Warning: Permanently added '10.128.0.82' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program [ 128.427271][ T27] audit: type=1400 audit(1579469430.367:42): avc: denied { map } for pid=10649 comm="syz-executor045" path="/root/syz-executor045283677" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 128.456221][ T27] audit: type=1400 audit(1579469430.367:43): avc: denied { create } for pid=10650 comm="syz-executor045" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 128.482314][ T27] audit: type=1400 audit(1579469430.367:44): avc: denied { write } for pid=10650 comm="syz-executor045" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 129.509191][ C1] ================================================================== [ 129.517732][ C1] BUG: KASAN: slab-out-of-bounds in bitmap_port_gc+0x112/0x4f0 [ 129.525375][ C1] Read of size 8 at addr ffff8880a6fe33c0 by task kworker/1:17/2741 [ 129.533445][ C1] [ 129.535914][ C1] CPU: 1 PID: 2741 Comm: kworker/1:17 Not tainted 5.5.0-rc6-syzkaller #0 [ 129.544576][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.554756][ C1] Workqueue: events free_work executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 129.559477][ C1] Call Trace: [ 129.562875][ C1] [ 129.565735][ C1] dump_stack+0x197/0x210 [ 129.570083][ C1] ? bitmap_port_gc+0x112/0x4f0 [ 129.574955][ C1] print_address_description.constprop.0.cold+0xd4/0x30b [ 129.581989][ C1] ? bitmap_port_gc+0x112/0x4f0 [ 129.586866][ C1] ? bitmap_port_gc+0x112/0x4f0 [ 129.591734][ C1] __kasan_report.cold+0x1b/0x41 [ 129.596801][ C1] ? bitmap_port_gc+0x112/0x4f0 [ 129.601781][ C1] kasan_report+0x12/0x20 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 129.606142][ C1] check_memory_region+0x134/0x1a0 [ 129.611266][ C1] __kasan_check_read+0x11/0x20 [ 129.616222][ C1] bitmap_port_gc+0x112/0x4f0 [ 129.620914][ C1] call_timer_fn+0x1ac/0x780 [ 129.625511][ C1] ? bitmap_port_test+0x170/0x170 [ 129.631067][ C1] ? msleep_interruptible+0x150/0x150 [ 129.636714][ C1] ? run_timer_softirq+0x6b1/0x1790 [ 129.641937][ C1] ? trace_hardirqs_on+0x67/0x240 [ 129.646969][ C1] ? bitmap_port_test+0x170/0x170 [ 129.651990][ C1] ? bitmap_port_test+0x170/0x170 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 129.657595][ C1] run_timer_softirq+0x6c3/0x1790 [ 129.662640][ C1] ? add_timer+0x930/0x930 [ 129.667219][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 129.673410][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 129.678960][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 129.685190][ C1] ? trace_hardirqs_on+0x67/0x240 [ 129.690236][ C1] __do_softirq+0x262/0x98c [ 129.694856][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 129.699734][ C1] irq_exit+0x19b/0x1e0 [ 129.703930][ C1] smp_apic_timer_interrupt+0x1a3/0x610 executing program executing program executing program executing program executing program executing program executing program executing program [ 129.709677][ C1] apic_timer_interrupt+0xf/0x20 [ 129.714625][ C1] [ 129.717579][ C1] RIP: 0010:_raw_spin_unlock_irqrestore+0x90/0xe0 [ 129.724311][ C1] Code: 48 c7 c0 98 33 93 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 39 48 83 3d ff f9 be 01 00 74 24 48 89 df 57 9d <0f> 1f 44 00 00 bf 01 00 00 00 e8 e1 50 7c f9 65 8b 05 d2 e4 2d 78 [ 129.744092][ C1] RSP: 0018:ffffc9000835fb80 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 129.752513][ C1] RAX: 1ffffffff1326673 RBX: 0000000000000282 RCX: 0000000000000006 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 129.760499][ C1] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: 0000000000000282 [ 129.768493][ C1] RBP: ffffc9000835fb90 R08: 1ffffffff165e7a0 R09: fffffbfff165e7a1 [ 129.776562][ C1] R10: fffffbfff165e7a0 R11: ffffffff8b2f3d07 R12: ffffffff8b828cc8 [ 129.784632][ C1] R13: ffffffff8b828cc8 R14: ffff88809792f000 R15: 0000000000000000 [ 129.792743][ C1] debug_check_no_obj_freed+0x20a/0x43f [ 129.798415][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 129.803977][ C1] ? free_unref_page+0x101/0x180 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 129.809029][ C1] free_pcp_prepare+0x208/0x4f0 [ 129.816426][ C1] free_unref_page+0x11/0x180 [ 129.821128][ C1] __free_pages+0x72/0xb0 [ 129.825471][ C1] __vunmap+0x610/0x950 [ 129.829963][ C1] free_work+0x5e/0x80 [ 129.834123][ C1] process_one_work+0x9af/0x1740 [ 129.839076][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 129.844573][ C1] ? lock_acquire+0x190/0x410 [ 129.849360][ C1] worker_thread+0x98/0xe40 [ 129.853895][ C1] kthread+0x361/0x430 executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 129.857979][ C1] ? process_one_work+0x1740/0x1740 [ 129.863197][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 129.869191][ C1] ret_from_fork+0x24/0x30 [ 129.873983][ C1] [ 129.876323][ C1] Allocated by task 10650: [ 129.880751][ C1] save_stack+0x23/0x90 [ 129.885016][ C1] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 129.890656][ C1] kasan_kmalloc+0x9/0x10 [ 129.895090][ C1] __kmalloc+0x163/0x770 [ 129.899486][ C1] ip_set_alloc+0x38/0x5e [ 129.903812][ C1] bitmap_port_create+0x3dc/0x7c0 executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 129.908848][ C1] ip_set_create+0x6f1/0x1500 [ 129.913537][ C1] nfnetlink_rcv_msg+0xcf2/0xfb0 [ 129.918484][ C1] netlink_rcv_skb+0x177/0x450 [ 129.923254][ C1] nfnetlink_rcv+0x1ba/0x460 [ 129.927879][ C1] netlink_unicast+0x58c/0x7d0 [ 129.932789][ C1] netlink_sendmsg+0x91c/0xea0 [ 129.937652][ C1] sock_sendmsg+0xd7/0x130 [ 129.942074][ C1] ____sys_sendmsg+0x753/0x880 [ 129.947104][ C1] ___sys_sendmsg+0x100/0x170 [ 129.951791][ C1] __sys_sendmsg+0x105/0x1d0 [ 129.956513][ C1] __x64_sys_sendmsg+0x78/0xb0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 129.961294][ C1] do_syscall_64+0xfa/0x790 [ 129.965949][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 129.971897][ C1] [ 129.974241][ C1] Freed by task 10421: [ 129.978339][ C1] save_stack+0x23/0x90 [ 129.982633][ C1] __kasan_slab_free+0x102/0x150 [ 129.987792][ C1] kasan_slab_free+0xe/0x10 [ 129.992311][ C1] kfree+0x10a/0x2c0 [ 129.996202][ C1] load_elf_binary+0x61c/0x5310 [ 130.001065][ C1] search_binary_handler+0x16d/0x570 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 130.006371][ C1] __do_execve_file.isra.0+0x1329/0x22b0 [ 130.012143][ C1] __x64_sys_execve+0x8f/0xc0 [ 130.016834][ C1] do_syscall_64+0xfa/0x790 [ 130.021353][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 130.027249][ C1] [ 130.029593][ C1] The buggy address belongs to the object at ffff8880a6fe33c0 [ 130.029593][ C1] which belongs to the cache kmalloc-32 of size 32 [ 130.043491][ C1] The buggy address is located 0 bytes inside of [ 130.043491][ C1] 32-byte region [ffff8880a6fe33c0, ffff8880a6fe33e0) executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 130.057139][ C1] The buggy address belongs to the page: [ 130.062783][ C1] page:ffffea00029bf8c0 refcount:1 mapcount:0 mapping:ffff8880aa4001c0 index:0xffff8880a6fe3fc1 [ 130.073387][ C1] raw: 00fffe0000000200 ffffea00026bafc8 ffffea00029d0888 ffff8880aa4001c0 [ 130.082222][ C1] raw: ffff8880a6fe3fc1 ffff8880a6fe3000 000000010000002d 0000000000000000 [ 130.091231][ C1] page dumped because: kasan: bad access detected [ 130.097764][ C1] [ 130.100208][ C1] Memory state around the buggy address: executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 130.105845][ C1] ffff8880a6fe3280: 00 05 fc fc fc fc fc fc 00 05 fc fc fc fc fc fc [ 130.113916][ C1] ffff8880a6fe3300: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 130.121984][ C1] >ffff8880a6fe3380: fb fb fb fb fc fc fc fc 04 fc fc fc fc fc fc fc [ 130.130058][ C1] ^ [ 130.136230][ C1] ffff8880a6fe3400: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 130.144315][ C1] ffff8880a6fe3480: fb fb fb fb fc fc fc fc 00 00 01 fc fc fc fc fc executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 130.156266][ C1] ================================================================== [ 130.164429][ C1] Disabling lock debugging due to kernel taint [ 130.170616][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 130.177243][ C1] CPU: 1 PID: 2741 Comm: kworker/1:17 Tainted: G B 5.5.0-rc6-syzkaller #0 [ 130.187045][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.197111][ C1] Workqueue: events free_work [ 130.201798][ C1] Call Trace: [ 130.205084][ C1] [ 130.207946][ C1] dump_stack+0x197/0x210 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 130.212283][ C1] panic+0x2e3/0x75c [ 130.216430][ C1] ? add_taint.cold+0x16/0x16 [ 130.221119][ C1] ? retint_kernel+0x2b/0x2b [ 130.225916][ C1] ? trace_hardirqs_on+0x5e/0x240 [ 130.231085][ C1] ? bitmap_port_gc+0x112/0x4f0 [ 130.235943][ C1] end_report+0x47/0x4f [ 130.240093][ C1] ? bitmap_port_gc+0x112/0x4f0 [ 130.244942][ C1] __kasan_report.cold+0xe/0x41 [ 130.249800][ C1] ? bitmap_port_gc+0x112/0x4f0 [ 130.254884][ C1] kasan_report+0x12/0x20 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 130.259230][ C1] check_memory_region+0x134/0x1a0 [ 130.264340][ C1] __kasan_check_read+0x11/0x20 [ 130.269200][ C1] bitmap_port_gc+0x112/0x4f0 [ 130.273881][ C1] call_timer_fn+0x1ac/0x780 [ 130.278609][ C1] ? bitmap_port_test+0x170/0x170 [ 130.283744][ C1] ? msleep_interruptible+0x150/0x150 [ 130.289221][ C1] ? run_timer_softirq+0x6b1/0x1790 [ 130.294427][ C1] ? trace_hardirqs_on+0x67/0x240 [ 130.299460][ C1] ? bitmap_port_test+0x170/0x170 [ 130.304486][ C1] ? bitmap_port_test+0x170/0x170 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 130.309678][ C1] run_timer_softirq+0x6c3/0x1790 [ 130.314736][ C1] ? add_timer+0x930/0x930 [ 130.319477][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 130.325761][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 130.331322][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 130.337481][ C1] ? trace_hardirqs_on+0x67/0x240 [ 130.342511][ C1] __do_softirq+0x262/0x98c [ 130.347161][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 130.352025][ C1] irq_exit+0x19b/0x1e0 [ 130.356447][ C1] smp_apic_timer_interrupt+0x1a3/0x610 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 130.362152][ C1] apic_timer_interrupt+0xf/0x20 [ 130.367169][ C1] [ 130.370118][ C1] RIP: 0010:_raw_spin_unlock_irqrestore+0x90/0xe0 [ 130.376547][ C1] Code: 48 c7 c0 98 33 93 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 39 48 83 3d ff f9 be 01 00 74 24 48 89 df 57 9d <0f> 1f 44 00 00 bf 01 00 00 00 e8 e1 50 7c f9 65 8b 05 d2 e4 2d 78 [ 130.396548][ C1] RSP: 0018:ffffc9000835fb80 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 130.404969][ C1] RAX: 1ffffffff1326673 RBX: 0000000000000282 RCX: 0000000000000006 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 130.412944][ C1] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: 0000000000000282 [ 130.421023][ C1] RBP: ffffc9000835fb90 R08: 1ffffffff165e7a0 R09: fffffbfff165e7a1 [ 130.429116][ C1] R10: fffffbfff165e7a0 R11: ffffffff8b2f3d07 R12: ffffffff8b828cc8 [ 130.437193][ C1] R13: ffffffff8b828cc8 R14: ffff88809792f000 R15: 0000000000000000 [ 130.445492][ C1] debug_check_no_obj_freed+0x20a/0x43f [ 130.451053][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 130.456610][ C1] ? free_unref_page+0x101/0x180 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 130.462138][ C1] free_pcp_prepare+0x208/0x4f0 [ 130.467008][ C1] free_unref_page+0x11/0x180 [ 130.471709][ C1] __free_pages+0x72/0xb0 [ 130.476050][ C1] __vunmap+0x610/0x950 [ 130.480496][ C1] free_work+0x5e/0x80 [ 130.484712][ C1] process_one_work+0x9af/0x1740 [ 130.489689][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 130.495065][ C1] ? lock_acquire+0x190/0x410 [ 130.499751][ C1] worker_thread+0x98/0xe40 [ 130.504271][ C1] kthread+0x361/0x430 [ 130.508352][ C1] ? process_one_work+0x1740/0x1740 executing program executing program executing program [ 130.513558][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 130.519288][ C1] ret_from_fork+0x24/0x30 [ 130.525887][ C1] Kernel Offset: disabled [ 130.530339][ C1] Rebooting in 86400 seconds..