Warning: Permanently added '10.128.10.52' (ED25519) to the list of known hosts. 2025/02/07 18:59:00 ignoring optional flag "sandboxArg"="0" 2025/02/07 18:59:01 parsed 1 programs [ 23.046852][ T23] audit: type=1400 audit(1738954741.960:66): avc: denied { node_bind } for pid=349 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 23.561568][ T23] audit: type=1400 audit(1738954742.470:67): avc: denied { mounton } for pid=358 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.563289][ T358] cgroup1: Unknown subsys name 'net' [ 23.584052][ T23] audit: type=1400 audit(1738954742.470:68): avc: denied { mount } for pid=358 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.589385][ T358] cgroup1: Unknown subsys name 'net_prio' [ 23.611652][ T23] audit: type=1400 audit(1738954742.530:69): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 23.616819][ T358] cgroup1: Unknown subsys name 'devices' [ 23.644344][ T23] audit: type=1400 audit(1738954742.560:70): avc: denied { unmount } for pid=358 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.815368][ T358] cgroup1: Unknown subsys name 'hugetlb' [ 23.821420][ T358] cgroup1: Unknown subsys name 'rlimit' [ 23.992213][ T23] audit: type=1400 audit(1738954742.900:71): avc: denied { setattr } for pid=358 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=9546 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.008731][ T361] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.015333][ T23] audit: type=1400 audit(1738954742.910:72): avc: denied { create } for pid=358 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.043959][ T23] audit: type=1400 audit(1738954742.910:73): avc: denied { write } for pid=358 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.064265][ T23] audit: type=1400 audit(1738954742.910:74): avc: denied { read } for pid=358 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.084215][ T23] audit: type=1400 audit(1738954742.910:75): avc: denied { module_request } for pid=358 comm="syz-executor" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 24.105972][ T358] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.483259][ T364] request_module fs-gadgetfs succeeded, but still no fs? [ 24.593492][ T364] syz-executor (364) used greatest stack depth: 21400 bytes left [ 24.912888][ T393] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.919728][ T393] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.927490][ T393] device bridge_slave_0 entered promiscuous mode [ 24.934140][ T393] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.940954][ T393] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.948479][ T393] device bridge_slave_1 entered promiscuous mode [ 24.991690][ T393] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.998660][ T393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.005795][ T393] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.012636][ T393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.034086][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.041501][ T103] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.048601][ T103] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.058386][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.066931][ T103] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.073782][ T103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.085488][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.093490][ T103] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.100319][ T103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.115702][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.132354][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.145232][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.156618][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.170181][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.182301][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.193411][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.228665][ T393] syz-executor (393) used greatest stack depth: 19832 bytes left 2025/02/07 18:59:04 executed programs: 0 [ 25.793853][ T430] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.800778][ T430] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.808991][ T430] device bridge_slave_0 entered promiscuous mode [ 25.815934][ T430] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.822809][ T430] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.829987][ T430] device bridge_slave_1 entered promiscuous mode [ 25.896650][ T430] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.903520][ T430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.910657][ T430] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.917623][ T430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.950495][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.958893][ T103] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.966488][ T103] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.983654][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.991681][ T103] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.998526][ T103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.006133][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.014617][ T103] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.021431][ T103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.031690][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.040954][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.056821][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.069940][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.083935][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.096651][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.106882][ T103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.753304][ T9] device bridge_slave_1 left promiscuous mode [ 26.759249][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.766505][ T9] device bridge_slave_0 left promiscuous mode [ 26.772414][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.191750][ T465] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.198684][ T465] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.206164][ T465] device bridge_slave_0 entered promiscuous mode [ 41.213009][ T465] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.219832][ T465] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.227173][ T465] device bridge_slave_1 entered promiscuous mode [ 41.269007][ T465] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.275874][ T465] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.283005][ T465] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.289729][ T465] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.310764][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.317925][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.325141][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.332359][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.341670][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.349689][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.356554][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.365684][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.373917][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.380737][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.394415][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.403802][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.419769][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.431426][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.445390][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.457656][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 2025/02/07 18:59:20 executed programs: 3 [ 41.468097][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.491122][ T465] ================================================================== [ 41.499021][ T465] BUG: KASAN: use-after-free in __mutex_lock+0xcd7/0x1060 [ 41.505958][ T465] Read of size 4 at addr ffff8881f045deb8 by task syz-executor/465 [ 41.513669][ T465] [ 41.515847][ T465] CPU: 1 PID: 465 Comm: syz-executor Not tainted 5.4.289-syzkaller-00030-gcb850525fc3e #0 [ 41.525568][ T465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 41.535469][ T465] Call Trace: [ 41.538728][ T465] dump_stack+0x1d8/0x241 [ 41.542886][ T465] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 41.548530][ T465] ? printk+0xd1/0x111 [ 41.552440][ T465] ? __mutex_lock+0xcd7/0x1060 [ 41.557061][ T465] print_address_description+0x8c/0x600 [ 41.562429][ T465] ? check_preemption_disabled+0x9f/0x320 [ 41.567964][ T465] ? __unwind_start+0x708/0x890 [ 41.572666][ T465] ? __mutex_lock+0xcd7/0x1060 [ 41.577259][ T465] __kasan_report+0xf3/0x120 [ 41.581698][ T465] ? __mutex_lock+0xcd7/0x1060 [ 41.586302][ T465] kasan_report+0x30/0x60 [ 41.590528][ T465] __mutex_lock+0xcd7/0x1060 [ 41.594969][ T465] ? kobject_get_unless_zero+0x229/0x320 [ 41.600560][ T465] ? __ww_mutex_lock_interruptible_slowpath+0x10/0x10 [ 41.607142][ T465] ? __module_put_and_exit+0x20/0x20 [ 41.612345][ T465] ? up_read+0x6f/0x1b0 [ 41.616335][ T465] mutex_lock_killable+0xd8/0x110 [ 41.621465][ T465] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 41.627792][ T465] ? mutex_lock+0xa5/0x110 [ 41.632038][ T465] ? mutex_trylock+0xa0/0xa0 [ 41.636477][ T465] lo_open+0x18/0xc0 [ 41.640215][ T465] __blkdev_get+0x3c8/0x1160 [ 41.644629][ T465] ? blkdev_get+0x3a0/0x3a0 [ 41.648969][ T465] ? _raw_spin_unlock+0x49/0x60 [ 41.653831][ T465] blkdev_get+0x2de/0x3a0 [ 41.657998][ T465] ? blkdev_open+0x173/0x290 [ 41.662605][ T465] ? block_ioctl+0xe0/0xe0 [ 41.666854][ T465] do_dentry_open+0x964/0x1130 [ 41.671458][ T465] ? finish_open+0xd0/0xd0 [ 41.675703][ T465] ? security_inode_permission+0xad/0xf0 [ 41.681167][ T465] ? memcpy+0x38/0x50 [ 41.684991][ T465] path_openat+0x29bf/0x34b0 [ 41.689429][ T465] ? stack_trace_save+0x118/0x1c0 [ 41.694280][ T465] ? do_filp_open+0x450/0x450 [ 41.698801][ T465] ? do_sys_open+0x357/0x810 [ 41.703414][ T465] ? do_syscall_64+0xca/0x1c0 [ 41.707907][ T465] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 41.713836][ T465] do_filp_open+0x20b/0x450 [ 41.718163][ T465] ? vfs_tmpfile+0x2c0/0x2c0 [ 41.722594][ T465] ? _raw_spin_unlock+0x49/0x60 [ 41.727287][ T465] ? __alloc_fd+0x4c5/0x570 [ 41.731690][ T465] do_sys_open+0x39c/0x810 [ 41.735957][ T465] ? check_preemption_disabled+0x153/0x320 [ 41.741595][ T465] ? file_open_root+0x490/0x490 [ 41.746292][ T465] do_syscall_64+0xca/0x1c0 [ 41.750717][ T465] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 41.756450][ T465] RIP: 0033:0x7fec3117e6d1 [ 41.760779][ T465] Code: 75 57 89 f0 25 00 00 41 00 3d 00 00 41 00 74 49 80 3d 7a 1e 1f 00 00 74 6d 89 da 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 93 00 00 00 48 8b 54 24 28 64 48 2b 14 25 [ 41.780406][ T465] RSP: 002b:00007ffc0a49dfd0 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 [ 41.788645][ T465] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007fec3117e6d1 [ 41.796453][ T465] RDX: 0000000000000002 RSI: 00007ffc0a49e0e0 RDI: 00000000ffffff9c [ 41.804283][ T465] RBP: 00007ffc0a49e0e0 R08: 000000000000000a R09: 00007ffc0a49dd97 [ 41.812078][ T465] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [ 41.819891][ T465] R13: 00007fec31369260 R14: 0000000000000003 R15: 00007ffc0a49e0e0 [ 41.827701][ T465] [ 41.829871][ T465] Allocated by task 445: [ 41.833960][ T465] __kasan_kmalloc+0x171/0x210 [ 41.838573][ T465] kmem_cache_alloc+0xd9/0x250 [ 41.843158][ T465] dup_task_struct+0x4f/0x600 [ 41.847673][ T465] copy_process+0x56d/0x3230 [ 41.852093][ T465] _do_fork+0x197/0x900 [ 41.856090][ T465] __x64_sys_clone3+0x2da/0x300 [ 41.860774][ T465] do_syscall_64+0xca/0x1c0 [ 41.865119][ T465] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 41.870844][ T465] [ 41.873009][ T465] Freed by task 17: [ 41.876757][ T465] __kasan_slab_free+0x1b5/0x270 [ 41.881527][ T465] kmem_cache_free+0x10b/0x2c0 [ 41.886216][ T465] rcu_do_batch+0x492/0xa00 [ 41.890563][ T465] rcu_core+0x4c8/0xcb0 [ 41.894552][ T465] __do_softirq+0x23b/0x6b7 [ 41.898968][ T465] [ 41.901145][ T465] The buggy address belongs to the object at ffff8881f045de80 [ 41.901145][ T465] which belongs to the cache task_struct of size 3904 [ 41.915206][ T465] The buggy address is located 56 bytes inside of [ 41.915206][ T465] 3904-byte region [ffff8881f045de80, ffff8881f045edc0) [ 41.928313][ T465] The buggy address belongs to the page: [ 41.933798][ T465] page:ffffea0007c11600 refcount:1 mapcount:0 mapping:ffff8881f5cf0c80 index:0x0 compound_mapcount: 0 [ 41.944552][ T465] flags: 0x8000000000010200(slab|head) [ 41.949847][ T465] raw: 8000000000010200 ffffea0007b7e200 0000000200000002 ffff8881f5cf0c80 [ 41.958278][ T465] raw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000 [ 41.966683][ T465] page dumped because: kasan: bad access detected [ 41.972933][ T465] page_owner tracks the page as allocated [ 41.978505][ T465] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC) [ 41.993335][ T465] prep_new_page+0x18f/0x370 [ 41.997753][ T465] get_page_from_freelist+0x2d13/0x2d90 [ 42.003137][ T465] __alloc_pages_nodemask+0x393/0x840 [ 42.008354][ T465] alloc_slab_page+0x39/0x3c0 [ 42.012861][ T465] new_slab+0x97/0x440 [ 42.016770][ T465] ___slab_alloc+0x2fe/0x490 [ 42.021202][ T465] __slab_alloc+0x62/0xa0 [ 42.025408][ T465] kmem_cache_alloc+0x109/0x250 [ 42.030046][ T465] dup_task_struct+0x4f/0x600 [ 42.034561][ T465] copy_process+0x56d/0x3230 [ 42.039083][ T465] _do_fork+0x197/0x900 [ 42.043080][ T465] kernel_thread+0x16a/0x1d0 [ 42.047513][ T465] kthreadd+0x3b1/0x4f0 [ 42.051518][ T465] ret_from_fork+0x1f/0x30 [ 42.055752][ T465] page_owner free stack trace missing [ 42.060943][ T465] [ 42.063121][ T465] Memory state around the buggy address: [ 42.068726][ T465] ffff8881f045dd80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.076744][ T465] ffff8881f045de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.084647][ T465] >ffff8881f045de80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.092639][ T465] ^ [ 42.098337][ T465] ffff8881f045df00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.106252][ T465] ffff8881f045df80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.114135][ T465] ================================================================== [ 42.122217][ T465] Disabling lock debugging due to kernel taint