KASAN: slab-use-after-free Write in binder_add_device ================================================================== BUG: KASAN: slab-use-after-free in hlist_add_head include/linux/list.h:1026 [inline] BUG: KASAN: slab-use-after-free in binder_add_device+0x5f/0xa0 drivers/android/binder.c:6932 Write of size 8 at addr ffff8880307ce408 by task syz-executor/5728 CPU: 1 UID: 0 PID: 5728 Comm: syz-executor Not tainted 6.13.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x169/0x550 mm/kasan/report.c:489 kasan_report+0x143/0x180 mm/kasan/report.c:602 hlist_add_head include/linux/list.h:1026 [inline] binder_add_device+0x5f/0xa0 drivers/android/binder.c:6932 binderfs_binder_device_create+0x7bf/0x9c0 drivers/android/binderfs.c:210 binderfs_fill_super+0x944/0xd90 drivers/android/binderfs.c:729 vfs_get_super fs/super.c:1280 [inline] get_tree_nodev+0xb7/0x140 fs/super.c:1299 vfs_get_tree+0x90/0x290 fs/super.c:1814 do_new_mount+0x2be/0xb40 fs/namespace.c:3560 do_mount fs/namespace.c:3900 [inline] __do_sys_mount fs/namespace.c:4111 [inline] __se_sys_mount+0x2d6/0x3c0 fs/namespace.c:4088 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x82/0x160 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f905a58e54a Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffc9110f3c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f905a60e663 RCX: 00007f905a58e54a RDX: 00007f905a61dda7 RSI: 00007f905a60e663 RDI: 00007f905a61dda7 RBP: 00007f905a60e8ac R08: 0000000000000000 R09: 00000000000001ff R10: 0000000000000000 R11: 0000000000000246 R12: 00007f905a5eb1a8 R13: 00007f905a5eb180 R14: 0000000000000009 R15: 0000000000000000 Allocated by task 5718: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x7d/0x90 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __kmalloc_cache_noprof+0x23e/0x360 mm/slub.c:4325 kmalloc_noprof include/linux/slab.h:901 [inline] kzalloc_noprof include/linux/slab.h:1037 [inline] binderfs_binder_device_create+0x16c/0x9c0 drivers/android/binderfs.c:147 binderfs_fill_super+0x944/0xd90 drivers/android/binderfs.c:729 vfs_get_super fs/super.c:1280 [inline] get_tree_nodev+0xb7/0x140 fs/super.c:1299 vfs_get_tree+0x90/0x290 fs/super.c:1814 do_new_mount+0x2be/0xb40 fs/namespace.c:3560 do_mount fs/namespace.c:3900 [inline] __do_sys_mount fs/namespace.c:4111 [inline] __se_sys_mount+0x2d6/0x3c0 fs/namespace.c:4088 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x82/0x160 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x76/0x7e Freed by task 5718: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x36/0x50 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2353 [inline] slab_free mm/slub.c:4609 [inline] kfree+0x181/0x430 mm/slub.c:4757 evict+0x4e8/0x9a0 fs/inode.c:796 __dentry_kill+0x200/0x610 fs/dcache.c:643 shrink_kill+0xa9/0x2c0 fs/dcache.c:1088 shrink_dentry_list+0x2c0/0x5b0 fs/dcache.c:1115 shrink_dcache_parent+0xcb/0x3b0 do_one_tree+0x23/0xe0 fs/dcache.c:1578 shrink_dcache_for_umount+0xb4/0x180 fs/dcache.c:1595 generic_shutdown_super+0x6a/0x2d0 fs/super.c:620 kill_anon_super fs/super.c:1237 [inline] kill_litter_super+0x76/0xb0 fs/super.c:1247 binderfs_kill_super+0x44/0x90 drivers/android/binderfs.c:791 deactivate_locked_super+0xc4/0x120 fs/super.c:473 cleanup_mnt+0x41f/0x4b0 fs/namespace.c:1413 task_work_run+0x24f/0x310 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xa2a/0x28d0 kernel/exit.c:938 do_group_exit+0x207/0x2c0 kernel/exit.c:1087 get_signal+0x16a6/0x1740 kernel/signal.c:3036 arch_do_signal_or_restart+0x96/0x830 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xcd/0x330 kernel/entry/common.c:218 do_syscall_64+0x8e/0x160 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x76/0x7e The buggy address belongs to the object at ffff8880307ce400 which belongs to the cache kmalloc-512 of size 512 The buggy address is located 8 bytes inside of freed 512-byte region [ffff8880307ce400, ffff8880307ce600) The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x307cc head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 anon flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff) page_type: f5(slab) raw: 00fff00000000040 ffff88801a041c80 0000000000000000 dead000000000001 raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 head: 00fff00000000040 ffff88801a041c80 0000000000000000 dead000000000001 head: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 head: 00fff00000000002 ffffea0000c1f301 ffffffffffffffff 0000000000000000 head: ffff888000000004 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5076, tgid 5076 (udevd), ts 42016799217, free_ts 41985395284 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x1ec/0x220 mm/page_alloc.c:1551 prep_new_page mm/page_alloc.c:1559 [inline] get_page_from_freelist+0x3607/0x3750 mm/page_alloc.c:3477 __alloc_frozen_pages_noprof+0x256/0x690 mm/page_alloc.c:4739 alloc_pages_mpol+0x311/0x660 mm/mempolicy.c:2270 alloc_slab_page mm/slub.c:2423 [inline] allocate_slab+0x8f/0x3a0 mm/slub.c:2587 new_slab mm/slub.c:2640 [inline] ___slab_alloc+0xc35/0x14a0 mm/slub.c:3826 __slab_alloc+0x58/0xa0 mm/slub.c:3916 __slab_alloc_node mm/slub.c:3991 [inline] slab_alloc_node mm/slub.c:4152 [inline] __kmalloc_cache_noprof+0x276/0x360 mm/slub.c:4320 kmalloc_noprof include/linux/slab.h:901 [inline] kzalloc_noprof include/linux/slab.h:1037 [inline] kernfs_fop_open+0x3e0/0xd10 fs/kernfs/file.c:623 do_dentry_open+0xdea/0x1960 fs/open.c:955 vfs_open+0x3b/0x370 fs/open.c:1085 do_open fs/namei.c:3830 [inline] path_openat+0x2c7d/0x3590 fs/namei.c:3989 do_filp_open+0x27f/0x4e0 fs/namei.c:4016 do_sys_openat2+0x13e/0x1d0 fs/open.c:1427 do_sys_open fs/open.c:1442 [inline] __do_sys_openat fs/open.c:1458 [inline] __se_sys_openat fs/open.c:1453 [inline] __x64_sys_openat+0x247/0x2a0 fs/open.c:1453 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x82/0x160 arch/x86/entry/common.c:83 page last free pid 5080 tgid 5080 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1127 [inline] free_frozen_pages+0xdf5/0x10b0 mm/page_alloc.c:2660 __slab_free+0x2c2/0x380 mm/slub.c:4520 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x9a/0x140 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x14f/0x170 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x23/0x60 mm/kasan/common.c:329 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4115 [inline] slab_alloc_node mm/slub.c:4164 [inline] __do_kmalloc_node mm/slub.c:4293 [inline] __kmalloc_noprof+0x231/0x490 mm/slub.c:4306 kmalloc_noprof include/linux/slab.h:905 [inline] tomoyo_realpath_from_path+0xcf/0x5e0 security/tomoyo/realpath.c:251 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_path_number_perm+0x236/0x860 security/tomoyo/file.c:723 tomoyo_path_mknod+0x176/0x1b0 security/tomoyo/tomoyo.c:252 security_path_mknod+0x181/0x3a0 security/security.c:1899 may_o_create fs/namei.c:3470 [inline] lookup_open fs/namei.c:3614 [inline] open_last_lookups fs/namei.c:3750 [inline] path_openat+0xe3c/0x3590 fs/namei.c:3986 do_filp_open+0x27f/0x4e0 fs/namei.c:4016 do_sys_openat2+0x13e/0x1d0 fs/open.c:1427 do_sys_open fs/open.c:1442 [inline] __do_sys_openat fs/open.c:1458 [inline] __se_sys_openat fs/open.c:1453 [inline] __x64_sys_openat+0x247/0x2a0 fs/open.c:1453 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x82/0x160 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x76/0x7e Memory state around the buggy address: ffff8880307ce300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff8880307ce380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >ffff8880307ce400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff8880307ce480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8880307ce500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ================================================================== Warning: Permanently added '10.128.1.12' (ED25519) to the list of known hosts. 2025/02/01 22:52:08 ignoring optional flag "sandboxArg"="0" 2025/02/01 22:52:09 parsed 1 programs [ 71.273150][ T5702] cgroup: Unknown subsys name 'net' [ 71.447757][ T5702] cgroup: Unknown subsys name 'cpuset' [ 71.456177][ T5702] cgroup: Unknown subsys name 'rlimit' [ 71.461930][ T5702] cgroup: Unknown subsys name 'memory' [ 71.769883][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.776588][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 72.966568][ T5702] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 76.096459][ T5713] chnl_net:caif_netlink_parms(): no params data found [ 76.505651][ T5713] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.512826][ T5713] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.527951][ T5713] bridge_slave_0: entered allmulticast mode [ 76.537233][ T5713] bridge_slave_0: entered promiscuous mode [ 76.547489][ T5713] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.555944][ T5713] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.563279][ T5713] bridge_slave_1: entered allmulticast mode [ 76.570482][ T5713] bridge_slave_1: entered promiscuous mode [ 76.624194][ T5713] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.638650][ T5713] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.691694][ T5713] team0: Port device team_slave_0 added [ 76.700946][ T5713] team0: Port device team_slave_1 added [ 76.750540][ T5713] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 76.759291][ T5713] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.788675][ T5713] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 76.794014][ T5728] ================================================================== [ 76.803048][ T5713] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 76.807367][ T5728] BUG: KASAN: slab-use-after-free in binder_add_device+0x5f/0xa0 [ 76.807412][ T5728] Write of size 8 at addr ffff8880307ce408 by task syz-executor/5728 [ 76.807429][ T5728] [ 76.807447][ T5728] CPU: 1 UID: 0 PID: 5728 Comm: syz-executor Not tainted 6.13.0-syzkaller #0 [ 76.807467][ T5728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 76.807484][ T5728] Call Trace: [ 76.807492][ T5728] [ 76.807500][ T5728] dump_stack_lvl+0x241/0x360 [ 76.807524][ T5728] ? __pfx_dump_stack_lvl+0x10/0x10 [ 76.807546][ T5728] ? __pfx__printk+0x10/0x10 [ 76.807569][ T5728] ? _printk+0xd5/0x120 [ 76.807588][ T5728] ? __virt_addr_valid+0x183/0x530 [ 76.807614][ T5728] ? __virt_addr_valid+0x183/0x530 [ 76.807639][ T5728] print_report+0x169/0x550 [ 76.807667][ T5728] ? __virt_addr_valid+0x183/0x530 [ 76.807697][ T5728] ? __virt_addr_valid+0x183/0x530 [ 76.807719][ T5728] ? __virt_addr_valid+0x45f/0x530 [ 76.807743][ T5728] ? __phys_addr+0xba/0x170 [ 76.807769][ T5728] ? binder_add_device+0x5f/0xa0 [ 76.807789][ T5728] kasan_report+0x143/0x180 [ 76.807820][ T5728] ? binder_add_device+0x5f/0xa0 [ 76.807842][ T5728] binder_add_device+0x5f/0xa0 [ 76.807863][ T5728] binderfs_binder_device_create+0x7bf/0x9c0 [ 76.807900][ T5728] binderfs_fill_super+0x944/0xd90 [ 76.807935][ T5728] ? __pfx_binderfs_fill_super+0x10/0x10 [ 76.807979][ T5728] ? shrinker_register+0x160/0x230 [ 76.808006][ T5728] ? sget_fc+0x909/0x9c0 [ 76.808037][ T5728] ? __pfx_set_anon_super_fc+0x10/0x10 [ 76.808058][ T5728] ? __pfx_binderfs_fill_super+0x10/0x10 [ 76.808090][ T5728] get_tree_nodev+0xb7/0x140 [ 76.808112][ T5728] vfs_get_tree+0x90/0x290 [ 76.808135][ T5728] do_new_mount+0x2be/0xb40 [ 76.808162][ T5728] ? __pfx_do_new_mount+0x10/0x10 [ 76.808191][ T5728] __se_sys_mount+0x2d6/0x3c0 [ 76.808216][ T5728] ? lockdep_hardirqs_on_prepare+0x43d/0x7a0 [ 76.808245][ T5728] ? __pfx___se_sys_mount+0x10/0x10 [ 76.808273][ T5728] ? __x64_sys_mount+0x20/0xc0 [ 76.808298][ T5728] do_syscall_64+0x82/0x160 [ 76.808329][ T5728] ? clear_bhb_loop+0x25/0x80 [ 76.808359][ T5728] ? clear_bhb_loop+0x25/0x80 [ 76.808389][ T5728] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 76.808424][ T5728] RIP: 0033:0x7f905a58e54a [ 76.808447][ T5728] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 76.808464][ T5728] RSP: 002b:00007ffc9110f3c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 76.808487][ T5728] RAX: ffffffffffffffda RBX: 00007f905a60e663 RCX: 00007f905a58e54a [ 76.808503][ T5728] RDX: 00007f905a61dda7 RSI: 00007f905a60e663 RDI: 00007f905a61dda7 [ 76.808518][ T5728] RBP: 00007f905a60e8ac R08: 0000000000000000 R09: 00000000000001ff [ 76.808532][ T5728] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f905a5eb1a8 [ 76.808546][ T5728] R13: 00007f905a5eb180 R14: 0000000000000009 R15: 0000000000000000 [ 76.808567][ T5728] [ 76.808575][ T5728] [ 76.817323][ T5713] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.822327][ T5728] Allocated by task 5718: [ 76.822341][ T5728] kasan_save_track+0x3f/0x80 [ 76.830458][ T5713] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 76.832709][ T5728] __kasan_kmalloc+0x7d/0x90 [ 77.155422][ T5728] __kmalloc_cache_noprof+0x23e/0x360 [ 77.160807][ T5728] binderfs_binder_device_create+0x16c/0x9c0 [ 77.167099][ T5728] binderfs_fill_super+0x944/0xd90 [ 77.172246][ T5728] get_tree_nodev+0xb7/0x140 [ 77.176864][ T5728] vfs_get_tree+0x90/0x290 [ 77.181317][ T5728] do_new_mount+0x2be/0xb40 [ 77.185937][ T5728] __se_sys_mount+0x2d6/0x3c0 [ 77.190647][ T5728] do_syscall_64+0x82/0x160 [ 77.195197][ T5728] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 77.201176][ T5728] [ 77.203518][ T5728] Freed by task 5718: [ 77.207513][ T5728] kasan_save_track+0x3f/0x80 [ 77.212197][ T5728] kasan_save_free_info+0x40/0x50 [ 77.217252][ T5728] __kasan_slab_free+0x36/0x50 [ 77.222035][ T5728] kfree+0x181/0x430 [ 77.225980][ T5728] evict+0x4e8/0x9a0 [ 77.229907][ T5728] __dentry_kill+0x200/0x610 [ 77.234595][ T5728] shrink_kill+0xa9/0x2c0 [ 77.238955][ T5728] shrink_dentry_list+0x2c0/0x5b0 [ 77.243988][ T5728] shrink_dcache_parent+0xcb/0x3b0 [ 77.249122][ T5728] do_one_tree+0x23/0xe0 [ 77.253385][ T5728] shrink_dcache_for_umount+0xb4/0x180 [ 77.258859][ T5728] generic_shutdown_super+0x6a/0x2d0 [ 77.264262][ T5728] kill_litter_super+0x76/0xb0 [ 77.269057][ T5728] binderfs_kill_super+0x44/0x90 [ 77.274006][ T5728] deactivate_locked_super+0xc4/0x120 [ 77.279384][ T5728] cleanup_mnt+0x41f/0x4b0 [ 77.283815][ T5728] task_work_run+0x24f/0x310 [ 77.288538][ T5728] do_exit+0xa2a/0x28d0 [ 77.292719][ T5728] do_group_exit+0x207/0x2c0 [ 77.297322][ T5728] get_signal+0x16a6/0x1740 [ 77.301849][ T5728] arch_do_signal_or_restart+0x96/0x830 [ 77.307412][ T5728] syscall_exit_to_user_mode+0xcd/0x330 [ 77.312988][ T5728] do_syscall_64+0x8e/0x160 [ 77.317526][ T5728] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 77.323482][ T5728] [ 77.325820][ T5728] The buggy address belongs to the object at ffff8880307ce400 [ 77.325820][ T5728] which belongs to the cache kmalloc-512 of size 512 [ 77.339871][ T5728] The buggy address is located 8 bytes inside of [ 77.339871][ T5728] freed 512-byte region [ffff8880307ce400, ffff8880307ce600) [ 77.353498][ T5728] [ 77.355856][ T5728] The buggy address belongs to the physical page: [ 77.362311][ T5728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x307cc [ 77.371104][ T5728] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 77.379642][ T5728] anon flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff) [ 77.387661][ T5728] page_type: f5(slab) [ 77.391658][ T5728] raw: 00fff00000000040 ffff88801a041c80 0000000000000000 dead000000000001 [ 77.400259][ T5728] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 77.408959][ T5728] head: 00fff00000000040 ffff88801a041c80 0000000000000000 dead000000000001 [ 77.417649][ T5728] head: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 77.426711][ T5728] head: 00fff00000000002 ffffea0000c1f301 ffffffffffffffff 0000000000000000 [ 77.435398][ T5728] head: ffff888000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 77.444162][ T5728] page dumped because: kasan: bad access detected [ 77.450595][ T5728] page_owner tracks the page as allocated [ 77.456766][ T5728] page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5076, tgid 5076 (udevd), ts 42016799217, free_ts 41985395284 [ 77.477946][ T5728] post_alloc_hook+0x1ec/0x220 [ 77.482762][ T5728] get_page_from_freelist+0x3607/0x3750 [ 77.488410][ T5728] __alloc_frozen_pages_noprof+0x256/0x690 [ 77.494246][ T5728] alloc_pages_mpol+0x311/0x660 [ 77.499105][ T5728] allocate_slab+0x8f/0x3a0 [ 77.503616][ T5728] ___slab_alloc+0xc35/0x14a0 [ 77.508429][ T5728] __slab_alloc+0x58/0xa0 [ 77.512763][ T5728] __kmalloc_cache_noprof+0x276/0x360 [ 77.518135][ T5728] kernfs_fop_open+0x3e0/0xd10 [ 77.523038][ T5728] do_dentry_open+0xdea/0x1960 [ 77.527832][ T5728] vfs_open+0x3b/0x370 [ 77.531919][ T5728] path_openat+0x2c7d/0x3590 [ 77.536550][ T5728] do_filp_open+0x27f/0x4e0 [ 77.541076][ T5728] do_sys_openat2+0x13e/0x1d0 [ 77.545761][ T5728] __x64_sys_openat+0x247/0x2a0 [ 77.550713][ T5728] do_syscall_64+0x82/0x160 [ 77.555353][ T5728] page last free pid 5080 tgid 5080 stack trace: [ 77.561777][ T5728] free_frozen_pages+0xdf5/0x10b0 [ 77.566922][ T5728] __slab_free+0x2c2/0x380 [ 77.571477][ T5728] qlist_free_all+0x9a/0x140 [ 77.576124][ T5728] kasan_quarantine_reduce+0x14f/0x170 [ 77.581599][ T5728] __kasan_slab_alloc+0x23/0x60 [ 77.586497][ T5728] __kmalloc_noprof+0x231/0x490 [ 77.591351][ T5728] tomoyo_realpath_from_path+0xcf/0x5e0 [ 77.596918][ T5728] tomoyo_path_number_perm+0x236/0x860 [ 77.602403][ T5728] tomoyo_path_mknod+0x176/0x1b0 [ 77.607438][ T5728] security_path_mknod+0x181/0x3a0 [ 77.613069][ T5728] path_openat+0xe3c/0x3590 [ 77.617619][ T5728] do_filp_open+0x27f/0x4e0 [ 77.622227][ T5728] do_sys_openat2+0x13e/0x1d0 [ 77.627394][ T5728] __x64_sys_openat+0x247/0x2a0 [ 77.632276][ T5728] do_syscall_64+0x82/0x160 [ 77.636814][ T5728] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 77.642727][ T5728] [ 77.645052][ T5728] Memory state around the buggy address: [ 77.650695][ T5728] ffff8880307ce300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.658771][ T5728] ffff8880307ce380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.666972][ T5728] >ffff8880307ce400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.675130][ T5728] ^ [ 77.679485][ T5728] ffff8880307ce480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.687571][ T5728] ffff8880307ce500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.695647][ T5728] ================================================================== [ 77.707084][ T5728] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 77.714335][ T5728] CPU: 0 UID: 0 PID: 5728 Comm: syz-executor Not tainted 6.13.0-syzkaller #0 [ 77.723341][ T5728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 77.733718][ T5728] Call Trace: [ 77.737013][ T5728] [ 77.740053][ T5728] dump_stack_lvl+0x241/0x360 [ 77.744777][ T5728] ? __pfx_dump_stack_lvl+0x10/0x10 [ 77.750363][ T5728] ? __pfx__printk+0x10/0x10 [ 77.754985][ T5728] ? preempt_schedule+0xe1/0xf0 [ 77.759884][ T5728] ? vscnprintf+0x5d/0x90 [ 77.764236][ T5728] panic+0x349/0x880 [ 77.768237][ T5728] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 77.774514][ T5728] ? check_panic_on_warn+0x21/0xb0 [ 77.779903][ T5728] ? __pfx_panic+0x10/0x10 [ 77.784343][ T5728] ? _raw_spin_unlock_irqrestore+0x130/0x140 [ 77.790450][ T5728] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 77.796804][ T5728] ? print_report+0x502/0x550 [ 77.801529][ T5728] check_panic_on_warn+0x86/0xb0 [ 77.806483][ T5728] ? binder_add_device+0x5f/0xa0 [ 77.811464][ T5728] end_report+0x77/0x150 [ 77.815723][ T5728] kasan_report+0x154/0x180 [ 77.820241][ T5728] ? binder_add_device+0x5f/0xa0 [ 77.825192][ T5728] binder_add_device+0x5f/0xa0 [ 77.829965][ T5728] binderfs_binder_device_create+0x7bf/0x9c0 [ 77.836053][ T5728] binderfs_fill_super+0x944/0xd90 [ 77.841191][ T5728] ? __pfx_binderfs_fill_super+0x10/0x10 [ 77.847013][ T5728] ? shrinker_register+0x160/0x230 [ 77.852125][ T5728] ? sget_fc+0x909/0x9c0 [ 77.856379][ T5728] ? __pfx_set_anon_super_fc+0x10/0x10 [ 77.861843][ T5728] ? __pfx_binderfs_fill_super+0x10/0x10 [ 77.867488][ T5728] get_tree_nodev+0xb7/0x140 [ 77.872085][ T5728] vfs_get_tree+0x90/0x290 [ 77.876520][ T5728] do_new_mount+0x2be/0xb40 [ 77.881203][ T5728] ? __pfx_do_new_mount+0x10/0x10 [ 77.886240][ T5728] __se_sys_mount+0x2d6/0x3c0 [ 77.890929][ T5728] ? lockdep_hardirqs_on_prepare+0x43d/0x7a0 [ 77.896911][ T5728] ? __pfx___se_sys_mount+0x10/0x10 [ 77.902210][ T5728] ? __x64_sys_mount+0x20/0xc0 [ 77.906989][ T5728] do_syscall_64+0x82/0x160 [ 77.911503][ T5728] ? clear_bhb_loop+0x25/0x80 [ 77.916186][ T5728] ? clear_bhb_loop+0x25/0x80 [ 77.920882][ T5728] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 77.926792][ T5728] RIP: 0033:0x7f905a58e54a [ 77.931202][ T5728] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 77.950979][ T5728] RSP: 002b:00007ffc9110f3c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 77.959422][ T5728] RAX: ffffffffffffffda RBX: 00007f905a60e663 RCX: 00007f905a58e54a [ 77.967427][ T5728] RDX: 00007f905a61dda7 RSI: 00007f905a60e663 RDI: 00007f905a61dda7 [ 77.975430][ T5728] RBP: 00007f905a60e8ac R08: 0000000000000000 R09: 00000000000001ff [ 77.983457][ T5728] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f905a5eb1a8 [ 77.991535][ T5728] R13: 00007f905a5eb180 R14: 0000000000000009 R15: 0000000000000000 [ 77.999530][ T5728] [ 78.002929][ T5728] Kernel Offset: disabled [ 78.007285][ T5728] Rebooting in 86400 seconds.. syzkaller build log: go env (err=) GO111MODULE='auto' GOARCH='amd64' GOBIN='' GOCACHE='/syzkaller/.cache/go-build' GOENV='/syzkaller/.config/go/env' GOEXE='' GOEXPERIMENT='' GOFLAGS='' GOHOSTARCH='amd64' GOHOSTOS='linux' GOINSECURE='' GOMODCACHE='/syzkaller/jobs-2/linux/gopath/pkg/mod' GONOPROXY='' GONOSUMDB='' GOOS='linux' GOPATH='/syzkaller/jobs-2/linux/gopath' GOPRIVATE='' GOPROXY='https://proxy.golang.org,direct' GOROOT='/usr/local/go' GOSUMDB='sum.golang.org' GOTMPDIR='' GOTOOLCHAIN='auto' GOTOOLDIR='/usr/local/go/pkg/tool/linux_amd64' GOVCS='' GOVERSION='go1.22.7' GCCGO='gccgo' GOAMD64='v1' AR='ar' CC='gcc' CXX='g++' CGO_ENABLED='1' GOMOD='/syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/go.mod' GOWORK='' CGO_CFLAGS='-O2 -g' CGO_CPPFLAGS='' CGO_CXXFLAGS='-O2 -g' CGO_FFLAGS='-O2 -g' CGO_LDFLAGS='-O2 -g' PKG_CONFIG='pkg-config' GOGCCFLAGS='-fPIC -m64 -pthread -Wl,--no-gc-sections -fmessage-length=0 -ffile-prefix-map=/tmp/go-build3763207164=/tmp/go-build -gno-record-gcc-switches' git status (err=) HEAD detached at aa47157c8e nothing to commit, working tree clean tput: No value for $TERM and no -T specified tput: No value for $TERM and no -T specified Makefile:31: run command via tools/syz-env for best compatibility, see: Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env go list -f '{{.Stale}}' ./sys/syz-sysgen | grep -q false || go install ./sys/syz-sysgen make .descriptions tput: No value for $TERM and no -T specified tput: No value for $TERM and no -T specified Makefile:31: run command via tools/syz-env for best compatibility, see: Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env bin/syz-sysgen touch .descriptions GOOS=linux GOARCH=amd64 go build "-ldflags=-s -w -X github.com/google/syzkaller/prog.GitRevision=aa47157c8ec3df5a6d16e3866b095c8f91026465 -X 'github.com/google/syzkaller/prog.gitRevisionDate=20250131-140626'" -o ./bin/linux_amd64/syz-execprog github.com/google/syzkaller/tools/syz-execprog mkdir -p ./bin/linux_amd64 g++ -o ./bin/linux_amd64/syz-executor executor/executor.cc \ -m64 -O2 -pthread -Wall -Werror -Wparentheses -Wunused-const-variable -Wframe-larger-than=16384 -Wno-stringop-overflow -Wno-array-bounds -Wno-format-overflow -Wno-unused-but-set-variable -Wno-unused-command-line-argument -static-pie -std=c++17 -I. -Iexecutor/_include -DGOOS_linux=1 -DGOARCH_amd64=1 \ -DHOSTGOOS_linux=1 -DGIT_REVISION=\"aa47157c8ec3df5a6d16e3866b095c8f91026465\" /usr/bin/ld: /tmp/ccv1gyKu.o: in function `Connection::Connect(char const*, char const*)': executor.cc:(.text._ZN10Connection7ConnectEPKcS1_[_ZN10Connection7ConnectEPKcS1_]+0x104): warning: Using 'gethostbyname' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking