Warning: Permanently added '10.128.0.255' (ECDSA) to the list of known hosts. 2020/07/04 13:46:07 parsed 1 programs 2020/07/04 13:46:07 executed programs: 0 syzkaller login: [ 38.971802] audit: type=1400 audit(1593870367.360:8): avc: denied { execmem } for pid=6455 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 38.998915] IPVS: ftp: loaded support on port[0] = 21 [ 39.080206] chnl_net:caif_netlink_parms(): no params data found [ 39.171955] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.179894] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.187825] device bridge_slave_0 entered promiscuous mode [ 39.195167] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.201840] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.209877] device bridge_slave_1 entered promiscuous mode [ 39.227213] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 39.236434] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 39.254484] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 39.262728] team0: Port device team_slave_0 added [ 39.268982] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 39.276719] team0: Port device team_slave_1 added [ 39.293056] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.299822] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.326109] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.337633] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.343873] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.369271] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.379963] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 39.387699] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 39.438111] device hsr_slave_0 entered promiscuous mode [ 39.485791] device hsr_slave_1 entered promiscuous mode [ 39.526112] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 39.533158] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 39.601711] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.608282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.615024] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.621458] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.654119] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 39.660297] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.668818] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 39.678505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.697924] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.706404] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.714334] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 39.725820] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 39.731926] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.740962] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.748998] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.755430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.764785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.772852] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.779244] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.795076] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 39.810577] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 39.820911] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 39.832249] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 39.839312] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 39.847687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 39.856115] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.863719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.871919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 39.883876] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 39.892842] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 39.900154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 39.910712] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.923301] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 39.933377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.965672] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 39.972652] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 39.980561] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 39.990294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.998116] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.005208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.013640] device veth0_vlan entered promiscuous mode [ 40.023669] device veth1_vlan entered promiscuous mode [ 40.029940] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 40.038713] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 40.051032] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 40.061637] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 40.069241] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 40.077252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.091268] device veth0_macvtap entered promiscuous mode [ 40.100049] device veth1_macvtap entered promiscuous mode [ 40.109317] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 40.119988] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 40.130052] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 40.138079] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.144731] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 40.153397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.164326] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 40.171410] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.178053] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 40.186299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.216307] team0 (unregistering): Port device team_slave_0 removed [ 41.336138] team0 (unregistering): Port device team_slave_1 removed [ 41.530393] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 41.537660] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 41.549567] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 41.556813] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 42.527652] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.680147] device bridge_slave_0 left promiscuous mode [ 42.685714] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.135331] bond0: Releasing backup interface bond_slave_1 2020/07/04 13:46:12 executed programs: 11 [ 44.432372] device hsr_slave_0 left promiscuous mode [ 44.472309] device hsr_slave_1 left promiscuous mode [ 46.721598] ================================================================== [ 46.729063] BUG: KASAN: use-after-free in free_netdev+0x3a7/0x410 [ 46.735279] Read of size 8 at addr ffff8880874134e0 by task syz-executor.0/6900 [ 46.742737] [ 46.744358] CPU: 1 PID: 6900 Comm: syz-executor.0 Not tainted 4.19.131-syzkaller #0 [ 46.752172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 46.761503] Call Trace: [ 46.764195] dump_stack+0x1fc/0x2fe [ 46.767819] print_address_description.cold+0x54/0x219 [ 46.773080] kasan_report_error.cold+0x8a/0x1c7 [ 46.777741] ? free_netdev+0x3a7/0x410 [ 46.781614] __asan_report_load8_noabort+0x88/0x90 [ 46.786529] ? free_netdev+0x3a7/0x410 [ 46.790400] free_netdev+0x3a7/0x410 [ 46.794098] netdev_run_todo+0x89b/0xab0 [ 46.798145] ? default_device_exit_batch+0x3c0/0x3c0 [ 46.803241] ? rtnl_newlink+0x15a0/0x15a0 [ 46.807387] rtnetlink_rcv_msg+0x460/0xb80 [ 46.811606] ? rtnl_calcit.isra.0+0x430/0x430 [ 46.816082] ? memcpy+0x35/0x50 [ 46.819356] ? netdev_pick_tx+0x2f0/0x2f0 [ 46.823486] ? __copy_skb_header+0x414/0x500 [ 46.827874] ? kfree_skbmem+0x140/0x140 [ 46.831831] netlink_rcv_skb+0x160/0x440 [ 46.835873] ? rtnl_calcit.isra.0+0x430/0x430 [ 46.840347] ? netlink_ack+0xae0/0xae0 [ 46.844223] netlink_unicast+0x4d5/0x690 [ 46.848266] ? netlink_sendskb+0x110/0x110 [ 46.852486] netlink_sendmsg+0x6bb/0xc40 [ 46.856529] ? nlmsg_notify+0x1a0/0x1a0 [ 46.860506] ? kernel_recvmsg+0x220/0x220 [ 46.864647] ? nlmsg_notify+0x1a0/0x1a0 [ 46.868601] sock_sendmsg+0xc3/0x120 [ 46.872296] ___sys_sendmsg+0x7bb/0x8e0 [ 46.876250] ? __lock_acquire+0x6de/0x3ff0 [ 46.880467] ? copy_msghdr_from_user+0x440/0x440 [ 46.885205] ? __fget+0x32f/0x510 [ 46.888639] ? lock_downgrade+0x720/0x720 [ 46.893614] ? check_preemption_disabled+0x41/0x280 [ 46.898609] ? check_preemption_disabled+0x41/0x280 [ 46.903608] ? __fget+0x356/0x510 [ 46.907043] ? do_dup2+0x450/0x450 [ 46.910601] ? __fdget+0x1d0/0x230 [ 46.914128] __x64_sys_sendmsg+0x132/0x220 [ 46.918345] ? __sys_sendmsg+0x1b0/0x1b0 [ 46.922405] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 46.927154] ? trace_hardirqs_off_caller+0x69/0x210 [ 46.932150] ? do_syscall_64+0x21/0x620 [ 46.936108] do_syscall_64+0xf9/0x620 [ 46.939892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 46.945078] RIP: 0033:0x45cb29 [ 46.948362] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 46.967426] RSP: 002b:00007feb6fbacc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 46.975171] RAX: ffffffffffffffda RBX: 0000000000502760 RCX: 000000000045cb29 [ 46.982427] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005 [ 46.989702] RBP: 000000000078c040 R08: 0000000000000000 R09: 0000000000000000 [ 46.996952] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 47.004242] R13: 0000000000000a43 R14: 00000000004cd2a1 R15: 00007feb6fbad6d4 [ 47.011504] [ 47.013113] Allocated by task 6888: [ 47.016724] __kmalloc+0x15a/0x3c0 [ 47.020252] sk_prot_alloc+0x1e2/0x2d0 [ 47.024116] sk_alloc+0x36/0xec0 [ 47.027521] tun_chr_open+0x7b/0x560 [ 47.031215] misc_open+0x372/0x4a0 [ 47.034735] chrdev_open+0x266/0x770 [ 47.038428] do_dentry_open+0x4aa/0x1160 [ 47.042472] path_openat+0x793/0x2df0 [ 47.046251] do_filp_open+0x18c/0x3f0 [ 47.050031] do_sys_open+0x3b3/0x520 [ 47.053725] do_syscall_64+0xf9/0x620 [ 47.057506] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 47.062668] [ 47.064274] Freed by task 6887: [ 47.067534] kfree+0xcc/0x210 [ 47.070618] __sk_destruct+0x5ff/0x810 [ 47.074483] __sk_free+0x165/0x3b0 [ 47.078018] sk_free+0x3b/0x50 [ 47.081192] __tun_detach+0xccb/0x1320 [ 47.086273] tun_chr_close+0x10e/0x180 [ 47.090138] __fput+0x2ce/0x890 [ 47.093408] task_work_run+0x148/0x1c0 [ 47.097273] exit_to_usermode_loop+0x251/0x2a0 [ 47.101834] do_syscall_64+0x538/0x620 [ 47.105724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 47.111418] [ 47.113030] The buggy address belongs to the object at ffff888087412e40 [ 47.113030] which belongs to the cache kmalloc-4096 of size 4096 [ 47.125843] The buggy address is located 1696 bytes inside of [ 47.125843] 4096-byte region [ffff888087412e40, ffff888087413e40) [ 47.137867] The buggy address belongs to the page: [ 47.142791] page:ffffea00021d0480 count:1 mapcount:0 mapping:ffff88812c39cdc0 index:0x0 compound_mapcount: 0 [ 47.152735] flags: 0xfffe0000008100(slab|head) [ 47.157300] raw: 00fffe0000008100 ffffea0002775388 ffffea000278e208 ffff88812c39cdc0 [ 47.165170] raw: 0000000000000000 ffff888087412e40 0000000100000001 0000000000000000 [ 47.173026] page dumped because: kasan: bad access detected [ 47.178714] [ 47.180325] Memory state around the buggy address: [ 47.185239] ffff888087413380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.192586] ffff888087413400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.199923] >ffff888087413480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.207258] ^ [ 47.213727] ffff888087413500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.221064] ffff888087413580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.228395] ================================================================== [ 47.235730] Disabling lock debugging due to kernel taint [ 47.245648] Kernel panic - not syncing: panic_on_warn set ... [ 47.245648] [ 47.253562] CPU: 0 PID: 6900 Comm: syz-executor.0 Tainted: G B 4.19.131-syzkaller #0 [ 47.262834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 47.272272] Call Trace: [ 47.274866] dump_stack+0x1fc/0x2fe [ 47.278545] panic+0x26a/0x50e [ 47.281720] ? __warn_printk+0xf3/0xf3 [ 47.285587] ? preempt_schedule_common+0x45/0xc0 [ 47.290321] ? ___preempt_schedule+0x16/0x18 [ 47.294883] ? trace_hardirqs_on+0x55/0x210 [ 47.299187] kasan_end_report+0x43/0x49 [ 47.303142] kasan_report_error.cold+0xa7/0x1c7 [ 47.314221] ? free_netdev+0x3a7/0x410 [ 47.327346] __asan_report_load8_noabort+0x88/0x90 [ 47.332367] ? free_netdev+0x3a7/0x410 [ 47.336243] free_netdev+0x3a7/0x410 [ 47.340456] netdev_run_todo+0x89b/0xab0 [ 47.344526] ? default_device_exit_batch+0x3c0/0x3c0 [ 47.349611] ? rtnl_newlink+0x15a0/0x15a0 [ 47.353739] rtnetlink_rcv_msg+0x460/0xb80 [ 47.357964] ? rtnl_calcit.isra.0+0x430/0x430 [ 47.362456] ? memcpy+0x35/0x50 [ 47.365809] ? netdev_pick_tx+0x2f0/0x2f0 [ 47.369935] ? __copy_skb_header+0x414/0x500 [ 47.374326] ? kfree_skbmem+0x140/0x140 [ 47.378282] netlink_rcv_skb+0x160/0x440 [ 47.382331] ? rtnl_calcit.isra.0+0x430/0x430 [ 47.386804] ? netlink_ack+0xae0/0xae0 [ 47.390688] netlink_unicast+0x4d5/0x690 [ 47.394730] ? netlink_sendskb+0x110/0x110 [ 47.398944] netlink_sendmsg+0x6bb/0xc40 [ 47.402984] ? nlmsg_notify+0x1a0/0x1a0 [ 47.408098] ? kernel_recvmsg+0x220/0x220 [ 47.412246] ? nlmsg_notify+0x1a0/0x1a0 [ 47.416197] sock_sendmsg+0xc3/0x120 [ 47.419888] ___sys_sendmsg+0x7bb/0x8e0 [ 47.423859] ? __lock_acquire+0x6de/0x3ff0 [ 47.428072] ? copy_msghdr_from_user+0x440/0x440 [ 47.432809] ? __fget+0x32f/0x510 [ 47.436245] ? lock_downgrade+0x720/0x720 [ 47.440391] ? check_preemption_disabled+0x41/0x280 [ 47.445395] ? check_preemption_disabled+0x41/0x280 [ 47.450413] ? __fget+0x356/0x510 [ 47.453869] ? do_dup2+0x450/0x450 [ 47.458345] ? __fdget+0x1d0/0x230 [ 47.462735] __x64_sys_sendmsg+0x132/0x220 [ 47.466947] ? __sys_sendmsg+0x1b0/0x1b0 [ 47.470991] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 47.475724] ? trace_hardirqs_off_caller+0x69/0x210 [ 47.480724] ? do_syscall_64+0x21/0x620 [ 47.484684] do_syscall_64+0xf9/0x620 [ 47.488465] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 47.493635] RIP: 0033:0x45cb29 [ 47.496808] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 47.515963] RSP: 002b:00007feb6fbacc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 47.523655] RAX: ffffffffffffffda RBX: 0000000000502760 RCX: 000000000045cb29 [ 47.530904] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005 [ 47.538162] RBP: 000000000078c040 R08: 0000000000000000 R09: 0000000000000000 [ 47.545415] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 47.552664] R13: 0000000000000a43 R14: 00000000004cd2a1 R15: 00007feb6fbad6d4 [ 47.561564] Kernel Offset: disabled [ 47.565203] Rebooting in 86400 seconds..