UBSAN: object-size-mismatch in wg_xmit IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready ================================================================================ UBSAN: object-size-mismatch in ./include/linux/skbuff.h:2016:28 member access within address 00000000b3930536 with insufficient space for an object of type 'struct sk_buff' CPU: 0 PID: 73 Comm: kworker/0:1 Not tainted 5.10.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Workqueue: ipv6_addrconf addrconf_dad_work Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x19c/0x1e2 lib/dump_stack.c:118 ubsan_epilogue lib/ubsan.c:148 [inline] handle_object_size_mismatch lib/ubsan.c:297 [inline] ubsan_type_mismatch_common+0x1ed/0x3a0 lib/ubsan.c:310 __ubsan_handle_type_mismatch_v1+0x4b/0x60 lib/ubsan.c:339 __skb_queue_before include/linux/skbuff.h:2016 [inline] __skb_queue_tail include/linux/skbuff.h:2049 [inline] wg_xmit+0x42c/0xa60 drivers/net/wireguard/device.c:182 __netdev_start_xmit include/linux/netdevice.h:4735 [inline] netdev_start_xmit+0x8a/0x160 include/linux/netdevice.h:4749 xmit_one net/core/dev.c:3564 [inline] dev_hard_start_xmit+0x18d/0x2f0 net/core/dev.c:3580 __dev_queue_xmit+0xf16/0x1920 net/core/dev.c:4140 dev_queue_xmit+0x17/0x20 net/core/dev.c:4173 neigh_connected_output+0x288/0x2b0 net/core/neighbour.c:1520 neigh_output include/net/neighbour.h:510 [inline] ip6_finish_output2+0xc34/0x1020 net/ipv6/ip6_output.c:117 __ip6_finish_output+0x279/0x370 net/ipv6/ip6_output.c:143 ip6_finish_output+0x20b/0x220 net/ipv6/ip6_output.c:153 NF_HOOK_COND include/linux/netfilter.h:290 [inline] ip6_output+0x18c/0x3f0 net/ipv6/ip6_output.c:176 dst_output include/net/dst.h:443 [inline] NF_HOOK+0x88/0x210 include/linux/netfilter.h:301 ndisc_send_skb+0x653/0x9f0 net/ipv6/ndisc.c:508 ndisc_send_rs+0x26c/0x360 net/ipv6/ndisc.c:702 addrconf_dad_completed+0x493/0x970 net/ipv6/addrconf.c:4191 addrconf_dad_work+0x9d0/0x12d0 net/ipv6/addrconf.c:3956 process_one_work+0x3d5/0x640 kernel/workqueue.c:2272 worker_thread+0x723/0xa60 kernel/workqueue.c:2418 kthread+0x365/0x400 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 ================================================================================ ================================================================================ UBSAN: object-size-mismatch in ./include/linux/skbuff.h:1909:2 member access within address 00000000b3930536 with insufficient space for an object of type 'struct sk_buff' CPU: 0 PID: 73 Comm: kworker/0:1 Not tainted 5.10.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Workqueue: ipv6_addrconf addrconf_dad_work Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x19c/0x1e2 lib/dump_stack.c:118 ubsan_epilogue lib/ubsan.c:148 [inline] handle_object_size_mismatch lib/ubsan.c:297 [inline] ubsan_type_mismatch_common+0x1ed/0x3a0 lib/ubsan.c:310 __ubsan_handle_type_mismatch_v1+0x4b/0x60 lib/ubsan.c:339 __skb_insert include/linux/skbuff.h:1909 [inline] __skb_queue_before include/linux/skbuff.h:2016 [inline] __skb_queue_tail include/linux/skbuff.h:2049 [inline] wg_xmit+0x48f/0xa60 drivers/net/wireguard/device.c:182 __netdev_start_xmit include/linux/netdevice.h:4735 [inline] netdev_start_xmit+0x8a/0x160 include/linux/netdevice.h:4749 xmit_one net/core/dev.c:3564 [inline] dev_hard_start_xmit+0x18d/0x2f0 net/core/dev.c:3580 __dev_queue_xmit+0xf16/0x1920 net/core/dev.c:4140 dev_queue_xmit+0x17/0x20 net/core/dev.c:4173 neigh_connected_output+0x288/0x2b0 net/core/neighbour.c:1520 neigh_output include/net/neighbour.h:510 [inline] ip6_finish_output2+0xc34/0x1020 net/ipv6/ip6_output.c:117 __ip6_finish_output+0x279/0x370 net/ipv6/ip6_output.c:143 ip6_finish_output+0x20b/0x220 net/ipv6/ip6_output.c:153 NF_HOOK_COND include/linux/netfilter.h:290 [inline] ip6_output+0x18c/0x3f0 net/ipv6/ip6_output.c:176 dst_output include/net/dst.h:443 [inline] NF_HOOK+0x88/0x210 include/linux/netfilter.h:301 ndisc_send_skb+0x653/0x9f0 net/ipv6/ndisc.c:508 ndisc_send_rs+0x26c/0x360 net/ipv6/ndisc.c:702 addrconf_dad_completed+0x493/0x970 net/ipv6/addrconf.c:4191 addrconf_dad_work+0x9d0/0x12d0 net/ipv6/addrconf.c:3956 process_one_work+0x3d5/0x640 kernel/workqueue.c:2272 worker_thread+0x723/0xa60 kernel/workqueue.c:2418 kthread+0x365/0x400 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 ================================================================================ Warning: Permanently added '10.128.15.207' (ECDSA) to the list of known hosts. 2022/11/15 11:10:53 fuzzer started 2022/11/15 11:10:53 connecting to host at 10.128.0.163:37675 2022/11/15 11:10:53 checking machine... 2022/11/15 11:10:53 checking revisions... 2022/11/15 11:10:53 testing simple program... [ 19.983713][ T22] audit: type=1400 audit(1668510653.270:73): avc: denied { integrity } for pid=371 comm="syz-fuzzer" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 19.990719][ T22] audit: type=1400 audit(1668510653.280:74): avc: denied { getattr } for pid=371 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 19.995731][ T22] audit: type=1400 audit(1668510653.280:75): avc: denied { read } for pid=371 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 20.000925][ T22] audit: type=1400 audit(1668510653.280:76): avc: denied { open } for pid=371 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 20.013502][ T22] audit: type=1400 audit(1668510653.290:77): avc: denied { read } for pid=371 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.015504][ T379] cgroup: Unknown subsys name 'net' [ 20.036352][ T22] audit: type=1400 audit(1668510653.290:78): avc: denied { open } for pid=371 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.064474][ T22] audit: type=1400 audit(1668510653.310:79): avc: denied { mounton } for pid=379 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.064633][ T379] cgroup: Unknown subsys name 'devices' [ 20.087061][ T22] audit: type=1400 audit(1668510653.310:80): avc: denied { mount } for pid=379 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.114632][ T22] audit: type=1400 audit(1668510653.330:81): avc: denied { unmount } for pid=379 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.256111][ T379] cgroup: Unknown subsys name 'hugetlb' [ 20.261760][ T379] cgroup: Unknown subsys name 'rlimit' [ 20.385472][ T22] audit: type=1400 audit(1668510653.680:82): avc: denied { setattr } for pid=379 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.463320][ T381] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.470492][ T381] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.478047][ T381] device bridge_slave_0 entered promiscuous mode [ 20.484860][ T381] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.491956][ T381] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.499487][ T381] device bridge_slave_1 entered promiscuous mode [ 20.531663][ T381] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.538702][ T381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.545935][ T381] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.552939][ T381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.569668][ T382] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.576976][ T382] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.584245][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.591842][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.601053][ T73] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.609301][ T73] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.616329][ T73] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.624814][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.632945][ T382] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.639992][ T382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.651014][ T73] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.660516][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.673151][ T73] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.683687][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.695323][ T73] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.706676][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.718697][ T73] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.728204][ T73] ================================================================================ [ 20.737656][ T73] UBSAN: object-size-mismatch in ./include/linux/skbuff.h:2016:28 [ 20.745458][ T73] member access within address 00000000b3930536 with insufficient space [ 20.753758][ T73] for an object of type 'struct sk_buff' [ 20.759404][ T73] CPU: 0 PID: 73 Comm: kworker/0:1 Not tainted 5.10.0-syzkaller #0 [ 20.767281][ T73] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 20.777330][ T73] Workqueue: ipv6_addrconf addrconf_dad_work [ 20.783287][ T73] Call Trace: [ 20.786558][ T73] dump_stack+0x19c/0x1e2 [ 20.790870][ T73] ubsan_type_mismatch_common+0x1ed/0x3a0 [ 20.796571][ T73] __ubsan_handle_type_mismatch_v1+0x4b/0x60 [ 20.802530][ T73] wg_xmit+0x42c/0xa60 [ 20.806581][ T73] ? __sanitizer_cov_trace_switch+0x64/0x80 [ 20.812540][ T73] netdev_start_xmit+0x8a/0x160 [ 20.817373][ T73] dev_hard_start_xmit+0x18d/0x2f0 [ 20.822635][ T73] __dev_queue_xmit+0xf16/0x1920 [ 20.827553][ T73] ? __kasan_check_write+0x14/0x20 [ 20.832667][ T73] dev_queue_xmit+0x17/0x20 [ 20.837154][ T73] neigh_connected_output+0x288/0x2b0 [ 20.842505][ T73] ip6_finish_output2+0xc34/0x1020 [ 20.847593][ T73] ? ip6_mtu+0xf1/0x140 [ 20.851902][ T73] __ip6_finish_output+0x279/0x370 [ 20.856995][ T73] ip6_finish_output+0x20b/0x220 [ 20.861915][ T73] ? ip6_output+0x175/0x3f0 [ 20.866403][ T73] ip6_output+0x18c/0x3f0 [ 20.870709][ T73] ? ip6_dst_idev+0x40/0x40 [ 20.875200][ T73] NF_HOOK+0x88/0x210 [ 20.879171][ T73] ? NF_HOOK+0x210/0x210 [ 20.883519][ T73] ndisc_send_skb+0x653/0x9f0 [ 20.888180][ T73] ndisc_send_rs+0x26c/0x360 [ 20.892755][ T73] addrconf_dad_completed+0x493/0x970 [ 20.898105][ T73] addrconf_dad_work+0x9d0/0x12d0 [ 20.903104][ T73] process_one_work+0x3d5/0x640 [ 20.907965][ T73] worker_thread+0x723/0xa60 [ 20.912530][ T73] ? _raw_spin_lock_irqsave+0xa2/0x220 [ 20.917966][ T73] kthread+0x365/0x400 [ 20.922010][ T73] ? pr_cont_work+0x110/0x110 [ 20.926656][ T73] ? __list_add+0xc0/0xc0 [ 20.930958][ T73] ret_from_fork+0x1f/0x30 [ 20.935379][ T73] ================================================================================ [ 20.944648][ T73] ================================================================================ [ 20.953896][ T73] UBSAN: object-size-mismatch in ./include/linux/skbuff.h:1909:2 [ 20.961609][ T73] member access within address 00000000b3930536 with insufficient space [ 20.969924][ T73] for an object of type 'struct sk_buff' [ 20.975556][ T73] CPU: 0 PID: 73 Comm: kworker/0:1 Not tainted 5.10.0-syzkaller #0 [ 20.983424][ T73] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 20.993461][ T73] Workqueue: ipv6_addrconf addrconf_dad_work [ 20.999415][ T73] Call Trace: [ 21.002679][ T73] dump_stack+0x19c/0x1e2 [ 21.007071][ T73] ubsan_type_mismatch_common+0x1ed/0x3a0 [ 21.012763][ T73] __ubsan_handle_type_mismatch_v1+0x4b/0x60 [ 21.018718][ T73] wg_xmit+0x48f/0xa60 [ 21.022760][ T73] ? __sanitizer_cov_trace_switch+0x64/0x80 [ 21.028624][ T73] netdev_start_xmit+0x8a/0x160 [ 21.033446][ T73] dev_hard_start_xmit+0x18d/0x2f0 [ 21.038531][ T73] __dev_queue_xmit+0xf16/0x1920 [ 21.043441][ T73] ? __kasan_check_write+0x14/0x20 [ 21.048535][ T73] dev_queue_xmit+0x17/0x20 [ 21.053014][ T73] neigh_connected_output+0x288/0x2b0 [ 21.058357][ T73] ip6_finish_output2+0xc34/0x1020 [ 21.063442][ T73] ? ip6_mtu+0xf1/0x140 [ 21.067571][ T73] __ip6_finish_output+0x279/0x370 [ 21.072654][ T73] ip6_finish_output+0x20b/0x220 [ 21.077565][ T73] ? ip6_output+0x175/0x3f0 [ 21.082040][ T73] ip6_output+0x18c/0x3f0 [ 21.086353][ T73] ? ip6_dst_idev+0x40/0x40 [ 21.090836][ T73] NF_HOOK+0x88/0x210 [ 21.094793][ T73] ? NF_HOOK+0x210/0x210 [ 21.099010][ T73] ndisc_send_skb+0x653/0x9f0 [ 21.103658][ T73] ndisc_send_rs+0x26c/0x360 [ 21.108220][ T73] addrconf_dad_completed+0x493/0x970 [ 21.113567][ T73] addrconf_dad_work+0x9d0/0x12d0 [ 21.118563][ T73] process_one_work+0x3d5/0x640 [ 21.123386][ T73] worker_thread+0x723/0xa60 [ 21.127955][ T73] ? _raw_spin_lock_irqsave+0xa2/0x220 2022/11/15 11:10:54 building call list... [ 21.133387][ T73] kthread+0x365/0x400 [ 21.137438][ T73] ? pr_cont_work+0x110/0x110 [ 21.142087][ T73] ? __list_add+0xc0/0xc0 [ 21.146393][ T73] ret_from_fork+0x1f/0x30 [ 21.150828][ T73] ================================================================================ [ 21.167831][ T381] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 21.264631][ T381] ================================================================== [ 21.272732][ T381] BUG: KASAN: use-after-free in task_active_pid_ns+0x9a/0xa0 [ 21.280103][ T381] Read of size 4 at addr ffff88810015a184 by task syz-executor.0/381 [ 21.289023][ T381] [ 21.291356][ T381] CPU: 0 PID: 381 Comm: syz-executor.0 Not tainted 5.10.0-syzkaller #0 [ 21.303860][ T381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 21.313903][ T381] Call Trace: [ 21.317187][ T381] dump_stack+0x19c/0x1e2 [ 21.321519][ T381] print_address_description+0x7e/0x6a0 [ 21.327063][ T381] ? printk+0x76/0x96 [ 21.331074][ T381] kasan_report+0x16f/0x210 [ 21.335574][ T381] ? task_active_pid_ns+0x9a/0xa0 [ 21.340593][ T381] ? task_active_pid_ns+0x9a/0xa0 [ 21.345616][ T381] __asan_report_load4_noabort+0x14/0x20 [ 21.351241][ T381] task_active_pid_ns+0x9a/0xa0 [ 21.356112][ T381] do_notify_parent+0x2c7/0xa70 [ 21.360952][ T381] ? __kasan_check_write+0x14/0x20 [ 21.366068][ T381] do_exit+0x1a52/0x2190 [ 21.370304][ T381] do_group_exit+0x13f/0x310 [ 21.374906][ T381] get_signal+0xbef/0x10c0 [ 21.379323][ T381] arch_do_signal+0x42/0x710 [ 21.383908][ T381] exit_to_user_mode_loop+0xa3/0xe0 [ 21.389094][ T381] syscall_exit_to_user_mode+0x77/0xa0 [ 21.394539][ T381] do_syscall_64+0x40/0x70 [ 21.398953][ T381] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 21.404841][ T381] RIP: 0033:0x7f0cf48d12fe [ 21.409254][ T381] Code: Unable to access opcode bytes at RIP 0x7f0cf48d12d4. [ 21.416614][ T381] RSP: 002b:00007fffa7ba22d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 21.425118][ T381] RAX: fffffffffffffe00 RBX: 00007fffa7ba2360 RCX: 00007f0cf48d12fe [ 21.433092][ T381] RDX: 0000000000000040 RSI: 00007f0cf4a3c020 RDI: 00000000000000f9 [ 21.441064][ T381] RBP: 0000000000000003 R08: 00000000000002e8 R09: ffffffffffff0000 [ 21.449028][ T381] R10: 00007f0cf4a16000 R11: 0000000000000246 R12: 0000000000000032 [ 21.457004][ T381] R13: 00000000000052ab R14: 0000000000000003 R15: 00007fffa7ba23a0 [ 21.464965][ T381] [ 21.467282][ T381] Allocated by task 0: [ 21.471344][ T381] __kasan_kmalloc+0x11a/0x150 [ 21.476100][ T381] kasan_slab_alloc+0xe/0x10 [ 21.480681][ T381] slab_post_alloc_hook+0x3f/0x70 [ 21.485694][ T381] kmem_cache_alloc+0x143/0x200 [ 21.490533][ T381] alloc_pid+0x9a/0xb00 [ 21.494677][ T381] copy_process+0xdc0/0x2110 [ 21.499260][ T381] kernel_clone+0x1df/0x690 [ 21.503756][ T381] kernel_thread+0x11b/0x160 [ 21.508345][ T381] rest_init+0x22/0xf0 [ 21.512409][ T381] arch_call_rest_init+0xe/0x10 [ 21.517254][ T381] start_kernel+0x47d/0x518 [ 21.521756][ T381] x86_64_start_reservations+0x2a/0x2c [ 21.527209][ T381] x86_64_start_kernel+0x7a/0x7d [ 21.532137][ T381] secondary_startup_64_no_verify+0xb0/0xbb [ 21.538018][ T381] [ 21.540342][ T381] Freed by task 379: [ 21.544225][ T381] kasan_set_track+0x4c/0x80 [ 21.548806][ T381] kasan_set_free_info+0x1b/0x30 [ 21.553739][ T381] __kasan_slab_free+0x11c/0x150 [ 21.558665][ T381] kasan_slab_free+0xe/0x10 [ 21.563154][ T381] slab_free_freelist_hook+0x8b/0x160 [ 21.568511][ T381] kmem_cache_free+0x9a/0x1c0 [ 21.573176][ T381] put_pid+0xb3/0x120 [ 21.577149][ T381] proc_do_cad_pid+0x131/0x1d0 [ 21.581901][ T381] proc_sys_call_handler+0x48d/0x640 [ 21.587181][ T381] proc_sys_write+0x22/0x30 [ 21.591679][ T381] vfs_write+0x466/0x560 [ 21.595910][ T381] ksys_write+0x155/0x260 [ 21.600227][ T381] __x64_sys_write+0x7b/0x90 [ 21.604807][ T381] do_syscall_64+0x34/0x70 [ 21.609213][ T381] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 21.615095][ T381] [ 21.617604][ T381] The buggy address belongs to the object at ffff88810015a180 [ 21.617604][ T381] which belongs to the cache pid of size 112 [ 21.630960][ T381] The buggy address is located 4 bytes inside of [ 21.630960][ T381] 112-byte region [ffff88810015a180, ffff88810015a1f0) [ 21.644053][ T381] The buggy address belongs to the page: [ 21.649680][ T381] page:000000007a7a4ada refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10015a [ 21.659914][ T381] flags: 0x8000000000000200(slab) [ 21.664955][ T381] raw: 8000000000000200 dead000000000100 dead000000000122 ffff888100134a00 [ 21.673535][ T381] raw: 0000000000000000 0000000000150015 00000001ffffffff 0000000000000000 [ 21.682110][ T381] page dumped because: kasan: bad access detected [ 21.688605][ T381] page_owner tracks the page as allocated [ 21.694313][ T381] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x0() [ 21.702818][ T381] register_early_stack+0x41/0x80 [ 21.707833][ T381] init_page_owner+0x32/0x4f0 [ 21.712500][ T381] invoke_init_callbacks+0x63/0x6d [ 21.717607][ T381] page_ext_init+0x348/0x371 [ 21.722180][ T381] page_owner free stack trace missing [ 21.727533][ T381] [ 21.729848][ T381] Memory state around the buggy address: [ 21.735466][ T381] ffff88810015a080: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 21.743702][ T381] ffff88810015a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.751754][ T381] >ffff88810015a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc [ 21.759809][ T381] ^ [ 21.763866][ T381] ffff88810015a200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 21.771922][ T381] ffff88810015a280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.779977][ T381] ================================================================== [ 21.788030][ T381] Disabling lock debugging due to kernel taint [ 21.794268][ T381] BUG: unable to handle page fault for address: ffffed122001c53f [ 21.801974][ T381] #PF: supervisor read access in kernel mode [ 21.807942][ T381] #PF: error_code(0x0000) - not-present page [ 21.813907][ T381] PGD 23fff2067 P4D 23fff2067 PUD 0 [ 21.819210][ T381] Oops: 0000 [#1] PREEMPT SMP KASAN [ 21.824406][ T381] CPU: 0 PID: 381 Comm: syz-executor.0 Tainted: G B 5.10.0-syzkaller #0 [ 21.834021][ T381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 21.844094][ T381] RIP: 0010:task_active_pid_ns+0x69/0xa0 [ 21.849717][ T381] Code: 5d 56 1d 00 48 8d 7b 04 48 89 f8 48 c1 e8 03 42 8a 04 30 84 c0 75 33 8b 43 04 48 c1 e0 04 48 8d 5c 03 68 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 74 08 48 89 df e8 28 a7 4c 00 48 8b 03 eb 07 e8 1e [ 21.869314][ T381] RSP: 0018:ffffc90000a77b40 EFLAGS: 00010806 [ 21.875373][ T381] RAX: 1ffff1122001c53f RBX: ffff8891000e29f8 RCX: 0000000000000002 [ 21.883427][ T381] RDX: 0000000000000000 RSI: 0000000000000086 RDI: 0000000000000001 [ 21.891393][ T381] RBP: ffffc90000a77b50 R08: ffff888119840000 R09: fffffbfff0bc26f9 [ 21.899359][ T381] R10: fffffbfff0bc26f9 R11: 1ffffffff0bc26f8 R12: dffffc0000000000 [ 21.907321][ T381] R13: ffff888119840000 R14: dffffc0000000000 R15: ffff888119840520 [ 21.915288][ T381] FS: 0000000000000000(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000 [ 21.924224][ T381] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.930810][ T381] CR2: ffffed122001c53f CR3: 0000000119536000 CR4: 00000000003506b0 [ 21.938782][ T381] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 21.946749][ T381] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 21.954708][ T381] Call Trace: [ 21.957990][ T381] do_notify_parent+0x2c7/0xa70 [ 21.962843][ T381] ? __kasan_check_write+0x14/0x20 [ 21.967945][ T381] do_exit+0x1a52/0x2190 [ 21.972194][ T381] do_group_exit+0x13f/0x310 [ 21.976783][ T381] get_signal+0xbef/0x10c0 [ 21.981213][ T381] arch_do_signal+0x42/0x710 [ 21.985793][ T381] exit_to_user_mode_loop+0xa3/0xe0 [ 21.990986][ T381] syscall_exit_to_user_mode+0x77/0xa0 [ 21.996439][ T381] do_syscall_64+0x40/0x70 [ 22.000846][ T381] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 22.006726][ T381] RIP: 0033:0x7f0cf48d12fe [ 22.011124][ T381] Code: Unable to access opcode bytes at RIP 0x7f0cf48d12d4. [ 22.018477][ T381] RSP: 002b:00007fffa7ba22d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 22.027076][ T381] RAX: fffffffffffffe00 RBX: 00007fffa7ba2360 RCX: 00007f0cf48d12fe [ 22.035038][ T381] RDX: 0000000000000040 RSI: 00007f0cf4a3c020 RDI: 00000000000000f9 [ 22.043002][ T381] RBP: 0000000000000003 R08: 00000000000002e8 R09: ffffffffffff0000 [ 22.050970][ T381] R10: 00007f0cf4a16000 R11: 0000000000000246 R12: 0000000000000032 [ 22.058933][ T381] R13: 00000000000052ab R14: 0000000000000003 R15: 00007fffa7ba23a0 [ 22.067017][ T381] Modules linked in: [ 22.070908][ T381] CR2: ffffed122001c53f [ 22.075072][ T381] ---[ end trace 0126cb864b745932 ]--- [ 22.080525][ T381] RIP: 0010:task_active_pid_ns+0x69/0xa0 [ 22.086147][ T381] Code: 5d 56 1d 00 48 8d 7b 04 48 89 f8 48 c1 e8 03 42 8a 04 30 84 c0 75 33 8b 43 04 48 c1 e0 04 48 8d 5c 03 68 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 74 08 48 89 df e8 28 a7 4c 00 48 8b 03 eb 07 e8 1e [ 22.105746][ T381] RSP: 0018:ffffc90000a77b40 EFLAGS: 00010806 [ 22.111830][ T381] RAX: 1ffff1122001c53f RBX: ffff8891000e29f8 RCX: 0000000000000002 [ 22.119798][ T381] RDX: 0000000000000000 RSI: 0000000000000086 RDI: 0000000000000001 [ 22.127768][ T381] RBP: ffffc90000a77b50 R08: ffff888119840000 R09: fffffbfff0bc26f9 [ 22.135745][ T381] R10: fffffbfff0bc26f9 R11: 1ffffffff0bc26f8 R12: dffffc0000000000 [ 22.143728][ T381] R13: ffff888119840000 R14: dffffc0000000000 R15: ffff888119840520 [ 22.151695][ T381] FS: 0000000000000000(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000 [ 22.160621][ T381] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.167208][ T381] CR2: ffffed122001c53f CR3: 0000000119536000 CR4: 00000000003506b0 [ 22.175176][ T381] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 22.183144][ T381] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 22.191106][ T381] Kernel panic - not syncing: Fatal exception [ 22.197200][ T381] Kernel Offset: disabled [ 22.201517][ T381] Rebooting in 86400 seconds.. syzkaller build log: go env (err=) GO111MODULE="auto" GOARCH="amd64" GOBIN="" GOCACHE="/syzkaller/.cache/go-build" GOENV="/syzkaller/.config/go/env" GOEXE="" GOEXPERIMENT="" GOFLAGS="" GOHOSTARCH="amd64" GOHOSTOS="linux" GOINSECURE="" GOMODCACHE="/syzkaller/jobs/linux/gopath/pkg/mod" GONOPROXY="" GONOSUMDB="" GOOS="linux" GOPATH="/syzkaller/jobs/linux/gopath" GOPRIVATE="" GOPROXY="https://proxy.golang.org,direct" GOROOT="/usr/local/go" GOSUMDB="sum.golang.org" GOTMPDIR="" GOTOOLDIR="/usr/local/go/pkg/tool/linux_amd64" GOVCS="" GOVERSION="go1.17" GCCGO="gccgo" AR="ar" CC="gcc" CXX="g++" CGO_ENABLED="1" GOMOD="/syzkaller/jobs/linux/gopath/src/github.com/google/syzkaller/go.mod" CGO_CFLAGS="-g -O2" CGO_CPPFLAGS="" CGO_CXXFLAGS="-g -O2" CGO_FFLAGS="-g -O2" CGO_LDFLAGS="-g -O2" PKG_CONFIG="pkg-config" GOGCCFLAGS="-fPIC -m64 -pthread -fmessage-length=0 -fdebug-prefix-map=/tmp/go-build30102721=/tmp/go-build -gno-record-gcc-switches" git status (err=) HEAD detached at c0b80a55c nothing to commit, working tree clean tput: No value for $TERM and no -T specified tput: No value for $TERM and no -T specified Makefile:32: run command via tools/syz-env for best compatibility, see: Makefile:33: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env go list -f '{{.Stale}}' ./sys/syz-sysgen | grep -q false || go install ./sys/syz-sysgen make .descriptions tput: No value for $TERM and no -T specified tput: No value for $TERM and no -T specified bin/syz-sysgen touch .descriptions GOOS=linux GOARCH=amd64 go build "-ldflags=-s -w -X github.com/google/syzkaller/prog.GitRevision=c0b80a55c9c8cfe75e77c555ed0d4ae7aa373cc2 -X 'github.com/google/syzkaller/prog.gitRevisionDate=20221021-135310'" "-tags=syz_target syz_os_linux syz_arch_amd64 " -o ./bin/linux_amd64/syz-fuzzer github.com/google/syzkaller/syz-fuzzer GOOS=linux GOARCH=amd64 go build "-ldflags=-s -w -X github.com/google/syzkaller/prog.GitRevision=c0b80a55c9c8cfe75e77c555ed0d4ae7aa373cc2 -X 'github.com/google/syzkaller/prog.gitRevisionDate=20221021-135310'" "-tags=syz_target syz_os_linux syz_arch_amd64 " -o ./bin/linux_amd64/syz-execprog github.com/google/syzkaller/tools/syz-execprog GOOS=linux GOARCH=amd64 go build "-ldflags=-s -w -X github.com/google/syzkaller/prog.GitRevision=c0b80a55c9c8cfe75e77c555ed0d4ae7aa373cc2 -X 'github.com/google/syzkaller/prog.gitRevisionDate=20221021-135310'" "-tags=syz_target syz_os_linux syz_arch_amd64 " -o ./bin/linux_amd64/syz-stress github.com/google/syzkaller/tools/syz-stress mkdir -p ./bin/linux_amd64 gcc -o ./bin/linux_amd64/syz-executor executor/executor.cc \ -m64 -O2 -pthread -Wall -Werror -Wparentheses -Wunused-const-variable -Wframe-larger-than=16384 -Wno-stringop-overflow -Wno-array-bounds -Wno-format-overflow -static-pie -fpermissive -w -DGOOS_linux=1 -DGOARCH_amd64=1 \ -DHOSTGOOS_linux=1 -DGIT_REVISION=\"c0b80a55c9c8cfe75e77c555ed0d4ae7aa373cc2\"