netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. ================================================================== BUG: KASAN: use-after-free in __list_add_valid+0x81/0xa0 lib/list_debug.c:23 Read of size 8 at addr ffff888093dc3608 by task syz-executor.5/25803 CPU: 1 PID: 25803 Comm: syz-executor.5 Not tainted 4.14.231-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 print_address_description.cold+0x54/0x1d3 mm/kasan/report.c:252 kasan_report_error.cold+0x8a/0x191 mm/kasan/report.c:351 kasan_report mm/kasan/report.c:409 [inline] __asan_report_load8_noabort+0x68/0x70 mm/kasan/report.c:430 __list_add_valid+0x81/0xa0 lib/list_debug.c:23 __list_add include/linux/list.h:60 [inline] list_add include/linux/list.h:79 [inline] chrdev_open+0x45c/0x6d0 fs/char_dev.c:405 do_dentry_open+0x44b/0xec0 fs/open.c:777 vfs_open+0x105/0x220 fs/open.c:888 do_last fs/namei.c:3428 [inline] path_openat+0x628/0x2970 fs/namei.c:3569 do_filp_open+0x179/0x3c0 fs/namei.c:3603 do_sys_open+0x296/0x410 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4665f9 RSP: 002b:00007fe1a3111188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665f9 RDX: 0000000000000042 RSI: 0000000020002000 RDI: ffffffffffffff9c RBP: 00000000004bfbb9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c008 R13: 00007ffca2b4233f R14: 00007fe1a3111300 R15: 0000000000022000 Allocated by task 25737: save_stack mm/kasan/kasan.c:447 [inline] set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:551 kmem_cache_alloc+0x124/0x3c0 mm/slab.c:3552 fuse_alloc_inode+0x1d/0x3f0 fs/fuse/inode.c:87 alloc_inode+0x5d/0x170 fs/inode.c:210 iget5_locked+0x169/0x450 fs/inode.c:1050 fuse_iget+0x164/0x730 fs/fuse/inode.c:307 fuse_lookup_name+0x3bb/0x550 fs/fuse/dir.c:341 fuse_lookup+0xcd/0x390 fs/fuse/dir.c:368 fuse_atomic_open+0x1bb/0x2d0 fs/fuse/dir.c:508 atomic_open fs/namei.c:3075 [inline] lookup_open+0xe0e/0x1750 fs/namei.c:3211 do_last fs/namei.c:3334 [inline] path_openat+0xe08/0x2970 fs/namei.c:3569 do_filp_open+0x179/0x3c0 fs/namei.c:3603 do_sys_open+0x296/0x410 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb Freed by task 22: save_stack mm/kasan/kasan.c:447 [inline] set_track mm/kasan/kasan.c:459 [inline] kasan_slab_free+0xc3/0x1a0 mm/kasan/kasan.c:524 __cache_free mm/slab.c:3496 [inline] kmem_cache_free+0x7c/0x2b0 mm/slab.c:3758 __rcu_reclaim kernel/rcu/rcu.h:195 [inline] rcu_do_batch kernel/rcu/tree.c:2699 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2962 [inline] __rcu_process_callbacks kernel/rcu/tree.c:2929 [inline] rcu_process_callbacks+0x780/0x1180 kernel/rcu/tree.c:2946 __do_softirq+0x24d/0x9ff kernel/softirq.c:288 The buggy address belongs to the object at ffff888093dc3280 which belongs to the cache fuse_inode of size 1272 The buggy address is located 904 bytes inside of 1272-byte region [ffff888093dc3280, ffff888093dc3778) The buggy address belongs to the page: page:ffffea00024f7080 count:1 mapcount:0 mapping:ffff888093dc2200 index:0xffff888093dc3ffb compound_mapcount: 0 flags: 0xfff00000008100(slab|head) raw: 00fff00000008100 ffff888093dc2200 ffff888093dc3ffb 0000000100000005 raw: ffffea00014d8fa0 ffffea00015d85a0 ffff8882393a20c0 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff888093dc3500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb audit: type=1804 audit(1619192856.298:183): pid=25822 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir291010987/syzkaller.d6mwqG/41/bus" dev="sda1" ino=16013 res=1 ffff888093dc3580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff888093dc3600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff888093dc3680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff888093dc3700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc ================================================================== audit: type=1804 audit(1619192856.348:184): pid=25823 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir291010987/syzkaller.d6mwqG/41/bus" dev="sda1" ino=16013 res=1