Warning: Permanently added '10.128.1.61' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program syzkaller login: [ 137.439369][ T8442] netlink: 24 bytes leftover after parsing attributes in process `syz-executor945'. [ 137.463209][ T8448] netlink: 24 bytes leftover after parsing attributes in process `syz-executor945'. [ 137.494143][ T8450] netlink: 24 bytes leftover after parsing attributes in process `syz-executor945'. [ 137.531937][ T8449] netlink: 24 bytes leftover after parsing attributes in process `syz-executor945'. [ 137.564166][ T8447] netlink: 24 bytes leftover after parsing attributes in process `syz-executor945'. [ 137.599351][ T8446] netlink: 24 bytes leftover after parsing attributes in process `syz-executor945'. [ 137.796121][ T8472] netlink: 4 bytes leftover after parsing attributes in process `syz-executor945'. [ 137.856337][ T8448] netlink: 4 bytes leftover after parsing attributes in process `syz-executor945'. [ 137.913465][ T8489] netlink: 4 bytes leftover after parsing attributes in process `syz-executor945'. [ 137.973000][ T8488] netlink: 4 bytes leftover after parsing attributes in process `syz-executor945'. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 142.646051][ T9694] __nla_validate_parse: 89 callbacks suppressed [ 142.646069][ T9694] netlink: 4 bytes leftover after parsing attributes in process `syz-executor945'. executing program [ 142.848306][ T9710] netlink: 4 bytes leftover after parsing attributes in process `syz-executor945'. [ 142.934828][ T9704] netlink: 4 bytes leftover after parsing attributes in process `syz-executor945'. [ 143.007687][ T9734] netlink: 24 bytes leftover after parsing attributes in process `syz-executor945'. [ 143.094395][ T9742] netlink: 4 bytes leftover after parsing attributes in process `syz-executor945'. executing program [ 143.180186][ T9762] netlink: 24 bytes leftover after parsing attributes in process `syz-executor945'. executing program [ 143.291024][ T9778] netlink: 4 bytes leftover after parsing attributes in process `syz-executor945'. executing program executing program [ 143.379820][ T9811] netlink: 24 bytes leftover after parsing attributes in process `syz-executor945'. [ 143.465603][ T9838] netlink: 24 bytes leftover after parsing attributes in process `syz-executor945'. [ 143.518137][ T9839] netlink: 4 bytes leftover after parsing attributes in process `syz-executor945'. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 147.759089][T11048] __nla_validate_parse: 94 callbacks suppressed [ 147.759106][T11048] netlink: 24 bytes leftover after parsing attributes in process `syz-executor945'. [ 147.877357][T11046] netlink: 24 bytes leftover after parsing attributes in process `syz-executor945'. [ 147.905021][T11028] netlink: 4 bytes leftover after parsing attributes in process `syz-executor945'. executing program [ 147.931906][T11047] netlink: 24 bytes leftover after parsing attributes in process `syz-executor945'. [ 148.021291][T11073] netlink: 4 bytes leftover after parsing attributes in process `syz-executor945'. [ 148.067204][T11071] netlink: 4 bytes leftover after parsing attributes in process `syz-executor945'. [ 148.121419][T11072] netlink: 4 bytes leftover after parsing attributes in process `syz-executor945'. [ 148.193358][T11070] netlink: 24 bytes leftover after parsing attributes in process `syz-executor945'. [ 148.324112][T11100] netlink: 4 bytes leftover after parsing attributes in process `syz-executor945'. executing program [ 148.418526][T11114] netlink: 24 bytes leftover after parsing attributes in process `syz-executor945'. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 151.571093][T11928] ================================================================== [ 151.579483][T11928] BUG: KASAN: use-after-free in macvlan_dev_get_iflink+0x5f/0x70 [ 151.587248][T11928] Read of size 4 at addr ffff888014dec0d0 by task syz-executor945/11928 [ 151.595600][T11928] [ 151.597937][T11928] CPU: 0 PID: 11928 Comm: syz-executor945 Not tainted 5.13.0-rc2-next-20210518-syzkaller #0 [ 151.608016][T11928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.618174][T11928] Call Trace: [ 151.621476][T11928] dump_stack_lvl+0x13e/0x1d6 [ 151.626331][T11928] ? macvlan_dev_get_iflink+0x5f/0x70 [ 151.631741][T11928] print_address_description.constprop.0.cold+0x6c/0x309 [ 151.638800][T11928] ? macvlan_dev_get_iflink+0x5f/0x70 [ 151.644225][T11928] ? macvlan_dev_get_iflink+0x5f/0x70 [ 151.649653][T11928] kasan_report.cold+0x83/0xdf [ 151.654449][T11928] ? macvlan_dev_get_iflink+0x5f/0x70 [ 151.659935][T11928] macvlan_dev_get_iflink+0x5f/0x70 [ 151.665257][T11928] ? macvlan_dev_poll_controller+0x10/0x10 [ 151.671098][T11928] dev_get_iflink+0x73/0xe0 [ 151.675812][T11928] rfc2863_policy+0x233/0x2d0 [ 151.680553][T11928] linkwatch_do_dev+0x2a/0x1b0 [ 151.685433][T11928] linkwatch_forget_dev+0x16a/0x200 [ 151.690752][T11928] netdev_run_todo+0x402/0xa80 [ 151.695645][T11928] ? slab_free_freelist_hook+0xdf/0x240 [ 151.701221][T11928] ? generic_xdp_install+0x7b0/0x7b0 [ 151.706544][T11928] ? rtnl_newlink+0x6f/0xa0 [ 151.711191][T11928] ? __rtnl_newlink+0x1710/0x1710 [ 151.716252][T11928] rtnetlink_rcv_msg+0x420/0xb80 [ 151.721217][T11928] ? rtnl_newlink+0xa0/0xa0 [ 151.725770][T11928] netlink_rcv_skb+0x153/0x420 [ 151.730562][T11928] ? rtnl_newlink+0xa0/0xa0 [ 151.735093][T11928] ? netlink_ack+0xaa0/0xaa0 [ 151.739789][T11928] ? netlink_deliver_tap+0x1a2/0xbc0 [ 151.745222][T11928] netlink_unicast+0x533/0x7d0 [ 151.750049][T11928] ? netlink_attachskb+0x870/0x870 [ 151.755273][T11928] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 151.761655][T11928] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 151.767929][T11928] ? __phys_addr_symbol+0x2c/0x70 [ 151.772977][T11928] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 151.778833][T11928] ? __check_object_size+0x16e/0x3f0 [ 151.784152][T11928] netlink_sendmsg+0x84c/0xd90 [ 151.788948][T11928] ? netlink_unicast+0x7d0/0x7d0 [ 151.794007][T11928] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 151.800302][T11928] ? netlink_unicast+0x7d0/0x7d0 [ 151.805261][T11928] sock_sendmsg+0xcf/0x120 [ 151.809704][T11928] ____sys_sendmsg+0x6e8/0x810 [ 151.814582][T11928] ? kernel_sendmsg+0x50/0x50 [ 151.819280][T11928] ? do_recvmmsg+0x6d0/0x6d0 [ 151.823903][T11928] ? lock_chain_count+0x20/0x20 [ 151.828784][T11928] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 151.834795][T11928] ___sys_sendmsg+0xf3/0x170 [ 151.839510][T11928] ? sendmsg_copy_msghdr+0x160/0x160 [ 151.844917][T11928] ? __fget_files+0x21b/0x3e0 [ 151.849705][T11928] ? lock_downgrade+0x6e0/0x6e0 [ 151.854766][T11928] ? __fget_files+0x23d/0x3e0 [ 151.859471][T11928] ? __fget_light+0xea/0x280 [ 151.864266][T11928] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 151.871095][T11928] __sys_sendmsg+0xe5/0x1b0 [ 151.875896][T11928] ? __sys_sendmsg_sock+0x30/0x30 [ 151.880966][T11928] ? syscall_enter_from_user_mode+0x21/0x70 [ 151.886890][T11928] do_syscall_64+0x31/0xb0 [ 151.891861][T11928] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 151.897868][T11928] RIP: 0033:0x445eb9 [ 151.901789][T11928] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 151.921507][T11928] RSP: 002b:00007f149c7be308 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 151.929945][T11928] RAX: ffffffffffffffda RBX: 00000000004cb478 RCX: 0000000000445eb9 [ 151.937939][T11928] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000006 [ 151.946376][T11928] RBP: 00000000004cb470 R08: 0000000000000008 R09: 0000000000000000 [ 151.954549][T11928] R10: 0000000000000005 R11: 0000000000000246 R12: 00000000004cb47c [ 151.962541][T11928] R13: 000000000049b074 R14: 006e616c7663616d R15: 0000000000022000 [ 151.970639][T11928] [ 151.972981][T11928] Allocated by task 11914: [ 151.977404][T11928] kasan_save_stack+0x1b/0x40 [ 151.982104][T11928] __kasan_kmalloc+0x9b/0xd0 [ 151.986724][T11928] kvmalloc_node+0x61/0xf0 [ 151.991161][T11928] alloc_netdev_mqs+0x98/0xe80 [ 151.995945][T11928] rtnl_create_link+0x1a4/0xae0 [ 152.000824][T11928] __rtnl_newlink+0xf72/0x1710 [ 152.005682][T11928] rtnl_newlink+0x64/0xa0 [ 152.010033][T11928] rtnetlink_rcv_msg+0x413/0xb80 [ 152.014991][T11928] netlink_rcv_skb+0x153/0x420 [ 152.019778][T11928] netlink_unicast+0x533/0x7d0 [ 152.024547][T11928] netlink_sendmsg+0x84c/0xd90 [ 152.029338][T11928] sock_sendmsg+0xcf/0x120 [ 152.033768][T11928] ____sys_sendmsg+0x6e8/0x810 [ 152.038646][T11928] ___sys_sendmsg+0xf3/0x170 [ 152.043362][T11928] __sys_sendmsg+0xe5/0x1b0 [ 152.047889][T11928] do_syscall_64+0x31/0xb0 [ 152.052324][T11928] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 152.058258][T11928] [ 152.060639][T11928] Freed by task 11940: [ 152.064816][T11928] kasan_save_stack+0x1b/0x40 [ 152.069544][T11928] kasan_set_track+0x1c/0x30 [ 152.074157][T11928] kasan_set_free_info+0x20/0x30 [ 152.079202][T11928] __kasan_slab_free+0xfb/0x130 [ 152.084170][T11928] slab_free_freelist_hook+0xdf/0x240 [ 152.089853][T11928] kfree+0xeb/0x650 [ 152.094024][T11928] kvfree+0x42/0x50 [ 152.097868][T11928] device_release+0x9f/0x240 [ 152.102486][T11928] kobject_put+0x1c8/0x540 [ 152.106961][T11928] netdev_run_todo+0x75a/0xa80 [ 152.111739][T11928] rtnetlink_rcv_msg+0x420/0xb80 [ 152.116684][T11928] netlink_rcv_skb+0x153/0x420 [ 152.121459][T11928] netlink_unicast+0x533/0x7d0 [ 152.126233][T11928] netlink_sendmsg+0x84c/0xd90 [ 152.131328][T11928] sock_sendmsg+0xcf/0x120 [ 152.135872][T11928] ____sys_sendmsg+0x6e8/0x810 [ 152.140671][T11928] ___sys_sendmsg+0xf3/0x170 [ 152.145271][T11928] __sys_sendmsg+0xe5/0x1b0 [ 152.149787][T11928] do_syscall_64+0x31/0xb0 [ 152.154206][T11928] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 152.160196][T11928] [ 152.162650][T11928] The buggy address belongs to the object at ffff888014dec000 [ 152.162650][T11928] which belongs to the cache kmalloc-4k of size 4096 [ 152.176926][T11928] The buggy address is located 208 bytes inside of [ 152.176926][T11928] 4096-byte region [ffff888014dec000, ffff888014ded000) [ 152.190584][T11928] The buggy address belongs to the page: [ 152.196230][T11928] page:ffffea0000537a00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14de8 [ 152.206587][T11928] head:ffffea0000537a00 order:3 compound_mapcount:0 compound_pincount:0 [ 152.214919][T11928] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 152.222919][T11928] raw: 00fff00000010200 0000000000000000 0000000100000001 ffff888011042140 [ 152.231511][T11928] raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000 [ 152.240316][T11928] page dumped because: kasan: bad access detected [ 152.247002][T11928] page_owner tracks the page as allocated [ 152.252813][T11928] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 4861, ts 145797285780, free_ts 145696904212 [ 152.271618][T11928] get_page_from_freelist+0x125c/0x2ed0 [ 152.277497][T11928] __alloc_pages+0x1b2/0x500 [ 152.282103][T11928] alloc_pages+0x18c/0x2a0 [ 152.286568][T11928] allocate_slab+0x2c2/0x4c0 [ 152.291183][T11928] ___slab_alloc+0x4ba/0x820 [ 152.295888][T11928] __slab_alloc.constprop.0+0xa7/0xf0 [ 152.301266][T11928] __kmalloc+0x312/0x330 [ 152.305698][T11928] tomoyo_realpath_from_path+0xc3/0x620 [ 152.311482][T11928] tomoyo_path_perm+0x21b/0x400 [ 152.316344][T11928] security_inode_getattr+0xcf/0x140 [ 152.321762][T11928] vfs_fstat+0x43/0xb0 [ 152.325842][T11928] __do_sys_newfstat+0x81/0x100 [ 152.330941][T11928] do_syscall_64+0x31/0xb0 [ 152.335397][T11928] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 152.341511][T11928] page last free stack trace: [ 152.346396][T11928] __free_pages_ok+0x4cb/0xf30 [ 152.351395][T11928] unfreeze_partials+0x17c/0x1d0 [ 152.356386][T11928] put_cpu_partial+0x13d/0x230 [ 152.361171][T11928] qlist_free_all+0x5a/0xc0 [ 152.365698][T11928] kasan_quarantine_reduce+0x180/0x200 [ 152.371279][T11928] __kasan_slab_alloc+0x8e/0xa0 [ 152.376153][T11928] kmem_cache_alloc+0x285/0x4a0 [ 152.381229][T11928] __pmd_alloc+0xbf/0x5c0 [ 152.385567][T11928] __handle_mm_fault+0xd6c/0x5200 [ 152.391730][T11928] handle_mm_fault+0x1b9/0x7e0 [ 152.396996][T11928] do_user_addr_fault+0x483/0x1210 [ 152.404054][T11928] exc_page_fault+0x9e/0x180 [ 152.408656][T11928] asm_exc_page_fault+0x1e/0x30 [ 152.413518][T11928] [ 152.415840][T11928] Memory state around the buggy address: [ 152.422002][T11928] ffff888014debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 152.430158][T11928] ffff888014dec000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 152.438260][T11928] >ffff888014dec080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 152.446516][T11928] ^ [ 152.453528][T11928] ffff888014dec100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 152.461599][T11928] ffff888014dec180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb executing program executing program [ 152.469699][T11928] ================================================================== [ 152.477762][T11928] Disabling lock debugging due to kernel taint [ 152.485811][T11928] Kernel panic - not syncing: panic_on_warn set ... [ 152.492410][T11928] CPU: 0 PID: 11928 Comm: syz-executor945 Tainted: G B 5.13.0-rc2-next-20210518-syzkaller #0 [ 152.504506][T11928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.514578][T11928] Call Trace: [ 152.517868][T11928] dump_stack_lvl+0x13e/0x1d6 [ 152.522571][T11928] ? macvlan_ethtool_get_ts_info+0x1f0/0x230 [ 152.528565][T11928] panic+0x306/0x73d [ 152.532485][T11928] ? __warn_printk+0xf3/0xf3 [ 152.537185][T11928] ? preempt_schedule_common+0x59/0xc0 [ 152.542751][T11928] ? macvlan_dev_get_iflink+0x5f/0x70 [ 152.548145][T11928] ? preempt_schedule_thunk+0x16/0x18 [ 152.553534][T11928] ? trace_hardirqs_on+0x38/0x1c0 [ 152.558577][T11928] ? trace_hardirqs_on+0x51/0x1c0 [ 152.563623][T11928] ? macvlan_dev_get_iflink+0x5f/0x70 [ 152.569538][T11928] ? macvlan_dev_get_iflink+0x5f/0x70 [ 152.574932][T11928] end_report.cold+0x5a/0x5a [ 152.579546][T11928] kasan_report.cold+0x71/0xdf [ 152.584537][T11928] ? macvlan_dev_get_iflink+0x5f/0x70 [ 152.589927][T11928] macvlan_dev_get_iflink+0x5f/0x70 [ 152.595151][T11928] ? macvlan_dev_poll_controller+0x10/0x10 [ 152.600975][T11928] dev_get_iflink+0x73/0xe0 [ 152.605530][T11928] rfc2863_policy+0x233/0x2d0 [ 152.610245][T11928] linkwatch_do_dev+0x2a/0x1b0 [ 152.615031][T11928] linkwatch_forget_dev+0x16a/0x200 [ 152.620353][T11928] netdev_run_todo+0x402/0xa80 [ 152.625173][T11928] ? slab_free_freelist_hook+0xdf/0x240 [ 152.630750][T11928] ? generic_xdp_install+0x7b0/0x7b0 [ 152.636070][T11928] ? rtnl_newlink+0x6f/0xa0 [ 152.640594][T11928] ? __rtnl_newlink+0x1710/0x1710 [ 152.645804][T11928] rtnetlink_rcv_msg+0x420/0xb80 [ 152.650770][T11928] ? rtnl_newlink+0xa0/0xa0 [ 152.655298][T11928] netlink_rcv_skb+0x153/0x420 [ 152.660211][T11928] ? rtnl_newlink+0xa0/0xa0 [ 152.664818][T11928] ? netlink_ack+0xaa0/0xaa0 [ 152.669420][T11928] ? netlink_deliver_tap+0x1a2/0xbc0 [ 152.674727][T11928] netlink_unicast+0x533/0x7d0 [ 152.679634][T11928] ? netlink_attachskb+0x870/0x870 [ 152.684770][T11928] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 152.691203][T11928] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 152.697464][T11928] ? __phys_addr_symbol+0x2c/0x70 [ 152.702507][T11928] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 152.708243][T11928] ? __check_object_size+0x16e/0x3f0 [ 152.713559][T11928] netlink_sendmsg+0x84c/0xd90 [ 152.718910][T11928] ? netlink_unicast+0x7d0/0x7d0 [ 152.724353][T11928] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 152.730618][T11928] ? netlink_unicast+0x7d0/0x7d0 [ 152.735702][T11928] sock_sendmsg+0xcf/0x120 [ 152.740316][T11928] ____sys_sendmsg+0x6e8/0x810 [ 152.745108][T11928] ? kernel_sendmsg+0x50/0x50 [ 152.750154][T11928] ? do_recvmmsg+0x6d0/0x6d0 [ 152.754959][T11928] ? lock_chain_count+0x20/0x20 [ 152.760287][T11928] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 152.766475][T11928] ___sys_sendmsg+0xf3/0x170 [ 152.771099][T11928] ? sendmsg_copy_msghdr+0x160/0x160 [ 152.776455][T11928] ? __fget_files+0x21b/0x3e0 [ 152.781145][T11928] ? lock_downgrade+0x6e0/0x6e0 [ 152.786089][T11928] ? __fget_files+0x23d/0x3e0 [ 152.790783][T11928] ? __fget_light+0xea/0x280 [ 152.795681][T11928] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 152.804550][T11928] __sys_sendmsg+0xe5/0x1b0 [ 152.809168][T11928] ? __sys_sendmsg_sock+0x30/0x30 [ 152.814398][T11928] ? syscall_enter_from_user_mode+0x21/0x70 [ 152.820346][T11928] do_syscall_64+0x31/0xb0 [ 152.824782][T11928] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 152.831132][T11928] RIP: 0033:0x445eb9 [ 152.835040][T11928] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 152.855239][T11928] RSP: 002b:00007f149c7be308 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 152.863856][T11928] RAX: ffffffffffffffda RBX: 00000000004cb478 RCX: 0000000000445eb9 [ 152.871933][T11928] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000006 [ 152.880190][T11928] RBP: 00000000004cb470 R08: 0000000000000008 R09: 0000000000000000 [ 152.888730][T11928] R10: 0000000000000005 R11: 0000000000000246 R12: 00000000004cb47c [ 152.907323][T11928] R13: 000000000049b074 R14: 006e616c7663616d R15: 0000000000022000 [ 152.917133][T11928] Kernel Offset: disabled [ 152.922141][T11928] Rebooting in 86400 seconds..