KASAN: slab-use-after-free Write in binder_add_device ================================================================== BUG: KASAN: slab-use-after-free in hlist_add_head include/linux/list.h:1026 [inline] BUG: KASAN: slab-use-after-free in binder_add_device+0x63/0xa0 drivers/android/binder.c:6932 Write of size 8 at addr ffff88811b3fde08 by task syz-executor.0/340 CPU: 1 UID: 0 PID: 340 Comm: syz-executor.0 Not tainted 6.14.0-rc1-syzkaller-00034-g92514ef226f5 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x188/0x200 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x163/0x550 mm/kasan/report.c:489 kasan_report+0x14f/0x190 mm/kasan/report.c:602 __asan_report_store8_noabort+0x1b/0x30 mm/kasan/report_generic.c:386 hlist_add_head include/linux/list.h:1026 [inline] binder_add_device+0x63/0xa0 drivers/android/binder.c:6932 binderfs_binder_device_create+0x7e7/0x9e0 drivers/android/binderfs.c:210 binderfs_fill_super+0x897/0xcb0 drivers/android/binderfs.c:729 vfs_get_super fs/super.c:1280 [inline] get_tree_nodev+0xbd/0x160 fs/super.c:1299 binderfs_fs_context_get_tree+0x20/0x30 drivers/android/binderfs.c:749 vfs_get_tree+0x90/0x2c0 fs/super.c:1814 do_new_mount+0x2be/0xb40 fs/namespace.c:3560 path_mount+0x680/0x1000 fs/namespace.c:3887 do_mount fs/namespace.c:3900 [inline] __do_sys_mount fs/namespace.c:4111 [inline] __se_sys_mount+0x2c5/0x3b0 fs/namespace.c:4088 __x64_sys_mount+0xc3/0xe0 fs/namespace.c:4088 x64_sys_call+0x2ca2/0x2e00 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x54/0xf0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f458ba7e5ea Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffdbd80ca38 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f458bac8533 RCX: 00007f458ba7e5ea RDX: 00007f458bad2e59 RSI: 00007f458bac8533 RDI: 00007f458bad2e59 RBP: 00007ffdbd80cb30 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdbd80d118 R13: 00007ffdbd80d118 R14: 0000000000000001 R15: 00000000fffffff1 Allocated by task 335: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_alloc_info+0x3c/0x50 mm/kasan/generic.c:562 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x9d/0xb0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __kmalloc_cache_noprof+0x17c/0x300 mm/slub.c:4325 kmalloc_noprof include/linux/slab.h:901 [inline] kzalloc_noprof include/linux/slab.h:1037 [inline] binderfs_binder_device_create+0x15b/0x9e0 drivers/android/binderfs.c:147 binderfs_fill_super+0x897/0xcb0 drivers/android/binderfs.c:729 vfs_get_super fs/super.c:1280 [inline] get_tree_nodev+0xbd/0x160 fs/super.c:1299 binderfs_fs_context_get_tree+0x20/0x30 drivers/android/binderfs.c:749 vfs_get_tree+0x90/0x2c0 fs/super.c:1814 do_new_mount+0x2be/0xb40 fs/namespace.c:3560 path_mount+0x680/0x1000 fs/namespace.c:3887 do_mount fs/namespace.c:3900 [inline] __do_sys_mount fs/namespace.c:4111 [inline] __se_sys_mount+0x2c5/0x3b0 fs/namespace.c:4088 __x64_sys_mount+0xc3/0xe0 fs/namespace.c:4088 x64_sys_call+0x2ca2/0x2e00 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x54/0xf0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x76/0x7e Freed by task 335: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x44/0x50 mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x57/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2353 [inline] slab_free mm/slub.c:4609 [inline] kfree+0x143/0x370 mm/slub.c:4757 binderfs_evict_inode+0x18b/0x230 drivers/android/binderfs.c:278 evict+0x4ab/0x940 fs/inode.c:796 iput_final fs/inode.c:1946 [inline] iput+0x607/0x920 fs/inode.c:1972 dentry_unlink_inode+0x389/0x460 fs/dcache.c:440 __dentry_kill+0x207/0x640 fs/dcache.c:643 shrink_kill fs/dcache.c:1088 [inline] shrink_dentry_list+0x319/0x510 fs/dcache.c:1115 shrink_dcache_parent+0xd2/0x360 do_one_tree+0x27/0xf0 fs/dcache.c:1578 shrink_dcache_for_umount+0xa7/0x150 fs/dcache.c:1595 generic_shutdown_super+0x6d/0x300 fs/super.c:620 kill_anon_super+0x4a/0x1e0 fs/super.c:1237 kill_litter_super+0x5a/0x70 fs/super.c:1247 binderfs_kill_super+0x45/0x60 drivers/android/binderfs.c:791 deactivate_locked_super+0xdc/0x290 fs/super.c:473 deactivate_super+0xca/0x100 fs/super.c:506 cleanup_mnt+0x42d/0x4d0 fs/namespace.c:1413 __cleanup_mnt+0x1d/0x30 fs/namespace.c:1420 task_work_run+0x24f/0x300 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xb3d/0x2ad0 kernel/exit.c:938 do_group_exit+0x21f/0x2e0 kernel/exit.c:1087 get_signal+0x1560/0x16b0 kernel/signal.c:3036 arch_do_signal_or_restart+0x96/0x790 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x63/0x110 kernel/entry/common.c:218 do_syscall_64+0x60/0xf0 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x76/0x7e The buggy address belongs to the object at ffff88811b3fde00 which belongs to the cache kmalloc-192 of size 192 The buggy address is located 8 bytes inside of freed 192-byte region [ffff88811b3fde00, ffff88811b3fdec0) The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11b3fd flags: 0x4000000000000000(zone=1) page_type: f5(slab) raw: 4000000000000000 ffff8881000413c0 dead000000000122 0000000000000000 raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x56cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_NORETRY|__GFP_COMP), pid 335, tgid 335 (syz-executor.0), ts 37251789226, free_ts 37020352814 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x1eb/0x210 mm/page_alloc.c:1551 prep_new_page mm/page_alloc.c:1559 [inline] get_page_from_freelist+0x482b/0x48c0 mm/page_alloc.c:3477 __alloc_frozen_pages_noprof+0x3e8/0x890 mm/page_alloc.c:4739 allocate_slab+0x76/0x430 mm/slub.c:2587 new_slab mm/slub.c:2640 [inline] ___slab_alloc+0x7e0/0xcf0 mm/slub.c:3826 __slab_alloc+0x5d/0xb0 mm/slub.c:3916 __slab_alloc_node mm/slub.c:3991 [inline] slab_alloc_node mm/slub.c:4152 [inline] __do_kmalloc_node mm/slub.c:4293 [inline] __kmalloc_node_noprof+0x230/0x430 mm/slub.c:4300 __kvmalloc_node_noprof+0x7e/0x1a0 mm/util.c:662 netif_alloc_rx_queues net/core/dev.c:10591 [inline] alloc_netdev_mqs+0x972/0xfc0 net/core/dev.c:11521 ip6gre_init_net+0xf7/0x340 net/ipv6/ip6_gre.c:1613 ops_init+0x1a5/0x440 net/core/net_namespace.c:138 setup_net+0x259/0xa40 net/core/net_namespace.c:362 copy_net_ns+0x503/0x820 net/core/net_namespace.c:516 create_new_namespaces+0x41a/0x680 kernel/nsproxy.c:110 unshare_nsproxy_namespaces+0x12c/0x190 kernel/nsproxy.c:228 ksys_unshare+0x5e7/0x9d0 kernel/fork.c:3342 page last free pid 16 tgid 16 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1127 [inline] free_frozen_pages+0x9ee/0xa70 mm/page_alloc.c:2660 __free_pages+0x5f/0xe0 mm/page_alloc.c:4838 pagetable_free include/linux/mm.h:2917 [inline] pagetable_dtor_free include/linux/mm.h:3015 [inline] __tlb_remove_table include/asm-generic/tlb.h:216 [inline] __tlb_remove_table_free mm/mmu_gather.c:227 [inline] tlb_remove_table_rcu+0x2da/0x400 mm/mmu_gather.c:282 rcu_do_batch+0x57a/0xd20 kernel/rcu/tree.c:2546 rcu_core+0x58b/0xd00 kernel/rcu/tree.c:2802 rcu_core_si+0xd/0x20 kernel/rcu/tree.c:2819 handle_softirqs+0x18f/0x580 kernel/softirq.c:561 run_ksoftirqd+0x2c/0x40 kernel/softirq.c:950 smpboot_thread_fn+0x471/0x8f0 kernel/smpboot.c:164 kthread+0x765/0x8d0 kernel/kthread.c:464 ret_from_fork+0x55/0x90 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Memory state around the buggy address: ffff88811b3fdd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff88811b3fdd80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc >ffff88811b3fde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff88811b3fde80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc ffff88811b3fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ================================================================== Warning: Permanently added '10.128.0.68' (ED25519) to the list of known hosts. 2025/02/05 23:12:00 ignoring optional flag "sandboxArg"="0" 2025/02/05 23:12:00 ignoring optional flag "type"="gce" 2025/02/05 23:12:00 parsed 1 programs [ 36.846439][ T308] cgroup: Unknown subsys name 'net' [ 36.849488][ T30] audit: type=1400 audit(1738797120.879:66): avc: denied { mounton } for pid=308 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 36.875270][ T308] cgroup: Unknown subsys name 'devices' [ 36.890821][ T30] audit: type=1400 audit(1738797120.879:67): avc: denied { mount } for pid=308 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 36.943265][ T30] audit: type=1400 audit(1738797120.889:68): avc: denied { unmount } for pid=308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 36.964916][ T30] audit: type=1400 audit(1738797120.919:69): avc: denied { setattr } for pid=316 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=163 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 36.965039][ T318] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 36.988970][ T30] audit: type=1400 audit(1738797120.919:70): avc: denied { create } for pid=317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 37.016625][ T30] audit: type=1400 audit(1738797120.929:71): avc: denied { write } for pid=317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 37.037419][ T30] audit: type=1400 audit(1738797120.929:72): avc: denied { read } for pid=317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 37.057958][ T30] audit: type=1400 audit(1738797120.929:73): avc: denied { module_request } for pid=317 comm="syz-executor" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 37.080022][ T30] audit: type=1400 audit(1738797120.949:74): avc: denied { mounton } for pid=320 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 37.104797][ T30] audit: type=1400 audit(1738797120.949:75): avc: denied { mount } for pid=320 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 37.105780][ T308] cgroup: Unknown subsys name 'cpuset' [ 37.134396][ T308] cgroup: Unknown subsys name 'hugetlb' [ 37.134711][ T315] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 37.140147][ T308] cgroup: Unknown subsys name 'rlimit' [ 37.154906][ T308] cgroup: Unknown subsys name 'memory' [ 37.312493][ T340] ================================================================== [ 37.320387][ T340] BUG: KASAN: slab-use-after-free in binder_add_device+0x63/0xa0 [ 37.327932][ T340] Write of size 8 at addr ffff88811b3fde08 by task syz-executor.0/340 [ 37.335919][ T340] [ 37.338100][ T340] CPU: 1 UID: 0 PID: 340 Comm: syz-executor.0 Not tainted 6.14.0-rc1-syzkaller-00034-g92514ef226f5 #0 [ 37.338118][ T340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 37.338130][ T340] Call Trace: [ 37.338138][ T340] [ 37.338146][ T340] dump_stack_lvl+0x188/0x200 [ 37.338165][ T340] ? __pfx_dump_stack_lvl+0x10/0x10 [ 37.338181][ T340] ? vprintk+0x21/0x30 [ 37.338193][ T340] ? _printk+0xd5/0x120 [ 37.338213][ T340] ? binder_add_device+0x63/0xa0 [ 37.338232][ T340] print_report+0x163/0x550 [ 37.338249][ T340] ? __virt_addr_valid+0x2a8/0x380 [ 37.338269][ T340] ? binder_add_device+0x63/0xa0 [ 37.338289][ T340] ? kasan_complete_mode_report_info+0x75/0x210 [ 37.338311][ T340] ? binder_add_device+0x63/0xa0 [ 37.338331][ T340] kasan_report+0x14f/0x190 [ 37.338347][ T340] ? binder_add_device+0x63/0xa0 [ 37.338368][ T340] __asan_report_store8_noabort+0x1b/0x30 [ 37.338390][ T340] binder_add_device+0x63/0xa0 [ 37.338409][ T340] binderfs_binder_device_create+0x7e7/0x9e0 [ 37.338430][ T340] binderfs_fill_super+0x897/0xcb0 [ 37.338450][ T340] ? __pfx_binderfs_fill_super+0x10/0x10 [ 37.338473][ T340] ? shrinker_register+0x16a/0x230 [ 37.338491][ T340] ? sget_fc+0x908/0x9c0 [ 37.338512][ T340] ? __pfx_set_anon_super_fc+0x10/0x10 [ 37.338528][ T340] get_tree_nodev+0xbd/0x160 [ 37.338541][ T340] ? __pfx_binderfs_fill_super+0x10/0x10 [ 37.338560][ T340] binderfs_fs_context_get_tree+0x20/0x30 [ 37.338579][ T340] vfs_get_tree+0x90/0x2c0 [ 37.338594][ T340] do_new_mount+0x2be/0xb40 [ 37.338610][ T340] ? __pfx_do_new_mount+0x10/0x10 [ 37.338624][ T340] ? security_capable+0x88/0xa0 [ 37.338643][ T340] ? ns_capable+0x8e/0xf0 [ 37.338665][ T340] path_mount+0x680/0x1000 [ 37.338680][ T340] __se_sys_mount+0x2c5/0x3b0 [ 37.338696][ T340] ? __pfx___se_sys_mount+0x10/0x10 [ 37.338714][ T340] __x64_sys_mount+0xc3/0xe0 [ 37.338729][ T340] x64_sys_call+0x2ca2/0x2e00 [ 37.338748][ T340] do_syscall_64+0x54/0xf0 [ 37.338764][ T340] ? clear_bhb_loop+0x35/0x90 [ 37.338783][ T340] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 37.338800][ T340] RIP: 0033:0x7f458ba7e5ea [ 37.338817][ T340] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 37.338830][ T340] RSP: 002b:00007ffdbd80ca38 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 37.338851][ T340] RAX: ffffffffffffffda RBX: 00007f458bac8533 RCX: 00007f458ba7e5ea [ 37.338862][ T340] RDX: 00007f458bad2e59 RSI: 00007f458bac8533 RDI: 00007f458bad2e59 [ 37.338873][ T340] RBP: 00007ffdbd80cb30 R08: 0000000000000000 R09: 0000000000000000 [ 37.338882][ T340] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdbd80d118 [ 37.338892][ T340] R13: 00007ffdbd80d118 R14: 0000000000000001 R15: 00000000fffffff1 [ 37.338905][ T340] [ 37.338910][ T340] [ 37.614240][ T340] Allocated by task 335: [ 37.618304][ T340] kasan_save_track+0x3f/0x80 [ 37.622819][ T340] kasan_save_alloc_info+0x3c/0x50 [ 37.627762][ T340] __kasan_kmalloc+0x9d/0xb0 [ 37.632189][ T340] __kmalloc_cache_noprof+0x17c/0x300 [ 37.637397][ T340] binderfs_binder_device_create+0x15b/0x9e0 [ 37.643213][ T340] binderfs_fill_super+0x897/0xcb0 [ 37.648159][ T340] get_tree_nodev+0xbd/0x160 [ 37.652588][ T340] binderfs_fs_context_get_tree+0x20/0x30 [ 37.658229][ T340] vfs_get_tree+0x90/0x2c0 [ 37.662502][ T340] do_new_mount+0x2be/0xb40 [ 37.666827][ T340] path_mount+0x680/0x1000 [ 37.671083][ T340] __se_sys_mount+0x2c5/0x3b0 [ 37.675590][ T340] __x64_sys_mount+0xc3/0xe0 [ 37.680016][ T340] x64_sys_call+0x2ca2/0x2e00 [ 37.684532][ T340] do_syscall_64+0x54/0xf0 [ 37.688788][ T340] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 37.694512][ T340] [ 37.696686][ T340] Freed by task 335: [ 37.700416][ T340] kasan_save_track+0x3f/0x80 [ 37.704928][ T340] kasan_save_free_info+0x44/0x50 [ 37.709786][ T340] __kasan_slab_free+0x57/0x70 [ 37.714388][ T340] kfree+0x143/0x370 [ 37.718116][ T340] binderfs_evict_inode+0x18b/0x230 [ 37.723153][ T340] evict+0x4ab/0x940 [ 37.726980][ T340] iput+0x607/0x920 [ 37.730708][ T340] dentry_unlink_inode+0x389/0x460 [ 37.735653][ T340] __dentry_kill+0x207/0x640 [ 37.740078][ T340] shrink_dentry_list+0x319/0x510 [ 37.744951][ T340] shrink_dcache_parent+0xd2/0x360 [ 37.749884][ T340] do_one_tree+0x27/0xf0 [ 37.754055][ T340] shrink_dcache_for_umount+0xa7/0x150 [ 37.759350][ T340] generic_shutdown_super+0x6d/0x300 [ 37.764465][ T340] kill_anon_super+0x4a/0x1e0 [ 37.768978][ T340] kill_litter_super+0x5a/0x70 [ 37.773589][ T340] binderfs_kill_super+0x45/0x60 [ 37.778523][ T340] deactivate_locked_super+0xdc/0x290 [ 37.783831][ T340] deactivate_super+0xca/0x100 [ 37.788413][ T340] cleanup_mnt+0x42d/0x4d0 [ 37.792745][ T340] __cleanup_mnt+0x1d/0x30 [ 37.797447][ T340] task_work_run+0x24f/0x300 [ 37.801859][ T340] do_exit+0xb3d/0x2ad0 [ 37.805937][ T340] do_group_exit+0x21f/0x2e0 [ 37.810371][ T340] get_signal+0x1560/0x16b0 [ 37.814705][ T340] arch_do_signal_or_restart+0x96/0x790 [ 37.820086][ T340] syscall_exit_to_user_mode+0x63/0x110 [ 37.825642][ T340] do_syscall_64+0x60/0xf0 [ 37.830083][ T340] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 37.835796][ T340] [ 37.837967][ T340] The buggy address belongs to the object at ffff88811b3fde00 [ 37.837967][ T340] which belongs to the cache kmalloc-192 of size 192 [ 37.851858][ T340] The buggy address is located 8 bytes inside of [ 37.851858][ T340] freed 192-byte region [ffff88811b3fde00, ffff88811b3fdec0) [ 37.865309][ T340] [ 37.867477][ T340] The buggy address belongs to the physical page: [ 37.873728][ T340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11b3fd [ 37.882408][ T340] flags: 0x4000000000000000(zone=1) [ 37.887525][ T340] page_type: f5(slab) [ 37.891356][ T340] raw: 4000000000000000 ffff8881000413c0 dead000000000122 0000000000000000 [ 37.899771][ T340] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 37.908195][ T340] page dumped because: kasan: bad access detected [ 37.914449][ T340] page_owner tracks the page as allocated [ 37.919984][ T340] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x56cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_NORETRY|__GFP_COMP), pid 335, tgid 335 (syz-executor.0), ts 37251789226, free_ts 37020352814 [ 37.940824][ T340] post_alloc_hook+0x1eb/0x210 [ 37.945419][ T340] get_page_from_freelist+0x482b/0x48c0 [ 37.950802][ T340] __alloc_frozen_pages_noprof+0x3e8/0x890 [ 37.956444][ T340] allocate_slab+0x76/0x430 [ 37.960794][ T340] ___slab_alloc+0x7e0/0xcf0 [ 37.965210][ T340] __slab_alloc+0x5d/0xb0 [ 37.969375][ T340] __kmalloc_node_noprof+0x230/0x430 [ 37.974526][ T340] __kvmalloc_node_noprof+0x7e/0x1a0 [ 37.979613][ T340] alloc_netdev_mqs+0x972/0xfc0 [ 37.984302][ T340] ip6gre_init_net+0xf7/0x340 [ 37.988811][ T340] ops_init+0x1a5/0x440 [ 37.992805][ T340] setup_net+0x259/0xa40 [ 37.996886][ T340] copy_net_ns+0x503/0x820 [ 38.001137][ T340] create_new_namespaces+0x41a/0x680 [ 38.006258][ T340] unshare_nsproxy_namespaces+0x12c/0x190 [ 38.011815][ T340] ksys_unshare+0x5e7/0x9d0 [ 38.016158][ T340] page last free pid 16 tgid 16 stack trace: [ 38.021969][ T340] free_frozen_pages+0x9ee/0xa70 [ 38.026743][ T340] __free_pages+0x5f/0xe0 [ 38.030909][ T340] tlb_remove_table_rcu+0x2da/0x400 [ 38.035941][ T340] rcu_do_batch+0x57a/0xd20 [ 38.040284][ T340] rcu_core+0x58b/0xd00 [ 38.044275][ T340] rcu_core_si+0xd/0x20 [ 38.048268][ T340] handle_softirqs+0x18f/0x580 [ 38.052876][ T340] run_ksoftirqd+0x2c/0x40 [ 38.057126][ T340] smpboot_thread_fn+0x471/0x8f0 [ 38.061893][ T340] kthread+0x765/0x8d0 [ 38.065800][ T340] ret_from_fork+0x55/0x90 [ 38.070055][ T340] ret_from_fork_asm+0x1a/0x30 [ 38.074654][ T340] [ 38.076824][ T340] Memory state around the buggy address: [ 38.082296][ T340] ffff88811b3fdd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.090191][ T340] ffff88811b3fdd80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.098090][ T340] >ffff88811b3fde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.105985][ T340] ^ [ 38.110153][ T340] ffff88811b3fde80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.118053][ T340] ffff88811b3fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.125968][ T340] ================================================================== [ 38.134226][ T340] Disabling lock debugging due to kernel taint [ 38.200978][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.207835][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.214926][ T345] bridge_slave_0: entered allmulticast mode [ 38.221361][ T345] bridge_slave_0: entered promiscuous mode [ 38.227607][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.234479][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.241352][ T345] bridge_slave_1: entered allmulticast mode [ 38.247378][ T345] bridge_slave_1: entered promiscuous mode [ 38.298383][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.305266][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.312406][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.319244][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.345012][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.353101][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.362617][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.369469][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.379060][ T346] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.385966][ T346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.410642][ T345] veth0_vlan: entered promiscuous mode [ 38.421405][ T345] veth1_macvtap: entered promiscuous mode [ 38.456034][ T345] syz-executor.0 (345) used greatest stack depth: 20880 bytes left [ 38.472529][ T11] bridge_slave_1: left allmulticast mode [ 38.478006][ T11] bridge_slave_1: left promiscuous mode [ 38.483754][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.491494][ T11] bridge_slave_0: left allmulticast mode [ 38.496976][ T11] bridge_slave_0: left promiscuous mode [ 38.502765][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.611934][ T11] veth1_macvtap: left promiscuous mode [ 38.617295][ T11] veth0_vlan: left promiscuous mode 2025/02/05 23:12:02 executed programs: 0 [ 38.994162][ T381] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.001162][ T381] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.008019][ T381] bridge_slave_0: entered allmulticast mode [ 39.014256][ T381] bridge_slave_0: entered promiscuous mode [ 39.020572][ T381] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.027411][ T381] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.034784][ T381] bridge_slave_1: entered allmulticast mode [ 39.040964][ T381] bridge_slave_1: entered promiscuous mode [ 39.123573][ T381] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.130470][ T381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.137555][ T381] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.144361][ T381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.169067][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.176164][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.186253][ T346] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.193120][ T346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.202198][ T346] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.209043][ T346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.237264][ T381] veth0_vlan: entered promiscuous mode [ 39.247942][ T381] veth1_macvtap: entered promiscuous mode syzkaller build log: go env (err=) GO111MODULE='auto' GOARCH='amd64' GOBIN='' GOCACHE='/syzkaller/.cache/go-build' GOENV='/syzkaller/.config/go/env' GOEXE='' GOEXPERIMENT='' GOFLAGS='' GOHOSTARCH='amd64' GOHOSTOS='linux' GOINSECURE='' GOMODCACHE='/syzkaller/jobs-2/linux/gopath/pkg/mod' GONOPROXY='' GONOSUMDB='' GOOS='linux' GOPATH='/syzkaller/jobs-2/linux/gopath' GOPRIVATE='' GOPROXY='https://proxy.golang.org,direct' GOROOT='/usr/local/go' GOSUMDB='sum.golang.org' GOTMPDIR='' GOTOOLCHAIN='auto' GOTOOLDIR='/usr/local/go/pkg/tool/linux_amd64' GOVCS='' GOVERSION='go1.22.7' GCCGO='gccgo' GOAMD64='v1' AR='ar' CC='gcc' CXX='g++' CGO_ENABLED='1' GOMOD='/syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/go.mod' GOWORK='' CGO_CFLAGS='-O2 -g' CGO_CPPFLAGS='' CGO_CXXFLAGS='-O2 -g' CGO_FFLAGS='-O2 -g' CGO_LDFLAGS='-O2 -g' PKG_CONFIG='pkg-config' GOGCCFLAGS='-fPIC -m64 -pthread -Wl,--no-gc-sections -fmessage-length=0 -ffile-prefix-map=/tmp/go-build935356206=/tmp/go-build -gno-record-gcc-switches' git status (err=) HEAD detached at 34889ee3b0 nothing to commit, working tree clean tput: No value for $TERM and no -T specified tput: No value for $TERM and no -T specified Makefile:31: run command via tools/syz-env for best compatibility, see: Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env go list -f '{{.Stale}}' ./sys/syz-sysgen | grep -q false || go install ./sys/syz-sysgen make .descriptions tput: No value for $TERM and no -T specified tput: No value for $TERM and no -T specified Makefile:31: run command via tools/syz-env for best compatibility, see: Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env bin/syz-sysgen touch .descriptions GOOS=linux GOARCH=amd64 go build "-ldflags=-s -w -X github.com/google/syzkaller/prog.GitRevision=34889ee3b09e7b4d381828377aa6173bfcc36cc7 -X 'github.com/google/syzkaller/prog.gitRevisionDate=20240528-103526'" "-tags=syz_target syz_os_linux syz_arch_amd64 " -o ./bin/linux_amd64/syz-fuzzer github.com/google/syzkaller/syz-fuzzer GOOS=linux GOARCH=amd64 go build "-ldflags=-s -w -X github.com/google/syzkaller/prog.GitRevision=34889ee3b09e7b4d381828377aa6173bfcc36cc7 -X 'github.com/google/syzkaller/prog.gitRevisionDate=20240528-103526'" "-tags=syz_target syz_os_linux syz_arch_amd64 " -o ./bin/linux_amd64/syz-execprog github.com/google/syzkaller/tools/syz-execprog mkdir -p ./bin/linux_amd64 g++ -o ./bin/linux_amd64/syz-executor executor/executor.cc \ -m64 -O2 -pthread -Wall -Werror -Wparentheses -Wunused-const-variable -Wframe-larger-than=16384 -Wno-stringop-overflow -Wno-array-bounds -Wno-format-overflow -Wno-unused-but-set-variable -Wno-unused-command-line-argument -static-pie -std=c++14 -I. -Iexecutor/_include -fpermissive -w -DGOOS_linux=1 -DGOARCH_amd64=1 \ -DHOSTGOOS_linux=1 -DGIT_REVISION=\"34889ee3b09e7b4d381828377aa6173bfcc36cc7\"