KASAN: slab-use-after-free Write in binder_add_device
request_module fs-gadgetfs succeeded, but still no fs?
==================================================================
BUG: KASAN: slab-use-after-free in hlist_add_head include/linux/list.h:1026 [inline]
BUG: KASAN: slab-use-after-free in binder_add_device+0x63/0xa0 drivers/android/binder.c:6932
Write of size 8 at addr ffff888106ead108 by task syz-executor/309
CPU: 0 UID: 0 PID: 309 Comm: syz-executor Not tainted 6.13.0-syzkaller-09585-gb4b0881156fb #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x188/0x200 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0x163/0x550 mm/kasan/report.c:489
kasan_report+0x14f/0x190 mm/kasan/report.c:602
__asan_report_store8_noabort+0x1b/0x30 mm/kasan/report_generic.c:386
hlist_add_head include/linux/list.h:1026 [inline]
binder_add_device+0x63/0xa0 drivers/android/binder.c:6932
binderfs_binder_device_create+0x7e7/0x9e0 drivers/android/binderfs.c:210
binderfs_fill_super+0x897/0xcb0 drivers/android/binderfs.c:729
vfs_get_super fs/super.c:1280 [inline]
get_tree_nodev+0xbd/0x160 fs/super.c:1299
binderfs_fs_context_get_tree+0x20/0x30 drivers/android/binderfs.c:749
vfs_get_tree+0x90/0x2c0 fs/super.c:1814
do_new_mount+0x2be/0xb40 fs/namespace.c:3560
path_mount+0x680/0x1000 fs/namespace.c:3887
do_mount fs/namespace.c:3900 [inline]
__do_sys_mount fs/namespace.c:4111 [inline]
__se_sys_mount+0x2c5/0x3b0 fs/namespace.c:4088
__x64_sys_mount+0xc3/0xe0 fs/namespace.c:4088
x64_sys_call+0x2ca2/0x2e00 arch/x86/include/generated/asm/syscalls_64.h:166
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x54/0xf0 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7f9ce8d874ba
Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffd522812a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007f9ce8e01de3 RCX: 00007f9ce8d874ba
RDX: 00007f9ce8e0eb3f RSI: 00007f9ce8e01de3 RDI: 00007f9ce8e0eb3f
RBP: 00007f9ce8e01fdb R08: 0000000000000000 R09: 00000000000001ff
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ce8de41c8
R13: 00007f9ce8de41a8 R14: 0000000000000009 R15: 0000000000000000
Allocated by task 307:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
kasan_save_alloc_info+0x3c/0x50 mm/kasan/generic.c:562
poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
__kasan_kmalloc+0x9d/0xb0 mm/kasan/common.c:394
kasan_kmalloc include/linux/kasan.h:260 [inline]
__kmalloc_cache_noprof+0x17c/0x300 mm/slub.c:4325
kmalloc_noprof include/linux/slab.h:901 [inline]
kzalloc_noprof include/linux/slab.h:1037 [inline]
binderfs_binder_device_create+0x15b/0x9e0 drivers/android/binderfs.c:147
binderfs_fill_super+0x897/0xcb0 drivers/android/binderfs.c:729
vfs_get_super fs/super.c:1280 [inline]
get_tree_nodev+0xbd/0x160 fs/super.c:1299
binderfs_fs_context_get_tree+0x20/0x30 drivers/android/binderfs.c:749
vfs_get_tree+0x90/0x2c0 fs/super.c:1814
do_new_mount+0x2be/0xb40 fs/namespace.c:3560
path_mount+0x680/0x1000 fs/namespace.c:3887
do_mount fs/namespace.c:3900 [inline]
__do_sys_mount fs/namespace.c:4111 [inline]
__se_sys_mount+0x2c5/0x3b0 fs/namespace.c:4088
__x64_sys_mount+0xc3/0xe0 fs/namespace.c:4088
x64_sys_call+0x2ca2/0x2e00 arch/x86/include/generated/asm/syscalls_64.h:166
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x54/0xf0 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x76/0x7e
Freed by task 307:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
kasan_save_free_info+0x44/0x50 mm/kasan/generic.c:576
poison_slab_object mm/kasan/common.c:247 [inline]
__kasan_slab_free+0x57/0x70 mm/kasan/common.c:264
kasan_slab_free include/linux/kasan.h:233 [inline]
slab_free_hook mm/slub.c:2353 [inline]
slab_free mm/slub.c:4609 [inline]
kfree+0x143/0x370 mm/slub.c:4757
binderfs_evict_inode+0x18b/0x230 drivers/android/binderfs.c:278
evict+0x4ab/0x940 fs/inode.c:796
iput_final fs/inode.c:1946 [inline]
iput+0x607/0x920 fs/inode.c:1972
dentry_unlink_inode+0x389/0x460 fs/dcache.c:440
__dentry_kill+0x207/0x640 fs/dcache.c:643
shrink_kill fs/dcache.c:1088 [inline]
shrink_dentry_list+0x319/0x510 fs/dcache.c:1115
shrink_dcache_parent+0xd2/0x360
do_one_tree+0x27/0xf0 fs/dcache.c:1578
shrink_dcache_for_umount+0xa7/0x150 fs/dcache.c:1595
generic_shutdown_super+0x6d/0x300 fs/super.c:620
kill_anon_super+0x4a/0x1e0 fs/super.c:1237
kill_litter_super+0x5a/0x70 fs/super.c:1247
binderfs_kill_super+0x45/0x60 drivers/android/binderfs.c:791
deactivate_locked_super+0xdc/0x290 fs/super.c:473
deactivate_super+0xca/0x100 fs/super.c:506
cleanup_mnt+0x42d/0x4d0 fs/namespace.c:1413
__cleanup_mnt+0x1d/0x30 fs/namespace.c:1420
task_work_run+0x24f/0x300 kernel/task_work.c:227
exit_task_work include/linux/task_work.h:40 [inline]
do_exit+0xb3d/0x2ad0 kernel/exit.c:938
do_group_exit+0x21f/0x2e0 kernel/exit.c:1087
__do_sys_exit_group kernel/exit.c:1098 [inline]
__se_sys_exit_group kernel/exit.c:1096 [inline]
__x64_sys_exit_group+0x43/0x50 kernel/exit.c:1096
x64_sys_call+0x2df3/0x2e00 arch/x86/include/generated/asm/syscalls_64.h:232
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x54/0xf0 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x76/0x7e
The buggy address belongs to the object at ffff888106ead100
which belongs to the cache kmalloc-192 of size 192
The buggy address is located 8 bytes inside of
freed 192-byte region [ffff888106ead100, ffff888106ead1c0)
The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ead
flags: 0x4000000000000000(zone=1)
page_type: f5(slab)
raw: 4000000000000000 ffff8881000413c0 ffffea00041bae00 dead000000000002
raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x52c00(GFP_NOIO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 1, tgid 1 (swapper/0), ts 3008791937, free_ts 0
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x1eb/0x210 mm/page_alloc.c:1551
prep_new_page mm/page_alloc.c:1559 [inline]
get_page_from_freelist+0x482b/0x48c0 mm/page_alloc.c:3477
__alloc_frozen_pages_noprof+0x3e8/0x890 mm/page_alloc.c:4739
allocate_slab+0x76/0x430 mm/slub.c:2587
new_slab mm/slub.c:2640 [inline]
___slab_alloc+0x7e0/0xcf0 mm/slub.c:3826
__slab_alloc+0x5d/0xb0 mm/slub.c:3916
__slab_alloc_node mm/slub.c:3991 [inline]
slab_alloc_node mm/slub.c:4152 [inline]
__do_kmalloc_node mm/slub.c:4293 [inline]
__kmalloc_noprof+0x221/0x420 mm/slub.c:4306
kmalloc_noprof include/linux/slab.h:905 [inline]
usb_alloc_urb+0x41/0x140 drivers/usb/core/urb.c:75
usb_internal_control_msg drivers/usb/core/message.c:96 [inline]
usb_control_msg+0x189/0x4c0 drivers/usb/core/message.c:154
usb_get_descriptor+0xba/0x3e0 drivers/usb/core/message.c:794
usb_get_configuration+0x296/0x4bb0 drivers/usb/core/config.c:905
usb_enumerate_device drivers/usb/core/hub.c:2484 [inline]
usb_new_device+0x14a/0x18a0 drivers/usb/core/hub.c:2622
register_root_hub+0x22b/0x440 drivers/usb/core/hcd.c:994
usb_add_hcd+0xccf/0x1200 drivers/usb/core/hcd.c:2976
dummy_hcd_probe+0x17d/0x2e0 drivers/usb/gadget/udc/dummy_hcd.c:2695
platform_probe+0x167/0x1f0 drivers/base/platform.c:1404
page_owner free stack trace missing
Memory state around the buggy address:
ffff888106ead000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffff888106ead080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc
>ffff888106ead100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
^
ffff888106ead180: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
ffff888106ead200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================
Warning: Permanently added '10.128.1.159' (ED25519) to the list of known hosts.
2025/01/30 21:31:55 ignoring optional flag "sandboxArg"="0"
2025/01/30 21:31:56 parsed 1 programs
[ 30.422848][ T30] audit: type=1400 audit(1738272716.106:66): avc: denied { node_bind } for pid=293 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 31.629771][ T30] audit: type=1400 audit(1738272717.316:67): avc: denied { mounton } for pid=299 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 31.631084][ T299] cgroup: Unknown subsys name 'net'
[ 31.652702][ T30] audit: type=1400 audit(1738272717.316:68): avc: denied { mount } for pid=299 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 31.679774][ T30] audit: type=1400 audit(1738272717.336:69): avc: denied { unmount } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 31.679950][ T299] cgroup: Unknown subsys name 'devices'
[ 31.800867][ T299] cgroup: Unknown subsys name 'cpuset'
[ 31.806799][ T299] cgroup: Unknown subsys name 'hugetlb'
[ 31.812314][ T299] cgroup: Unknown subsys name 'rlimit'
[ 31.817745][ T299] cgroup: Unknown subsys name 'memory'
[ 31.933741][ T30] audit: type=1400 audit(1738272717.616:70): avc: denied { setattr } for pid=299 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 31.957192][ T30] audit: type=1400 audit(1738272717.616:71): avc: denied { create } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 31.958159][ T304] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 31.978687][ T30] audit: type=1400 audit(1738272717.616:72): avc: denied { write } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 32.007255][ T30] audit: type=1400 audit(1738272717.616:73): avc: denied { read } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 32.026553][ T299] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 32.027669][ T30] audit: type=1400 audit(1738272717.616:74): avc: denied { module_request } for pid=299 comm="syz-executor" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 32.058036][ T30] audit: type=1400 audit(1738272717.616:75): avc: denied { mounton } for pid=299 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 32.792176][ T309] request_module fs-gadgetfs succeeded, but still no fs?
[ 32.799377][ T309] ==================================================================
[ 32.807275][ T309] BUG: KASAN: slab-use-after-free in binder_add_device+0x63/0xa0
[ 32.814818][ T309] Write of size 8 at addr ffff888106ead108 by task syz-executor/309
[ 32.822642][ T309]
[ 32.824824][ T309] CPU: 0 UID: 0 PID: 309 Comm: syz-executor Not tainted 6.13.0-syzkaller-09585-gb4b0881156fb #0
[ 32.824849][ T309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
[ 32.824866][ T309] Call Trace:
[ 32.824878][ T309]
[ 32.824888][ T309] dump_stack_lvl+0x188/0x200
[ 32.824920][ T309] ? __pfx_dump_stack_lvl+0x10/0x10
[ 32.824965][ T309] ? vprintk+0x21/0x30
[ 32.824985][ T309] ? _printk+0xd5/0x120
[ 32.825015][ T309] ? binder_add_device+0x63/0xa0
[ 32.825033][ T309] print_report+0x163/0x550
[ 32.825059][ T309] ? __virt_addr_valid+0x2a8/0x380
[ 32.825084][ T309] ? binder_add_device+0x63/0xa0
[ 32.825103][ T309] ? kasan_complete_mode_report_info+0x75/0x210
[ 32.825134][ T309] ? binder_add_device+0x63/0xa0
[ 32.825152][ T309] kasan_report+0x14f/0x190
[ 32.825177][ T309] ? binder_add_device+0x63/0xa0
[ 32.825198][ T309] __asan_report_store8_noabort+0x1b/0x30
[ 32.825217][ T309] binder_add_device+0x63/0xa0
[ 32.825235][ T309] binderfs_binder_device_create+0x7e7/0x9e0
[ 32.825270][ T309] binderfs_fill_super+0x897/0xcb0
[ 32.825302][ T309] ? __pfx_binderfs_fill_super+0x10/0x10
[ 32.825339][ T309] ? shrinker_register+0x16a/0x230
[ 32.825365][ T309] ? sget_fc+0x908/0x9c0
[ 32.825384][ T309] ? __pfx_set_anon_super_fc+0x10/0x10
[ 32.825408][ T309] get_tree_nodev+0xbd/0x160
[ 32.825429][ T309] ? __pfx_binderfs_fill_super+0x10/0x10
[ 32.825460][ T309] binderfs_fs_context_get_tree+0x20/0x30
[ 32.825492][ T309] vfs_get_tree+0x90/0x2c0
[ 32.825516][ T309] do_new_mount+0x2be/0xb40
[ 32.825540][ T309] ? __pfx_do_new_mount+0x10/0x10
[ 32.825563][ T309] ? security_capable+0x88/0xa0
[ 32.825592][ T309] ? ns_capable+0x8e/0xf0
[ 32.825611][ T309] path_mount+0x680/0x1000
[ 32.825636][ T309] __se_sys_mount+0x2c5/0x3b0
[ 32.825661][ T309] ? __pfx___se_sys_mount+0x10/0x10
[ 32.825689][ T309] __x64_sys_mount+0xc3/0xe0
[ 32.825714][ T309] x64_sys_call+0x2ca2/0x2e00
[ 32.825742][ T309] do_syscall_64+0x54/0xf0
[ 32.825768][ T309] ? clear_bhb_loop+0x35/0x90
[ 32.825793][ T309] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 32.825816][ T309] RIP: 0033:0x7f9ce8d874ba
[ 32.825840][ T309] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 32.825857][ T309] RSP: 002b:00007ffd522812a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[ 32.825882][ T309] RAX: ffffffffffffffda RBX: 00007f9ce8e01de3 RCX: 00007f9ce8d874ba
[ 32.825897][ T309] RDX: 00007f9ce8e0eb3f RSI: 00007f9ce8e01de3 RDI: 00007f9ce8e0eb3f
[ 32.825911][ T309] RBP: 00007f9ce8e01fdb R08: 0000000000000000 R09: 00000000000001ff
[ 32.825924][ T309] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ce8de41c8
[ 32.825937][ T309] R13: 00007f9ce8de41a8 R14: 0000000000000009 R15: 0000000000000000
[ 32.825953][ T309]
[ 32.825961][ T309]
[ 33.101999][ T309] Allocated by task 307:
[ 33.106221][ T309] kasan_save_track+0x3f/0x80
[ 33.110834][ T309] kasan_save_alloc_info+0x3c/0x50
[ 33.115780][ T309] __kasan_kmalloc+0x9d/0xb0
[ 33.120312][ T309] __kmalloc_cache_noprof+0x17c/0x300
[ 33.125505][ T309] binderfs_binder_device_create+0x15b/0x9e0
[ 33.131319][ T309] binderfs_fill_super+0x897/0xcb0
[ 33.136260][ T309] get_tree_nodev+0xbd/0x160
[ 33.140688][ T309] binderfs_fs_context_get_tree+0x20/0x30
[ 33.146278][ T309] vfs_get_tree+0x90/0x2c0
[ 33.150498][ T309] do_new_mount+0x2be/0xb40
[ 33.154834][ T309] path_mount+0x680/0x1000
[ 33.159089][ T309] __se_sys_mount+0x2c5/0x3b0
[ 33.163602][ T309] __x64_sys_mount+0xc3/0xe0
[ 33.168045][ T309] x64_sys_call+0x2ca2/0x2e00
[ 33.172541][ T309] do_syscall_64+0x54/0xf0
[ 33.177066][ T309] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 33.182784][ T309]
[ 33.184961][ T309] Freed by task 307:
[ 33.188690][ T309] kasan_save_track+0x3f/0x80
[ 33.193232][ T309] kasan_save_free_info+0x44/0x50
[ 33.198057][ T309] __kasan_slab_free+0x57/0x70
[ 33.202657][ T309] kfree+0x143/0x370
[ 33.206403][ T309] binderfs_evict_inode+0x18b/0x230
[ 33.211598][ T309] evict+0x4ab/0x940
[ 33.215328][ T309] iput+0x607/0x920
[ 33.219322][ T309] dentry_unlink_inode+0x389/0x460
[ 33.224271][ T309] __dentry_kill+0x207/0x640
[ 33.228703][ T309] shrink_dentry_list+0x319/0x510
[ 33.233574][ T309] shrink_dcache_parent+0xd2/0x360
[ 33.238629][ T309] do_one_tree+0x27/0xf0
[ 33.242712][ T309] shrink_dcache_for_umount+0xa7/0x150
[ 33.248194][ T309] generic_shutdown_super+0x6d/0x300
[ 33.253492][ T309] kill_anon_super+0x4a/0x1e0
[ 33.258140][ T309] kill_litter_super+0x5a/0x70
[ 33.262837][ T309] binderfs_kill_super+0x45/0x60
[ 33.267787][ T309] deactivate_locked_super+0xdc/0x290
[ 33.272966][ T309] deactivate_super+0xca/0x100
[ 33.277577][ T309] cleanup_mnt+0x42d/0x4d0
[ 33.281945][ T309] __cleanup_mnt+0x1d/0x30
[ 33.286185][ T309] task_work_run+0x24f/0x300
[ 33.290777][ T309] do_exit+0xb3d/0x2ad0
[ 33.294843][ T309] do_group_exit+0x21f/0x2e0
[ 33.299644][ T309] __x64_sys_exit_group+0x43/0x50
[ 33.304488][ T309] x64_sys_call+0x2df3/0x2e00
[ 33.309013][ T309] do_syscall_64+0x54/0xf0
[ 33.313582][ T309] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 33.320301][ T309]
[ 33.322641][ T309] The buggy address belongs to the object at ffff888106ead100
[ 33.322641][ T309] which belongs to the cache kmalloc-192 of size 192
[ 33.337342][ T309] The buggy address is located 8 bytes inside of
[ 33.337342][ T309] freed 192-byte region [ffff888106ead100, ffff888106ead1c0)
[ 33.350957][ T309]
[ 33.353154][ T309] The buggy address belongs to the physical page:
[ 33.359380][ T309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ead
[ 33.368371][ T309] flags: 0x4000000000000000(zone=1)
[ 33.373701][ T309] page_type: f5(slab)
[ 33.377510][ T309] raw: 4000000000000000 ffff8881000413c0 ffffea00041bae00 dead000000000002
[ 33.386286][ T309] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 33.395291][ T309] page dumped because: kasan: bad access detected
[ 33.402387][ T309] page_owner tracks the page as allocated
[ 33.407914][ T309] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x52c00(GFP_NOIO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 1, tgid 1 (swapper/0), ts 3008791937, free_ts 0
[ 33.425628][ T309] post_alloc_hook+0x1eb/0x210
[ 33.430528][ T309] get_page_from_freelist+0x482b/0x48c0
[ 33.436447][ T309] __alloc_frozen_pages_noprof+0x3e8/0x890
[ 33.442076][ T309] allocate_slab+0x76/0x430
[ 33.446416][ T309] ___slab_alloc+0x7e0/0xcf0
[ 33.450978][ T309] __slab_alloc+0x5d/0xb0
[ 33.455318][ T309] __kmalloc_noprof+0x221/0x420
[ 33.460005][ T309] usb_alloc_urb+0x41/0x140
[ 33.464600][ T309] usb_control_msg+0x189/0x4c0
[ 33.469180][ T309] usb_get_descriptor+0xba/0x3e0
[ 33.473964][ T309] usb_get_configuration+0x296/0x4bb0
[ 33.479313][ T309] usb_new_device+0x14a/0x18a0
[ 33.483895][ T309] register_root_hub+0x22b/0x440
[ 33.488788][ T309] usb_add_hcd+0xccf/0x1200
[ 33.493119][ T309] dummy_hcd_probe+0x17d/0x2e0
[ 33.497769][ T309] platform_probe+0x167/0x1f0
[ 33.502315][ T309] page_owner free stack trace missing
[ 33.507627][ T309]
[ 33.509861][ T309] Memory state around the buggy address:
[ 33.515331][ T309] ffff888106ead000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 33.523231][ T309] ffff888106ead080: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc
[ 33.531131][ T309] >ffff888106ead100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 33.539028][ T309] ^
[ 33.543191][ T309] ffff888106ead180: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 33.551091][ T309] ffff888106ead200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 33.559200][ T309] ==================================================================
[ 33.567675][ T309] Disabling lock debugging due to kernel taint
[ 33.948722][ T339] bridge0: port 1(bridge_slave_0) entered blocking state
[ 33.956140][ T339] bridge0: port 1(bridge_slave_0) entered disabled state
[ 33.963430][ T339] bridge_slave_0: entered allmulticast mode
[ 33.974309][ T339] bridge_slave_0: entered promiscuous mode
[ 33.983309][ T339] bridge0: port 2(bridge_slave_1) entered blocking state
[ 33.990270][ T339] bridge0: port 2(bridge_slave_1) entered disabled state
[ 33.997096][ T339] bridge_slave_1: entered allmulticast mode
[ 34.003386][ T339] bridge_slave_1: entered promiscuous mode
[ 34.059511][ T339] bridge0: port 2(bridge_slave_1) entered blocking state
[ 34.066420][ T339] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 34.073775][ T339] bridge0: port 1(bridge_slave_0) entered blocking state
[ 34.080961][ T339] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 34.102843][ T317] bridge0: port 1(bridge_slave_0) entered disabled state
[ 34.110281][ T317] bridge0: port 2(bridge_slave_1) entered disabled state
[ 34.119377][ T11] bridge0: port 1(bridge_slave_0) entered blocking state
[ 34.126266][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 34.135060][ T317] bridge0: port 2(bridge_slave_1) entered blocking state
[ 34.142288][ T317] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 34.167934][ T339] veth0_vlan: entered promiscuous mode
[ 34.179457][ T339] veth1_macvtap: entered promiscuous mode
[ 34.212836][ T339] syz-executor (339) used greatest stack depth: 19992 bytes left
[ 34.232525][ T317] bridge_slave_1: left allmulticast mode
[ 34.238184][ T317] bridge_slave_1: left promiscuous mode
[ 34.245571][ T317] bridge0: port 2(bridge_slave_1) entered disabled state
[ 34.253229][ T317] bridge_slave_0: left allmulticast mode
[ 34.258697][ T317] bridge_slave_0: left promiscuous mode
[ 34.264530][ T317] bridge0: port 1(bridge_slave_0) entered disabled state
[ 34.361243][ T317] veth1_macvtap: left promiscuous mode
[ 34.366711][ T317] veth0_vlan: left promiscuous mode
2025/01/30 21:32:00 executed programs: 0
[ 34.856254][ T367] bridge0: port 1(bridge_slave_0) entered blocking state
[ 34.863304][ T367] bridge0: port 1(bridge_slave_0) entered disabled state
[ 34.870255][ T367] bridge_slave_0: entered allmulticast mode
[ 34.876350][ T367] bridge_slave_0: entered promiscuous mode
[ 34.883069][ T367] bridge0: port 2(bridge_slave_1) entered blocking state
[ 34.890137][ T367] bridge0: port 2(bridge_slave_1) entered disabled state
[ 34.897057][ T367] bridge_slave_1: entered allmulticast mode
[ 34.903488][ T367] bridge_slave_1: entered promiscuous mode
[ 34.960787][ T367] bridge0: port 2(bridge_slave_1) entered blocking state
[ 34.968673][ T367] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 34.975992][ T367] bridge0: port 1(bridge_slave_0) entered blocking state
[ 34.983176][ T367] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 35.005921][ T39] bridge0: port 1(bridge_slave_0) entered disabled state
[ 35.013204][ T39] bridge0: port 2(bridge_slave_1) entered disabled state
[ 35.022674][ T12] bridge0: port 1(bridge_slave_0) entered blocking state
[ 35.029532][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 35.038298][ T39] bridge0: port 2(bridge_slave_1) entered blocking state
[ 35.045201][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 35.071122][ T367] veth0_vlan: entered promiscuous mode
[ 35.081955][ T367] veth1_macvtap: entered promiscuous mode
[ 35.163330][ T39] bridge_slave_1: left allmulticast mode
[ 35.168820][ T39] bridge_slave_1: left promiscuous mode
[ 35.174664][ T39] bridge0: port 2(bridge_slave_1) entered disabled state
[ 35.182776][ T39] bridge_slave_0: left allmulticast mode
[ 35.188418][ T39] bridge_slave_0: left promiscuous mode
[ 35.194266][ T39] bridge0: port 1(bridge_slave_0) entered disabled state
syzkaller build log:
go env (err=)
GO111MODULE='auto'
GOARCH='amd64'
GOBIN=''
GOCACHE='/syzkaller/.cache/go-build'
GOENV='/syzkaller/.config/go/env'
GOEXE=''
GOEXPERIMENT=''
GOFLAGS=''
GOHOSTARCH='amd64'
GOHOSTOS='linux'
GOINSECURE=''
GOMODCACHE='/syzkaller/jobs-2/linux/gopath/pkg/mod'
GONOPROXY=''
GONOSUMDB=''
GOOS='linux'
GOPATH='/syzkaller/jobs-2/linux/gopath'
GOPRIVATE=''
GOPROXY='https://proxy.golang.org,direct'
GOROOT='/usr/local/go'
GOSUMDB='sum.golang.org'
GOTMPDIR=''
GOTOOLCHAIN='auto'
GOTOOLDIR='/usr/local/go/pkg/tool/linux_amd64'
GOVCS=''
GOVERSION='go1.22.7'
GCCGO='gccgo'
GOAMD64='v1'
AR='ar'
CC='gcc'
CXX='g++'
CGO_ENABLED='1'
GOMOD='/syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/go.mod'
GOWORK=''
CGO_CFLAGS='-O2 -g'
CGO_CPPFLAGS=''
CGO_CXXFLAGS='-O2 -g'
CGO_FFLAGS='-O2 -g'
CGO_LDFLAGS='-O2 -g'
PKG_CONFIG='pkg-config'
GOGCCFLAGS='-fPIC -m64 -pthread -Wl,--no-gc-sections -fmessage-length=0 -ffile-prefix-map=/tmp/go-build2197305386=/tmp/go-build -gno-record-gcc-switches'
git status (err=)
HEAD detached at 7cbfbb3ab4
nothing to commit, working tree clean
tput: No value for $TERM and no -T specified
tput: No value for $TERM and no -T specified
Makefile:31: run command via tools/syz-env for best compatibility, see:
Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env
go list -f '{{.Stale}}' ./sys/syz-sysgen | grep -q false || go install ./sys/syz-sysgen
make .descriptions
tput: No value for $TERM and no -T specified
tput: No value for $TERM and no -T specified
Makefile:31: run command via tools/syz-env for best compatibility, see:
Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env
bin/syz-sysgen
go fmt ./sys/... >/dev/null
touch .descriptions
GOOS=linux GOARCH=amd64 go build "-ldflags=-s -w -X github.com/google/syzkaller/prog.GitRevision=7cbfbb3ab457b0a8ecf525a27a65a2078c5dcaa8 -X 'github.com/google/syzkaller/prog.gitRevisionDate=20241213-162906'" "-tags=syz_target syz_os_linux syz_arch_amd64 " -o ./bin/linux_amd64/syz-execprog github.com/google/syzkaller/tools/syz-execprog
mkdir -p ./bin/linux_amd64
g++ -o ./bin/linux_amd64/syz-executor executor/executor.cc \
-m64 -O2 -pthread -Wall -Werror -Wparentheses -Wunused-const-variable -Wframe-larger-than=16384 -Wno-stringop-overflow -Wno-array-bounds -Wno-format-overflow -Wno-unused-but-set-variable -Wno-unused-command-line-argument -static-pie -std=c++17 -I. -Iexecutor/_include -fpermissive -w -DGOOS_linux=1 -DGOARCH_amd64=1 \
-DHOSTGOOS_linux=1 -DGIT_REVISION=\"7cbfbb3ab457b0a8ecf525a27a65a2078c5dcaa8\"
/usr/bin/ld: /tmp/ccKYAQBW.o: in function `Connection::Connect(char const*, char const*)':
executor.cc:(.text._ZN10Connection7ConnectEPKcS1_[_ZN10Connection7ConnectEPKcS1_]+0x104): warning: Using 'gethostbyname' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking