
[ 77.258859][ T5728] generic_shutdown_super+0x6a/0x2d0
[ 77.264262][ T5728] kill_litter_super+0x76/0xb0
[ 77.269057][ T5728] binderfs_kill_super+0x44/0x90
[ 77.274006][ T5728] deactivate_locked_super+0xc4/0x120
[ 77.279384][ T5728] cleanup_mnt+0x41f/0x4b0
[ 77.283815][ T5728] task_work_run+0x24f/0x310
[ 77.288538][ T5728] do_exit+0xa2a/0x28d0
[ 77.292719][ T5728] do_group_exit+0x207/0x2c0
[ 77.297322][ T5728] get_signal+0x16a6/0x1740
[ 77.301849][ T5728] arch_do_signal_or_restart+0x96/0x830
[ 77.307412][ T5728] syscall_exit_to_user_mode+0xcd/0x330
[ 77.312988][ T5728] do_syscall_64+0x8e/0x160
[ 77.317526][ T5728] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 77.323482][ T5728]
[ 77.325820][ T5728] The buggy address belongs to the object at ffff8880307ce400
[ 77.325820][ T5728] which belongs to the cache kmalloc-512 of size 512
[ 77.339871][ T5728] The buggy address is located 8 bytes inside of
[ 77.339871][ T5728] freed 512-byte region [ffff8880307ce400, ffff8880307ce600)
[ 77.353498][ T5728]
[ 77.355856][ T5728] The buggy address belongs to the physical page:
[ 77.362311][ T5728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x307cc
[ 77.371104][ T5728] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 77.379642][ T5728] anon flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff)
[ 77.387661][ T5728] page_type: f5(slab)
[ 77.391658][ T5728] raw: 00fff00000000040 ffff88801a041c80 0000000000000000 dead000000000001
[ 77.400259][ T5728] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[ 77.408959][ T5728] head: 00fff00000000040 ffff88801a041c80 0000000000000000 dead000000000001
[ 77.417649][ T5728] head: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[ 77.426711][ T5728] head: 00fff00000000002 ffffea0000c1f301 ffffffffffffffff 0000000000000000
[ 77.435398][ T5728] head: ffff888000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 77.444162][ T5728] page dumped because: kasan: bad access detected
[ 77.450595][ T5728] page_owner tracks the page as allocated
[ 77.456766][ T5728] page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5076, tgid 5076 (udevd), ts 42016799217, free_ts 41985395284
[ 77.477946][ T5728] post_alloc_hook+0x1ec/0x220
[ 77.482762][ T5728] get_page_from_freelist+0x3607/0x3750
[ 77.488410][ T5728] __alloc_frozen_pages_noprof+0x256/0x690
[ 77.494246][ T5728] alloc_pages_mpol+0x311/0x660
[ 77.499105][ T5728] allocate_slab+0x8f/0x3a0
[ 77.503616][ T5728] ___slab_alloc+0xc35/0x14a0
[ 77.508429][ T5728] __slab_alloc+0x58/0xa0
[ 77.512763][ T5728] __kmalloc_cache_noprof+0x276/0x360
[ 77.518135][ T5728] kernfs_fop_open+0x3e0/0xd10
[ 77.523038][ T5728] do_dentry_open+0xdea/0x1960
[ 77.527832][ T5728] vfs_open+0x3b/0x370
[ 77.531919][ T5728] path_openat+0x2c7d/0x3590
[ 77.536550][ T5728] do_filp_open+0x27f/0x4e0
[ 77.541076][ T5728] do_sys_openat2+0x13e/0x1d0
[ 77.545761][ T5728] __x64_sys_openat+0x247/0x2a0
[ 77.550713][ T5728] do_syscall_64+0x82/0x160
[ 77.555353][ T5728] page last free pid 5080 tgid 5080 stack trace:
[ 77.561777][ T5728] free_frozen_pages+0xdf5/0x10b0
[ 77.566922][ T5728] __slab_free+0x2c2/0x380
[ 77.571477][ T5728] qlist_free_all+0x9a/0x140
[ 77.576124][ T5728] kasan_quarantine_reduce+0x14f/0x170
[ 77.581599][ T5728] __kasan_slab_alloc+0x23/0x60
[ 77.586497][ T5728] __kmalloc_noprof+0x231/0x490
[ 77.591351][ T5728] tomoyo_realpath_from_path+0xcf/0x5e0
[ 77.596918][ T5728] tomoyo_path_number_perm+0x236/0x860
[ 77.602403][ T5728] tomoyo_path_mknod+0x176/0x1b0
[ 77.607438][ T5728] security_path_mknod+0x181/0x3a0
[ 77.613069][ T5728] path_openat+0xe3c/0x3590
[ 77.617619][ T5728] do_filp_open+0x27f/0x4e0
[ 77.622227][ T5728] do_sys_openat2+0x13e/0x1d0
[ 77.627394][ T5728] __x64_sys_openat+0x247/0x2a0
[ 77.632276][ T5728] do_syscall_64+0x82/0x160
[ 77.636814][ T5728] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 77.642727][ T5728]
[ 77.645052][ T5728] Memory state around the buggy address:
[ 77.650695][ T5728] ffff8880307ce300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 77.658771][ T5728] ffff8880307ce380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 77.666972][ T5728] >ffff8880307ce400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 77.675130][ T5728] ^
[ 77.679485][ T5728] ffff8880307ce480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 77.687571][ T5728] ffff8880307ce500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 77.695647][ T5728] ==================================================================
[ 77.707084][ T5728] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 77.714335][ T5728] CPU: 0 UID: 0 PID: 5728 Comm: syz-executor Not tainted 6.13.0-syzkaller #0
[ 77.723341][ T5728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
[ 77.733718][ T5728] Call Trace:
[ 77.737013][ T5728]
[ 77.740053][ T5728] dump_stack_lvl+0x241/0x360
[ 77.744777][ T5728] ? __pfx_dump_stack_lvl+0x10/0x10
[ 77.750363][ T5728] ? __pfx__printk+0x10/0x10
[ 77.754985][ T5728] ? preempt_schedule+0xe1/0xf0
[ 77.759884][ T5728] ? vscnprintf+0x5d/0x90
[ 77.764236][ T5728] panic+0x349/0x880
[ 77.768237][ T5728] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20
[ 77.774514][ T5728] ? check_panic_on_warn+0x21/0xb0
[ 77.779903][ T5728] ? __pfx_panic+0x10/0x10
[ 77.784343][ T5728] ? _raw_spin_unlock_irqrestore+0x130/0x140
[ 77.790450][ T5728] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10
[ 77.796804][ T5728] ? print_report+0x502/0x550
[ 77.801529][ T5728] check_panic_on_warn+0x86/0xb0
[ 77.806483][ T5728] ? binder_add_device+0x5f/0xa0
[ 77.811464][ T5728] end_report+0x77/0x150
[ 77.815723][ T5728] kasan_report+0x154/0x180
[ 77.820241][ T5728] ? binder_add_device+0x5f/0xa0
[ 77.825192][ T5728] binder_add_device+0x5f/0xa0
[ 77.829965][ T5728] binderfs_binder_device_create+0x7bf/0x9c0
[ 77.836053][ T5728] binderfs_fill_super+0x944/0xd90
[ 77.841191][ T5728] ? __pfx_binderfs_fill_super+0x10/0x10
[ 77.847013][ T5728] ? shrinker_register+0x160/0x230
[ 77.852125][ T5728] ? sget_fc+0x909/0x9c0
[ 77.856379][ T5728] ? __pfx_set_anon_super_fc+0x10/0x10
[ 77.861843][ T5728] ? __pfx_binderfs_fill_super+0x10/0x10
[ 77.867488][ T5728] get_tree_nodev+0xb7/0x140
[ 77.872085][ T5728] vfs_get_tree+0x90/0x290
[ 77.876520][ T5728] do_new_mount+0x2be/0xb40
[ 77.881203][ T5728] ? __pfx_do_new_mount+0x10/0x10
[ 77.886240][ T5728] __se_sys_mount+0x2d6/0x3c0
[ 77.890929][ T5728] ? lockdep_hardirqs_on_prepare+0x43d/0x7a0
[ 77.896911][ T5728] ? __pfx___se_sys_mount+0x10/0x10
[ 77.902210][ T5728] ? __x64_sys_mount+0x20/0xc0
[ 77.906989][ T5728] do_syscall_64+0x82/0x160
[ 77.911503][ T5728] ? clear_bhb_loop+0x25/0x80
[ 77.916186][ T5728] ? clear_bhb_loop+0x25/0x80
[ 77.920882][ T5728] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 77.926792][ T5728] RIP: 0033:0x7f905a58e54a
[ 77.931202][ T5728] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 77.950979][ T5728] RSP: 002b:00007ffc9110f3c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[ 77.959422][ T5728] RAX: ffffffffffffffda RBX: 00007f905a60e663 RCX: 00007f905a58e54a
[ 77.967427][ T5728] RDX: 00007f905a61dda7 RSI: 00007f905a60e663 RDI: 00007f905a61dda7
[ 77.975430][ T5728] RBP: 00007f905a60e8ac R08: 0000000000000000 R09: 00000000000001ff
[ 77.983457][ T5728] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f905a5eb1a8
[ 77.991535][ T5728] R13: 00007f905a5eb180 R14: 0000000000000009 R15: 0000000000000000
[ 77.999530][ T5728]
[ 78.002929][ T5728] Kernel Offset: disabled
[ 78.007285][ T5728] Rebooting in 86400 seconds..
syzkaller build log:
go env (err=)
GO111MODULE='auto'
GOARCH='amd64'
GOBIN=''
GOCACHE='/syzkaller/.cache/go-build'
GOENV='/syzkaller/.config/go/env'
GOEXE=''
GOEXPERIMENT=''
GOFLAGS=''
GOHOSTARCH='amd64'
GOHOSTOS='linux'
GOINSECURE=''
GOMODCACHE='/syzkaller/jobs-2/linux/gopath/pkg/mod'
GONOPROXY=''
GONOSUMDB=''
GOOS='linux'
GOPATH='/syzkaller/jobs-2/linux/gopath'
GOPRIVATE=''
GOPROXY='https://proxy.golang.org,direct'
GOROOT='/usr/local/go'
GOSUMDB='sum.golang.org'
GOTMPDIR=''
GOTOOLCHAIN='auto'
GOTOOLDIR='/usr/local/go/pkg/tool/linux_amd64'
GOVCS=''
GOVERSION='go1.22.7'
GCCGO='gccgo'
GOAMD64='v1'
AR='ar'
CC='gcc'
CXX='g++'
CGO_ENABLED='1'
GOMOD='/syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/go.mod'
GOWORK=''
CGO_CFLAGS='-O2 -g'
CGO_CPPFLAGS=''
CGO_CXXFLAGS='-O2 -g'
CGO_FFLAGS='-O2 -g'
CGO_LDFLAGS='-O2 -g'
PKG_CONFIG='pkg-config'
GOGCCFLAGS='-fPIC -m64 -pthread -Wl,--no-gc-sections -fmessage-length=0 -ffile-prefix-map=/tmp/go-build3763207164=/tmp/go-build -gno-record-gcc-switches'
git status (err=)
HEAD detached at aa47157c8e
nothing to commit, working tree clean
tput: No value for $TERM and no -T specified
tput: No value for $TERM and no -T specified
Makefile:31: run command via tools/syz-env for best compatibility, see:
Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env
go list -f '{{.Stale}}' ./sys/syz-sysgen | grep -q false || go install ./sys/syz-sysgen
make .descriptions
tput: No value for $TERM and no -T specified
tput: No value for $TERM and no -T specified
Makefile:31: run command via tools/syz-env for best compatibility, see:
Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env
bin/syz-sysgen
touch .descriptions
GOOS=linux GOARCH=amd64 go build "-ldflags=-s -w -X github.com/google/syzkaller/prog.GitRevision=aa47157c8ec3df5a6d16e3866b095c8f91026465 -X 'github.com/google/syzkaller/prog.gitRevisionDate=20250131-140626'" -o ./bin/linux_amd64/syz-execprog github.com/google/syzkaller/tools/syz-execprog
mkdir -p ./bin/linux_amd64
g++ -o ./bin/linux_amd64/syz-executor executor/executor.cc \
-m64 -O2 -pthread -Wall -Werror -Wparentheses -Wunused-const-variable -Wframe-larger-than=16384 -Wno-stringop-overflow -Wno-array-bounds -Wno-format-overflow -Wno-unused-but-set-variable -Wno-unused-command-line-argument -static-pie -std=c++17 -I. -Iexecutor/_include -DGOOS_linux=1 -DGOARCH_amd64=1 \
-DHOSTGOOS_linux=1 -DGIT_REVISION=\"aa47157c8ec3df5a6d16e3866b095c8f91026465\"
/usr/bin/ld: /tmp/ccv1gyKu.o: in function `Connection::Connect(char const*, char const*)':
executor.cc:(.text._ZN10Connection7ConnectEPKcS1_[_ZN10Connection7ConnectEPKcS1_]+0x104): warning: Using 'gethostbyname' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking