KASAN: slab-use-after-free Write in binder_add_device ================================================================== BUG: KASAN: slab-use-after-free in hlist_add_head include/linux/list.h:1026 [inline] BUG: KASAN: slab-use-after-free in binder_add_device+0x63/0xa0 drivers/android/binder.c:6932 Write of size 8 at addr ffff888103e4a108 by task syz-executor/316 CPU: 0 UID: 0 PID: 316 Comm: syz-executor Not tainted 6.13.0-syzkaller-09760-g69e858e0b8b2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x188/0x200 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x163/0x550 mm/kasan/report.c:489 kasan_report+0x14f/0x190 mm/kasan/report.c:602 __asan_report_store8_noabort+0x1b/0x30 mm/kasan/report_generic.c:386 hlist_add_head include/linux/list.h:1026 [inline] binder_add_device+0x63/0xa0 drivers/android/binder.c:6932 binderfs_binder_device_create+0x7e7/0x9e0 drivers/android/binderfs.c:210 binderfs_fill_super+0x897/0xcb0 drivers/android/binderfs.c:729 vfs_get_super fs/super.c:1280 [inline] get_tree_nodev+0xbd/0x160 fs/super.c:1299 binderfs_fs_context_get_tree+0x20/0x30 drivers/android/binderfs.c:749 vfs_get_tree+0x90/0x2c0 fs/super.c:1814 do_new_mount+0x2be/0xb40 fs/namespace.c:3560 path_mount+0x680/0x1000 fs/namespace.c:3887 do_mount fs/namespace.c:3900 [inline] __do_sys_mount fs/namespace.c:4111 [inline] __se_sys_mount+0x2c5/0x3b0 fs/namespace.c:4088 __x64_sys_mount+0xc3/0xe0 fs/namespace.c:4088 x64_sys_call+0x2ca2/0x2e00 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x54/0xf0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7fd9a658e54a Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffd9a6e6b18 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fd9a660e663 RCX: 00007fd9a658e54a RDX: 00007fd9a661dda7 RSI: 00007fd9a660e663 RDI: 00007fd9a661dda7 RBP: 00007fd9a660e8ac R08: 0000000000000000 R09: 00000000000001ff R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd9a65eb1a8 R13: 00007fd9a65eb180 R14: 0000000000000009 R15: 0000000000000000 Allocated by task 310: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_alloc_info+0x3c/0x50 mm/kasan/generic.c:562 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x9d/0xb0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __kmalloc_cache_noprof+0x17c/0x300 mm/slub.c:4325 kmalloc_noprof include/linux/slab.h:901 [inline] kzalloc_noprof include/linux/slab.h:1037 [inline] binderfs_binder_device_create+0x15b/0x9e0 drivers/android/binderfs.c:147 binderfs_fill_super+0x897/0xcb0 drivers/android/binderfs.c:729 vfs_get_super fs/super.c:1280 [inline] get_tree_nodev+0xbd/0x160 fs/super.c:1299 binderfs_fs_context_get_tree+0x20/0x30 drivers/android/binderfs.c:749 vfs_get_tree+0x90/0x2c0 fs/super.c:1814 do_new_mount+0x2be/0xb40 fs/namespace.c:3560 path_mount+0x680/0x1000 fs/namespace.c:3887 do_mount fs/namespace.c:3900 [inline] __do_sys_mount fs/namespace.c:4111 [inline] __se_sys_mount+0x2c5/0x3b0 fs/namespace.c:4088 __x64_sys_mount+0xc3/0xe0 fs/namespace.c:4088 x64_sys_call+0x2ca2/0x2e00 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x54/0xf0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x76/0x7e Freed by task 310: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x44/0x50 mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x57/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2353 [inline] slab_free mm/slub.c:4609 [inline] kfree+0x143/0x370 mm/slub.c:4757 binderfs_evict_inode+0x18b/0x230 drivers/android/binderfs.c:278 evict+0x4ab/0x940 fs/inode.c:796 iput_final fs/inode.c:1946 [inline] iput+0x607/0x920 fs/inode.c:1972 dentry_unlink_inode+0x389/0x460 fs/dcache.c:440 __dentry_kill+0x207/0x640 fs/dcache.c:643 shrink_kill fs/dcache.c:1088 [inline] shrink_dentry_list+0x319/0x510 fs/dcache.c:1115 shrink_dcache_parent+0xd2/0x360 do_one_tree+0x27/0xf0 fs/dcache.c:1578 shrink_dcache_for_umount+0xa7/0x150 fs/dcache.c:1595 generic_shutdown_super+0x6d/0x300 fs/super.c:620 kill_anon_super+0x4a/0x1e0 fs/super.c:1237 kill_litter_super+0x5a/0x70 fs/super.c:1247 binderfs_kill_super+0x45/0x60 drivers/android/binderfs.c:791 deactivate_locked_super+0xdc/0x290 fs/super.c:473 deactivate_super+0xca/0x100 fs/super.c:506 cleanup_mnt+0x42d/0x4d0 fs/namespace.c:1413 __cleanup_mnt+0x1d/0x30 fs/namespace.c:1420 task_work_run+0x24f/0x300 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xb3d/0x2ad0 kernel/exit.c:938 do_group_exit+0x21f/0x2e0 kernel/exit.c:1087 get_signal+0x1560/0x16b0 kernel/signal.c:3036 arch_do_signal_or_restart+0x96/0x790 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x63/0x110 kernel/entry/common.c:218 do_syscall_64+0x60/0xf0 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x76/0x7e The buggy address belongs to the object at ffff888103e4a100 which belongs to the cache kmalloc-192 of size 192 The buggy address is located 8 bytes inside of freed 192-byte region [ffff888103e4a100, ffff888103e4a1c0) The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e4a flags: 0x4000000000000000(zone=1) page_type: f5(slab) raw: 4000000000000000 ffff8881000413c0 ffffea00042d98c0 dead000000000002 raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x52cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 28, tgid 28 (kdevtmpfs), ts 1456480730, free_ts 0 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x1eb/0x210 mm/page_alloc.c:1551 prep_new_page mm/page_alloc.c:1559 [inline] get_page_from_freelist+0x482b/0x48c0 mm/page_alloc.c:3477 __alloc_frozen_pages_noprof+0x3e8/0x890 mm/page_alloc.c:4739 allocate_slab+0x76/0x430 mm/slub.c:2587 new_slab mm/slub.c:2640 [inline] ___slab_alloc+0x7e0/0xcf0 mm/slub.c:3826 __slab_alloc+0x5d/0xb0 mm/slub.c:3916 __slab_alloc_node mm/slub.c:3991 [inline] slab_alloc_node mm/slub.c:4152 [inline] __kmalloc_cache_noprof+0x1b9/0x300 mm/slub.c:4320 kmalloc_noprof include/linux/slab.h:901 [inline] kzalloc_noprof include/linux/slab.h:1037 [inline] alloc_fs_context+0x65/0x840 fs/fs_context.c:285 fs_context_for_mount+0x28/0x40 fs/fs_context.c:332 do_new_mount+0x160/0xb40 fs/namespace.c:3539 path_mount+0x680/0x1000 fs/namespace.c:3887 init_mount+0xd4/0x130 fs/init.c:25 devtmpfs_setup+0x7b/0xe0 drivers/base/devtmpfs.c:419 devtmpfsd+0x19/0x60 drivers/base/devtmpfs.c:436 kthread+0x765/0x8d0 kernel/kthread.c:464 ret_from_fork+0x55/0x90 arch/x86/kernel/process.c:148 page_owner free stack trace missing Memory state around the buggy address: ffff888103e4a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff888103e4a080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc >ffff888103e4a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff888103e4a180: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc ffff888103e4a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ================================================================== Warning: Permanently added '10.128.1.61' (ED25519) to the list of known hosts. 2025/01/31 03:34:03 ignoring optional flag "sandboxArg"="0" 2025/01/31 03:34:03 parsed 1 programs [ 31.270423][ T30] audit: type=1400 audit(1738294443.982:66): avc: denied { node_bind } for pid=295 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 32.477847][ T30] audit: type=1400 audit(1738294445.192:67): avc: denied { mounton } for pid=303 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 32.479128][ T303] cgroup: Unknown subsys name 'net' [ 32.500964][ T30] audit: type=1400 audit(1738294445.192:68): avc: denied { mount } for pid=303 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 32.528017][ T30] audit: type=1400 audit(1738294445.222:69): avc: denied { unmount } for pid=303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 32.528215][ T303] cgroup: Unknown subsys name 'devices' [ 32.671902][ T303] cgroup: Unknown subsys name 'cpuset' [ 32.677925][ T303] cgroup: Unknown subsys name 'hugetlb' [ 32.683490][ T303] cgroup: Unknown subsys name 'rlimit' [ 32.688900][ T303] cgroup: Unknown subsys name 'memory' [ 32.784377][ T30] audit: type=1400 audit(1738294445.502:70): avc: denied { setattr } for pid=303 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 32.807616][ T30] audit: type=1400 audit(1738294445.502:71): avc: denied { create } for pid=303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 32.827773][ T30] audit: type=1400 audit(1738294445.502:72): avc: denied { write } for pid=303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 32.847896][ T30] audit: type=1400 audit(1738294445.502:73): avc: denied { read } for pid=303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 32.858125][ T308] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 32.868025][ T30] audit: type=1400 audit(1738294445.502:74): avc: denied { module_request } for pid=303 comm="syz-executor" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 32.898082][ T30] audit: type=1400 audit(1738294445.502:75): avc: denied { mounton } for pid=303 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 32.927562][ T303] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 33.718415][ T310] request_module fs-gadgetfs succeeded, but still no fs? [ 33.815082][ T316] ================================================================== [ 33.822995][ T316] BUG: KASAN: slab-use-after-free in binder_add_device+0x63/0xa0 [ 33.830817][ T316] Write of size 8 at addr ffff888103e4a108 by task syz-executor/316 [ 33.838722][ T316] [ 33.840889][ T316] CPU: 0 UID: 0 PID: 316 Comm: syz-executor Not tainted 6.13.0-syzkaller-09760-g69e858e0b8b2 #0 [ 33.840911][ T316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 33.840924][ T316] Call Trace: [ 33.840934][ T316] [ 33.840942][ T316] dump_stack_lvl+0x188/0x200 [ 33.840966][ T316] ? __pfx_dump_stack_lvl+0x10/0x10 [ 33.840986][ T316] ? vprintk+0x21/0x30 [ 33.841002][ T316] ? _printk+0xd5/0x120 [ 33.841024][ T316] ? binder_add_device+0x63/0xa0 [ 33.841039][ T316] print_report+0x163/0x550 [ 33.841064][ T316] ? __virt_addr_valid+0x2a8/0x380 [ 33.841088][ T316] ? binder_add_device+0x63/0xa0 [ 33.841102][ T316] ? kasan_complete_mode_report_info+0x75/0x210 [ 33.841127][ T316] ? binder_add_device+0x63/0xa0 [ 33.841140][ T316] kasan_report+0x14f/0x190 [ 33.841158][ T316] ? binder_add_device+0x63/0xa0 [ 33.841174][ T316] __asan_report_store8_noabort+0x1b/0x30 [ 33.841189][ T316] binder_add_device+0x63/0xa0 [ 33.841202][ T316] binderfs_binder_device_create+0x7e7/0x9e0 [ 33.841228][ T316] binderfs_fill_super+0x897/0xcb0 [ 33.841253][ T316] ? __pfx_binderfs_fill_super+0x10/0x10 [ 33.841281][ T316] ? shrinker_register+0x16a/0x230 [ 33.841302][ T316] ? sget_fc+0x908/0x9c0 [ 33.841316][ T316] ? __pfx_set_anon_super_fc+0x10/0x10 [ 33.841334][ T316] get_tree_nodev+0xbd/0x160 [ 33.841350][ T316] ? __pfx_binderfs_fill_super+0x10/0x10 [ 33.841374][ T316] binderfs_fs_context_get_tree+0x20/0x30 [ 33.841397][ T316] vfs_get_tree+0x90/0x2c0 [ 33.841416][ T316] do_new_mount+0x2be/0xb40 [ 33.841434][ T316] ? __pfx_do_new_mount+0x10/0x10 [ 33.841451][ T316] ? security_capable+0x88/0xa0 [ 33.841473][ T316] ? ns_capable+0x8e/0xf0 [ 33.841487][ T316] path_mount+0x680/0x1000 [ 33.841505][ T316] __se_sys_mount+0x2c5/0x3b0 [ 33.841524][ T316] ? __pfx___se_sys_mount+0x10/0x10 [ 33.841544][ T316] __x64_sys_mount+0xc3/0xe0 [ 33.841563][ T316] x64_sys_call+0x2ca2/0x2e00 [ 33.841585][ T316] do_syscall_64+0x54/0xf0 [ 33.841605][ T316] ? clear_bhb_loop+0x35/0x90 [ 33.841624][ T316] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 33.841641][ T316] RIP: 0033:0x7fd9a658e54a [ 33.841660][ T316] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 33.841673][ T316] RSP: 002b:00007ffd9a6e6b18 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 33.841692][ T316] RAX: ffffffffffffffda RBX: 00007fd9a660e663 RCX: 00007fd9a658e54a [ 33.841704][ T316] RDX: 00007fd9a661dda7 RSI: 00007fd9a660e663 RDI: 00007fd9a661dda7 [ 33.841715][ T316] RBP: 00007fd9a660e8ac R08: 0000000000000000 R09: 00000000000001ff [ 33.841725][ T316] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd9a65eb1a8 [ 33.841735][ T316] R13: 00007fd9a65eb180 R14: 0000000000000009 R15: 0000000000000000 [ 33.841747][ T316] [ 33.841753][ T316] [ 34.118168][ T316] Allocated by task 310: [ 34.122239][ T316] kasan_save_track+0x3f/0x80 [ 34.126751][ T316] kasan_save_alloc_info+0x3c/0x50 [ 34.131704][ T316] __kasan_kmalloc+0x9d/0xb0 [ 34.136130][ T316] __kmalloc_cache_noprof+0x17c/0x300 [ 34.141340][ T316] binderfs_binder_device_create+0x15b/0x9e0 [ 34.147157][ T316] binderfs_fill_super+0x897/0xcb0 [ 34.152093][ T316] get_tree_nodev+0xbd/0x160 [ 34.156520][ T316] binderfs_fs_context_get_tree+0x20/0x30 [ 34.162196][ T316] vfs_get_tree+0x90/0x2c0 [ 34.166515][ T316] do_new_mount+0x2be/0xb40 [ 34.170870][ T316] path_mount+0x680/0x1000 [ 34.175121][ T316] __se_sys_mount+0x2c5/0x3b0 [ 34.179623][ T316] __x64_sys_mount+0xc3/0xe0 [ 34.184131][ T316] x64_sys_call+0x2ca2/0x2e00 [ 34.188654][ T316] do_syscall_64+0x54/0xf0 [ 34.192914][ T316] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 34.198711][ T316] [ 34.200883][ T316] Freed by task 310: [ 34.204616][ T316] kasan_save_track+0x3f/0x80 [ 34.209133][ T316] kasan_save_free_info+0x44/0x50 [ 34.213987][ T316] __kasan_slab_free+0x57/0x70 [ 34.218586][ T316] kfree+0x143/0x370 [ 34.222327][ T316] binderfs_evict_inode+0x18b/0x230 [ 34.227379][ T316] evict+0x4ab/0x940 [ 34.231086][ T316] iput+0x607/0x920 [ 34.234732][ T316] dentry_unlink_inode+0x389/0x460 [ 34.239677][ T316] __dentry_kill+0x207/0x640 [ 34.244105][ T316] shrink_dentry_list+0x319/0x510 [ 34.248962][ T316] shrink_dcache_parent+0xd2/0x360 [ 34.254007][ T316] do_one_tree+0x27/0xf0 [ 34.258098][ T316] shrink_dcache_for_umount+0xa7/0x150 [ 34.263370][ T316] generic_shutdown_super+0x6d/0x300 [ 34.268492][ T316] kill_anon_super+0x4a/0x1e0 [ 34.273008][ T316] kill_litter_super+0x5a/0x70 [ 34.277693][ T316] binderfs_kill_super+0x45/0x60 [ 34.282465][ T316] deactivate_locked_super+0xdc/0x290 [ 34.287674][ T316] deactivate_super+0xca/0x100 [ 34.292275][ T316] cleanup_mnt+0x42d/0x4d0 [ 34.296525][ T316] __cleanup_mnt+0x1d/0x30 [ 34.300964][ T316] task_work_run+0x24f/0x300 [ 34.305386][ T316] do_exit+0xb3d/0x2ad0 [ 34.309459][ T316] do_group_exit+0x21f/0x2e0 [ 34.313968][ T316] get_signal+0x1560/0x16b0 [ 34.318312][ T316] arch_do_signal_or_restart+0x96/0x790 [ 34.323687][ T316] syscall_exit_to_user_mode+0x63/0x110 [ 34.329183][ T316] do_syscall_64+0x60/0xf0 [ 34.333437][ T316] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 34.339353][ T316] [ 34.341487][ T316] The buggy address belongs to the object at ffff888103e4a100 [ 34.341487][ T316] which belongs to the cache kmalloc-192 of size 192 [ 34.355465][ T316] The buggy address is located 8 bytes inside of [ 34.355465][ T316] freed 192-byte region [ffff888103e4a100, ffff888103e4a1c0) [ 34.369012][ T316] [ 34.371179][ T316] The buggy address belongs to the physical page: [ 34.377424][ T316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e4a [ 34.386105][ T316] flags: 0x4000000000000000(zone=1) [ 34.391139][ T316] page_type: f5(slab) [ 34.394969][ T316] raw: 4000000000000000 ffff8881000413c0 ffffea00042d98c0 dead000000000002 [ 34.403493][ T316] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 34.411983][ T316] page dumped because: kasan: bad access detected [ 34.418248][ T316] page_owner tracks the page as allocated [ 34.423812][ T316] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x52cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 28, tgid 28 (kdevtmpfs), ts 1456480730, free_ts 0 [ 34.441435][ T316] post_alloc_hook+0x1eb/0x210 [ 34.446003][ T316] get_page_from_freelist+0x482b/0x48c0 [ 34.451391][ T316] __alloc_frozen_pages_noprof+0x3e8/0x890 [ 34.457025][ T316] allocate_slab+0x76/0x430 [ 34.461479][ T316] ___slab_alloc+0x7e0/0xcf0 [ 34.465885][ T316] __slab_alloc+0x5d/0xb0 [ 34.470052][ T316] __kmalloc_cache_noprof+0x1b9/0x300 [ 34.475250][ T316] alloc_fs_context+0x65/0x840 [ 34.479848][ T316] fs_context_for_mount+0x28/0x40 [ 34.484710][ T316] do_new_mount+0x160/0xb40 [ 34.489058][ T316] path_mount+0x680/0x1000 [ 34.493418][ T316] init_mount+0xd4/0x130 [ 34.497485][ T316] devtmpfs_setup+0x7b/0xe0 [ 34.501831][ T316] devtmpfsd+0x19/0x60 [ 34.505732][ T316] kthread+0x765/0x8d0 [ 34.509730][ T316] ret_from_fork+0x55/0x90 [ 34.514183][ T316] page_owner free stack trace missing [ 34.519380][ T316] [ 34.521528][ T316] Memory state around the buggy address: [ 34.527000][ T316] ffff888103e4a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.534988][ T316] ffff888103e4a080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.542987][ T316] >ffff888103e4a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.550888][ T316] ^ [ 34.555051][ T316] ffff888103e4a180: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.562939][ T316] ffff888103e4a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.570842][ T316] ================================================================== [ 34.582189][ T316] Disabling lock debugging due to kernel taint [ 34.981837][ T339] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.988796][ T339] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.995755][ T339] bridge_slave_0: entered allmulticast mode [ 35.001865][ T339] bridge_slave_0: entered promiscuous mode [ 35.008270][ T339] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.015441][ T339] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.022404][ T339] bridge_slave_1: entered allmulticast mode [ 35.028454][ T339] bridge_slave_1: entered promiscuous mode [ 35.105307][ T339] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.112184][ T339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.119258][ T339] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.126101][ T339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.145936][ T340] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.153313][ T340] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.162946][ T40] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.169885][ T40] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.180071][ T340] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.186954][ T340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.213601][ T339] veth0_vlan: entered promiscuous mode [ 35.224527][ T339] veth1_macvtap: entered promiscuous mode [ 35.263604][ T339] syz-executor (339) used greatest stack depth: 20880 bytes left [ 35.275286][ T340] bridge_slave_1: left allmulticast mode [ 35.288850][ T340] bridge_slave_1: left promiscuous mode [ 35.296192][ T340] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.303821][ T340] bridge_slave_0: left allmulticast mode [ 35.309295][ T340] bridge_slave_0: left promiscuous mode [ 35.314969][ T340] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.463604][ T340] veth1_macvtap: left promiscuous mode [ 35.469039][ T340] veth0_vlan: left promiscuous mode 2025/01/31 03:34:08 executed programs: 0 [ 35.908867][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.915970][ T371] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.922880][ T371] bridge_slave_0: entered allmulticast mode [ 35.928856][ T371] bridge_slave_0: entered promiscuous mode [ 35.935601][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.943774][ T371] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.950664][ T371] bridge_slave_1: entered allmulticast mode [ 35.957636][ T371] bridge_slave_1: entered promiscuous mode [ 36.015044][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.021930][ T371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.029005][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.035936][ T371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.044872][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.052948][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.077311][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.084201][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.092886][ T40] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.099749][ T40] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.123854][ T371] veth0_vlan: entered promiscuous mode [ 36.134957][ T371] veth1_macvtap: entered promiscuous mode [ 36.192831][ T40] bridge_slave_1: left allmulticast mode [ 36.198411][ T40] bridge_slave_1: left promiscuous mode [ 36.204092][ T40] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.211854][ T40] bridge_slave_0: left allmulticast mode [ 36.217324][ T40] bridge_slave_0: left promiscuous mode [ 36.223403][ T40] bridge0: port 1(bridge_slave_0) entered disabled state syzkaller build log: go env (err=) GO111MODULE='auto' GOARCH='amd64' GOBIN='' GOCACHE='/syzkaller/.cache/go-build' GOENV='/syzkaller/.config/go/env' GOEXE='' GOEXPERIMENT='' GOFLAGS='' GOHOSTARCH='amd64' GOHOSTOS='linux' GOINSECURE='' GOMODCACHE='/syzkaller/jobs-2/linux/gopath/pkg/mod' GONOPROXY='' GONOSUMDB='' GOOS='linux' GOPATH='/syzkaller/jobs-2/linux/gopath' GOPRIVATE='' GOPROXY='https://proxy.golang.org,direct' GOROOT='/usr/local/go' GOSUMDB='sum.golang.org' GOTMPDIR='' GOTOOLCHAIN='auto' GOTOOLDIR='/usr/local/go/pkg/tool/linux_amd64' GOVCS='' GOVERSION='go1.22.7' GCCGO='gccgo' GOAMD64='v1' AR='ar' CC='gcc' CXX='g++' CGO_ENABLED='1' GOMOD='/syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/go.mod' GOWORK='' CGO_CFLAGS='-O2 -g' CGO_CPPFLAGS='' CGO_CXXFLAGS='-O2 -g' CGO_FFLAGS='-O2 -g' CGO_LDFLAGS='-O2 -g' PKG_CONFIG='pkg-config' GOGCCFLAGS='-fPIC -m64 -pthread -Wl,--no-gc-sections -fmessage-length=0 -ffile-prefix-map=/tmp/go-build2408098701=/tmp/go-build -gno-record-gcc-switches' git status (err=) HEAD detached at 4c6ac32f33 nothing to commit, working tree clean tput: No value for $TERM and no -T specified tput: No value for $TERM and no -T specified Makefile:31: run command via tools/syz-env for best compatibility, see: Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env go list -f '{{.Stale}}' ./sys/syz-sysgen | grep -q false || go install ./sys/syz-sysgen make .descriptions tput: No value for $TERM and no -T specified tput: No value for $TERM and no -T specified Makefile:31: run command via tools/syz-env for best compatibility, see: Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env bin/syz-sysgen touch .descriptions GOOS=linux GOARCH=amd64 go build "-ldflags=-s -w -X github.com/google/syzkaller/prog.GitRevision=4c6ac32f33aa00c680c8f4656d1fbf2887f390f1 -X 'github.com/google/syzkaller/prog.gitRevisionDate=20250130-130318'" -o ./bin/linux_amd64/syz-execprog github.com/google/syzkaller/tools/syz-execprog mkdir -p ./bin/linux_amd64 g++ -o ./bin/linux_amd64/syz-executor executor/executor.cc \ -m64 -O2 -pthread -Wall -Werror -Wparentheses -Wunused-const-variable -Wframe-larger-than=16384 -Wno-stringop-overflow -Wno-array-bounds -Wno-format-overflow -Wno-unused-but-set-variable -Wno-unused-command-line-argument -static-pie -std=c++17 -I. -Iexecutor/_include -DGOOS_linux=1 -DGOARCH_amd64=1 \ -DHOSTGOOS_linux=1 -DGIT_REVISION=\"4c6ac32f33aa00c680c8f4656d1fbf2887f390f1\" /usr/bin/ld: /tmp/ccfXiKWy.o: in function `Connection::Connect(char const*, char const*)': executor.cc:(.text._ZN10Connection7ConnectEPKcS1_[_ZN10Connection7ConnectEPKcS1_]+0x104): warning: Using 'gethostbyname' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking