KASAN: slab-use-after-free Write in binder_add_device veth0_vlan: entered promiscuous mode veth1_macvtap: entered promiscuous mode ================================================================== BUG: KASAN: slab-use-after-free in hlist_add_head include/linux/list.h:1026 [inline] BUG: KASAN: slab-use-after-free in binder_add_device+0x5f/0xa0 drivers/android/binder.c:6932 Write of size 8 at addr ffff888105714e08 by task syz-executor/326 CPU: 0 UID: 0 PID: 326 Comm: syz-executor Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x184/0x200 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x163/0x550 mm/kasan/report.c:489 kasan_report+0x15f/0x190 mm/kasan/report.c:602 __asan_report_store8_noabort+0x17/0x20 mm/kasan/report_generic.c:386 hlist_add_head include/linux/list.h:1026 [inline] binder_add_device+0x5f/0xa0 drivers/android/binder.c:6932 binderfs_binder_device_create+0x841/0xaa0 drivers/android/binderfs.c:210 binderfs_fill_super+0x8fb/0xdd0 drivers/android/binderfs.c:729 vfs_get_super fs/super.c:1280 [inline] get_tree_nodev+0xb9/0x160 fs/super.c:1299 binderfs_fs_context_get_tree+0x1c/0x30 drivers/android/binderfs.c:749 vfs_get_tree+0x8c/0x2c0 fs/super.c:1814 do_new_mount+0x2ba/0xb40 fs/namespace.c:3560 path_mount+0x67c/0x1000 fs/namespace.c:3887 do_mount fs/namespace.c:3900 [inline] __do_sys_mount fs/namespace.c:4111 [inline] __se_sys_mount+0x2c1/0x3b0 fs/namespace.c:4088 __x64_sys_mount+0xbf/0xe0 fs/namespace.c:4088 x64_sys_call+0x2c9e/0x2df0 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x50/0x110 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7fb9f678e58a Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fffba3099e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fb9f680e663 RCX: 00007fb9f678e58a RDX: 00007fb9f681dda7 RSI: 00007fb9f680e663 RDI: 00007fb9f681dda7 RBP: 00007fb9f680e8ac R08: 0000000000000000 R09: 00007fffba309a90 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb9f67eb1a8 R13: 00007fb9f67eb180 R14: 0000000000000009 R15: 0000000000000000 Allocated by task 319: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3b/0x70 mm/kasan/common.c:68 kasan_save_alloc_info+0x38/0x50 mm/kasan/generic.c:562 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x99/0xb0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __kmalloc_cache_noprof+0x15f/0x2d0 mm/slub.c:4325 kmalloc_noprof include/linux/slab.h:901 [inline] kzalloc_noprof include/linux/slab.h:1037 [inline] binderfs_binder_device_create+0x159/0xaa0 drivers/android/binderfs.c:147 binderfs_fill_super+0x8fb/0xdd0 drivers/android/binderfs.c:729 vfs_get_super fs/super.c:1280 [inline] get_tree_nodev+0xb9/0x160 fs/super.c:1299 binderfs_fs_context_get_tree+0x1c/0x30 drivers/android/binderfs.c:749 vfs_get_tree+0x8c/0x2c0 fs/super.c:1814 do_new_mount+0x2ba/0xb40 fs/namespace.c:3560 path_mount+0x67c/0x1000 fs/namespace.c:3887 do_mount fs/namespace.c:3900 [inline] __do_sys_mount fs/namespace.c:4111 [inline] __se_sys_mount+0x2c1/0x3b0 fs/namespace.c:4088 __x64_sys_mount+0xbf/0xe0 fs/namespace.c:4088 x64_sys_call+0x2c9e/0x2df0 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x50/0x110 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x76/0x7e Freed by task 319: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3b/0x70 mm/kasan/common.c:68 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x53/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2353 [inline] slab_free mm/slub.c:4609 [inline] kfree+0x13b/0x350 mm/slub.c:4757 binderfs_evict_inode+0x187/0x220 drivers/android/binderfs.c:278 evict+0x4a7/0x930 fs/inode.c:796 iput_final fs/inode.c:1946 [inline] iput+0x5ff/0x920 fs/inode.c:1972 dentry_unlink_inode+0x389/0x460 fs/dcache.c:440 __dentry_kill+0x207/0x640 fs/dcache.c:643 shrink_kill fs/dcache.c:1088 [inline] shrink_dentry_list+0x315/0x510 fs/dcache.c:1115 shrink_dcache_parent+0xce/0x340 do_one_tree+0x27/0xf0 fs/dcache.c:1578 shrink_dcache_for_umount+0xa3/0x140 fs/dcache.c:1595 generic_shutdown_super+0x69/0x300 fs/super.c:620 kill_anon_super+0x46/0x1e0 fs/super.c:1237 kill_litter_super+0x56/0x60 fs/super.c:1247 binderfs_kill_super+0x41/0x60 drivers/android/binderfs.c:791 deactivate_locked_super+0xd8/0x290 fs/super.c:473 deactivate_super+0xc6/0xf0 fs/super.c:506 cleanup_mnt+0x42d/0x4d0 fs/namespace.c:1413 __cleanup_mnt+0x19/0x20 fs/namespace.c:1420 task_work_run+0x252/0x2e0 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xb39/0x2ab0 kernel/exit.c:938 do_group_exit+0x21b/0x2d0 kernel/exit.c:1087 get_signal+0x1553/0x1690 kernel/signal.c:3036 arch_do_signal_or_restart+0x92/0x7d0 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x5f/0x110 kernel/entry/common.c:218 do_syscall_64+0x5c/0x110 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x76/0x7e The buggy address belongs to the object at ffff888105714e00 which belongs to the cache kmalloc-192 of size 192 The buggy address is located 8 bytes inside of freed 192-byte region [ffff888105714e00, ffff888105714ec0) The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105714 flags: 0x4000000000000000(zone=1) page_type: f5(slab) raw: 4000000000000000 ffff8881000413c0 ffffea00040ad280 0000000000000002 raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x52cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 1, tgid 1 (swapper/0), ts 3605953348, free_ts 0 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x1db/0x200 mm/page_alloc.c:1551 prep_new_page mm/page_alloc.c:1559 [inline] get_page_from_freelist+0x47ee/0x4880 mm/page_alloc.c:3477 __alloc_frozen_pages_noprof+0x3c3/0x7d0 mm/page_alloc.c:4739 allocate_slab+0x76/0x420 mm/slub.c:2587 new_slab mm/slub.c:2640 [inline] ___slab_alloc+0x767/0xc00 mm/slub.c:3826 __slab_alloc+0x5d/0xb0 mm/slub.c:3916 __slab_alloc_node mm/slub.c:3991 [inline] slab_alloc_node mm/slub.c:4152 [inline] __do_kmalloc_node mm/slub.c:4293 [inline] __kmalloc_node_track_caller_noprof+0x210/0x3f0 mm/slub.c:4313 __do_krealloc mm/slub.c:4820 [inline] krealloc_noprof+0x104/0x2d0 mm/slub.c:4873 add_sysfs_param+0xcd/0x7e0 kernel/params.c:654 kernel_add_sysfs_param+0xb2/0x140 kernel/params.c:817 param_sysfs_builtin+0x1d3/0x290 kernel/params.c:856 param_sysfs_builtin_init+0x32/0x40 kernel/params.c:990 do_one_initcall+0x18a/0x730 init/main.c:1257 do_initcall_level+0x186/0x310 init/main.c:1319 do_initcalls+0x76/0xe0 init/main.c:1335 do_basic_setup+0x87/0xa0 init/main.c:1354 page_owner free stack trace missing Memory state around the buggy address: ffff888105714d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff888105714d80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc >ffff888105714e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff888105714e80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc ffff888105714f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ================================================================== syz-executor (326) used greatest stack depth: 20856 bytes left Warning: Permanently added '10.128.0.92' (ED25519) to the list of known hosts. 2025/02/10 10:34:44 ignoring optional flag "sandboxArg"="0" 2025/02/10 10:34:45 parsed 1 programs [ 34.823361][ T30] audit: type=1400 audit(1739183685.672:66): avc: denied { node_bind } for pid=302 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 36.016409][ T30] audit: type=1400 audit(1739183686.862:67): avc: denied { mounton } for pid=311 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 36.017713][ T311] cgroup: Unknown subsys name 'net' [ 36.038904][ T30] audit: type=1400 audit(1739183686.862:68): avc: denied { mount } for pid=311 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 36.066532][ T30] audit: type=1400 audit(1739183686.912:69): avc: denied { unmount } for pid=311 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 36.066684][ T311] cgroup: Unknown subsys name 'devices' [ 36.204300][ T311] cgroup: Unknown subsys name 'cpuset' [ 36.210253][ T311] cgroup: Unknown subsys name 'hugetlb' [ 36.215844][ T311] cgroup: Unknown subsys name 'rlimit' [ 36.221255][ T311] cgroup: Unknown subsys name 'memory' [ 36.316286][ T30] audit: type=1400 audit(1739183687.162:70): avc: denied { setattr } for pid=311 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 36.339259][ T30] audit: type=1400 audit(1739183687.162:71): avc: denied { create } for pid=311 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.350528][ T315] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 36.359616][ T30] audit: type=1400 audit(1739183687.162:72): avc: denied { write } for pid=311 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.387892][ T30] audit: type=1400 audit(1739183687.162:73): avc: denied { read } for pid=311 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.407949][ T30] audit: type=1400 audit(1739183687.162:74): avc: denied { module_request } for pid=311 comm="syz-executor" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 36.429474][ T30] audit: type=1400 audit(1739183687.162:75): avc: denied { mounton } for pid=311 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 36.433255][ T311] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 37.214960][ T319] request_module fs-gadgetfs succeeded, but still no fs? [ 37.358543][ T326] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.365528][ T326] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.372392][ T326] bridge_slave_0: entered allmulticast mode [ 37.378743][ T326] bridge_slave_0: entered promiscuous mode [ 37.385005][ T326] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.391838][ T326] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.399497][ T326] bridge_slave_1: entered allmulticast mode [ 37.405831][ T326] bridge_slave_1: entered promiscuous mode [ 37.464104][ T326] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.471044][ T326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.478198][ T326] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.485235][ T326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.509117][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.516325][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.526336][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.533216][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.542109][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.549063][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.574873][ T326] veth0_vlan: entered promiscuous mode [ 37.586230][ T326] veth1_macvtap: entered promiscuous mode [ 37.607288][ T326] ================================================================== [ 37.615181][ T326] BUG: KASAN: slab-use-after-free in binder_add_device+0x5f/0xa0 [ 37.622721][ T326] Write of size 8 at addr ffff888105714e08 by task syz-executor/326 [ 37.630633][ T326] [ 37.632813][ T326] CPU: 0 UID: 0 PID: 326 Comm: syz-executor Not tainted 6.14.0-rc2-syzkaller #0 [ 37.632829][ T326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 37.632842][ T326] Call Trace: [ 37.632851][ T326] [ 37.632857][ T326] dump_stack_lvl+0x184/0x200 [ 37.632874][ T326] ? __pfx_dump_stack_lvl+0x10/0x10 [ 37.632887][ T326] ? vprintk+0x1d/0x30 [ 37.632903][ T326] ? _printk+0xd1/0x120 [ 37.632920][ T326] print_report+0x163/0x550 [ 37.632940][ T326] ? __virt_addr_valid+0x2a4/0x380 [ 37.632968][ T326] ? kasan_complete_mode_report_info+0x71/0x210 [ 37.632993][ T326] kasan_report+0x15f/0x190 [ 37.633006][ T326] ? binder_add_device+0x5f/0xa0 [ 37.633025][ T326] ? binder_add_device+0x5f/0xa0 [ 37.633043][ T326] __asan_report_store8_noabort+0x17/0x20 [ 37.633063][ T326] binder_add_device+0x5f/0xa0 [ 37.633081][ T326] binderfs_binder_device_create+0x841/0xaa0 [ 37.633102][ T326] binderfs_fill_super+0x8fb/0xdd0 [ 37.633127][ T326] ? __pfx_binderfs_fill_super+0x10/0x10 [ 37.633149][ T326] ? shrinker_register+0x166/0x220 [ 37.633164][ T326] ? sget_fc+0x95b/0xa50 [ 37.633183][ T326] ? __pfx_set_anon_super_fc+0x10/0x10 [ 37.633207][ T326] get_tree_nodev+0xb9/0x160 [ 37.633227][ T326] ? __pfx_binderfs_fill_super+0x10/0x10 [ 37.633245][ T326] binderfs_fs_context_get_tree+0x1c/0x30 [ 37.633263][ T326] vfs_get_tree+0x8c/0x2c0 [ 37.633276][ T326] do_new_mount+0x2ba/0xb40 [ 37.633291][ T326] ? __pfx_do_new_mount+0x10/0x10 [ 37.633305][ T326] ? security_capable+0x7c/0x90 [ 37.633320][ T326] ? ns_capable+0x8a/0xf0 [ 37.633341][ T326] path_mount+0x67c/0x1000 [ 37.633356][ T326] __se_sys_mount+0x2c1/0x3b0 [ 37.633372][ T326] ? __pfx___se_sys_mount+0x10/0x10 [ 37.633389][ T326] __x64_sys_mount+0xbf/0xe0 [ 37.633404][ T326] x64_sys_call+0x2c9e/0x2df0 [ 37.633420][ T326] do_syscall_64+0x50/0x110 [ 37.633433][ T326] ? clear_bhb_loop+0x35/0x90 [ 37.633452][ T326] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 37.633469][ T326] RIP: 0033:0x7fb9f678e58a [ 37.633485][ T326] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 37.633497][ T326] RSP: 002b:00007fffba3099e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 37.633518][ T326] RAX: ffffffffffffffda RBX: 00007fb9f680e663 RCX: 00007fb9f678e58a [ 37.633529][ T326] RDX: 00007fb9f681dda7 RSI: 00007fb9f680e663 RDI: 00007fb9f681dda7 [ 37.633539][ T326] RBP: 00007fb9f680e8ac R08: 0000000000000000 R09: 00007fffba309a90 [ 37.633549][ T326] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb9f67eb1a8 [ 37.633558][ T326] R13: 00007fb9f67eb180 R14: 0000000000000009 R15: 0000000000000000 [ 37.633570][ T326] [ 37.633578][ T326] [ 37.898280][ T326] Allocated by task 319: [ 37.902357][ T326] kasan_save_track+0x3b/0x70 [ 37.906886][ T326] kasan_save_alloc_info+0x38/0x50 [ 37.911817][ T326] __kasan_kmalloc+0x99/0xb0 [ 37.916246][ T326] __kmalloc_cache_noprof+0x15f/0x2d0 [ 37.921541][ T326] binderfs_binder_device_create+0x159/0xaa0 [ 37.927351][ T326] binderfs_fill_super+0x8fb/0xdd0 [ 37.932297][ T326] get_tree_nodev+0xb9/0x160 [ 37.936750][ T326] binderfs_fs_context_get_tree+0x1c/0x30 [ 37.942279][ T326] vfs_get_tree+0x8c/0x2c0 [ 37.946541][ T326] do_new_mount+0x2ba/0xb40 [ 37.950969][ T326] path_mount+0x67c/0x1000 [ 37.955212][ T326] __se_sys_mount+0x2c1/0x3b0 [ 37.959723][ T326] __x64_sys_mount+0xbf/0xe0 [ 37.964154][ T326] x64_sys_call+0x2c9e/0x2df0 [ 37.968726][ T326] do_syscall_64+0x50/0x110 [ 37.973011][ T326] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 37.978822][ T326] [ 37.980990][ T326] Freed by task 319: [ 37.984723][ T326] kasan_save_track+0x3b/0x70 [ 37.989233][ T326] kasan_save_free_info+0x40/0x50 [ 37.994100][ T326] __kasan_slab_free+0x53/0x70 [ 37.998711][ T326] kfree+0x13b/0x350 [ 38.002427][ T326] binderfs_evict_inode+0x187/0x220 [ 38.007461][ T326] evict+0x4a7/0x930 [ 38.011206][ T326] iput+0x5ff/0x920 [ 38.014843][ T326] dentry_unlink_inode+0x389/0x460 [ 38.019788][ T326] __dentry_kill+0x207/0x640 [ 38.024213][ T326] shrink_dentry_list+0x315/0x510 [ 38.029084][ T326] shrink_dcache_parent+0xce/0x340 [ 38.034018][ T326] do_one_tree+0x27/0xf0 [ 38.038099][ T326] shrink_dcache_for_umount+0xa3/0x140 [ 38.043393][ T326] generic_shutdown_super+0x69/0x300 [ 38.048513][ T326] kill_anon_super+0x46/0x1e0 [ 38.053025][ T326] kill_litter_super+0x56/0x60 [ 38.057627][ T326] binderfs_kill_super+0x41/0x60 [ 38.062425][ T326] deactivate_locked_super+0xd8/0x290 [ 38.067618][ T326] deactivate_super+0xc6/0xf0 [ 38.072123][ T326] cleanup_mnt+0x42d/0x4d0 [ 38.076375][ T326] __cleanup_mnt+0x19/0x20 [ 38.080713][ T326] task_work_run+0x252/0x2e0 [ 38.085139][ T326] do_exit+0xb39/0x2ab0 [ 38.089140][ T326] do_group_exit+0x21b/0x2d0 [ 38.093558][ T326] get_signal+0x1553/0x1690 [ 38.097899][ T326] arch_do_signal_or_restart+0x92/0x7d0 [ 38.103366][ T326] syscall_exit_to_user_mode+0x5f/0x110 [ 38.108748][ T326] do_syscall_64+0x5c/0x110 [ 38.113100][ T326] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 38.118817][ T326] [ 38.120985][ T326] The buggy address belongs to the object at ffff888105714e00 [ 38.120985][ T326] which belongs to the cache kmalloc-192 of size 192 [ 38.135091][ T326] The buggy address is located 8 bytes inside of [ 38.135091][ T326] freed 192-byte region [ffff888105714e00, ffff888105714ec0) [ 38.148579][ T326] [ 38.150713][ T326] The buggy address belongs to the physical page: [ 38.156958][ T326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105714 [ 38.165640][ T326] flags: 0x4000000000000000(zone=1) [ 38.170670][ T326] page_type: f5(slab) [ 38.174506][ T326] raw: 4000000000000000 ffff8881000413c0 ffffea00040ad280 0000000000000002 [ 38.182920][ T326] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 38.191327][ T326] page dumped because: kasan: bad access detected [ 38.197603][ T326] page_owner tracks the page as allocated [ 38.203136][ T326] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x52cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 1, tgid 1 (swapper/0), ts 3605953348, free_ts 0 [ 38.220501][ T326] post_alloc_hook+0x1db/0x200 [ 38.225176][ T326] get_page_from_freelist+0x47ee/0x4880 [ 38.230565][ T326] __alloc_frozen_pages_noprof+0x3c3/0x7d0 [ 38.236200][ T326] allocate_slab+0x76/0x420 [ 38.240537][ T326] ___slab_alloc+0x767/0xc00 [ 38.245052][ T326] __slab_alloc+0x5d/0xb0 [ 38.249221][ T326] __kmalloc_node_track_caller_noprof+0x210/0x3f0 [ 38.255560][ T326] krealloc_noprof+0x104/0x2d0 [ 38.260258][ T326] add_sysfs_param+0xcd/0x7e0 [ 38.264774][ T326] kernel_add_sysfs_param+0xb2/0x140 [ 38.269900][ T326] param_sysfs_builtin+0x1d3/0x290 [ 38.274853][ T326] param_sysfs_builtin_init+0x32/0x40 [ 38.280049][ T326] do_one_initcall+0x18a/0x730 [ 38.284661][ T326] do_initcall_level+0x186/0x310 [ 38.289422][ T326] do_initcalls+0x76/0xe0 [ 38.293589][ T326] do_basic_setup+0x87/0xa0 [ 38.297962][ T326] page_owner free stack trace missing [ 38.303137][ T326] [ 38.305305][ T326] Memory state around the buggy address: [ 38.310789][ T326] ffff888105714d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.318674][ T326] ffff888105714d80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.326582][ T326] >ffff888105714e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.334466][ T326] ^ [ 38.338634][ T326] ffff888105714e80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.346537][ T326] ffff888105714f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.354435][ T326] ================================================================== [ 38.365144][ T326] Disabling lock debugging due to kernel taint [ 38.391204][ T44] bridge_slave_1: left allmulticast mode [ 38.391465][ T326] syz-executor (326) used greatest stack depth: 20856 bytes left [ 38.403015][ T44] bridge_slave_1: left promiscuous mode [ 38.409749][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.417721][ T44] bridge_slave_0: left allmulticast mode [ 38.424661][ T44] bridge_slave_0: left promiscuous mode [ 38.430109][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.576775][ T44] veth1_macvtap: left promiscuous mode [ 38.582411][ T44] veth0_vlan: left promiscuous mode 2025/02/10 10:34:50 executed programs: 0 [ 39.531361][ T376] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.538422][ T376] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.545380][ T376] bridge_slave_0: entered allmulticast mode [ 39.551513][ T376] bridge_slave_0: entered promiscuous mode [ 39.558520][ T376] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.565598][ T376] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.572341][ T376] bridge_slave_1: entered allmulticast mode [ 39.578537][ T376] bridge_slave_1: entered promiscuous mode [ 39.628865][ T376] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.635737][ T376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.642828][ T376] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.649634][ T376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.671646][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.679703][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.688909][ T40] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.695877][ T40] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.704680][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.711542][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.737450][ T376] veth0_vlan: entered promiscuous mode [ 39.749179][ T376] veth1_macvtap: entered promiscuous mode [ 39.806963][ T11] bridge_slave_1: left allmulticast mode [ 39.812448][ T11] bridge_slave_1: left promiscuous mode [ 39.813077][ T376] syz-executor (376) used greatest stack depth: 20784 bytes left [ 39.818160][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.833240][ T11] bridge_slave_0: left allmulticast mode [ 39.838709][ T11] bridge_slave_0: left promiscuous mode [ 39.844477][ T11] bridge0: port 1(bridge_slave_0) entered disabled state syzkaller build log: go env (err=) GO111MODULE='auto' GOARCH='amd64' GOBIN='' GOCACHE='/syzkaller/.cache/go-build' GOENV='/syzkaller/.config/go/env' GOEXE='' GOEXPERIMENT='' GOFLAGS='' GOHOSTARCH='amd64' GOHOSTOS='linux' GOINSECURE='' GOMODCACHE='/syzkaller/jobs-2/linux/gopath/pkg/mod' GONOPROXY='' GONOSUMDB='' GOOS='linux' GOPATH='/syzkaller/jobs-2/linux/gopath' GOPRIVATE='' GOPROXY='https://proxy.golang.org,direct' GOROOT='/syzkaller/jobs-2/linux/gopath/pkg/mod/golang.org/toolchain@v0.0.1-go1.23.6.linux-amd64' GOSUMDB='sum.golang.org' GOTMPDIR='' GOTOOLCHAIN='auto' GOTOOLDIR='/syzkaller/jobs-2/linux/gopath/pkg/mod/golang.org/toolchain@v0.0.1-go1.23.6.linux-amd64/pkg/tool/linux_amd64' GOVCS='' GOVERSION='go1.23.6' GODEBUG='' GOTELEMETRY='local' GOTELEMETRYDIR='/syzkaller/.config/go/telemetry' GCCGO='gccgo' GOAMD64='v1' AR='ar' CC='gcc' CXX='g++' CGO_ENABLED='1' GOMOD='/syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/go.mod' GOWORK='' CGO_CFLAGS='-O2 -g' CGO_CPPFLAGS='' CGO_CXXFLAGS='-O2 -g' CGO_FFLAGS='-O2 -g' CGO_LDFLAGS='-O2 -g' PKG_CONFIG='pkg-config' GOGCCFLAGS='-fPIC -m64 -pthread -Wl,--no-gc-sections -fmessage-length=0 -ffile-prefix-map=/tmp/go-build660489947=/tmp/go-build -gno-record-gcc-switches' git status (err=) HEAD detached at ef44b750e8 nothing to commit, working tree clean tput: No value for $TERM and no -T specified tput: No value for $TERM and no -T specified Makefile:31: run command via tools/syz-env for best compatibility, see: Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env go list -f '{{.Stale}}' ./sys/syz-sysgen | grep -q false || go install ./sys/syz-sysgen make .descriptions tput: No value for $TERM and no -T specified tput: No value for $TERM and no -T specified Makefile:31: run command via tools/syz-env for best compatibility, see: Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env bin/syz-sysgen touch .descriptions GOOS=linux GOARCH=amd64 go build "-ldflags=-s -w -X github.com/google/syzkaller/prog.GitRevision=ef44b750e8fab8d6d5cb84920680581b13e0d470 -X 'github.com/google/syzkaller/prog.gitRevisionDate=20250207-152458'" -o ./bin/linux_amd64/syz-execprog github.com/google/syzkaller/tools/syz-execprog mkdir -p ./bin/linux_amd64 g++ -o ./bin/linux_amd64/syz-executor executor/executor.cc \ -m64 -O2 -pthread -Wall -Werror -Wparentheses -Wunused-const-variable -Wframe-larger-than=16384 -Wno-stringop-overflow -Wno-array-bounds -Wno-format-overflow -Wno-unused-but-set-variable -Wno-unused-command-line-argument -static-pie -std=c++17 -I. -Iexecutor/_include -DGOOS_linux=1 -DGOARCH_amd64=1 \ -DHOSTGOOS_linux=1 -DGIT_REVISION=\"ef44b750e8fab8d6d5cb84920680581b13e0d470\" /usr/bin/ld: /tmp/cciEk8fi.o: in function `Connection::Connect(char const*, char const*)': executor.cc:(.text._ZN10Connection7ConnectEPKcS1_[_ZN10Connection7ConnectEPKcS1_]+0x104): warning: Using 'gethostbyname' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking