Warning: Permanently added '10.128.1.45' (ED25519) to the list of known hosts. 2025/05/14 10:16:20 ignoring optional flag "sandboxArg"="0" 2025/05/14 10:16:21 parsed 1 programs [ 27.763903][ T23] audit: type=1400 audit(1747217781.190:81): avc: denied { node_bind } for pid=335 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 28.567142][ T23] audit: type=1400 audit(1747217782.000:82): avc: denied { mounton } for pid=343 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 28.569016][ T343] cgroup1: Unknown subsys name 'net' [ 28.590800][ T23] audit: type=1400 audit(1747217782.000:83): avc: denied { mount } for pid=343 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.596714][ T343] cgroup1: Unknown subsys name 'net_prio' [ 28.624836][ T343] cgroup1: Unknown subsys name 'devices' [ 28.632154][ T23] audit: type=1400 audit(1747217782.070:84): avc: denied { unmount } for pid=343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.829099][ T343] cgroup1: Unknown subsys name 'hugetlb' [ 28.834960][ T343] cgroup1: Unknown subsys name 'rlimit' [ 29.005588][ T23] audit: type=1400 audit(1747217782.430:85): avc: denied { setattr } for pid=343 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=10699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 29.029448][ T23] audit: type=1400 audit(1747217782.430:86): avc: denied { create } for pid=343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.049936][ T23] audit: type=1400 audit(1747217782.430:87): avc: denied { write } for pid=343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.057125][ T346] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 29.070426][ T23] audit: type=1400 audit(1747217782.440:88): avc: denied { read } for pid=343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.099320][ T23] audit: type=1400 audit(1747217782.440:89): avc: denied { module_request } for pid=343 comm="syz-executor" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 29.121339][ T23] audit: type=1400 audit(1747217782.440:90): avc: denied { mounton } for pid=343 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 29.190707][ T343] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.582893][ T349] request_module fs-gadgetfs succeeded, but still no fs? [ 30.279162][ T397] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.286364][ T397] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.294036][ T397] device bridge_slave_0 entered promiscuous mode [ 30.301104][ T397] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.308251][ T397] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.315640][ T397] device bridge_slave_1 entered promiscuous mode [ 30.348075][ T393] syz-executor (393) used greatest stack depth: 21632 bytes left [ 30.362147][ T397] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.369497][ T397] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.377304][ T397] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.384716][ T397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.406457][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.414622][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.422047][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.434994][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.443713][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.450943][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.460222][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.468700][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.475846][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.493003][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.503492][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.523566][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.534749][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.548129][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.564668][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.575275][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2025/05/14 10:16:24 executed programs: 0 [ 30.867963][ T416] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.875008][ T416] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.882628][ T416] device bridge_slave_0 entered promiscuous mode [ 30.889640][ T416] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.896721][ T416] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.904289][ T416] device bridge_slave_1 entered promiscuous mode [ 30.960424][ T416] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.967586][ T416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.975050][ T416] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.982108][ T416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.008183][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.016112][ T103] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.024308][ T103] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.041354][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.049799][ T103] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.057039][ T103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.064968][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.073688][ T103] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.080866][ T103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.097096][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.105223][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.123916][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.133428][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.148341][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.160774][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.171746][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.908677][ T9] device bridge_slave_1 left promiscuous mode [ 31.914990][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.922459][ T9] device bridge_slave_0 left promiscuous mode [ 31.928780][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.255503][ T439] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.263083][ T439] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.271067][ T439] device bridge_slave_0 entered promiscuous mode [ 46.278331][ T439] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.285694][ T439] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.293471][ T439] device bridge_slave_1 entered promiscuous mode [ 46.336469][ T439] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.343519][ T439] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.351067][ T439] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.358416][ T439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.381746][ T103] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.389414][ T103] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.397325][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.405329][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.415080][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.423595][ T103] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.430765][ T103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.440068][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.448600][ T103] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.455695][ T103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.469477][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.479085][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.495288][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.507427][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.520494][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.533407][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 2025/05/14 10:16:40 executed programs: 3 [ 46.544141][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.568129][ T439] ================================================================== [ 46.576272][ T439] BUG: KASAN: use-after-free in __mutex_lock+0xace/0xe30 [ 46.583457][ T439] Read of size 4 at addr ffff8881ed6c5eb8 by task syz-executor/439 [ 46.591481][ T439] [ 46.593815][ T439] CPU: 1 PID: 439 Comm: syz-executor Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 46.603772][ T439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 46.613905][ T439] Call Trace: [ 46.617335][ T439] __dump_stack+0x1e/0x20 [ 46.621769][ T439] dump_stack+0x15b/0x1b8 [ 46.626354][ T439] ? vprintk_default+0x28/0x30 [ 46.631223][ T439] ? show_regs_print_info+0x18/0x18 [ 46.637290][ T439] ? printk+0xcc/0x110 [ 46.641608][ T439] ? __mutex_lock+0xace/0xe30 [ 46.646450][ T439] print_address_description+0x8d/0x4c0 [ 46.652002][ T439] ? __mutex_lock+0xace/0xe30 [ 46.656811][ T439] __kasan_report+0xef/0x120 [ 46.661543][ T439] ? __mutex_lock+0xace/0xe30 [ 46.666304][ T439] kasan_report+0x30/0x60 [ 46.670631][ T439] __asan_report_load4_noabort+0x14/0x20 [ 46.676435][ T439] __mutex_lock+0xace/0xe30 [ 46.681195][ T439] ? __kasan_check_write+0x14/0x20 [ 46.686307][ T439] ? kobject_get_unless_zero+0x15e/0x1e0 [ 46.691944][ T439] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 46.698744][ T439] ? mutex_lock+0x8c/0xe0 [ 46.703164][ T439] ? disk_check_events+0x5c0/0x5c0 [ 46.708272][ T439] __mutex_lock_killable_slowpath+0xe/0x10 [ 46.714327][ T439] mutex_lock_killable+0xd3/0xe0 [ 46.719262][ T439] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 46.725809][ T439] ? __kasan_check_write+0x14/0x20 [ 46.731388][ T439] ? kobject_get+0xd3/0x120 [ 46.735899][ T439] lo_open+0x1d/0xc0 [ 46.739920][ T439] __blkdev_get+0x610/0x1560 [ 46.744509][ T439] ? blkdev_get+0x380/0x380 [ 46.749007][ T439] ? _raw_spin_lock+0x8e/0xe0 [ 46.753702][ T439] ? _raw_spin_trylock_bh+0x130/0x130 [ 46.759081][ T439] ? __fsnotify_parent+0x310/0x310 [ 46.764417][ T439] blkdev_get+0x68/0x380 [ 46.768978][ T439] ? bd_acquire+0x30a/0x340 [ 46.773590][ T439] blkdev_open+0x1cb/0x2b0 [ 46.778102][ T439] ? block_ioctl+0x100/0x100 [ 46.782924][ T439] do_dentry_open+0x8b5/0x1030 [ 46.787855][ T439] ? finish_open+0xd0/0xd0 [ 46.792290][ T439] ? inode_permission+0xed/0x540 [ 46.797505][ T439] vfs_open+0x73/0x80 [ 46.801495][ T439] path_openat+0x2a5e/0x35c0 [ 46.806163][ T439] ? kmem_cache_alloc+0xe2/0x270 [ 46.811209][ T439] ? getname_flags+0xb9/0x500 [ 46.816579][ T439] ? getname+0x19/0x20 [ 46.821097][ T439] ? do_filp_open+0x3f0/0x3f0 [ 46.826147][ T439] do_filp_open+0x1ae/0x3f0 [ 46.830804][ T439] ? vfs_tmpfile+0x2c0/0x2c0 [ 46.835406][ T439] ? get_unused_fd_flags+0x93/0xa0 [ 46.840598][ T439] do_sys_open+0x2bb/0x5d0 [ 46.845293][ T439] ? file_open_root+0x2b0/0x2b0 [ 46.850300][ T439] ? debug_smp_processor_id+0x1c/0x20 [ 46.855676][ T439] __x64_sys_openat+0xa2/0xb0 [ 46.860341][ T439] do_syscall_64+0xcf/0x170 [ 46.864847][ T439] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 46.870859][ T439] RIP: 0033:0x7f134ac96251 [ 46.875278][ T439] Code: 75 57 89 f0 25 00 00 41 00 3d 00 00 41 00 74 49 80 3d fa 72 1f 00 00 74 6d 89 da 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 93 00 00 00 48 8b 54 24 28 64 48 2b 14 25 [ 46.895050][ T439] RSP: 002b:00007ffd6730ed20 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 [ 46.903454][ T439] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f134ac96251 [ 46.911527][ T439] RDX: 0000000000000002 RSI: 00007ffd6730ee30 RDI: 00000000ffffff9c [ 46.919508][ T439] RBP: 00007ffd6730ee30 R08: 000000000000000a R09: 00007ffd6730eae7 [ 46.927468][ T439] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [ 46.936767][ T439] R13: 00007f134ae86260 R14: 0000000000000003 R15: 00007ffd6730ee30 [ 46.944978][ T439] [ 46.947639][ T439] Allocated by task 435: [ 46.951884][ T439] __kasan_kmalloc+0x162/0x200 [ 46.956639][ T439] kasan_slab_alloc+0x12/0x20 [ 46.961310][ T439] kmem_cache_alloc+0xe2/0x270 [ 46.966409][ T439] dup_task_struct+0x57/0x640 [ 46.971499][ T439] copy_process+0x503/0x2cf0 [ 46.976423][ T439] _do_fork+0x190/0x860 [ 46.980578][ T439] __x64_sys_clone3+0x1de/0x1f0 [ 46.985595][ T439] do_syscall_64+0xcf/0x170 [ 46.990201][ T439] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 46.996171][ T439] [ 46.998491][ T439] Freed by task 17: [ 47.002290][ T439] __kasan_slab_free+0x1c3/0x280 [ 47.007235][ T439] kasan_slab_free+0xe/0x10 [ 47.011747][ T439] slab_free_freelist_hook+0xb7/0x180 [ 47.017104][ T439] kmem_cache_free+0x10c/0x2c0 [ 47.021872][ T439] free_task+0xe9/0x150 [ 47.026024][ T439] __put_task_struct+0x2b7/0x420 [ 47.030942][ T439] delayed_put_task_struct+0x71/0x210 [ 47.036338][ T439] rcu_do_batch+0x446/0x980 [ 47.040980][ T439] rcu_core+0x4bd/0xbd0 [ 47.045411][ T439] rcu_core_si+0x9/0x10 [ 47.049553][ T439] __do_softirq+0x236/0x660 [ 47.054042][ T439] [ 47.056423][ T439] The buggy address belongs to the object at ffff8881ed6c5e80 [ 47.056423][ T439] which belongs to the cache task_struct of size 3904 [ 47.071191][ T439] The buggy address is located 56 bytes inside of [ 47.071191][ T439] 3904-byte region [ffff8881ed6c5e80, ffff8881ed6c6dc0) [ 47.084530][ T439] The buggy address belongs to the page: [ 47.090473][ T439] page:ffffea0007b5b000 refcount:1 mapcount:0 mapping:ffff8881f5cf5180 index:0x0 compound_mapcount: 0 [ 47.101477][ T439] flags: 0x8000000000010200(slab|head) [ 47.107230][ T439] raw: 8000000000010200 dead000000000100 dead000000000122 ffff8881f5cf5180 [ 47.115969][ T439] raw: 0000000000000000 0000000080080008 00000001ffffffff 0000000000000000 [ 47.124705][ T439] page dumped because: kasan: bad access detected [ 47.131209][ T439] page_owner tracks the page as allocated [ 47.137392][ T439] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL) [ 47.154828][ T439] prep_new_page+0x35e/0x370 [ 47.159496][ T439] get_page_from_freelist+0x1296/0x1310 [ 47.165033][ T439] __alloc_pages_nodemask+0x202/0x4b0 [ 47.170862][ T439] alloc_slab_page+0x3c/0x3b0 [ 47.175634][ T439] new_slab+0x93/0x420 [ 47.179780][ T439] ___slab_alloc+0x29e/0x420 [ 47.184393][ T439] __slab_alloc+0x63/0xa0 [ 47.188903][ T439] kmem_cache_alloc+0x12c/0x270 [ 47.194004][ T439] dup_task_struct+0x57/0x640 [ 47.198781][ T439] copy_process+0x503/0x2cf0 [ 47.203347][ T439] _do_fork+0x190/0x860 [ 47.207502][ T439] kernel_thread+0x6f/0x90 [ 47.212112][ T439] kthreadd+0x354/0x480 [ 47.216505][ T439] ret_from_fork+0x1f/0x30 [ 47.220910][ T439] page last free stack trace: [ 47.225580][ T439] __free_pages_ok+0x7e4/0x910 [ 47.231114][ T439] __free_pages+0x8c/0x110 [ 47.235617][ T439] kfree+0x1ca/0x260 [ 47.240023][ T439] can_pernet_exit+0x75/0xd0 [ 47.244781][ T439] cleanup_net+0x588/0xb40 [ 47.249310][ T439] process_one_work+0x73b/0xcc0 [ 47.254607][ T439] worker_thread+0xa5c/0x13b0 [ 47.259663][ T439] kthread+0x31e/0x3a0 [ 47.264050][ T439] ret_from_fork+0x1f/0x30 [ 47.268882][ T439] [ 47.271190][ T439] Memory state around the buggy address: [ 47.276825][ T439] ffff8881ed6c5d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.284988][ T439] ffff8881ed6c5e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.293605][ T439] >ffff8881ed6c5e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.302163][ T439] ^ [ 47.308142][ T439] ffff8881ed6c5f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.316300][ T439] ffff8881ed6c5f80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.324878][ T439] ================================================================== [ 47.333839][ T439] Disabling lock debugging due to kernel taint