Warning: Permanently added '10.128.10.19' (ECDSA) to the list of known hosts. executing program [* ] A start job is running for dev-ttyS0.device (8s / 1min 30s)[** ] A start job is running for dev-ttyS0.device (9s / 1min 30s)[*** ] A start job is running for dev-ttyS0.device (9s / 1min 30s)[ *** ] A start job is running for dev-ttyS0.device (10s / 1min 30s)[ *** ] A start job is running for dev-ttyS0.device (11s / 1min 30s)[ ***] A start job is running for dev-ttyS0.device (11s / 1min 30s)[ **] A start job is running for dev-ttyS0.device (12s / 1min 30s)[ 20.061025][ T22] audit: type=1400 audit(1617159517.519:8): avc: denied { execmem } for pid=339 comm="syz-executor313" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 20.115747][ T341] ================================================================== [ 20.124771][ T341] BUG: KASAN: use-after-free in eth_header_parse_protocol+0xad/0xd0 [ 20.133407][ T341] Read of size 2 at addr ffff8881e901400b by task syz-executor313/341 [ 20.154229][ T341] [ 20.156592][ T341] CPU: 0 PID: 341 Comm: syz-executor313 Not tainted 5.4.108-syzkaller-00848-g4a75e4d41639 #0 [ 20.167260][ T341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 20.177733][ T341] Call Trace: [ 20.181639][ T341] dump_stack+0x1d8/0x24e [ 20.186984][ T341] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 20.192898][ T341] ? show_regs_print_info+0x12/0x12 [ 20.198261][ T341] ? printk+0xcf/0x114 [ 20.202408][ T341] print_address_description+0x9b/0x650 [ 20.208057][ T341] ? devkmsg_release+0x11c/0x11c [ 20.214337][ T341] ? _copy_from_iter+0x84d/0xa80 [ 20.219575][ T341] ? memcpy+0x38/0x50 [ 20.223543][ T341] __kasan_report+0x182/0x260 [ 20.228587][ T341] ? eth_header_parse_protocol+0xad/0xd0 [ 20.234343][ T341] kasan_report+0x30/0x60 [ 20.238670][ T341] eth_header_parse_protocol+0xad/0xd0 [ 20.244506][ T341] ? eth_header_cache_update+0x30/0x30 [ 20.250062][ T341] virtio_net_hdr_to_skb+0x6de/0xd70 [ 20.255456][ T341] ? fanout_demux_bpf+0x230/0x230 [ 20.260571][ T341] ? skb_copy_datagram_from_iter+0x604/0x6b0 [ 20.267117][ T341] packet_sendmsg+0x483a/0x6780 [ 20.272097][ T341] ? memset+0x1f/0x40 [ 20.276081][ T341] ? selinux_socket_sendmsg+0x11f/0x340 [ 20.281623][ T341] ? selinux_socket_accept+0x5b0/0x5b0 [ 20.287176][ T341] ? compat_packet_setsockopt+0x160/0x160 [ 20.293068][ T341] ? security_socket_sendmsg+0x9d/0xb0 [ 20.298904][ T341] ? compat_packet_setsockopt+0x160/0x160 [ 20.306178][ T341] kernel_sendmsg+0xf5/0x130 [ 20.310971][ T341] sock_no_sendpage+0x143/0x1b0 [ 20.316942][ T341] ? __receive_sock+0xe0/0xe0 [ 20.321613][ T341] ? avc_has_perm_noaudit+0x37d/0x400 [ 20.327292][ T341] ? avc_has_perm_noaudit+0x30c/0x400 [ 20.332936][ T341] ? __receive_sock+0xe0/0xe0 [ 20.337895][ T341] sock_sendpage+0xd0/0x120 [ 20.343405][ T341] pipe_to_sendpage+0x23b/0x300 [ 20.349283][ T341] ? sock_fasync+0xf0/0xf0 [ 20.353946][ T341] ? generic_splice_sendpage+0x210/0x210 [ 20.359564][ T341] ? avc_has_perm+0xd2/0x270 [ 20.364252][ T341] ? avc_has_perm+0x173/0x270 [ 20.369284][ T341] __splice_from_pipe+0x2d3/0x870 [ 20.374578][ T341] ? generic_splice_sendpage+0x210/0x210 [ 20.380490][ T341] generic_splice_sendpage+0x181/0x210 [ 20.386399][ T341] ? iter_file_splice_write+0xf20/0xf20 [ 20.392628][ T341] ? security_file_permission+0x128/0x300 [ 20.398445][ T341] ? iter_file_splice_write+0xf20/0xf20 [ 20.404075][ T341] __se_sys_splice+0x7a8/0x1b00 [ 20.409187][ T341] ? check_preemption_disabled+0x154/0x330 [ 20.415331][ T341] ? debug_smp_processor_id+0x20/0x20 [ 20.420900][ T341] ? __fpregs_load_activate+0x1d7/0x3c0 [ 20.426952][ T341] ? __x64_sys_splice+0xf0/0xf0 [ 20.432013][ T341] ? finish_task_switch+0x1b9/0x550 [ 20.437284][ T341] ? __x64_sys_splice+0x1d/0xf0 [ 20.442647][ T341] do_syscall_64+0xcb/0x1e0 [ 20.447164][ T341] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 20.453045][ T341] RIP: 0033:0x44ce29 [ 20.457112][ T341] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 71 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 20.478077][ T341] RSP: 002b:00007fe85e3a61f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 20.486914][ T341] RAX: ffffffffffffffda RBX: 00000000004ca438 RCX: 000000000044ce29 [ 20.494923][ T341] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 20.503547][ T341] RBP: 00000000004ca430 R08: 000000000004ffe0 R09: 0000000000000000 [ 20.512654][ T341] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004ca43c [ 20.520722][ T341] R13: 00007fff79c275ff R14: 00007fe85e3a6300 R15: 0000000000022000 [ 20.530272][ T341] [ 20.532604][ T341] Allocated by task 143: [ 20.536923][ T341] __kasan_kmalloc+0x137/0x1e0 [ 20.541695][ T341] kmem_cache_alloc+0x115/0x290 [ 20.546618][ T341] getname_flags+0xba/0x640 [ 20.551205][ T341] do_sys_open+0x33e/0x7c0 [ 20.555702][ T341] do_syscall_64+0xcb/0x1e0 [ 20.560482][ T341] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 20.566551][ T341] [ 20.568870][ T341] Freed by task 143: [ 20.572762][ T341] __kasan_slab_free+0x18a/0x240 [ 20.577808][ T341] slab_free_freelist_hook+0x7b/0x150 [ 20.583293][ T341] kmem_cache_free+0xb8/0x5f0 [ 20.588136][ T341] do_sys_open+0x62e/0x7c0 [ 20.593118][ T341] do_syscall_64+0xcb/0x1e0 [ 20.598015][ T341] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 20.603913][ T341] [ 20.606754][ T341] The buggy address belongs to the object at ffff8881e9013300 [ 20.606754][ T341] which belongs to the cache names_cache of size 4096 [ 20.621975][ T341] The buggy address is located 3339 bytes inside of [ 20.621975][ T341] 4096-byte region [ffff8881e9013300, ffff8881e9014300) [ 20.635968][ T341] The buggy address belongs to the page: [ 20.642033][ T341] page:ffffea0007a40400 refcount:1 mapcount:0 mapping:ffff8881f5cfb680 index:0x0 compound_mapcount: 0 [ 20.653374][ T341] flags: 0x8000000000010200(slab|head) [ 20.658929][ T341] raw: 8000000000010200 dead000000000100 dead000000000122 ffff8881f5cfb680 [ 20.667499][ T341] raw: 0000000000000000 0000000000070007 00000001ffffffff 0000000000000000 [ 20.677010][ T341] page dumped because: kasan: bad access detected [ 20.683530][ T341] [ 20.685949][ T341] Memory state around the buggy address: [ 20.692003][ T341] ffff8881e9013f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.700224][ T341] ffff8881e9013f80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.708443][ T341] >ffff8881e9014000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.716946][ T341] ^ [ 20.721575][ T341] ffff8881e9014080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.730751][ T341] ffff8881e9014100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.738795][ T341] ================================================================== [ 20.746841][ T341] Disabling lock debugging due to kernel taint write to /proc/sys/kernel/hung_task_check_interval_secs failed: No such file or directory write to /proc/sys/vm/nr_overcommit_hugepages failed: No such file or directory [ *] A start job is running for dev-ttyS0.device (13s / 1min 30s)