Warning: Permanently added '10.128.0.73' (ED25519) to the list of known hosts. executing program [ 35.479776][ T28] audit: type=1400 audit(1699666921.643:66): avc: denied { execmem } for pid=303 comm="syz-executor366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 38.100972][ T445] ================================================================== [ 38.108860][ T445] BUG: KASAN: use-after-free in unix_stream_read_actor+0xa3/0xb0 [ 38.116410][ T445] Read of size 4 at addr ffff888109da2a44 by task syz-executor366/445 [ 38.124393][ T445] [ 38.126563][ T445] CPU: 1 PID: 445 Comm: syz-executor366 Not tainted 6.1.43-syzkaller-00006-g48c6c901fe0e #0 [ 38.136460][ T445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 38.146352][ T445] Call Trace: [ 38.149650][ T445] [ 38.152427][ T445] dump_stack_lvl+0x151/0x1b7 [ 38.156948][ T445] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 38.162235][ T445] ? _printk+0xd1/0x111 [ 38.166229][ T445] ? __virt_addr_valid+0x242/0x2f0 [ 38.171177][ T445] print_report+0x158/0x4e0 [ 38.175525][ T445] ? __virt_addr_valid+0x242/0x2f0 [ 38.180467][ T445] ? kasan_complete_mode_report_info+0x90/0x1b0 [ 38.186542][ T445] ? unix_stream_read_actor+0xa3/0xb0 [ 38.191743][ T445] kasan_report+0x13c/0x170 [ 38.196092][ T445] ? unix_stream_read_actor+0xa3/0xb0 [ 38.201290][ T445] __asan_report_load4_noabort+0x14/0x20 [ 38.206758][ T445] unix_stream_read_actor+0xa3/0xb0 [ 38.211792][ T445] unix_stream_recv_urg+0x1b4/0x300 [ 38.216828][ T445] unix_stream_read_generic+0x2140/0x2220 [ 38.222378][ T445] ? avc_denied+0x1b0/0x1b0 [ 38.226726][ T445] ? avc_has_perm+0x16f/0x260 [ 38.231232][ T445] ? avc_has_perm_noaudit+0x430/0x430 [ 38.236442][ T445] ? unix_stream_read_actor+0xb0/0xb0 [ 38.241647][ T445] ? selinux_socket_recvmsg+0x243/0x340 [ 38.247033][ T445] ? selinux_socket_sendmsg+0x340/0x340 [ 38.252409][ T445] unix_stream_recvmsg+0x222/0x2b0 [ 38.257358][ T445] ? unix_stream_sendmsg+0x1070/0x1070 [ 38.262649][ T445] ? __unix_stream_recvmsg+0x210/0x210 [ 38.267946][ T445] ? __import_iovec+0x24f/0x430 [ 38.272632][ T445] ? security_socket_recvmsg+0x87/0xb0 [ 38.277928][ T445] ? unix_stream_sendmsg+0x1070/0x1070 [ 38.283222][ T445] ____sys_recvmsg+0x285/0x530 [ 38.287824][ T445] ? __sys_recvmsg_sock+0x50/0x50 [ 38.292688][ T445] __sys_recvmsg+0x2e9/0x3d0 [ 38.297110][ T445] ? __kasan_check_write+0x14/0x20 [ 38.302057][ T445] ? ____sys_recvmsg+0x530/0x530 [ 38.306829][ T445] ? __set_current_blocked+0x2a5/0x2f0 [ 38.312124][ T445] ? __kasan_check_write+0x14/0x20 [ 38.317080][ T445] ? __se_sys_rt_sigprocmask+0x30a/0x380 [ 38.322539][ T445] ? debug_smp_processor_id+0x17/0x20 [ 38.327749][ T445] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 38.333648][ T445] __x64_sys_recvmsg+0x7f/0x90 [ 38.338246][ T445] do_syscall_64+0x3d/0xb0 [ 38.342499][ T445] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 38.348228][ T445] RIP: 0033:0x7f5e75189989 [ 38.352481][ T445] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 1b 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 38.371951][ T445] RSP: 002b:00007f5e75100228 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 38.380167][ T445] RAX: ffffffffffffffda RBX: 0000000000000023 RCX: 00007f5e75189989 [ 38.387980][ T445] RDX: 0000000040010083 RSI: 0000000020000140 RDI: 0000000000000004 [ 38.395793][ T445] RBP: 00007f5e7520c408 R08: 00007f5e751006c0 R09: 00007f5e751006c0 [ 38.403607][ T445] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5e7520c400 [ 38.411416][ T445] R13: 00007f5e7520c40c R14: 00007ffe5b635d80 R15: 00007ffe5b635e68 [ 38.419235][ T445] [ 38.422088][ T445] [ 38.424262][ T445] Allocated by task 444: [ 38.428339][ T445] kasan_set_track+0x4b/0x70 [ 38.432766][ T445] kasan_save_alloc_info+0x1f/0x30 [ 38.437711][ T445] __kasan_slab_alloc+0x6c/0x80 [ 38.442397][ T445] slab_post_alloc_hook+0x53/0x2c0 [ 38.447345][ T445] kmem_cache_alloc_node+0x18a/0x2d0 [ 38.452470][ T445] __alloc_skb+0xcc/0x2e0 [ 38.456633][ T445] alloc_skb_with_frags+0xa6/0x680 [ 38.461579][ T445] sock_alloc_send_pskb+0x915/0xa50 [ 38.466615][ T445] queue_oob+0x102/0x8e0 [ 38.470693][ T445] unix_stream_sendmsg+0xe10/0x1070 [ 38.475726][ T445] ____sys_sendmsg+0x5dc/0x9d0 [ 38.480327][ T445] __sys_sendmsg+0x2a9/0x390 [ 38.484752][ T445] __x64_sys_sendmsg+0x7f/0x90 [ 38.489353][ T445] do_syscall_64+0x3d/0xb0 [ 38.493604][ T445] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 38.499331][ T445] [ 38.501509][ T445] Freed by task 444: [ 38.505233][ T445] kasan_set_track+0x4b/0x70 [ 38.509662][ T445] kasan_save_free_info+0x2b/0x40 [ 38.514524][ T445] ____kasan_slab_free+0x131/0x180 [ 38.519470][ T445] __kasan_slab_free+0x11/0x20 [ 38.524070][ T445] kmem_cache_free+0x291/0x510 [ 38.528671][ T445] kfree_skbmem+0x104/0x170 [ 38.533011][ T445] consume_skb+0xb4/0x250 [ 38.537175][ T445] queue_oob+0x52c/0x8e0 [ 38.541252][ T445] unix_stream_sendmsg+0xe10/0x1070 [ 38.546286][ T445] ____sys_sendmsg+0x5dc/0x9d0 [ 38.550887][ T445] __sys_sendmsg+0x2a9/0x390 [ 38.555316][ T445] __x64_sys_sendmsg+0x7f/0x90 [ 38.559918][ T445] do_syscall_64+0x3d/0xb0 [ 38.564167][ T445] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 38.569894][ T445] [ 38.572063][ T445] The buggy address belongs to the object at ffff888109da2a00 [ 38.572063][ T445] which belongs to the cache skbuff_head_cache of size 256 [ 38.586472][ T445] The buggy address is located 68 bytes inside of [ 38.586472][ T445] 256-byte region [ffff888109da2a00, ffff888109da2b00) [ 38.599580][ T445] [ 38.601751][ T445] The buggy address belongs to the physical page: [ 38.608005][ T445] page:ffffea0004276880 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109da2 [ 38.618064][ T445] flags: 0x4000000000000200(slab|zone=1) [ 38.623541][ T445] raw: 4000000000000200 0000000000000000 dead000000000122 ffff888100b91800 [ 38.631964][ T445] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 [ 38.641413][ T445] page dumped because: kasan: bad access detected [ 38.647665][ T445] page_owner tracks the page as allocated [ 38.653216][ T445] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 444, tgid 442 (syz-executor366), ts 38100870369, free_ts 37664742630 [ 38.671621][ T445] post_alloc_hook+0x213/0x220 [ 38.676215][ T445] prep_new_page+0x1b/0x110 [ 38.680553][ T445] get_page_from_freelist+0x2878/0x2910 [ 38.685934][ T445] __alloc_pages+0x3a1/0x780 [ 38.690361][ T445] new_slab+0xce/0x4c0 [ 38.694275][ T445] ___slab_alloc+0x6f9/0xb80 [ 38.698693][ T445] __slab_alloc+0x5d/0xa0 [ 38.702860][ T445] kmem_cache_alloc_node+0x1c9/0x2d0 [ 38.707979][ T445] __alloc_skb+0xcc/0x2e0 [ 38.712147][ T445] alloc_skb_with_frags+0xa6/0x680 [ 38.717094][ T445] sock_alloc_send_pskb+0x915/0xa50 [ 38.722126][ T445] queue_oob+0x102/0x8e0 [ 38.726209][ T445] unix_stream_sendmsg+0xe10/0x1070 [ 38.731241][ T445] ____sys_sendmsg+0x5dc/0x9d0 [ 38.735843][ T445] __sys_sendmsg+0x2a9/0x390 [ 38.740265][ T445] __x64_sys_sendmsg+0x7f/0x90 [ 38.744866][ T445] page last free stack trace: [ 38.749379][ T445] free_unref_page_prepare+0x83d/0x850 [ 38.754672][ T445] free_unref_page_list+0xf6/0x6c0 [ 38.759620][ T445] release_pages+0xf7f/0xfe0 [ 38.764047][ T445] free_pages_and_swap_cache+0x8a/0xa0 [ 38.769342][ T445] tlb_finish_mmu+0x1e0/0x3f0 [ 38.773854][ T445] exit_mmap+0x3e5/0x8a0 [ 38.777936][ T445] __mmput+0x95/0x310 [ 38.781753][ T445] mmput+0x56/0x170 [ 38.785397][ T445] do_exit+0xb29/0x2b80 [ 38.789391][ T445] do_group_exit+0x21a/0x2d0 [ 38.793820][ T445] get_signal+0x169d/0x1820 [ 38.798159][ T445] arch_do_signal_or_restart+0xb0/0x16f0 [ 38.803626][ T445] exit_to_user_mode_loop+0x6b/0xa0 [ 38.808662][ T445] exit_to_user_mode_prepare+0x5a/0xa0 [ 38.813954][ T445] syscall_exit_to_user_mode+0x26/0x130 [ 38.819336][ T445] do_syscall_64+0x49/0xb0 [ 38.823587][ T445] [ 38.825756][ T445] Memory state around the buggy address: [ 38.831230][ T445] ffff888109da2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.839127][ T445] ffff888109da2980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc executing program [ 38.847034][ T445] >ffff888109da2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.854923][ T445] ^ [ 38.860914][ T445] ffff888109da2a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.868810][ T445] ffff888109da2b00: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 38.876706][ T445] ================================================================== [ 38.884700][ T445] Disabling lock debugging due to kernel taint executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program