[ 89.593419][ T27] audit: type=1400 audit(1582209253.178:37): avc: denied { watch } for pid=10746 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 89.620333][ T27] audit: type=1400 audit(1582209253.178:38): avc: denied { watch } for pid=10746 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 90.009668][ T27] audit: type=1800 audit(1582209253.608:39): pid=10658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 90.031901][ T27] audit: type=1800 audit(1582209253.608:40): pid=10658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 92.908240][ T27] audit: type=1400 audit(1582209256.508:41): avc: denied { map } for pid=10836 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.10.2' (ECDSA) to the list of known hosts. [ 99.742939][ T27] audit: type=1400 audit(1582209263.338:42): avc: denied { map } for pid=10848 comm="syz-executor565" path="/root/syz-executor565163003" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 99.766826][T10849] IPVS: ftp: loaded support on port[0] = 21 [ 99.821717][T10849] chnl_net:caif_netlink_parms(): no params data found [ 99.859683][T10849] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.867266][T10849] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.875263][T10849] device bridge_slave_0 entered promiscuous mode [ 99.884797][T10849] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.891907][T10849] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.899779][T10849] device bridge_slave_1 entered promiscuous mode [ 99.918196][T10849] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 99.929945][T10849] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 99.950202][T10849] team0: Port device team_slave_0 added [ 99.957943][T10849] team0: Port device team_slave_1 added [ 99.973980][T10849] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 99.981190][T10849] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 100.007263][T10849] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 100.020395][T10849] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 100.027528][T10849] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 100.054221][T10849] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 100.164937][T10849] device hsr_slave_0 entered promiscuous mode [ 100.243200][T10849] device hsr_slave_1 entered promiscuous mode [ 100.389407][ T27] audit: type=1400 audit(1582209263.988:43): avc: denied { create } for pid=10849 comm="syz-executor565" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 100.392770][T10849] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 100.422116][ T27] audit: type=1400 audit(1582209263.988:44): avc: denied { write } for pid=10849 comm="syz-executor565" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 100.447077][ T27] audit: type=1400 audit(1582209263.988:45): avc: denied { read } for pid=10849 comm="syz-executor565" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 100.475842][T10849] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 100.525397][T10849] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 100.585342][T10849] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 100.680963][T10849] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.688176][T10849] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.695969][T10849] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.703089][T10849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.757149][T10849] 8021q: adding VLAN 0 to HW filter on device bond0 [ 100.771394][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.781910][ T2689] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.790873][ T2689] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.799175][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 100.815254][T10849] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.826407][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.836056][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.844958][ T3508] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.852059][ T3508] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.873243][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.881860][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.890858][ T2723] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.897937][ T2723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.905937][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 100.914931][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 100.926092][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 100.935389][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 100.944544][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 100.963378][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 100.972441][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 100.981515][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 100.990413][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.999273][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 101.007737][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 101.022035][T10849] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 101.044627][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 101.052038][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 101.068963][T10849] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 101.091242][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 101.100760][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 101.123262][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 101.131409][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.140357][T10849] device veth0_vlan entered promiscuous mode [ 101.147899][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.155698][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 101.170409][T10849] device veth1_vlan entered promiscuous mode [ 101.196241][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 101.205068][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 101.213884][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 101.222214][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 101.234148][T10849] device veth0_macvtap entered promiscuous mode [ 101.246220][T10849] device veth1_macvtap entered promiscuous mode [ 101.266155][T10849] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 101.274678][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 101.282673][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 101.290753][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 101.299392][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 101.312355][T10849] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 101.321029][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 101.329936][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 101.481094][ C0] ================================================================== [ 101.489416][ C0] BUG: KASAN: use-after-free in find_match+0xb39/0xc90 [ 101.496274][ C0] Read of size 8 at addr ffff88809ff2c320 by task kworker/0:10/3508 [ 101.504228][ C0] [ 101.506544][ C0] CPU: 0 PID: 3508 Comm: kworker/0:10 Not tainted 5.6.0-rc2-syzkaller #0 [ 101.514935][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.525122][ C0] Workqueue: ipv6_addrconf addrconf_dad_work [ 101.531095][ C0] Call Trace: [ 101.534359][ C0] [ 101.537194][ C0] dump_stack+0x197/0x210 [ 101.541634][ C0] ? find_match+0xb39/0xc90 [ 101.546128][ C0] print_address_description.constprop.0.cold+0xd4/0x30b [ 101.553143][ C0] ? find_match+0xb39/0xc90 [ 101.557651][ C0] ? find_match+0xb39/0xc90 [ 101.562141][ C0] __kasan_report.cold+0x1b/0x32 [ 101.567075][ C0] ? find_match+0xb39/0xc90 [ 101.571566][ C0] kasan_report+0x12/0x20 [ 101.575933][ C0] __asan_report_load8_noabort+0x14/0x20 [ 101.581562][ C0] find_match+0xb39/0xc90 [ 101.585876][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 101.590882][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 101.596695][ C0] __find_rr_leaf+0x14e/0x750 [ 101.601367][ C0] ? nexthop_is_blackhole+0x690/0x690 [ 101.606741][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 101.612908][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 101.617999][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 101.623843][ C0] fib6_table_lookup+0x697/0xdb0 [ 101.628825][ C0] ? rt6_age_exceptions+0x130/0x130 [ 101.634018][ C0] ? __kasan_check_read+0x11/0x20 [ 101.639028][ C0] ip6_pol_route+0x1f6/0xa70 [ 101.643641][ C0] ? ip6_pol_route_lookup+0x12e0/0x12e0 [ 101.649197][ C0] ? flow_hash_from_keys+0x2c4/0x8c0 [ 101.654479][ C0] ip6_pol_route_input+0x65/0x80 [ 101.659413][ C0] fib6_rule_lookup+0x133/0x7d0 [ 101.664268][ C0] ? ip6_pol_route+0xa70/0xa70 [ 101.669029][ C0] ? fib6_lookup+0x340/0x340 [ 101.673641][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 101.679910][ C0] ? nf_conntrack_icmpv6_error+0x3c1/0x560 [ 101.685762][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 101.691707][ C0] ip6_route_input_lookup+0xb7/0xd0 [ 101.696997][ C0] ip6_route_input+0x5f0/0xa40 [ 101.701760][ C0] ? ip6_route_check_nh+0x670/0x670 [ 101.707007][ C0] ? cpuup_canceled+0xf8/0x1d0 [ 101.711785][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 101.716869][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 101.722790][ C0] ip6_rcv_finish_core.isra.0+0x174/0x590 [ 101.728506][ C0] ip6_rcv_finish+0x17a/0x310 [ 101.733182][ C0] ipv6_rcv+0x10e/0x420 [ 101.737369][ C0] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 101.742816][ C0] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 101.748710][ C0] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 101.754157][ C0] __netif_receive_skb_one_core+0x113/0x1a0 [ 101.760053][ C0] ? __netif_receive_skb_core+0x30b0/0x30b0 [ 101.765942][ C0] ? lock_acquire+0x190/0x410 [ 101.770612][ C0] ? process_backlog+0x1b5/0x780 [ 101.775543][ C0] __netif_receive_skb+0x2c/0x1d0 [ 101.780564][ C0] process_backlog+0x226/0x780 [ 101.785322][ C0] ? net_rx_action+0x27b/0x1120 [ 101.790169][ C0] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 101.795499][ C0] net_rx_action+0x508/0x1120 [ 101.800185][ C0] ? napi_busy_loop+0x970/0x970 [ 101.805090][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 101.810620][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 101.816591][ C0] ? ip6_finish_output2+0x10d3/0x25c0 [ 101.822021][ C0] ? trace_hardirqs_on+0x67/0x240 [ 101.827056][ C0] __do_softirq+0x262/0x98c [ 101.831554][ C0] ? ip6_finish_output2+0x10d3/0x25c0 [ 101.836925][ C0] do_softirq_own_stack+0x2a/0x40 [ 101.841939][ C0] [ 101.844935][ C0] do_softirq.part.0+0x11a/0x170 [ 101.849859][ C0] __local_bh_enable_ip+0x211/0x270 [ 101.855049][ C0] ip6_finish_output2+0x1101/0x25c0 [ 101.860269][ C0] ? ip6_mtu+0x2e6/0x450 [ 101.864514][ C0] ? ip6_frag_next+0xb20/0xb20 [ 101.869282][ C0] ? lock_downgrade+0x920/0x920 [ 101.874136][ C0] ? __kasan_check_read+0x11/0x20 [ 101.879159][ C0] __ip6_finish_output+0x444/0xaa0 [ 101.884274][ C0] ? __ip6_finish_output+0x444/0xaa0 [ 101.889565][ C0] ip6_finish_output+0x38/0x1f0 [ 101.894407][ C0] ip6_output+0x25e/0x880 [ 101.898742][ C0] ? ip6_finish_output+0x1f0/0x1f0 [ 101.903854][ C0] ? __ip6_finish_output+0xaa0/0xaa0 [ 101.909136][ C0] ndisc_send_skb+0xf1f/0x1490 [ 101.913948][ C0] ? nf_hook.constprop.0+0x560/0x560 [ 101.919243][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 101.925479][ C0] ? skb_set_owner_w+0x265/0x410 [ 101.930413][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 101.936147][ C0] ndisc_send_ns+0x3a9/0x850 [ 101.940725][ C0] ? mark_held_locks+0xa4/0xf0 [ 101.945480][ C0] ? ndisc_netdev_event+0x5e0/0x5e0 [ 101.950659][ C0] ? lockdep_hardirqs_on+0x421/0x5e0 [ 101.955940][ C0] ? addrconf_dad_work+0xb2c/0x11d0 [ 101.961169][ C0] ? trace_hardirqs_on+0x67/0x240 [ 101.966197][ C0] ? addrconf_dad_work+0xb2c/0x11d0 [ 101.971444][ C0] addrconf_dad_work+0xbf3/0x11d0 [ 101.976468][ C0] ? addrconf_dad_completed+0xbb0/0xbb0 [ 101.982063][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 101.988042][ C0] ? trace_hardirqs_on+0x67/0x240 [ 101.993065][ C0] process_one_work+0xa05/0x17a0 [ 101.997995][ C0] ? mark_held_locks+0xf0/0xf0 [ 102.002753][ C0] ? pwq_dec_nr_in_flight+0x320/0x320 [ 102.008124][ C0] ? lock_acquire+0x190/0x410 [ 102.012817][ C0] worker_thread+0x98/0xe40 [ 102.017318][ C0] ? trace_hardirqs_on+0x67/0x240 [ 102.022350][ C0] kthread+0x361/0x430 [ 102.026409][ C0] ? process_one_work+0x17a0/0x17a0 [ 102.031591][ C0] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 102.037308][ C0] ret_from_fork+0x24/0x30 [ 102.041724][ C0] [ 102.044387][ C0] Allocated by task 10849: [ 102.048787][ C0] save_stack+0x23/0x90 [ 102.052930][ C0] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 102.058544][ C0] kasan_kmalloc+0x9/0x10 [ 102.062873][ C0] __kmalloc_node+0x4e/0x70 [ 102.067375][ C0] kvmalloc_node+0x68/0x100 [ 102.071861][ C0] alloc_netdev_mqs+0x98/0xe40 [ 102.076680][ C0] vti6_init_net+0x244/0x810 [ 102.081253][ C0] ops_init+0xb3/0x420 [ 102.085303][ C0] setup_net+0x2d5/0x8b0 [ 102.089525][ C0] copy_net_ns+0x29e/0x5a0 [ 102.093923][ C0] create_new_namespaces+0x403/0xb50 [ 102.099201][ C0] unshare_nsproxy_namespaces+0xc2/0x200 [ 102.104864][ C0] ksys_unshare+0x444/0x980 [ 102.109360][ C0] __x64_sys_unshare+0x31/0x40 [ 102.114108][ C0] do_syscall_64+0xfa/0x790 [ 102.118653][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 102.124528][ C0] [ 102.126859][ C0] Freed by task 10849: [ 102.130929][ C0] save_stack+0x23/0x90 [ 102.135108][ C0] __kasan_slab_free+0x102/0x150 [ 102.140038][ C0] kasan_slab_free+0xe/0x10 [ 102.144524][ C0] kfree+0x10a/0x2c0 [ 102.148410][ C0] __netdev_name_node_alt_destroy+0x1ff/0x2a0 [ 102.154459][ C0] netdev_name_node_alt_destroy+0x57/0x80 [ 102.160268][ C0] rtnl_linkprop.isra.0+0x575/0x6f0 [ 102.165448][ C0] rtnl_dellinkprop+0x46/0x60 [ 102.170123][ C0] rtnetlink_rcv_msg+0x45e/0xaf0 [ 102.175045][ C0] netlink_rcv_skb+0x177/0x450 [ 102.179927][ C0] rtnetlink_rcv+0x1d/0x30 [ 102.184376][ C0] netlink_unicast+0x59e/0x7e0 [ 102.189123][ C0] netlink_sendmsg+0x91c/0xea0 [ 102.193871][ C0] sock_sendmsg+0xd7/0x130 [ 102.198544][ C0] ____sys_sendmsg+0x753/0x880 [ 102.203336][ C0] ___sys_sendmsg+0x100/0x170 [ 102.207995][ C0] __sys_sendmsg+0x105/0x1d0 [ 102.212572][ C0] __x64_sys_sendmsg+0x78/0xb0 [ 102.217329][ C0] do_syscall_64+0xfa/0x790 [ 102.221900][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 102.227769][ C0] [ 102.230093][ C0] The buggy address belongs to the object at ffff88809ff2c000 [ 102.230093][ C0] which belongs to the cache kmalloc-4k of size 4096 [ 102.244142][ C0] The buggy address is located 800 bytes inside of [ 102.244142][ C0] 4096-byte region [ffff88809ff2c000, ffff88809ff2d000) [ 102.257532][ C0] The buggy address belongs to the page: [ 102.263313][ C0] page:ffffea00027fcb00 refcount:1 mapcount:0 mapping:ffff8880aa402000 index:0x0 compound_mapcount: 0 [ 102.274345][ C0] flags: 0xfffe0000010200(slab|head) [ 102.279624][ C0] raw: 00fffe0000010200 ffffea00028c3b08 ffffea000264fe88 ffff8880aa402000 [ 102.288199][ C0] raw: 0000000000000000 ffff88809ff2c000 0000000100000001 0000000000000000 [ 102.296825][ C0] page dumped because: kasan: bad access detected [ 102.303215][ C0] [ 102.305524][ C0] Memory state around the buggy address: [ 102.311144][ C0] ffff88809ff2c200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 102.319199][ C0] ffff88809ff2c280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 102.327253][ C0] >ffff88809ff2c300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 102.335300][ C0] ^ [ 102.340400][ C0] ffff88809ff2c380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 102.348518][ C0] ffff88809ff2c400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 102.356567][ C0] ================================================================== [ 102.364612][ C0] Disabling lock debugging due to kernel taint [ 102.370789][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 102.377376][ C0] CPU: 0 PID: 3508 Comm: kworker/0:10 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 102.387155][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.397214][ C0] Workqueue: ipv6_addrconf addrconf_dad_work [ 102.403176][ C0] Call Trace: [ 102.406436][ C0] [ 102.409283][ C0] dump_stack+0x197/0x210 [ 102.413608][ C0] panic+0x2e3/0x75c [ 102.417499][ C0] ? add_taint.cold+0x16/0x16 [ 102.422176][ C0] ? trace_hardirqs_on+0x5e/0x240 [ 102.427359][ C0] ? trace_hardirqs_on+0x5e/0x240 [ 102.432426][ C0] ? find_match+0xb39/0xc90 [ 102.437009][ C0] end_report+0x47/0x4f [ 102.441155][ C0] ? find_match+0xb39/0xc90 [ 102.445650][ C0] __kasan_report.cold+0xe/0x32 [ 102.450553][ C0] ? find_match+0xb39/0xc90 [ 102.455040][ C0] kasan_report+0x12/0x20 [ 102.459401][ C0] __asan_report_load8_noabort+0x14/0x20 [ 102.465020][ C0] find_match+0xb39/0xc90 [ 102.469340][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 102.474344][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 102.480191][ C0] __find_rr_leaf+0x14e/0x750 [ 102.484871][ C0] ? nexthop_is_blackhole+0x690/0x690 [ 102.490235][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 102.496377][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 102.501378][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 102.507227][ C0] fib6_table_lookup+0x697/0xdb0 [ 102.512159][ C0] ? rt6_age_exceptions+0x130/0x130 [ 102.517357][ C0] ? __kasan_check_read+0x11/0x20 [ 102.522363][ C0] ip6_pol_route+0x1f6/0xa70 [ 102.526948][ C0] ? ip6_pol_route_lookup+0x12e0/0x12e0 [ 102.532488][ C0] ? flow_hash_from_keys+0x2c4/0x8c0 [ 102.537795][ C0] ip6_pol_route_input+0x65/0x80 [ 102.542726][ C0] fib6_rule_lookup+0x133/0x7d0 [ 102.547564][ C0] ? ip6_pol_route+0xa70/0xa70 [ 102.552310][ C0] ? fib6_lookup+0x340/0x340 [ 102.556960][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 102.563246][ C0] ? nf_conntrack_icmpv6_error+0x3c1/0x560 [ 102.569054][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 102.574989][ C0] ip6_route_input_lookup+0xb7/0xd0 [ 102.580172][ C0] ip6_route_input+0x5f0/0xa40 [ 102.584986][ C0] ? ip6_route_check_nh+0x670/0x670 [ 102.590175][ C0] ? cpuup_canceled+0xf8/0x1d0 [ 102.594926][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 102.599943][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 102.605743][ C0] ip6_rcv_finish_core.isra.0+0x174/0x590 [ 102.611466][ C0] ip6_rcv_finish+0x17a/0x310 [ 102.616136][ C0] ipv6_rcv+0x10e/0x420 [ 102.620272][ C0] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 102.625772][ C0] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 102.631670][ C0] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 102.637125][ C0] __netif_receive_skb_one_core+0x113/0x1a0 [ 102.643027][ C0] ? __netif_receive_skb_core+0x30b0/0x30b0 [ 102.648903][ C0] ? lock_acquire+0x190/0x410 [ 102.653567][ C0] ? process_backlog+0x1b5/0x780 [ 102.658499][ C0] __netif_receive_skb+0x2c/0x1d0 [ 102.663508][ C0] process_backlog+0x226/0x780 [ 102.668275][ C0] ? net_rx_action+0x27b/0x1120 [ 102.673119][ C0] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 102.678407][ C0] net_rx_action+0x508/0x1120 [ 102.683266][ C0] ? napi_busy_loop+0x970/0x970 [ 102.688110][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 102.693651][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 102.699644][ C0] ? ip6_finish_output2+0x10d3/0x25c0 [ 102.705008][ C0] ? trace_hardirqs_on+0x67/0x240 [ 102.710047][ C0] __do_softirq+0x262/0x98c [ 102.714639][ C0] ? ip6_finish_output2+0x10d3/0x25c0 [ 102.720010][ C0] do_softirq_own_stack+0x2a/0x40 [ 102.725016][ C0] [ 102.727950][ C0] do_softirq.part.0+0x11a/0x170 [ 102.732883][ C0] __local_bh_enable_ip+0x211/0x270 [ 102.738167][ C0] ip6_finish_output2+0x1101/0x25c0 [ 102.743348][ C0] ? ip6_mtu+0x2e6/0x450 [ 102.747729][ C0] ? ip6_frag_next+0xb20/0xb20 [ 102.752539][ C0] ? lock_downgrade+0x920/0x920 [ 102.757378][ C0] ? __kasan_check_read+0x11/0x20 [ 102.762398][ C0] __ip6_finish_output+0x444/0xaa0 [ 102.767516][ C0] ? __ip6_finish_output+0x444/0xaa0 [ 102.772901][ C0] ip6_finish_output+0x38/0x1f0 [ 102.777746][ C0] ip6_output+0x25e/0x880 [ 102.782072][ C0] ? ip6_finish_output+0x1f0/0x1f0 [ 102.787238][ C0] ? __ip6_finish_output+0xaa0/0xaa0 [ 102.792533][ C0] ndisc_send_skb+0xf1f/0x1490 [ 102.797288][ C0] ? nf_hook.constprop.0+0x560/0x560 [ 102.802571][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.808819][ C0] ? skb_set_owner_w+0x265/0x410 [ 102.813819][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 102.819594][ C0] ndisc_send_ns+0x3a9/0x850 [ 102.824208][ C0] ? mark_held_locks+0xa4/0xf0 [ 102.828981][ C0] ? ndisc_netdev_event+0x5e0/0x5e0 [ 102.834167][ C0] ? lockdep_hardirqs_on+0x421/0x5e0 [ 102.839670][ C0] ? addrconf_dad_work+0xb2c/0x11d0 [ 102.844904][ C0] ? trace_hardirqs_on+0x67/0x240 [ 102.850007][ C0] ? addrconf_dad_work+0xb2c/0x11d0 [ 102.855258][ C0] addrconf_dad_work+0xbf3/0x11d0 [ 102.860313][ C0] ? addrconf_dad_completed+0xbb0/0xbb0 [ 102.865873][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 102.871973][ C0] ? trace_hardirqs_on+0x67/0x240 [ 102.876988][ C0] process_one_work+0xa05/0x17a0 [ 102.882073][ C0] ? mark_held_locks+0xf0/0xf0 [ 102.886838][ C0] ? pwq_dec_nr_in_flight+0x320/0x320 [ 102.892199][ C0] ? lock_acquire+0x190/0x410 [ 102.896871][ C0] worker_thread+0x98/0xe40 [ 102.901439][ C0] ? trace_hardirqs_on+0x67/0x240 [ 102.906461][ C0] kthread+0x361/0x430 [ 102.910513][ C0] ? process_one_work+0x17a0/0x17a0 [ 102.915842][ C0] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 102.921561][ C0] ret_from_fork+0x24/0x30 [ 102.927329][ C0] Kernel Offset: disabled [ 102.931709][ C0] Rebooting in 86400 seconds..