Warning: Permanently added '10.128.1.15' (ECDSA) to the list of known hosts. [ 66.337928] audit: type=1400 audit(1578323826.724:37): avc: denied { map } for pid=7870 comm="syz-executor650" path="/root/syz-executor650554034" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 66.358533] IPVS: ftp: loaded support on port[0] = 21 [ 66.391680] audit: type=1400 audit(1578323826.774:38): avc: denied { create } for pid=7871 comm="syz-executor650" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 66.417609] audit: type=1400 audit(1578323826.774:39): avc: denied { write } for pid=7871 comm="syz-executor650" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 66.442408] audit: type=1400 audit(1578323826.774:40): avc: denied { read } for pid=7871 comm="syz-executor650" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 66.491053] chnl_net:caif_netlink_parms(): no params data found [ 66.526962] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.533576] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.540896] device bridge_slave_0 entered promiscuous mode [ 66.548388] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.554893] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.561796] device bridge_slave_1 entered promiscuous mode [ 66.577691] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 66.586833] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 66.603619] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 66.611321] team0: Port device team_slave_0 added [ 66.616960] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 66.624118] team0: Port device team_slave_1 added [ 66.629698] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 66.637373] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 66.696581] device hsr_slave_0 entered promiscuous mode [ 66.734928] device hsr_slave_1 entered promiscuous mode [ 66.775309] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 66.782399] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 66.827789] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.834238] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.841240] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.847617] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.880390] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 66.887596] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.896557] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 66.906828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.925756] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.933000] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.940683] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 66.950731] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 66.957141] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.966318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.974108] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.980522] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.990406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.998437] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.004863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.020696] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 67.028377] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 67.043256] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 67.053495] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 67.064930] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 67.072580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.080725] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.089148] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.097034] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 67.109214] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 67.117680] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 67.124543] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 67.135952] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.148402] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 67.159318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 67.199102] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 67.207771] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 67.214273] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 67.223611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.231562] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.240135] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready executing program [ 67.249658] device veth0_vlan entered promiscuous mode [ 67.258833] device veth1_vlan entered promiscuous mode [ 67.264818] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 67.274124] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 67.314921] protocol 88fb is buggy, dev hsr_slave_0 [ 67.320136] protocol 88fb is buggy, dev hsr_slave_1 [ 67.326283] ================================================================== [ 67.333721] BUG: KASAN: use-after-free in macvlan_broadcast+0x57c/0x660 [ 67.340476] Read of size 4 at addr ffff88808dec1841 by task syz-executor650/7871 [ 67.347988] [ 67.349607] CPU: 0 PID: 7871 Comm: syz-executor650 Not tainted 4.19.93-syzkaller #0 [ 67.357390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.366738] Call Trace: [ 67.369314] dump_stack+0x197/0x210 [ 67.372942] ? macvlan_broadcast+0x57c/0x660 [ 67.377335] print_address_description.cold+0x7c/0x20d [ 67.382593] ? macvlan_broadcast+0x57c/0x660 [ 67.386997] kasan_report.cold+0x8c/0x2ba [ 67.391131] __asan_report_load_n_noabort+0xf/0x20 [ 67.396057] macvlan_broadcast+0x57c/0x660 [ 67.400296] macvlan_start_xmit+0x408/0x785 [ 67.404612] dev_direct_xmit+0x34d/0x650 [ 67.408666] ? validate_xmit_skb_list+0x130/0x130 [ 67.413495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 67.419025] ? skb_copy_datagram_from_iter+0x441/0x660 [ 67.424302] packet_direct_xmit+0xf9/0x170 [ 67.428526] packet_sendmsg+0x3bb2/0x6440 [ 67.432674] ? packet_notifier+0x840/0x840 [ 67.436896] ? release_sock+0x156/0x1c0 [ 67.440861] ? selinux_socket_sendmsg+0x36/0x40 [ 67.445601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 67.451124] ? security_socket_sendmsg+0x8d/0xc0 [ 67.455868] ? packet_notifier+0x840/0x840 [ 67.460097] sock_sendmsg+0xd7/0x130 [ 67.463802] __sys_sendto+0x262/0x380 [ 67.467588] ? __ia32_sys_getpeername+0xb0/0xb0 [ 67.472249] ? __ia32_sys_socketpair+0xf0/0xf0 [ 67.476829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 67.482361] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 67.487102] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 67.491841] ? do_syscall_64+0x26/0x620 [ 67.495800] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 67.501162] __x64_sys_sendto+0xe1/0x1a0 [ 67.505215] do_syscall_64+0xfd/0x620 [ 67.509012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 67.514197] RIP: 0033:0x442529 [ 67.517374] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b 10 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 67.536278] RSP: 002b:00007ffe90cc3aa8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 67.543972] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000442529 [ 67.551329] RDX: 000000000000000e RSI: 0000000020000080 RDI: 0000000000000003 [ 67.558594] RBP: 0000000000000004 R08: 0000000000000000 R09: 0000000000000000 [ 67.565856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 67.573193] R13: 0000000000403aa0 R14: 0000000000000000 R15: 0000000000000000 [ 67.580454] [ 67.582075] Allocated by task 6576: [ 67.585702] save_stack+0x45/0xd0 [ 67.589142] kasan_kmalloc+0xce/0xf0 [ 67.592856] kasan_slab_alloc+0xf/0x20 [ 67.596855] kmem_cache_alloc+0x12e/0x700 [ 67.601972] selinux_file_alloc_security+0xb4/0x190 [ 67.606980] security_file_alloc+0x63/0xa0 [ 67.611226] __alloc_file+0xcf/0x330 [ 67.615053] alloc_empty_file+0x72/0x170 [ 67.619104] alloc_file+0x5e/0x4d0 [ 67.622631] alloc_file_pseudo+0x189/0x280 [ 67.626852] create_pipe_files+0x3f1/0x730 [ 67.631096] __do_pipe_flags+0x48/0x250 [ 67.635071] do_pipe2+0x84/0x160 [ 67.638433] __x64_sys_pipe+0x33/0x40 [ 67.642218] do_syscall_64+0xfd/0x620 [ 67.646012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 67.651191] [ 67.652811] Freed by task 6579: [ 67.656179] save_stack+0x45/0xd0 [ 67.659630] __kasan_slab_free+0x102/0x150 [ 67.663870] kasan_slab_free+0xe/0x10 [ 67.667663] kmem_cache_free+0x86/0x260 [ 67.671639] selinux_file_free_security+0x49/0x60 [ 67.676503] security_file_free+0x41/0x80 [ 67.680641] __fput+0x43d/0x8b0 [ 67.683951] ____fput+0x16/0x20 [ 67.687219] task_work_run+0x145/0x1c0 [ 67.691144] exit_to_usermode_loop+0x273/0x2c0 [ 67.696856] do_syscall_64+0x53d/0x620 [ 67.700732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 67.705912] [ 67.707537] The buggy address belongs to the object at ffff88808dec1840 [ 67.707537] which belongs to the cache selinux_file_security of size 16 [ 67.720958] The buggy address is located 1 bytes inside of [ 67.720958] 16-byte region [ffff88808dec1840, ffff88808dec1850) [ 67.732567] The buggy address belongs to the page: [ 67.737559] page:ffffea000237b040 count:1 mapcount:0 mapping:ffff8880aa44b080 index:0xffff88808dec1f84 [ 67.747054] flags: 0xfffe0000000100(slab) [ 67.751191] raw: 00fffe0000000100 ffffea00027b2048 ffffea0002910108 ffff8880aa44b080 [ 67.759073] raw: ffff88808dec1f84 ffff88808dec1000 0000000100000044 0000000000000000 [ 67.766953] page dumped because: kasan: bad access detected [ 67.772959] [ 67.774635] Memory state around the buggy address: [ 67.779578] ffff88808dec1700: fb fb fc fc 00 00 fc fc fb fb fc fc fb fb fc fc [ 67.786940] ffff88808dec1780: fb fb fc fc fb fb fc fc fb fb fc fc fb fb fc fc [ 67.794290] >ffff88808dec1800: fb fb fc fc fb fb fc fc fb fb fc fc fb fb fc fc [ 67.801637] ^ [ 67.807080] ffff88808dec1880: fb fb fc fc fb fb fc fc fb fb fc fc fb fb fc fc [ 67.814422] ffff88808dec1900: fb fb fc fc fb fb fc fc fb fb fc fc fb fb fc fc [ 67.821770] ================================================================== [ 67.829151] Disabling lock debugging due to kernel taint [ 67.834806] Kernel panic - not syncing: panic_on_warn set ... [ 67.834806] [ 67.842171] CPU: 0 PID: 7871 Comm: syz-executor650 Tainted: G B 4.19.93-syzkaller #0 [ 67.845006] protocol 88fb is buggy, dev hsr_slave_0 [ 67.851349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.856671] protocol 88fb is buggy, dev hsr_slave_1 [ 67.866051] Call Trace: [ 67.866072] dump_stack+0x197/0x210 [ 67.866090] ? macvlan_broadcast+0x57c/0x660 [ 67.881665] panic+0x26a/0x50e [ 67.884852] ? __warn_printk+0xf3/0xf3 [ 67.888724] ? retint_kernel+0x2d/0x2d [ 67.892599] ? trace_hardirqs_on+0x5e/0x220 [ 67.897425] ? macvlan_broadcast+0x57c/0x660 [ 67.901817] kasan_end_report+0x47/0x4f [ 67.905777] kasan_report.cold+0xa9/0x2ba [ 67.909911] __asan_report_load_n_noabort+0xf/0x20 [ 67.914914] macvlan_broadcast+0x57c/0x660 [ 67.919163] macvlan_start_xmit+0x408/0x785 [ 67.923469] dev_direct_xmit+0x34d/0x650 [ 67.927537] ? validate_xmit_skb_list+0x130/0x130 [ 67.932369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 67.937903] ? skb_copy_datagram_from_iter+0x441/0x660 [ 67.943176] packet_direct_xmit+0xf9/0x170 [ 67.947409] packet_sendmsg+0x3bb2/0x6440 [ 67.951652] ? packet_notifier+0x840/0x840 [ 67.955885] ? release_sock+0x156/0x1c0 [ 67.959858] ? selinux_socket_sendmsg+0x36/0x40 [ 67.964506] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 67.970027] ? security_socket_sendmsg+0x8d/0xc0 [ 67.974768] ? packet_notifier+0x840/0x840 [ 67.978994] sock_sendmsg+0xd7/0x130 [ 67.982706] __sys_sendto+0x262/0x380 [ 67.986493] ? __ia32_sys_getpeername+0xb0/0xb0 [ 67.991146] ? __ia32_sys_socketpair+0xf0/0xf0 [ 67.995724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 68.001272] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 68.006034] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 68.010796] ? do_syscall_64+0x26/0x620 [ 68.014771] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 68.020213] __x64_sys_sendto+0xe1/0x1a0 [ 68.024265] do_syscall_64+0xfd/0x620 [ 68.028061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 68.033681] RIP: 0033:0x442529 [ 68.036859] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b 10 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 68.055824] RSP: 002b:00007ffe90cc3aa8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 68.063541] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000442529 [ 68.070796] RDX: 000000000000000e RSI: 0000000020000080 RDI: 0000000000000003 [ 68.078071] RBP: 0000000000000004 R08: 0000000000000000 R09: 0000000000000000 [ 68.085343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 68.092689] R13: 0000000000403aa0 R14: 0000000000000000 R15: 0000000000000000 [ 68.101438] Kernel Offset: disabled [ 68.105077] Rebooting in 86400 seconds..