cheduled to be removed in 2025, please contact the netdev mailing list Warning: Permanently added '10.128.1.184' (ED25519) to the list of known hosts. 2023/10/30 14:34:07 ignoring optional flag "sandboxArg"="0" 2023/10/30 14:34:08 parsed 1 programs [ 56.129668][ T25] kauditd_printk_skb: 78 callbacks suppressed [ 56.129675][ T25] audit: type=1400 audit(1698676448.039:168): avc: denied { getattr } for pid=3262 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 56.160133][ T25] audit: type=1400 audit(1698676448.039:169): avc: denied { read } for pid=3262 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 56.181997][ T25] audit: type=1400 audit(1698676448.039:170): avc: denied { open } for pid=3262 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 56.205950][ T25] audit: type=1400 audit(1698676448.039:171): avc: denied { mounton } for pid=3267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 56.231186][ T25] audit: type=1400 audit(1698676448.039:172): avc: denied { mount } for pid=3267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2023/10/30 14:34:08 executed programs: 0 [ 56.254808][ T25] audit: type=1400 audit(1698676448.089:173): avc: denied { unlink } for pid=3267 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 56.282868][ T3267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k FS [ 56.317508][ T25] audit: type=1400 audit(1698676448.219:174): avc: denied { mounton } for pid=3277 comm="syz-executor.4" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 58.737627][ T25] audit: type=1400 audit(1698676450.639:175): avc: denied { write } for pid=3277 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 58.774867][ T25] audit: type=1400 audit(1698676450.649:176): avc: denied { read } for pid=3277 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 64.289600][ T3277] veth0_vlan: entered promiscuous mode [ 64.394163][ T3293] veth0_vlan: entered promiscuous mode [ 64.518259][ T3282] veth0_vlan: entered promiscuous mode [ 64.672259][ T3295] veth0_vlan: entered promiscuous mode [ 64.755693][ T3287] veth0_vlan: entered promiscuous mode [ 64.938202][ T3290] veth0_vlan: entered promiscuous mode 2023/10/30 14:34:18 executed programs: 6 [ 66.663788][ T25] audit: type=1400 audit(1698676458.569:177): avc: denied { ioctl } for pid=4347 comm="syz-executor.4" path="/dev/iommu" dev="devtmpfs" ino=109 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 69.272080][ T5172] ================================================================== [ 69.280340][ T5172] BUG: KASAN: slab-use-after-free in __up_read+0x330/0x3a0 [ 69.288837][ T5172] Read of size 8 at addr ffff88807b65c068 by task syz-executor.4/5172 [ 69.297856][ T5172] [ 69.300183][ T5172] CPU: 0 PID: 5172 Comm: syz-executor.4 Not tainted 6.5.0-rc3-syzkaller #0 [ 69.308947][ T5172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 69.319268][ T5172] Call Trace: [ 69.322555][ T5172] [ 69.325927][ T5172] dump_stack_lvl+0x3d/0x60 [ 69.330524][ T5172] print_report+0xc4/0x620 [ 69.335208][ T5172] kasan_report+0xda/0x110 [ 69.339805][ T5172] ? __up_read+0x330/0x3a0 [ 69.344306][ T5172] ? __up_read+0x330/0x3a0 [ 69.349016][ T5172] __up_read+0x330/0x3a0 [ 69.353348][ T5172] ? up_write+0x210/0x210 [ 69.357677][ T5172] iommufd_vfio_ioas+0x3cf/0x4e0 [ 69.363335][ T5172] iommufd_fops_ioctl+0x27a/0x3b0 [ 69.368661][ T5172] ? reacquire_held_locks+0x380/0x380 [ 69.374034][ T5172] ? iommufd_option+0x180/0x180 [ 69.378984][ T5172] ? lock_acquire+0x12a/0x2b0 [ 69.384012][ T5172] ? security_file_ioctl+0x5f/0x90 [ 69.389300][ T5172] __x64_sys_ioctl+0x12b/0x1a0 [ 69.394236][ T5172] do_syscall_64+0x38/0xb0 [ 69.398673][ T5172] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 69.405008][ T5172] RIP: 0033:0x7ff09967cae9 [ 69.409691][ T5172] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 69.431551][ T5172] RSP: 002b:00007ff09a41b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 69.440938][ T5172] RAX: ffffffffffffffda RBX: 00007ff09979c120 RCX: 00007ff09967cae9 [ 69.449435][ T5172] RDX: 0000000020000080 RSI: 0000000000003b88 RDI: 0000000000000003 [ 69.457718][ T5172] RBP: 00007ff0996c847a R08: 0000000000000000 R09: 0000000000000000 [ 69.466686][ T5172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 69.475004][ T5172] R13: 000000000000000b R14: 00007ff09979c120 R15: 00007ffd11ca11e8 [ 69.488343][ T5172] [ 69.491358][ T5172] [ 69.493879][ T5172] Allocated by task 5170: [ 69.498193][ T5172] kasan_save_stack+0x33/0x50 [ 69.502874][ T5172] kasan_set_track+0x25/0x30 [ 69.507458][ T5172] __kasan_kmalloc+0xa3/0xb0 [ 69.512571][ T5172] __kmalloc+0x5d/0x160 [ 69.516820][ T5172] _iommufd_object_alloc+0x1b/0x140 [ 69.522285][ T5172] iommufd_ioas_alloc_ioctl+0x9c/0x310 [ 69.528091][ T5172] iommufd_fops_ioctl+0x27a/0x3b0 [ 69.533597][ T5172] __x64_sys_ioctl+0x12b/0x1a0 [ 69.538447][ T5172] do_syscall_64+0x38/0xb0 [ 69.542957][ T5172] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 69.549260][ T5172] [ 69.552092][ T5172] Freed by task 5173: [ 69.558307][ T5172] kasan_save_stack+0x33/0x50 [ 69.564239][ T5172] kasan_set_track+0x25/0x30 [ 69.569351][ T5172] kasan_save_free_info+0x28/0x40 [ 69.575156][ T5172] ____kasan_slab_free+0x13f/0x190 [ 69.580440][ T5172] __kmem_cache_free+0xbb/0x2c0 [ 69.585413][ T5172] iommufd_destroy+0xf5/0x140 [ 69.590453][ T5172] iommufd_fops_ioctl+0x27a/0x3b0 [ 69.595883][ T5172] __x64_sys_ioctl+0x12b/0x1a0 [ 69.601876][ T5172] do_syscall_64+0x38/0xb0 [ 69.607199][ T5172] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 69.613109][ T5172] [ 69.615437][ T5172] The buggy address belongs to the object at ffff88807b65c000 [ 69.615437][ T5172] which belongs to the cache kmalloc-cg-1k of size 1024 [ 69.630784][ T5172] The buggy address is located 104 bytes inside of [ 69.630784][ T5172] freed 1024-byte region [ffff88807b65c000, ffff88807b65c400) [ 69.645526][ T5172] [ 69.649074][ T5172] The buggy address belongs to the physical page: [ 69.655490][ T5172] page:ffffea0001ed9700 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7b65c [ 69.666474][ T5172] memcg:ffff888069608641 [ 69.670824][ T5172] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 69.679407][ T5172] page_type: 0x2() [ 69.683293][ T5172] raw: 00fff00000000200 ffff88800a84d800 ffffea0001a04f50 ffffea000077fbd0 [ 69.691965][ T5172] raw: 0000000000000000 ffff88807b65c000 0000000100000002 ffff888069608641 [ 69.700802][ T5172] page dumped because: kasan: bad access detected [ 69.707364][ T5172] page_owner tracks the page as allocated [ 69.713243][ T5172] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x3420c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_COMP|__GFP_HARDWALL|__GFP_THISNODE), pid 4418, tgid 4417 (syz-executor.3), ts 67178753666, free_ts 67160033050 [ 69.735021][ T5172] post_alloc_hook+0x281/0x2f0 [ 69.739785][ T5172] get_page_from_freelist+0xfcb/0x31e0 [ 69.745253][ T5172] __alloc_pages+0x1d0/0x470 [ 69.750012][ T5172] cache_grow_begin+0x7c/0x330 [ 69.754777][ T5172] cache_alloc_refill+0x286/0x350 [ 69.759794][ T5172] __kmem_cache_alloc_node+0x383/0x3d0 [ 69.765437][ T5172] __kmalloc+0x4c/0x160 [ 69.769687][ T5172] _iommufd_object_alloc+0x1b/0x140 [ 69.774941][ T5172] iommufd_ioas_alloc_ioctl+0x9c/0x310 [ 69.780496][ T5172] iommufd_fops_ioctl+0x27a/0x3b0 [ 69.785866][ T5172] __x64_sys_ioctl+0x12b/0x1a0 [ 69.790626][ T5172] do_syscall_64+0x38/0xb0 [ 69.795044][ T5172] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 69.801036][ T5172] page last free stack trace: [ 69.805878][ T5172] free_unref_page_prepare+0x5aa/0xc40 [ 69.811431][ T5172] free_unref_page+0x33/0x350 [ 69.816376][ T5172] slabs_destroy+0x85/0xc0 [ 69.820874][ T5172] ___cache_free+0x297/0x3b0 [ 69.825591][ T5172] qlist_free_all+0x71/0x1a0 [ 69.830268][ T5172] kasan_quarantine_reduce+0x17d/0x1b0 [ 69.835891][ T5172] __kasan_slab_alloc+0x65/0x90 [ 69.841081][ T5172] kmem_cache_alloc+0x1d6/0x3d0 [ 69.846099][ T5172] getname_flags.part.0+0x4a/0x430 [ 69.851294][ T5172] do_sys_openat2+0xe8/0x170 [ 69.855886][ T5172] __x64_sys_openat+0x134/0x1d0 [ 69.860992][ T5172] do_syscall_64+0x38/0xb0 [ 69.865573][ T5172] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 69.871735][ T5172] [ 69.874052][ T5172] Memory state around the buggy address: [ 69.879936][ T5172] ffff88807b65bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.888600][ T5172] ffff88807b65bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.896927][ T5172] >ffff88807b65c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 69.905433][ T5172] ^ [ 69.913784][ T5172] ffff88807b65c080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 69.922100][ T5172] ffff88807b65c100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 69.930510][ T5172] ================================================================== [ 69.946433][ T25] audit: type=1400 audit(1698676461.849:178): avc: denied { remove_name } for pid=2671 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 69.997984][ T5172] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 70.005828][ T5172] Kernel Offset: disabled [ 70.010325][ T5172] Rebooting in 86400 seconds..