Warning: Permanently added '10.128.0.192' (ED25519) to the list of known hosts. 2025/02/09 16:48:54 ignoring optional flag "sandboxArg"="0" 2025/02/09 16:48:55 parsed 1 programs [ 22.636174][ T23] audit: type=1400 audit(1739119735.009:66): avc: denied { node_bind } for pid=349 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 23.197163][ T23] audit: type=1400 audit(1739119735.579:67): avc: denied { mounton } for pid=358 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.198784][ T358] cgroup1: Unknown subsys name 'net' [ 23.219647][ T23] audit: type=1400 audit(1739119735.579:68): avc: denied { mount } for pid=358 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.225232][ T358] cgroup1: Unknown subsys name 'net_prio' [ 23.253104][ T358] cgroup1: Unknown subsys name 'devices' [ 23.259292][ T23] audit: type=1400 audit(1739119735.639:69): avc: denied { unmount } for pid=358 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.399552][ T358] cgroup1: Unknown subsys name 'hugetlb' [ 23.405171][ T358] cgroup1: Unknown subsys name 'rlimit' [ 23.636633][ T23] audit: type=1400 audit(1739119736.009:70): avc: denied { setattr } for pid=358 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=10768 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.659817][ T23] audit: type=1400 audit(1739119736.019:71): avc: denied { create } for pid=358 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.680014][ T23] audit: type=1400 audit(1739119736.019:72): avc: denied { write } for pid=358 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.686190][ T362] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.700594][ T23] audit: type=1400 audit(1739119736.019:73): avc: denied { read } for pid=358 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.728674][ T23] audit: type=1400 audit(1739119736.019:74): avc: denied { module_request } for pid=358 comm="syz-executor" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 23.750407][ T23] audit: type=1400 audit(1739119736.019:75): avc: denied { mounton } for pid=358 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.797454][ T358] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.131650][ T369] request_module fs-gadgetfs succeeded, but still no fs? [ 24.494128][ T382] syz-executor (382) used greatest stack depth: 21112 bytes left [ 24.686021][ T398] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.693085][ T398] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.700513][ T398] device bridge_slave_0 entered promiscuous mode [ 24.707333][ T398] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.714153][ T398] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.721433][ T398] device bridge_slave_1 entered promiscuous mode [ 24.761713][ T398] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.768733][ T398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.775822][ T398] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.782625][ T398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.803836][ T180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.811316][ T180] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.818405][ T180] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.828663][ T180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.837192][ T180] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.844363][ T180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.854120][ T180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.863520][ T180] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.870359][ T180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.885420][ T180] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.895189][ T180] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.913131][ T180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.924652][ T180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.937358][ T180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.950010][ T180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.959810][ T180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.999579][ T398] syz-executor (398) used greatest stack depth: 19416 bytes left 2025/02/09 16:48:57 executed programs: 0 [ 25.366823][ T432] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.373753][ T432] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.381440][ T432] device bridge_slave_0 entered promiscuous mode [ 25.391513][ T432] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.398378][ T432] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.405512][ T432] device bridge_slave_1 entered promiscuous mode [ 25.464516][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.472287][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.484003][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.492149][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.500225][ T410] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.507051][ T410] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.514518][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.526240][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.534791][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.542838][ T410] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.549670][ T410] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.565835][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.575090][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.590108][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.607923][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.623185][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.639275][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.653412][ T410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.483129][ T9] device bridge_slave_1 left promiscuous mode [ 26.490965][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.500168][ T9] device bridge_slave_0 left promiscuous mode [ 26.506253][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.066530][ T707] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.073437][ T707] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.080684][ T707] device bridge_slave_0 entered promiscuous mode [ 44.087392][ T707] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.094212][ T707] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.101544][ T707] device bridge_slave_1 entered promiscuous mode [ 44.140250][ T707] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.147118][ T707] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.154167][ T707] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.160986][ T707] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.180690][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.187754][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.194901][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.202524][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.212641][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.221003][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.227929][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.237324][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.245361][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.252196][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.264917][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.274056][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.289402][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.300424][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.313013][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.325667][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 2025/02/09 16:49:16 executed programs: 62 [ 44.335819][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.358171][ T707] ================================================================== [ 44.366146][ T707] BUG: KASAN: use-after-free in __mutex_lock+0xcd7/0x1060 [ 44.373076][ T707] Read of size 4 at addr ffff8881e46e0ff8 by task syz-executor/707 [ 44.380786][ T707] [ 44.382968][ T707] CPU: 0 PID: 707 Comm: syz-executor Not tainted 5.4.289-syzkaller-00030-gcb850525fc3e #0 [ 44.392686][ T707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 44.402576][ T707] Call Trace: [ 44.405717][ T707] dump_stack+0x1d8/0x241 [ 44.409879][ T707] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 44.415508][ T707] ? printk+0xd1/0x111 [ 44.419416][ T707] ? __mutex_lock+0xcd7/0x1060 [ 44.424017][ T707] print_address_description+0x8c/0x600 [ 44.429396][ T707] ? check_preemption_disabled+0x9f/0x320 [ 44.434950][ T707] ? __unwind_start+0x708/0x890 [ 44.439636][ T707] ? __mutex_lock+0xcd7/0x1060 [ 44.444237][ T707] __kasan_report+0xf3/0x120 [ 44.448677][ T707] ? __mutex_lock+0xcd7/0x1060 [ 44.453270][ T707] kasan_report+0x30/0x60 [ 44.457434][ T707] __mutex_lock+0xcd7/0x1060 [ 44.461857][ T707] ? kobject_get_unless_zero+0x229/0x320 [ 44.467351][ T707] ? __ww_mutex_lock_interruptible_slowpath+0x10/0x10 [ 44.473919][ T707] ? __module_put_and_exit+0x20/0x20 [ 44.479040][ T707] ? up_read+0x6f/0x1b0 [ 44.483030][ T707] mutex_lock_killable+0xd8/0x110 [ 44.487893][ T707] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 44.494227][ T707] ? mutex_lock+0xa5/0x110 [ 44.498478][ T707] ? mutex_trylock+0xa0/0xa0 [ 44.502905][ T707] lo_open+0x18/0xc0 [ 44.506640][ T707] __blkdev_get+0x3c8/0x1160 [ 44.511064][ T707] ? blkdev_get+0x3a0/0x3a0 [ 44.515403][ T707] ? _raw_spin_unlock+0x49/0x60 [ 44.520091][ T707] blkdev_get+0x2de/0x3a0 [ 44.524255][ T707] ? blkdev_open+0x173/0x290 [ 44.528683][ T707] ? block_ioctl+0xe0/0xe0 [ 44.532934][ T707] do_dentry_open+0x964/0x1130 [ 44.537539][ T707] ? finish_open+0xd0/0xd0 [ 44.541786][ T707] ? security_inode_permission+0xad/0xf0 [ 44.547254][ T707] ? memcpy+0x38/0x50 [ 44.551072][ T707] path_openat+0x29bf/0x34b0 [ 44.555502][ T707] ? stack_trace_save+0x118/0x1c0 [ 44.560362][ T707] ? do_filp_open+0x450/0x450 [ 44.564874][ T707] ? do_sys_open+0x357/0x810 [ 44.569299][ T707] ? do_syscall_64+0xca/0x1c0 [ 44.573812][ T707] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 44.579716][ T707] do_filp_open+0x20b/0x450 [ 44.584052][ T707] ? vfs_tmpfile+0x2c0/0x2c0 [ 44.588482][ T707] ? _raw_spin_unlock+0x49/0x60 [ 44.593177][ T707] ? __alloc_fd+0x4c5/0x570 [ 44.597517][ T707] do_sys_open+0x39c/0x810 [ 44.601765][ T707] ? check_preemption_disabled+0x153/0x320 [ 44.607414][ T707] ? file_open_root+0x490/0x490 [ 44.612126][ T707] do_syscall_64+0xca/0x1c0 [ 44.616426][ T707] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 44.622171][ T707] RIP: 0033:0x7f20ab6226d1 [ 44.626473][ T707] Code: 75 57 89 f0 25 00 00 41 00 3d 00 00 41 00 74 49 80 3d 7a 1e 1f 00 00 74 6d 89 da 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 93 00 00 00 48 8b 54 24 28 64 48 2b 14 25 [ 44.645856][ T707] RSP: 002b:00007ffea3e56e50 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 [ 44.654093][ T707] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f20ab6226d1 [ 44.661903][ T707] RDX: 0000000000000002 RSI: 00007ffea3e56f60 RDI: 00000000ffffff9c [ 44.669720][ T707] RBP: 00007ffea3e56f60 R08: 000000000000000a R09: 00007ffea3e56c17 [ 44.677525][ T707] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [ 44.685339][ T707] R13: 00007f20ab80d260 R14: 0000000000000003 R15: 00007ffea3e56f60 [ 44.693148][ T707] [ 44.695315][ T707] Allocated by task 688: [ 44.699493][ T707] __kasan_kmalloc+0x171/0x210 [ 44.704085][ T707] kmem_cache_alloc+0xd9/0x250 [ 44.708771][ T707] dup_task_struct+0x4f/0x600 [ 44.713290][ T707] copy_process+0x56d/0x3230 [ 44.717711][ T707] _do_fork+0x197/0x900 [ 44.721704][ T707] __x64_sys_clone3+0x2da/0x300 [ 44.726397][ T707] do_syscall_64+0xca/0x1c0 [ 44.730728][ T707] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 44.736452][ T707] [ 44.738626][ T707] Freed by task 10: [ 44.742274][ T707] __kasan_slab_free+0x1b5/0x270 [ 44.747045][ T707] kmem_cache_free+0x10b/0x2c0 [ 44.751643][ T707] rcu_do_batch+0x492/0xa00 [ 44.755992][ T707] rcu_core+0x4c8/0xcb0 [ 44.759976][ T707] __do_softirq+0x23b/0x6b7 [ 44.764324][ T707] [ 44.766483][ T707] The buggy address belongs to the object at ffff8881e46e0fc0 [ 44.766483][ T707] which belongs to the cache task_struct of size 3904 [ 44.780475][ T707] The buggy address is located 56 bytes inside of [ 44.780475][ T707] 3904-byte region [ffff8881e46e0fc0, ffff8881e46e1f00) [ 44.793562][ T707] The buggy address belongs to the page: [ 44.799047][ T707] page:ffffea000791b800 refcount:1 mapcount:0 mapping:ffff8881f5cf1400 index:0x0 compound_mapcount: 0 [ 44.809792][ T707] flags: 0x8000000000010200(slab|head) [ 44.815098][ T707] raw: 8000000000010200 dead000000000100 dead000000000122 ffff8881f5cf1400 [ 44.823510][ T707] raw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000 [ 44.831921][ T707] page dumped because: kasan: bad access detected [ 44.838181][ T707] page_owner tracks the page as allocated [ 44.843754][ T707] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL) [ 44.859967][ T707] prep_new_page+0x18f/0x370 [ 44.864391][ T707] get_page_from_freelist+0x2d13/0x2d90 [ 44.869773][ T707] __alloc_pages_nodemask+0x393/0x840 [ 44.875009][ T707] alloc_slab_page+0x39/0x3c0 [ 44.879487][ T707] new_slab+0x97/0x440 [ 44.883390][ T707] ___slab_alloc+0x2fe/0x490 [ 44.887827][ T707] __slab_alloc+0x62/0xa0 [ 44.891985][ T707] kmem_cache_alloc+0x109/0x250 [ 44.896669][ T707] dup_task_struct+0x4f/0x600 [ 44.901183][ T707] copy_process+0x56d/0x3230 [ 44.905608][ T707] _do_fork+0x197/0x900 [ 44.909600][ T707] __x64_sys_clone+0x26b/0x2c0 [ 44.914201][ T707] do_syscall_64+0xca/0x1c0 [ 44.918539][ T707] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 44.924267][ T707] page last free stack trace: [ 44.928783][ T707] __free_pages_ok+0x847/0x950 [ 44.933380][ T707] __free_pages+0x91/0x140 [ 44.937633][ T707] __free_slab+0x221/0x2e0 [ 44.941885][ T707] unfreeze_partials+0x14e/0x180 [ 44.946659][ T707] put_cpu_partial+0x44/0x180 [ 44.951173][ T707] __slab_free+0x297/0x360 [ 44.955427][ T707] qlist_free_all+0x43/0xb0 [ 44.959766][ T707] quarantine_reduce+0x1d9/0x210 [ 44.964537][ T707] __kasan_kmalloc+0x41/0x210 [ 44.969052][ T707] kmem_cache_alloc_trace+0xdc/0x260 [ 44.974172][ T707] kobject_uevent_env+0x26f/0x710 [ 44.979034][ T707] __loop_clr_fd+0x574/0x920 [ 44.983462][ T707] __blkdev_put+0x4ad/0x710 [ 44.987797][ T707] blkdev_close+0x78/0xa0 [ 44.991962][ T707] __fput+0x262/0x680 [ 44.995785][ T707] task_work_run+0x140/0x170 [ 45.000204][ T707] [ 45.002375][ T707] Memory state around the buggy address: [ 45.007845][ T707] ffff8881e46e0e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 45.015744][ T707] ffff8881e46e0f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 45.023640][ T707] >ffff8881e46e0f80: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 45.031537][ T707] ^ [ 45.039351][ T707] ffff8881e46e1000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 45.047249][ T707] ffff8881e46e1080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 45.055142][ T707] ================================================================== [ 45.063045][ T707] Disabling lock debugging due to kernel taint