./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3777709169 <...> Warning: Permanently added '10.128.1.216' (ED25519) to the list of known hosts. execve("./syz-executor3777709169", ["./syz-executor3777709169"], 0x7ffd54295710 /* 10 vars */) = 0 brk(NULL) = 0x555587a5f000 brk(0x555587a5fd00) = 0x555587a5fd00 arch_prctl(ARCH_SET_FS, 0x555587a5f380) = 0 set_tid_address(0x555587a5f650) = 288 set_robust_list(0x555587a5f660, 24) = 0 rseq(0x555587a5fca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor3777709169", 4096) = 28 getrandom("\xe6\xd4\x3f\x19\x4e\x71\x2d\x73", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555587a5fd00 brk(0x555587a80d00) = 0x555587a80d00 brk(0x555587a81000) = 0x555587a81000 mprotect(0x7fab952b6000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 unshare(CLONE_NEWPID) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555587a5f650) = 289 ./strace-static-x86_64: Process 289 attached [pid 289] set_robust_list(0x555587a5f660, 24) = 0 [pid 289] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 289] getppid() = 0 [pid 289] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0 [pid 289] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0 [pid 289] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0 [pid 289] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0 [pid 289] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0 [pid 289] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0 [pid 289] unshare(CLONE_NEWNS) = 0 [pid 289] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0 [pid 289] unshare(CLONE_NEWIPC) = -1 EINVAL (Invalid argument) [pid 289] unshare(CLONE_NEWCGROUP) = 0 [pid 289] unshare(CLONE_NEWUTS) = 0 [pid 289] unshare(CLONE_SYSVSEM) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 289] getpid() = 1 [pid 289] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PTRACE|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_NICE|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, permitted=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PTRACE|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_NICE|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, inheritable=0}) = 0 [pid 289] capset({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, permitted=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, inheritable=0}) = 0 [pid 289] unshare(CLONE_NEWNET) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/net/ipv4/ping_group_range", O_WRONLY|O_CLOEXEC) = 3 [pid 289] write(3, "0 65535", 7) = 7 [pid 289] close(3) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/fs/mount-max", O_WRONLY|O_CLOEXEC) = 3 [pid 289] write(3, "100000", 6) = 6 [pid 289] close(3) = 0 [pid 289] mkdir("./syz-tmp", 0777) = 0 [pid 289] mount("", "./syz-tmp", "tmpfs", 0, NULL) = 0 [pid 289] mkdir("./syz-tmp/newroot", 0777) = 0 [pid 289] mkdir("./syz-tmp/newroot/dev", 0700) = 0 [pid 289] mount("/dev", "./syz-tmp/newroot/dev", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0 [pid 289] mkdir("./syz-tmp/newroot/proc", 0700) = 0 [pid 289] mount("syz-proc", "./syz-tmp/newroot/proc", "proc", 0, NULL) = 0 [pid 289] mkdir("./syz-tmp/newroot/selinux", 0700) = 0 [pid 289] mount("/selinux", "./syz-tmp/newroot/selinux", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory) [pid 289] mount("/sys/fs/selinux", "./syz-tmp/newroot/selinux", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0 [pid 289] mkdir("./syz-tmp/newroot/sys", 0700) = 0 [pid 289] mount("/sys", "./syz-tmp/newroot/sys", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0 [pid 289] mount("/sys/kernel/debug", "./syz-tmp/newroot/sys/kernel/debug", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0 [pid 289] mount("/sys/fs/smackfs", "./syz-tmp/newroot/sys/fs/smackfs", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory) [pid 289] mount("/proc/sys/fs/binfmt_misc", "./syz-tmp/newroot/proc/sys/fs/binfmt_misc", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0 [pid 289] mkdir("./syz-tmp/pivot", 0777) = 0 [pid 289] pivot_root("./syz-tmp", "./syz-tmp/pivot") = 0 [pid 289] chdir("/") = 0 [ 22.067092][ T24] audit: type=1400 audit(1731408735.910:66): avc: denied { execmem } for pid=288 comm="syz-executor377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 22.075404][ T24] audit: type=1400 audit(1731408735.920:67): avc: denied { mounton } for pid=289 comm="syz-executor377" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [pid 289] umount2("./pivot", MNT_DETACH) = 0 [pid 289] chroot("./newroot") = 0 [pid 289] chdir("/") = 0 [pid 289] mkdir("/dev/binderfs", 0777) = 0 [pid 289] mount("binder", "/dev/binderfs", "binder", 0, NULL) = 0 [pid 289] symlink("/dev/binderfs", "./binderfs") = 0 [pid 289] mount(NULL, "/sys/fs/fuse/connections", "fusectl", 0, NULL) = -1 EBUSY (Device or resource busy) [pid 289] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555587a5f650) = 2 ./strace-static-x86_64: Process 290 attached [pid 290] set_robust_list(0x555587a5f660, 24) = 0 [pid 290] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 290] setpgid(0, 0) = 0 [pid 290] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 290] write(3, "1000", 4) = 4 executing program [pid 290] close(3) = 0 [pid 290] write(1, "executing program\n", 18) = 18 [pid 290] openat(AT_FDCWD, "./binderfs/binder0", O_RDONLY) = 3 [pid 290] ioctl(3, BINDER_SET_CONTEXT_MGR_EXT, 0x20000300) = 0 [pid 290] openat(AT_FDCWD, "./binderfs/binder0", O_RDONLY) = 4 [pid 290] openat(AT_FDCWD, "./binderfs/binder0", O_RDONLY) = 5 [pid 290] ioctl(5, BINDER_WRITE_READ, 0x20000000) = 0 [pid 290] dup3(5, 4, 0) = 4 [ 22.098049][ T24] audit: type=1400 audit(1731408735.950:68): avc: denied { mounton } for pid=289 comm="syz-executor377" path="/root/syz-tmp" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 22.121118][ T24] audit: type=1400 audit(1731408735.950:69): avc: denied { mount } for pid=289 comm="syz-executor377" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 22.131510][ T290] binder: 290:290 unknown command 0 [pid 290] ioctl(4, BINDER_WRITE_READ, 0x20000580) = -1 EINVAL (Invalid argument) [pid 290] close(3) = 0 [pid 290] close(4) = 0 [ 22.144044][ T24] audit: type=1400 audit(1731408735.950:70): avc: denied { mounton } for pid=289 comm="syz-executor377" path="/root/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 22.148431][ T290] binder: 290:290 ioctl c0306201 20000580 returned -22 [ 22.171783][ T24] audit: type=1400 audit(1731408735.950:71): avc: denied { mount } for pid=289 comm="syz-executor377" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 22.200236][ T24] audit: type=1400 audit(1731408735.950:72): avc: denied { mounton } for pid=289 comm="syz-executor377" path="/root/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 22.201413][ T25] ================================================================== [ 22.225778][ T24] audit: type=1400 audit(1731408735.950:73): avc: denied { mounton } for pid=289 comm="syz-executor377" path="/root/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1572 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 22.233125][ T25] BUG: KASAN: use-after-free in __list_del_entry_valid+0x2f/0x120 [ 22.233134][ T25] Read of size 8 at addr ffff88810c9f9488 by task kworker/1:1/25 [ 22.233137][ T25] [ 22.233150][ T25] CPU: 1 PID: 25 Comm: kworker/1:1 Not tainted 5.10.226-syzkaller-00001-g6a01908517df #0 [ 22.233164][ T25] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 22.295769][ T25] Workqueue: events binder_deferred_func [ 22.301231][ T25] Call Trace: [ 22.304358][ T25] dump_stack_lvl+0x1e2/0x24b [ 22.308868][ T25] ? bfq_pos_tree_add_move+0x43b/0x43b [ 22.314165][ T25] ? panic+0x812/0x812 [ 22.318071][ T25] print_address_description+0x81/0x3b0 [ 22.323455][ T25] ? ____kasan_slab_free+0x12c/0x160 [ 22.328569][ T25] kasan_report+0x179/0x1c0 [ 22.332908][ T25] ? __list_del_entry_valid+0x2f/0x120 [ 22.338211][ T25] ? __list_del_entry_valid+0x2f/0x120 [ 22.343503][ T25] __asan_report_load8_noabort+0x14/0x20 [ 22.348968][ T25] __list_del_entry_valid+0x2f/0x120 [ 22.354113][ T25] binder_release_work+0xcd/0x680 [ 22.358948][ T25] binder_deferred_func+0x1847/0x1bc0 [ 22.364153][ T25] ? read_word_at_a_time+0x12/0x20 [ 22.369102][ T25] process_one_work+0x6dc/0xbd0 [ 22.373788][ T25] worker_thread+0xaea/0x1510 [ 22.378308][ T25] ? _raw_spin_lock+0x1b0/0x1b0 [ 22.382991][ T25] kthread+0x34b/0x3d0 [ 22.386896][ T25] ? worker_clr_flags+0x180/0x180 [ 22.391753][ T25] ? kthread_blkcg+0xd0/0xd0 [ 22.396178][ T25] ret_from_fork+0x1f/0x30 [ 22.400428][ T25] [ 22.402598][ T25] Allocated by task 290: [ 22.406696][ T25] ____kasan_kmalloc+0xdb/0x110 [ 22.411368][ T25] __kasan_kmalloc+0x9/0x10 [ 22.415707][ T25] kmem_cache_alloc_trace+0x18a/0x2e0 [ 22.420915][ T25] binder_thread_write+0x9ce/0x6c70 [ 22.425956][ T25] binder_ioctl_write_read+0x216/0x6a80 [ 22.431330][ T25] binder_ioctl+0x314/0x1e00 [ 22.435755][ T25] __se_sys_ioctl+0x114/0x190 [ 22.440269][ T25] __x64_sys_ioctl+0x7b/0x90 [ 22.444694][ T25] do_syscall_64+0x34/0x70 [ 22.448954][ T25] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 22.454669][ T25] [ 22.456845][ T25] Freed by task 25: [ 22.460503][ T25] kasan_set_track+0x4b/0x70 [ 22.464928][ T25] kasan_set_free_info+0x23/0x40 [ 22.469696][ T25] ____kasan_slab_free+0x121/0x160 [ 22.474639][ T25] __kasan_slab_free+0x11/0x20 [ 22.479240][ T25] slab_free_freelist_hook+0xc0/0x190 [ 22.484447][ T25] kfree+0xc3/0x270 [ 22.488095][ T25] binder_free_ref+0x128/0x260 [ 22.492691][ T25] binder_deferred_func+0x171c/0x1bc0 [ 22.497899][ T25] process_one_work+0x6dc/0xbd0 [ 22.502585][ T25] worker_thread+0xaea/0x1510 [ 22.507103][ T25] kthread+0x34b/0x3d0 [ 22.511006][ T25] ret_from_fork+0x1f/0x30 [ 22.515256][ T25] [ 22.517427][ T25] The buggy address belongs to the object at ffff88810c9f9480 [ 22.517427][ T25] which belongs to the cache kmalloc-64 of size 64 [ 22.531141][ T25] The buggy address is located 8 bytes inside of [ 22.531141][ T25] 64-byte region [ffff88810c9f9480, ffff88810c9f94c0) [ 22.543981][ T25] The buggy address belongs to the page: [ 22.549473][ T25] page:ffffea0004327e40 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10c9f9 [ 22.559521][ T25] flags: 0x4000000000000200(slab) [ 22.564387][ T25] raw: 4000000000000200 ffffea000430a300 0000001300000013 ffff888100043800 [ 22.572806][ T25] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 22.581219][ T25] page dumped because: kasan: bad access detected [ 22.587477][ T25] page_owner tracks the page as allocated [ 22.593028][ T25] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 67, ts 3719652083, free_ts 3706482158 [ 22.608562][ T25] prep_new_page+0x166/0x180 [ 22.612985][ T25] get_page_from_freelist+0x2d8c/0x2f30 [ 22.618369][ T25] __alloc_pages_nodemask+0x435/0xaf0 [ 22.623573][ T25] new_slab+0x80/0x400 [ 22.627483][ T25] ___slab_alloc+0x302/0x4b0 [ 22.631910][ T25] __slab_alloc+0x63/0xa0 [ 22.636075][ T25] kmem_cache_alloc_trace+0x1bd/0x2e0 [ 22.641281][ T25] load_elf_binary+0x1ac5/0x2750 [ 22.646057][ T25] bprm_execve+0x81b/0x1600 [ 22.650394][ T25] do_execveat_common+0x959/0xac0 [ 22.655255][ T25] __x64_sys_execve+0x92/0xb0 [ 22.659766][ T25] do_syscall_64+0x34/0x70 [ 22.664021][ T25] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 22.669743][ T25] page last free stack trace: [ 22.674264][ T25] free_unref_page_prepare+0x2ae/0x2d0 [ 22.679556][ T25] free_the_page+0x9e/0x370 [ 22.683896][ T25] __free_pages+0x67/0xc0 [ 22.688065][ T25] __vunmap+0x7bc/0x8f0 [ 22.692053][ T25] free_work+0x5b/0x80 [ 22.695959][ T25] process_one_work+0x6dc/0xbd0 [ 22.700646][ T25] worker_thread+0xaea/0x1510 [ 22.705159][ T25] kthread+0x34b/0x3d0 [ 22.709065][ T25] ret_from_fork+0x1f/0x30 [ 22.713315][ T25] [ 22.715482][ T25] Memory state around the buggy address: [ 22.720955][ T25] ffff88810c9f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.728856][ T25] ffff88810c9f9400: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 22.736750][ T25] >ffff88810c9f9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.744645][ T25] ^ [ 22.748817][ T25] ffff88810c9f9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.756712][ T25] ffff88810c9f9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.764610][ T25] ================================================================== [ 22.772507][ T25] Disabling lock debugging due to kernel taint [ 22.778725][ T25] general protection fault, probably for non-canonical address 0xfefffc1e80000003: 0000 [#1] PREEMPT SMP KASAN [ 22.790240][ T25] KASAN: maybe wild-memory-access in range [0xf80000f400000018-0xf80000f40000001f] [ 22.799351][ T25] CPU: 1 PID: 25 Comm: kworker/1:1 Tainted: G B 5.10.226-syzkaller-00001-g6a01908517df #0 [ 22.810367][ T25] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 22.820268][ T25] Workqueue: events binder_deferred_func [ 22.825738][ T25] RIP: 0010:__list_del_entry_valid+0x75/0x120 [ 22.831636][ T25] Code: 1e 48 85 db 74 68 4d 85 ff 74 74 48 ba 00 01 00 00 00 00 ad de 48 39 d3 74 76 48 83 c2 22 49 39 d7 74 7e 4c 89 f8 48 c1 e8 03 <42> 80 3c 20 00 74 08 4c 89 ff e8 9c 9a 51 ff 49 8b 17 4c 39 f2 75 [ 22.851073][ T25] RSP: 0018:ffffc900001afc20 EFLAGS: 00010a06 [ 22.856974][ T25] RAX: 1f00001e80000003 RBX: ffff88810c140500 RCX: ffffffff8256ad19 [ 22.864786][ T25] RDX: dead000000000122 RSI: 0000000000000286 RDI: ffff88810c9f9480 [ 22.872597][ T25] RBP: ffffc900001afc40 R08: ffffffff813e2a7b R09: 0000000000000003 [ 22.880409][ T25] R10: fffffbfff0e10e48 R11: dffffc0000000001 R12: dffffc0000000000 [ 22.888220][ T25] R13: ffff88810c9f9480 R14: ffff88810c9f9480 R15: f80000f400000019 [ 22.896032][ T25] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 22.904797][ T25] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.911220][ T25] CR2: 00007fab952ba0d0 CR3: 000000010d1ce000 CR4: 00000000003506a0 [ 22.919032][ T25] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 22.926841][ T25] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 22.934651][ T25] Call Trace: [ 22.937785][ T25] ? __die_body+0x62/0xb0 [ 22.941946][ T25] ? die_addr+0x9f/0xd0 [ 22.945940][ T25] ? exc_general_protection+0x3ff/0x490 [ 22.951327][ T25] ? check_panic_on_warn+0x65/0xb0 [ 22.956268][ T25] ? asm_exc_general_protection+0x1e/0x30 [ 22.961823][ T25] ? check_panic_on_warn+0x5b/0xb0 [ 22.966769][ T25] ? __list_del_entry_valid+0x49/0x120 [ 22.972065][ T25] ? __list_del_entry_valid+0x75/0x120 [ 22.977363][ T25] binder_release_work+0xcd/0x680 [ 22.982221][ T25] binder_deferred_func+0x1847/0x1bc0 [ 22.987439][ T25] ? read_word_at_a_time+0x12/0x20 [ 22.992374][ T25] process_one_work+0x6dc/0xbd0 [ 22.997063][ T25] worker_thread+0xaea/0x1510 [ 23.001574][ T25] ? _raw_spin_lock+0x1b0/0x1b0 [ 23.006263][ T25] kthread+0x34b/0x3d0 [ 23.010170][ T25] ? worker_clr_flags+0x180/0x180 [ 23.015030][ T25] ? kthread_blkcg+0xd0/0xd0 [ 23.019455][ T25] ret_from_fork+0x1f/0x30 [ 23.023700][ T25] Modules linked in: [ 23.027608][ T25] ---[ end trace 18b1bc2e15668d4d ]--- [ 23.032893][ T25] RIP: 0010:__list_del_entry_valid+0x75/0x120 [ 23.038888][ T25] Code: 1e 48 85 db 74 68 4d 85 ff 74 74 48 ba 00 01 00 00 00 00 ad de 48 39 d3 74 76 48 83 c2 22 49 39 d7 74 7e 4c 89 f8 48 c1 e8 03 <42> 80 3c 20 00 74 08 4c 89 ff e8 9c 9a 51 ff 49 8b 17 4c 39 f2 75 [pid 290] close(5) = 0 [pid 290] close(6) = -1 EBADF (Bad file descriptor) [pid 290] close(7) = -1 EBADF (Bad file descriptor) [pid 290] close(8) = -1 EBADF (Bad file descriptor) [pid 290] close(9) = -1 EBADF (Bad file descriptor) [pid 290] close(10) = -1 EBADF (Bad file descriptor) [pid 290] close(11) = -1 EBADF (Bad file descriptor) [pid 290] close(12) = -1 EBADF (Bad file descriptor) [pid 290] close(13) = -1 EBADF (Bad file descriptor) [pid 290] close(14) = -1 EBADF (Bad file descriptor) [pid 290] close(15) = -1 EBADF (Bad file descriptor) [pid 290] close(16) = -1 EBADF (Bad file descriptor) [pid 290] close(17) = -1 EBADF (Bad file descriptor) [pid 290] close(18) = -1 EBADF (Bad file descriptor) [pid 290] close(19) = -1 EBADF (Bad file descriptor) [pid 290] close(20) = -1 EBADF (Bad file descriptor) [pid 290] close(21) = -1 EBADF (Bad file descriptor) [pid 290] close(22) = -1 EBADF (Bad file descriptor) [pid 290] close(23) = -1 EBADF (Bad file descriptor) [pid 290] close(24) = -1 EBADF (Bad file descriptor) [pid 290] close(25) = -1 EBADF (Bad file descriptor) [pid 290] close(26) = -1 EBADF (Bad file descriptor) [pid 290] close(27) = -1 EBADF (Bad file descriptor) [pid 290] close(28) = -1 EBADF (Bad file descriptor) [pid 290] close(29) = -1 EBADF (Bad file descriptor) [pid 290] exit_group(0) = ? [pid 290] +++ exited with 0 +++ [pid 289] --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=2, si_uid=0, si_status=0, si_utime=0, si_stime=4} --- [pid 289] restart_syscall(<... resuming interrupted clone ...>) = 0 [pid 289] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555587a5f650) = 3 ./strace-static-x86_64: Process 292 attached [pid 292] set_robust_list(0x555587a5f660, 24) = 0 [pid 292] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 292] setpgid(0, 0) = 0 [pid 292] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 292] write(3, "1000", 4) = 4 [pid 292] close(3) = 0 [pid 292] write(1, "executing program\n", 18executing program ) = 18 [pid 292] openat(AT_FDCWD, "./binderfs/binder0", O_RDONLY) = 3 [pid 292] ioctl(3, BINDER_SET_CONTEXT_MGR_EXT, 0x20000300) = 0 [pid 292] openat(AT_FDCWD, "./binderfs/binder0", O_RDONLY) = 4 [pid 292] openat(AT_FDCWD, "./binderfs/binder0", O_RDONLY) = 5 [ 23.047247][ T24] audit: type=1400 audit(1731408735.950:74): avc: denied { unmount } for pid=289 comm="syz-executor377" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 23.058268][ T25] RSP: 0018:ffffc900001afc20 EFLAGS: 00010a06 [ 23.083568][ T25] RAX: 1f00001e80000003 RBX: ffff88810c140500 RCX: ffffffff8256ad19 [ 23.083943][ T24] audit: type=1400 audit(1731408735.970:75): avc: denied { mounton } for pid=289 comm="syz-executor377" path="/dev/binderfs" dev="devtmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 23.091400][ T25] RDX: dead000000000122 RSI: 0000000000000286 RDI: ffff88810c9f9480 [pid 292] ioctl(5, BINDER_WRITE_READ, 0x20000000) = 0 [pid 292] dup3(5, 4, 0) = 4 [pid 292] ioctl(4, BINDER_WRITE_READ, 0x20000580) = -1 EINVAL (Invalid argument) [pid 292] close(3) = 0 [pid 292] close(4) = 0 [pid 292] close(5) = 0 [pid 292] close(6) = -1 EBADF (Bad file descriptor) [pid 292] close(7) = -1 EBADF (Bad file descriptor) [pid 292] close(8) = -1 EBADF (Bad file descriptor) [pid 292] close(9) = -1 EBADF (Bad file descriptor) [pid 292] close(10) = -1 EBADF (Bad file descriptor) [pid 292] close(11) = -1 EBADF (Bad file descriptor) [pid 292] close(12) = -1 EBADF (Bad file descriptor) [pid 292] close(13) = -1 EBADF (Bad file descriptor) [pid 292] close(14) = -1 EBADF (Bad file descriptor) [pid 292] close(15) = -1 EBADF (Bad file descriptor) [pid 292] close(16) = -1 EBADF (Bad file descriptor) [pid 292] close(17) = -1 EBADF (Bad file descriptor) [pid 292] close(18) = -1 EBADF (Bad file descriptor) [pid 292] close(19) = -1 EBADF (Bad file descriptor) [pid 292] close(20) = -1 EBADF (Bad file descriptor) [pid 292] close(21) = -1 EBADF (Bad file descriptor) [pid 292] close(22) = -1 EBADF (Bad file descriptor) [pid 292] close(23) = -1 EBADF (Bad file descriptor) [pid 292] close(24) = -1 EBADF (Bad file descriptor) [pid 292] close(25) = -1 EBADF (Bad file descriptor) [pid 292] close(26) = -1 EBADF (Bad file descriptor) [pid 292] close(27) = -1 EBADF (Bad file descriptor) [pid 292] close(28) = -1 EBADF (Bad file descriptor) [pid 292] close(29) = -1 EBADF (Bad file descriptor) [pid 292] exit_group(0) = ? [pid 292] +++ exited with 0 +++ [pid 289] --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=3, si_uid=0, si_status=0, si_utime=0, si_stime=3} --- [pid 289] restart_syscall(<... resuming interrupted clone ...>) = 0 [pid 289] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555587a5f650) = 4 ./strace-static-x86_64: Process 293 attached [ 23.091416][ T25] RBP: ffffc900001afc40 R08: ffffffff813e2a7b R09: 0000000000000003 [ 23.123715][ T292] binder: 292:292 unknown command 0 [ 23.129665][ T25] R10: fffffbfff0e10e48 R11: dffffc0000000001 R12: dffffc0000000000 [ 23.129675][ T25] R13: ffff88810c9f9480 R14: ffff88810c9f9480 R15: f80000f400000019 [ 23.129684][ T25] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 23.129699][ T25] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 23.134912][ T292] binder: 292:292 ioctl c0306201 20000580 returned -22 [pid 293] set_robust_list(0x555587a5f660, 24) = 0 [pid 293] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 293] setpgid(0, 0) = 0 [pid 293] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 293] write(3, "1000", 4) = 4 [pid 293] close(3) = 0 [pid 293] write(1, "executing program\n", 18executing program ) = 18 [pid 293] openat(AT_FDCWD, "./binderfs/binder0", O_RDONLY) = 3 [ 23.142518][ T25] CR2: 00007fab952ba0d0 CR3: 000000000660f000 CR4: 00000000003506a0 [ 23.142527][ T25] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 23.142533][ T25] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 23.142545][ T25] Kernel panic - not syncing: Fatal exception [ 23.177424][ T293] binder: BINDER_SET_CONTEXT_MGR already set [ 23.180398][ T25] Kernel Offset: disabled [ 23.211861][ T25] Rebooting in 86400 seconds..