[ 46.150113] audit: type=1800 audit(1583580437.478:29): pid=7777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 46.179251] audit: type=1800 audit(1583580437.478:30): pid=7777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.179' (ECDSA) to the list of known hosts. syzkaller login: [ 54.922091] kauditd_printk_skb: 5 callbacks suppressed [ 54.922105] audit: type=1400 audit(1583580446.248:36): avc: denied { map } for pid=7961 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/03/07 11:27:26 parsed 1 programs [ 56.565867] audit: type=1400 audit(1583580447.898:37): avc: denied { map } for pid=7961 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=95 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2020/03/07 11:27:28 executed programs: 0 [ 56.760348] IPVS: ftp: loaded support on port[0] = 21 [ 56.824518] chnl_net:caif_netlink_parms(): no params data found [ 56.877164] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.883737] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.891190] device bridge_slave_0 entered promiscuous mode [ 56.899635] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.906378] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.913489] device bridge_slave_1 entered promiscuous mode [ 56.930134] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.939387] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.957375] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 56.964912] team0: Port device team_slave_0 added [ 56.971375] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 56.979420] team0: Port device team_slave_1 added [ 56.994015] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 57.000312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 57.025616] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 57.037796] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 57.044040] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 57.069318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 57.080159] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 57.087858] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 57.147485] device hsr_slave_0 entered promiscuous mode [ 57.205776] device hsr_slave_1 entered promiscuous mode [ 57.246034] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 57.253350] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 57.307548] audit: type=1400 audit(1583580448.638:38): avc: denied { create } for pid=7978 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 57.330690] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.333162] audit: type=1400 audit(1583580448.638:39): avc: denied { write } for pid=7978 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 57.337898] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.362698] audit: type=1400 audit(1583580448.648:40): avc: denied { read } for pid=7978 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 57.368768] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.398577] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.434780] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 57.442182] 8021q: adding VLAN 0 to HW filter on device bond0 [ 57.451362] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.460820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.480575] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.488020] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.495064] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 57.508381] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 57.514620] 8021q: adding VLAN 0 to HW filter on device team0 [ 57.524188] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.532176] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.538624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.549705] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.557771] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.564113] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.587050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.594862] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.602943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 57.610768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 57.618878] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 57.628373] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 57.634641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 57.649622] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 57.657549] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 57.664212] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 57.675913] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 57.689375] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 57.699442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 57.740276] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 57.748859] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 57.755780] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 57.765914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.773519] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.781157] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 57.790263] device veth0_vlan entered promiscuous mode [ 57.800602] device veth1_vlan entered promiscuous mode [ 57.806763] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 57.816073] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 57.822805] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 57.830635] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 57.844139] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 57.854108] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 57.862013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 57.870321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 57.880095] device veth0_macvtap entered promiscuous mode [ 57.886717] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 57.895131] device veth1_macvtap entered promiscuous mode [ 57.901604] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 57.911972] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 57.922197] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 57.931879] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 57.939343] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 57.947275] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 57.954974] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 57.962632] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 57.970678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 57.982533] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 57.990034] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 57.997452] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 58.006507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 58.117186] audit: type=1400 audit(1583580449.448:41): avc: denied { associate } for pid=7978 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 58.736801] ================================================================== [ 58.744451] BUG: KASAN: use-after-free in free_netdev+0x3b0/0x420 [ 58.751128] Read of size 8 at addr ffff8880a3944d60 by task syz-executor.0/8027 [ 58.758825] [ 58.760456] CPU: 0 PID: 8027 Comm: syz-executor.0 Not tainted 4.19.108-syzkaller #0 [ 58.768231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 58.777580] Call Trace: [ 58.780162] dump_stack+0x188/0x20d [ 58.783775] ? free_netdev+0x3b0/0x420 [ 58.787647] print_address_description.cold+0x7c/0x212 [ 58.792908] ? free_netdev+0x3b0/0x420 [ 58.796776] kasan_report.cold+0x88/0x2b9 [ 58.800909] free_netdev+0x3b0/0x420 [ 58.804607] netdev_run_todo+0x5ea/0x740 [ 58.808703] ? register_netdev+0x50/0x50 [ 58.812751] ? __lock_is_held+0xad/0x140 [ 58.816808] ? rtnl_link_get_net_capable.constprop.0+0x230/0x230 [ 58.823034] rtnetlink_rcv_msg+0x460/0xaf0 [ 58.827265] ? rtnetlink_put_metrics+0x520/0x520 [ 58.833265] ? netdev_pick_tx+0x2f0/0x2f0 [ 58.837457] ? __copy_skb_header+0x2f0/0x510 [ 58.841906] ? sock_spd_release+0x270/0x270 [ 58.846218] netlink_rcv_skb+0x160/0x410 [ 58.850267] ? rtnetlink_put_metrics+0x520/0x520 [ 58.855006] ? netlink_ack+0xa60/0xa60 [ 58.858896] netlink_unicast+0x4d7/0x6a0 [ 58.862963] ? netlink_attachskb+0x710/0x710 [ 58.867364] netlink_sendmsg+0x80b/0xcd0 [ 58.871414] ? netlink_unicast+0x6a0/0x6a0 [ 58.875634] ? move_addr_to_kernel.part.0+0x110/0x110 [ 58.880903] ? netlink_unicast+0x6a0/0x6a0 [ 58.885122] sock_sendmsg+0xcf/0x120 [ 58.888824] ___sys_sendmsg+0x803/0x920 [ 58.892785] ? copy_msghdr_from_user+0x410/0x410 [ 58.897525] ? __fget+0x319/0x510 [ 58.900982] ? lock_downgrade+0x740/0x740 [ 58.905119] ? check_preemption_disabled+0x41/0x280 [ 58.910119] ? __fget+0x340/0x510 [ 58.913573] ? iterate_fd+0x350/0x350 [ 58.917365] ? __fget_light+0x1d1/0x230 [ 58.921353] __sys_sendmsg+0xec/0x1b0 [ 58.925142] ? __ia32_sys_shutdown+0x70/0x70 [ 58.929544] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 58.934288] ? trace_hardirqs_off_caller+0x55/0x210 [ 58.939291] ? do_syscall_64+0x21/0x620 [ 58.943263] do_syscall_64+0xf9/0x620 [ 58.947059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 58.952246] RIP: 0033:0x45c4a9 [ 58.955423] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 58.974402] RSP: 002b:00007fa636214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 58.982102] RAX: ffffffffffffffda RBX: 00007fa6362156d4 RCX: 000000000045c4a9 [ 58.989354] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005 [ 58.996609] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 59.003874] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 59.011128] R13: 00000000000009f9 R14: 00000000004cc766 R15: 000000000076bfcc [ 59.018386] [ 59.019993] Allocated by task 8026: [ 59.023617] kasan_kmalloc+0xbf/0xe0 [ 59.027324] __kmalloc+0x15b/0x770 [ 59.030864] sk_prot_alloc+0x18c/0x2d0 [ 59.034748] sk_alloc+0x36/0xf50 [ 59.038098] tun_chr_open+0x7b/0x560 [ 59.041797] misc_open+0x372/0x4a0 [ 59.045324] chrdev_open+0x219/0x5c0 [ 59.049024] do_dentry_open+0x4a8/0x1160 [ 59.053072] path_openat+0x1031/0x4200 [ 59.056944] do_filp_open+0x1a1/0x280 [ 59.060726] do_sys_open+0x3c0/0x500 [ 59.064425] do_syscall_64+0xf9/0x620 [ 59.068221] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 59.073386] [ 59.074993] Freed by task 8024: [ 59.078270] __kasan_slab_free+0xf7/0x140 [ 59.082407] kfree+0xce/0x220 [ 59.085495] __sk_destruct+0x579/0x780 [ 59.089364] sk_destruct+0xb9/0xf0 [ 59.092884] __sk_free+0xc2/0x2e0 [ 59.096324] sk_free+0x3b/0x50 [ 59.099508] __tun_detach+0xa04/0x1020 [ 59.103379] tun_chr_close+0x10e/0x180 [ 59.107248] __fput+0x2cd/0x890 [ 59.110509] task_work_run+0x13f/0x1b0 [ 59.114379] exit_to_usermode_loop+0x25a/0x2b0 [ 59.118946] do_syscall_64+0x538/0x620 [ 59.122817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 59.127984] [ 59.129592] The buggy address belongs to the object at ffff8880a39446c0 [ 59.129592] which belongs to the cache kmalloc-4096 of size 4096 [ 59.142406] The buggy address is located 1696 bytes inside of [ 59.142406] 4096-byte region [ffff8880a39446c0, ffff8880a39456c0) [ 59.154445] The buggy address belongs to the page: [ 59.159359] page:ffffea00028e5100 count:1 mapcount:0 mapping:ffff88812c3dcdc0 index:0x0 compound_mapcount: 0 [ 59.169307] flags: 0xfffe0000008100(slab|head) [ 59.173872] raw: 00fffe0000008100 ffffea000284ed88 ffffea000295b008 ffff88812c3dcdc0 [ 59.181734] raw: 0000000000000000 ffff8880a39446c0 0000000100000001 0000000000000000 [ 59.189591] page dumped because: kasan: bad access detected [ 59.195275] [ 59.196884] Memory state around the buggy address: [ 59.201807] ffff8880a3944c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.209167] ffff8880a3944c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.216648] >ffff8880a3944d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.223995] ^ [ 59.230474] ffff8880a3944d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.237831] ffff8880a3944e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.245182] ================================================================== [ 59.252538] Disabling lock debugging due to kernel taint [ 59.263849] Kernel panic - not syncing: panic_on_warn set ... [ 59.263849] [ 59.271262] CPU: 1 PID: 8027 Comm: syz-executor.0 Tainted: G B 4.19.108-syzkaller #0 [ 59.280479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.289816] Call Trace: [ 59.292396] dump_stack+0x188/0x20d [ 59.296023] panic+0x26a/0x50e [ 59.299213] ? __warn_printk+0xf3/0xf3 [ 59.303084] ? preempt_schedule_common+0x4a/0xc0 [ 59.307928] ? free_netdev+0x3b0/0x420 [ 59.311798] ? ___preempt_schedule+0x16/0x18 [ 59.316322] ? trace_hardirqs_on+0x55/0x210 [ 59.320645] ? free_netdev+0x3b0/0x420 [ 59.324541] kasan_end_report+0x43/0x49 [ 59.328543] kasan_report.cold+0xa4/0x2b9 [ 59.332692] free_netdev+0x3b0/0x420 [ 59.336471] netdev_run_todo+0x5ea/0x740 [ 59.340516] ? register_netdev+0x50/0x50 [ 59.344557] ? __lock_is_held+0xad/0x140 [ 59.348623] ? rtnl_link_get_net_capable.constprop.0+0x230/0x230 [ 59.354751] rtnetlink_rcv_msg+0x460/0xaf0 [ 59.358973] ? rtnetlink_put_metrics+0x520/0x520 [ 59.363725] ? netdev_pick_tx+0x2f0/0x2f0 [ 59.367861] ? __copy_skb_header+0x2f0/0x510 [ 59.372252] ? sock_spd_release+0x270/0x270 [ 59.376571] netlink_rcv_skb+0x160/0x410 [ 59.380630] ? rtnetlink_put_metrics+0x520/0x520 [ 59.385370] ? netlink_ack+0xa60/0xa60 [ 59.389243] netlink_unicast+0x4d7/0x6a0 [ 59.393286] ? netlink_attachskb+0x710/0x710 [ 59.397682] netlink_sendmsg+0x80b/0xcd0 [ 59.401735] ? netlink_unicast+0x6a0/0x6a0 [ 59.405963] ? move_addr_to_kernel.part.0+0x110/0x110 [ 59.411160] ? netlink_unicast+0x6a0/0x6a0 [ 59.415401] sock_sendmsg+0xcf/0x120 [ 59.419112] ___sys_sendmsg+0x803/0x920 [ 59.423073] ? copy_msghdr_from_user+0x410/0x410 [ 59.427831] ? __fget+0x319/0x510 [ 59.431312] ? lock_downgrade+0x740/0x740 [ 59.435456] ? check_preemption_disabled+0x41/0x280 [ 59.440505] ? __fget+0x340/0x510 [ 59.443952] ? iterate_fd+0x350/0x350 [ 59.447745] ? __fget_light+0x1d1/0x230 [ 59.451709] __sys_sendmsg+0xec/0x1b0 [ 59.455500] ? __ia32_sys_shutdown+0x70/0x70 [ 59.459912] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 59.464654] ? trace_hardirqs_off_caller+0x55/0x210 [ 59.469665] ? do_syscall_64+0x21/0x620 [ 59.473624] do_syscall_64+0xf9/0x620 [ 59.477413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 59.482582] RIP: 0033:0x45c4a9 [ 59.485773] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 59.504658] RSP: 002b:00007fa636214c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 59.512348] RAX: ffffffffffffffda RBX: 00007fa6362156d4 RCX: 000000000045c4a9 [ 59.519607] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005 [ 59.526859] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 59.534109] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 59.541359] R13: 00000000000009f9 R14: 00000000004cc766 R15: 000000000076bfcc [ 59.550022] Kernel Offset: disabled [ 59.553646] Rebooting in 86400 seconds..