Warning: Permanently added '10.128.0.82' (ECDSA) to the list of known hosts.
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 128.427271][ T27] audit: type=1400 audit(1579469430.367:42): avc: denied { map } for pid=10649 comm="syz-executor045" path="/root/syz-executor045283677" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 128.456221][ T27] audit: type=1400 audit(1579469430.367:43): avc: denied { create } for pid=10650 comm="syz-executor045" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
[ 128.482314][ T27] audit: type=1400 audit(1579469430.367:44): avc: denied { write } for pid=10650 comm="syz-executor045" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 129.509191][ C1] ==================================================================
[ 129.517732][ C1] BUG: KASAN: slab-out-of-bounds in bitmap_port_gc+0x112/0x4f0
[ 129.525375][ C1] Read of size 8 at addr ffff8880a6fe33c0 by task kworker/1:17/2741
[ 129.533445][ C1]
[ 129.535914][ C1] CPU: 1 PID: 2741 Comm: kworker/1:17 Not tainted 5.5.0-rc6-syzkaller #0
[ 129.544576][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 129.554756][ C1] Workqueue: events free_work
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 129.559477][ C1] Call Trace:
[ 129.562875][ C1]
[ 129.565735][ C1] dump_stack+0x197/0x210
[ 129.570083][ C1] ? bitmap_port_gc+0x112/0x4f0
[ 129.574955][ C1] print_address_description.constprop.0.cold+0xd4/0x30b
[ 129.581989][ C1] ? bitmap_port_gc+0x112/0x4f0
[ 129.586866][ C1] ? bitmap_port_gc+0x112/0x4f0
[ 129.591734][ C1] __kasan_report.cold+0x1b/0x41
[ 129.596801][ C1] ? bitmap_port_gc+0x112/0x4f0
[ 129.601781][ C1] kasan_report+0x12/0x20
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 129.606142][ C1] check_memory_region+0x134/0x1a0
[ 129.611266][ C1] __kasan_check_read+0x11/0x20
[ 129.616222][ C1] bitmap_port_gc+0x112/0x4f0
[ 129.620914][ C1] call_timer_fn+0x1ac/0x780
[ 129.625511][ C1] ? bitmap_port_test+0x170/0x170
[ 129.631067][ C1] ? msleep_interruptible+0x150/0x150
[ 129.636714][ C1] ? run_timer_softirq+0x6b1/0x1790
[ 129.641937][ C1] ? trace_hardirqs_on+0x67/0x240
[ 129.646969][ C1] ? bitmap_port_test+0x170/0x170
[ 129.651990][ C1] ? bitmap_port_test+0x170/0x170
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 129.657595][ C1] run_timer_softirq+0x6c3/0x1790
[ 129.662640][ C1] ? add_timer+0x930/0x930
[ 129.667219][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130
[ 129.673410][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0
[ 129.678960][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50
[ 129.685190][ C1] ? trace_hardirqs_on+0x67/0x240
[ 129.690236][ C1] __do_softirq+0x262/0x98c
[ 129.694856][ C1] ? sched_clock_cpu+0x1b/0x1b0
[ 129.699734][ C1] irq_exit+0x19b/0x1e0
[ 129.703930][ C1] smp_apic_timer_interrupt+0x1a3/0x610
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 129.709677][ C1] apic_timer_interrupt+0xf/0x20
[ 129.714625][ C1]
[ 129.717579][ C1] RIP: 0010:_raw_spin_unlock_irqrestore+0x90/0xe0
[ 129.724311][ C1] Code: 48 c7 c0 98 33 93 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 39 48 83 3d ff f9 be 01 00 74 24 48 89 df 57 9d <0f> 1f 44 00 00 bf 01 00 00 00 e8 e1 50 7c f9 65 8b 05 d2 e4 2d 78
[ 129.744092][ C1] RSP: 0018:ffffc9000835fb80 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13
[ 129.752513][ C1] RAX: 1ffffffff1326673 RBX: 0000000000000282 RCX: 0000000000000006
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 129.760499][ C1] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: 0000000000000282
[ 129.768493][ C1] RBP: ffffc9000835fb90 R08: 1ffffffff165e7a0 R09: fffffbfff165e7a1
[ 129.776562][ C1] R10: fffffbfff165e7a0 R11: ffffffff8b2f3d07 R12: ffffffff8b828cc8
[ 129.784632][ C1] R13: ffffffff8b828cc8 R14: ffff88809792f000 R15: 0000000000000000
[ 129.792743][ C1] debug_check_no_obj_freed+0x20a/0x43f
[ 129.798415][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0
[ 129.803977][ C1] ? free_unref_page+0x101/0x180
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 129.809029][ C1] free_pcp_prepare+0x208/0x4f0
[ 129.816426][ C1] free_unref_page+0x11/0x180
[ 129.821128][ C1] __free_pages+0x72/0xb0
[ 129.825471][ C1] __vunmap+0x610/0x950
[ 129.829963][ C1] free_work+0x5e/0x80
[ 129.834123][ C1] process_one_work+0x9af/0x1740
[ 129.839076][ C1] ? pwq_dec_nr_in_flight+0x320/0x320
[ 129.844573][ C1] ? lock_acquire+0x190/0x410
[ 129.849360][ C1] worker_thread+0x98/0xe40
[ 129.853895][ C1] kthread+0x361/0x430
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 129.857979][ C1] ? process_one_work+0x1740/0x1740
[ 129.863197][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0
[ 129.869191][ C1] ret_from_fork+0x24/0x30
[ 129.873983][ C1]
[ 129.876323][ C1] Allocated by task 10650:
[ 129.880751][ C1] save_stack+0x23/0x90
[ 129.885016][ C1] __kasan_kmalloc.constprop.0+0xcf/0xe0
[ 129.890656][ C1] kasan_kmalloc+0x9/0x10
[ 129.895090][ C1] __kmalloc+0x163/0x770
[ 129.899486][ C1] ip_set_alloc+0x38/0x5e
[ 129.903812][ C1] bitmap_port_create+0x3dc/0x7c0
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 129.908848][ C1] ip_set_create+0x6f1/0x1500
[ 129.913537][ C1] nfnetlink_rcv_msg+0xcf2/0xfb0
[ 129.918484][ C1] netlink_rcv_skb+0x177/0x450
[ 129.923254][ C1] nfnetlink_rcv+0x1ba/0x460
[ 129.927879][ C1] netlink_unicast+0x58c/0x7d0
[ 129.932789][ C1] netlink_sendmsg+0x91c/0xea0
[ 129.937652][ C1] sock_sendmsg+0xd7/0x130
[ 129.942074][ C1] ____sys_sendmsg+0x753/0x880
[ 129.947104][ C1] ___sys_sendmsg+0x100/0x170
[ 129.951791][ C1] __sys_sendmsg+0x105/0x1d0
[ 129.956513][ C1] __x64_sys_sendmsg+0x78/0xb0
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 129.961294][ C1] do_syscall_64+0xfa/0x790
[ 129.965949][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 129.971897][ C1]
[ 129.974241][ C1] Freed by task 10421:
[ 129.978339][ C1] save_stack+0x23/0x90
[ 129.982633][ C1] __kasan_slab_free+0x102/0x150
[ 129.987792][ C1] kasan_slab_free+0xe/0x10
[ 129.992311][ C1] kfree+0x10a/0x2c0
[ 129.996202][ C1] load_elf_binary+0x61c/0x5310
[ 130.001065][ C1] search_binary_handler+0x16d/0x570
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 130.006371][ C1] __do_execve_file.isra.0+0x1329/0x22b0
[ 130.012143][ C1] __x64_sys_execve+0x8f/0xc0
[ 130.016834][ C1] do_syscall_64+0xfa/0x790
[ 130.021353][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 130.027249][ C1]
[ 130.029593][ C1] The buggy address belongs to the object at ffff8880a6fe33c0
[ 130.029593][ C1] which belongs to the cache kmalloc-32 of size 32
[ 130.043491][ C1] The buggy address is located 0 bytes inside of
[ 130.043491][ C1] 32-byte region [ffff8880a6fe33c0, ffff8880a6fe33e0)
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 130.057139][ C1] The buggy address belongs to the page:
[ 130.062783][ C1] page:ffffea00029bf8c0 refcount:1 mapcount:0 mapping:ffff8880aa4001c0 index:0xffff8880a6fe3fc1
[ 130.073387][ C1] raw: 00fffe0000000200 ffffea00026bafc8 ffffea00029d0888 ffff8880aa4001c0
[ 130.082222][ C1] raw: ffff8880a6fe3fc1 ffff8880a6fe3000 000000010000002d 0000000000000000
[ 130.091231][ C1] page dumped because: kasan: bad access detected
[ 130.097764][ C1]
[ 130.100208][ C1] Memory state around the buggy address:
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 130.105845][ C1] ffff8880a6fe3280: 00 05 fc fc fc fc fc fc 00 05 fc fc fc fc fc fc
[ 130.113916][ C1] ffff8880a6fe3300: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc
[ 130.121984][ C1] >ffff8880a6fe3380: fb fb fb fb fc fc fc fc 04 fc fc fc fc fc fc fc
[ 130.130058][ C1] ^
[ 130.136230][ C1] ffff8880a6fe3400: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc
[ 130.144315][ C1] ffff8880a6fe3480: fb fb fb fb fc fc fc fc 00 00 01 fc fc fc fc fc
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 130.156266][ C1] ==================================================================
[ 130.164429][ C1] Disabling lock debugging due to kernel taint
[ 130.170616][ C1] Kernel panic - not syncing: panic_on_warn set ...
[ 130.177243][ C1] CPU: 1 PID: 2741 Comm: kworker/1:17 Tainted: G B 5.5.0-rc6-syzkaller #0
[ 130.187045][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 130.197111][ C1] Workqueue: events free_work
[ 130.201798][ C1] Call Trace:
[ 130.205084][ C1]
[ 130.207946][ C1] dump_stack+0x197/0x210
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 130.212283][ C1] panic+0x2e3/0x75c
[ 130.216430][ C1] ? add_taint.cold+0x16/0x16
[ 130.221119][ C1] ? retint_kernel+0x2b/0x2b
[ 130.225916][ C1] ? trace_hardirqs_on+0x5e/0x240
[ 130.231085][ C1] ? bitmap_port_gc+0x112/0x4f0
[ 130.235943][ C1] end_report+0x47/0x4f
[ 130.240093][ C1] ? bitmap_port_gc+0x112/0x4f0
[ 130.244942][ C1] __kasan_report.cold+0xe/0x41
[ 130.249800][ C1] ? bitmap_port_gc+0x112/0x4f0
[ 130.254884][ C1] kasan_report+0x12/0x20
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 130.259230][ C1] check_memory_region+0x134/0x1a0
[ 130.264340][ C1] __kasan_check_read+0x11/0x20
[ 130.269200][ C1] bitmap_port_gc+0x112/0x4f0
[ 130.273881][ C1] call_timer_fn+0x1ac/0x780
[ 130.278609][ C1] ? bitmap_port_test+0x170/0x170
[ 130.283744][ C1] ? msleep_interruptible+0x150/0x150
[ 130.289221][ C1] ? run_timer_softirq+0x6b1/0x1790
[ 130.294427][ C1] ? trace_hardirqs_on+0x67/0x240
[ 130.299460][ C1] ? bitmap_port_test+0x170/0x170
[ 130.304486][ C1] ? bitmap_port_test+0x170/0x170
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 130.309678][ C1] run_timer_softirq+0x6c3/0x1790
[ 130.314736][ C1] ? add_timer+0x930/0x930
[ 130.319477][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130
[ 130.325761][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0
[ 130.331322][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50
[ 130.337481][ C1] ? trace_hardirqs_on+0x67/0x240
[ 130.342511][ C1] __do_softirq+0x262/0x98c
[ 130.347161][ C1] ? sched_clock_cpu+0x1b/0x1b0
[ 130.352025][ C1] irq_exit+0x19b/0x1e0
[ 130.356447][ C1] smp_apic_timer_interrupt+0x1a3/0x610
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 130.362152][ C1] apic_timer_interrupt+0xf/0x20
[ 130.367169][ C1]
[ 130.370118][ C1] RIP: 0010:_raw_spin_unlock_irqrestore+0x90/0xe0
[ 130.376547][ C1] Code: 48 c7 c0 98 33 93 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 39 48 83 3d ff f9 be 01 00 74 24 48 89 df 57 9d <0f> 1f 44 00 00 bf 01 00 00 00 e8 e1 50 7c f9 65 8b 05 d2 e4 2d 78
[ 130.396548][ C1] RSP: 0018:ffffc9000835fb80 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13
[ 130.404969][ C1] RAX: 1ffffffff1326673 RBX: 0000000000000282 RCX: 0000000000000006
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 130.412944][ C1] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: 0000000000000282
[ 130.421023][ C1] RBP: ffffc9000835fb90 R08: 1ffffffff165e7a0 R09: fffffbfff165e7a1
[ 130.429116][ C1] R10: fffffbfff165e7a0 R11: ffffffff8b2f3d07 R12: ffffffff8b828cc8
[ 130.437193][ C1] R13: ffffffff8b828cc8 R14: ffff88809792f000 R15: 0000000000000000
[ 130.445492][ C1] debug_check_no_obj_freed+0x20a/0x43f
[ 130.451053][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0
[ 130.456610][ C1] ? free_unref_page+0x101/0x180
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 130.462138][ C1] free_pcp_prepare+0x208/0x4f0
[ 130.467008][ C1] free_unref_page+0x11/0x180
[ 130.471709][ C1] __free_pages+0x72/0xb0
[ 130.476050][ C1] __vunmap+0x610/0x950
[ 130.480496][ C1] free_work+0x5e/0x80
[ 130.484712][ C1] process_one_work+0x9af/0x1740
[ 130.489689][ C1] ? pwq_dec_nr_in_flight+0x320/0x320
[ 130.495065][ C1] ? lock_acquire+0x190/0x410
[ 130.499751][ C1] worker_thread+0x98/0xe40
[ 130.504271][ C1] kthread+0x361/0x430
[ 130.508352][ C1] ? process_one_work+0x1740/0x1740
executing program
executing program
executing program
[ 130.513558][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0
[ 130.519288][ C1] ret_from_fork+0x24/0x30
[ 130.525887][ C1] Kernel Offset: disabled
[ 130.530339][ C1] Rebooting in 86400 seconds..