[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 61.131195][ T27] audit: type=1800 audit(1579404120.185:25): pid=8704 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 61.150490][ T27] audit: type=1800 audit(1579404120.185:26): pid=8704 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 61.185275][ T27] audit: type=1800 audit(1579404120.185:27): pid=8704 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.56' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 74.285124][ C1] ================================================================== [ 74.293466][ C1] BUG: KASAN: slab-out-of-bounds in bitmap_port_gc+0x140/0x4b0 [ 74.301243][ C1] Read of size 8 at addr ffff88809fa9eb00 by task syz-executor841/9236 [ 74.309894][ C1] [ 74.312221][ C1] CPU: 1 PID: 9236 Comm: syz-executor841 Not tainted 5.5.0-rc6-syzkaller #0 [ 74.321096][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.331321][ C1] Call Trace: [ 74.334749][ C1] [ 74.337593][ C1] dump_stack+0x1fb/0x318 [ 74.342047][ C1] print_address_description+0x74/0x5c0 [ 74.347858][ C1] ? vprintk_default+0x28/0x30 [ 74.352626][ C1] ? vprintk_func+0x158/0x170 [ 74.357302][ C1] ? printk+0x62/0x8d [ 74.361505][ C1] __kasan_report+0x149/0x1c0 [ 74.366191][ C1] ? bitmap_port_gc+0x140/0x4b0 [ 74.371366][ C1] kasan_report+0x26/0x50 [ 74.375787][ C1] check_memory_region+0x2b6/0x2f0 [ 74.381017][ C1] __kasan_check_read+0x11/0x20 [ 74.385983][ C1] bitmap_port_gc+0x140/0x4b0 [ 74.390834][ C1] ? bitmap_port_create+0x790/0x790 [ 74.396031][ C1] call_timer_fn+0x95/0x170 [ 74.400881][ C1] ? bitmap_port_create+0x790/0x790 [ 74.406180][ C1] __run_timers+0x776/0x970 [ 74.410681][ C1] ? check_preemption_disabled+0x44/0x260 [ 74.416577][ C1] ? debug_smp_processor_id+0x9/0x20 [ 74.421879][ C1] run_timer_softirq+0x4a/0x90 [ 74.426646][ C1] __do_softirq+0x283/0x7bd [ 74.431161][ C1] ? irq_exit+0x227/0x230 [ 74.435770][ C1] irq_exit+0x227/0x230 [ 74.439965][ C1] smp_apic_timer_interrupt+0x113/0x280 [ 74.445700][ C1] apic_timer_interrupt+0xf/0x20 [ 74.450627][ C1] [ 74.453565][ C1] RIP: 0010:proc_tgid_base_lookup+0x0/0x260 [ 74.459898][ C1] Code: 5b d1 ff e9 49 ff ff ff 44 89 e9 80 e1 07 fe c1 38 c1 0f 8c 61 ff ff ff 4c 89 ef e8 ea 5a d1 ff e9 54 ff ff ff 0f 1f 44 00 00 <55> 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 18 49 89 f6 48 89 [ 74.479491][ C1] RSP: 0018:ffffc90003817b20 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 74.488083][ C1] RAX: ffffc90003817da0 RBX: ffffffff81e16520 RCX: dffffc0000000000 [ 74.496223][ C1] RDX: 0000000000000109 RSI: ffff888091382840 RDI: ffff888095e8db18 [ 74.504346][ C1] RBP: ffffc90003817d40 R08: ffffffff81bf7cc6 R09: fffffbfff145a112 [ 74.512308][ C1] R10: fffffbfff145a112 R11: 0000000000000000 R12: 0000000000008001 [ 74.520388][ C1] R13: 0000000000000000 R14: ffff888091382840 R15: dffffc0000000000 [ 74.528634][ C1] ? proc_pident_instantiate+0x2f0/0x2f0 [ 74.534418][ C1] ? path_openat+0x2056/0x4250 [ 74.539410][ C1] ? path_openat+0x20f1/0x4250 [ 74.544243][ C1] do_filp_open+0x192/0x3d0 [ 74.548758][ C1] ? noop_direct_IO+0x20/0x20 [ 74.553429][ C1] do_sys_open+0x29f/0x560 [ 74.557836][ C1] __x64_sys_open+0x87/0x90 [ 74.562433][ C1] do_syscall_64+0xf7/0x1c0 [ 74.566934][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 74.572891][ C1] RIP: 0033:0x4011a0 [ 74.576935][ C1] Code: 01 f0 ff ff 0f 83 c0 0b 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d 2d 15 2d 00 00 75 14 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 94 0b 00 00 c3 48 83 ec 08 e8 fa 00 00 00 [ 74.596742][ C1] RSP: 002b:00007ffc39fd9268 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 74.605384][ C1] RAX: ffffffffffffffda RBX: 00007ffc39fd9294 RCX: 00000000004011a0 [ 74.613556][ C1] RDX: 00007ffc39fd929a RSI: 0000000000080001 RDI: 00000000004a23c2 [ 74.621583][ C1] RBP: 00007ffc39fd9290 R08: 0000000000000000 R09: 0000000000000004 [ 74.629657][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004021c0 [ 74.637755][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 74.645935][ C1] [ 74.648253][ C1] Allocated by task 8855: [ 74.652579][ C1] __kasan_kmalloc+0x118/0x1c0 [ 74.657438][ C1] kasan_kmalloc+0x9/0x10 [ 74.661758][ C1] __kmalloc+0x254/0x340 [ 74.666001][ C1] kzalloc+0x21/0x40 [ 74.669960][ C1] ip_set_alloc+0x32/0x60 [ 74.674286][ C1] bitmap_port_create+0x32c/0x790 [ 74.679542][ C1] ip_set_create+0x421/0xfd0 [ 74.684129][ C1] nfnetlink_rcv_msg+0x9ae/0xcd0 [ 74.689067][ C1] netlink_rcv_skb+0x19e/0x3e0 [ 74.693827][ C1] nfnetlink_rcv+0x1e0/0x1e50 [ 74.698610][ C1] netlink_unicast+0x767/0x920 [ 74.703370][ C1] netlink_sendmsg+0xa2c/0xd50 [ 74.708220][ C1] ____sys_sendmsg+0x4f7/0x7f0 [ 74.713096][ C1] __sys_sendmsg+0x1ed/0x290 [ 74.717688][ C1] __x64_sys_sendmsg+0x7f/0x90 [ 74.722443][ C1] do_syscall_64+0xf7/0x1c0 [ 74.727012][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 74.732890][ C1] [ 74.735291][ C1] Freed by task 8544: [ 74.739335][ C1] __kasan_slab_free+0x12e/0x1e0 [ 74.744375][ C1] kasan_slab_free+0xe/0x10 [ 74.749180][ C1] kfree+0x10d/0x220 [ 74.753095][ C1] tomoyo_path_perm+0x6ae/0x850 [ 74.757939][ C1] tomoyo_inode_getattr+0x1c/0x20 [ 74.763160][ C1] security_inode_getattr+0xc0/0x140 [ 74.768440][ C1] vfs_getattr+0x2a/0x6d0 [ 74.772867][ C1] __se_sys_newstat+0x95/0x150 [ 74.777611][ C1] __x64_sys_newstat+0x5b/0x70 [ 74.782584][ C1] do_syscall_64+0xf7/0x1c0 [ 74.787167][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 74.793397][ C1] [ 74.795723][ C1] The buggy address belongs to the object at ffff88809fa9eb00 [ 74.795723][ C1] which belongs to the cache kmalloc-32 of size 32 [ 74.809741][ C1] The buggy address is located 0 bytes inside of [ 74.809741][ C1] 32-byte region [ffff88809fa9eb00, ffff88809fa9eb20) [ 74.822742][ C1] The buggy address belongs to the page: [ 74.828472][ C1] page:ffffea00027ea780 refcount:1 mapcount:0 mapping:ffff8880aa8001c0 index:0xffff88809fa9efc1 [ 74.839002][ C1] raw: 00fffe0000000200 ffffea000256b648 ffffea00027e62c8 ffff8880aa8001c0 [ 74.847989][ C1] raw: ffff88809fa9efc1 ffff88809fa9e000 0000000100000029 0000000000000000 [ 74.856949][ C1] page dumped because: kasan: bad access detected [ 74.863349][ C1] [ 74.865833][ C1] Memory state around the buggy address: [ 74.871635][ C1] ffff88809fa9ea00: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 74.880527][ C1] ffff88809fa9ea80: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 74.888732][ C1] >ffff88809fa9eb00: 04 fc fc fc fc fc fc fc fb fb fb fb fc fc fc fc [ 74.897091][ C1] ^ [ 74.901157][ C1] ffff88809fa9eb80: fb fb fb fb fc fc fc fc 00 00 fc fc fc fc fc fc [ 74.909385][ C1] ffff88809fa9ec00: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 74.917652][ C1] ================================================================== [ 74.926285][ C1] Disabling lock debugging due to kernel taint [ 74.932498][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 74.939080][ C1] CPU: 1 PID: 9236 Comm: syz-executor841 Tainted: G B 5.5.0-rc6-syzkaller #0 [ 74.949232][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.959363][ C1] Call Trace: [ 74.962669][ C1] [ 74.965587][ C1] dump_stack+0x1fb/0x318 [ 74.970043][ C1] panic+0x264/0x7a9 [ 74.974010][ C1] ? __kasan_report+0x193/0x1c0 [ 74.978844][ C1] ? trace_hardirqs_on+0x34/0x80 [ 74.983772][ C1] ? _raw_spin_unlock_irqrestore+0xa8/0xe0 [ 74.989845][ C1] __kasan_report+0x1b9/0x1c0 [ 74.994519][ C1] ? bitmap_port_gc+0x140/0x4b0 [ 74.999528][ C1] kasan_report+0x26/0x50 [ 75.003914][ C1] check_memory_region+0x2b6/0x2f0 [ 75.009015][ C1] __kasan_check_read+0x11/0x20 [ 75.014147][ C1] bitmap_port_gc+0x140/0x4b0 [ 75.018892][ C1] ? bitmap_port_create+0x790/0x790 [ 75.024377][ C1] call_timer_fn+0x95/0x170 [ 75.028870][ C1] ? bitmap_port_create+0x790/0x790 [ 75.034382][ C1] __run_timers+0x776/0x970 [ 75.038885][ C1] ? check_preemption_disabled+0x44/0x260 [ 75.044734][ C1] ? debug_smp_processor_id+0x9/0x20 [ 75.050005][ C1] run_timer_softirq+0x4a/0x90 [ 75.054869][ C1] __do_softirq+0x283/0x7bd [ 75.059366][ C1] ? irq_exit+0x227/0x230 [ 75.063673][ C1] irq_exit+0x227/0x230 [ 75.067811][ C1] smp_apic_timer_interrupt+0x113/0x280 [ 75.073446][ C1] apic_timer_interrupt+0xf/0x20 [ 75.078364][ C1] [ 75.081293][ C1] RIP: 0010:proc_tgid_base_lookup+0x0/0x260 [ 75.087392][ C1] Code: 5b d1 ff e9 49 ff ff ff 44 89 e9 80 e1 07 fe c1 38 c1 0f 8c 61 ff ff ff 4c 89 ef e8 ea 5a d1 ff e9 54 ff ff ff 0f 1f 44 00 00 <55> 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 18 49 89 f6 48 89 [ 75.107260][ C1] RSP: 0018:ffffc90003817b20 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 75.115779][ C1] RAX: ffffc90003817da0 RBX: ffffffff81e16520 RCX: dffffc0000000000 [ 75.123736][ C1] RDX: 0000000000000109 RSI: ffff888091382840 RDI: ffff888095e8db18 [ 75.131866][ C1] RBP: ffffc90003817d40 R08: ffffffff81bf7cc6 R09: fffffbfff145a112 [ 75.140043][ C1] R10: fffffbfff145a112 R11: 0000000000000000 R12: 0000000000008001 [ 75.148255][ C1] R13: 0000000000000000 R14: ffff888091382840 R15: dffffc0000000000 [ 75.156250][ C1] ? proc_pident_instantiate+0x2f0/0x2f0 [ 75.162005][ C1] ? path_openat+0x2056/0x4250 [ 75.166849][ C1] ? path_openat+0x20f1/0x4250 [ 75.171717][ C1] do_filp_open+0x192/0x3d0 [ 75.176241][ C1] ? noop_direct_IO+0x20/0x20 [ 75.180903][ C1] do_sys_open+0x29f/0x560 [ 75.185308][ C1] __x64_sys_open+0x87/0x90 [ 75.189912][ C1] do_syscall_64+0xf7/0x1c0 [ 75.194751][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 75.200703][ C1] RIP: 0033:0x4011a0 [ 75.204589][ C1] Code: 01 f0 ff ff 0f 83 c0 0b 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d 2d 15 2d 00 00 75 14 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 94 0b 00 00 c3 48 83 ec 08 e8 fa 00 00 00 [ 75.224604][ C1] RSP: 002b:00007ffc39fd9268 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 75.233014][ C1] RAX: ffffffffffffffda RBX: 00007ffc39fd9294 RCX: 00000000004011a0 [ 75.240977][ C1] RDX: 00007ffc39fd929a RSI: 0000000000080001 RDI: 00000000004a23c2 [ 75.249130][ C1] RBP: 00007ffc39fd9290 R08: 0000000000000000 R09: 0000000000000004 [ 75.257313][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004021c0 [ 75.265514][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 75.275767][ C1] Kernel Offset: disabled [ 75.280191][ C1] Rebooting in 86400 seconds..