[ 102.343175][ T27] audit: type=1400 audit(1582219901.906:37): avc: denied { watch } for pid=10705 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 102.375505][ T27] audit: type=1400 audit(1582219901.916:38): avc: denied { watch } for pid=10705 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 102.740309][ T27] audit: type=1800 audit(1582219902.306:39): pid=10617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 102.762226][ T27] audit: type=1800 audit(1582219902.316:40): pid=10617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 105.121254][ T27] audit: type=1400 audit(1582219904.686:41): avc: denied { map } for pid=10794 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.196' (ECDSA) to the list of known hosts. [ 111.980968][ T27] audit: type=1400 audit(1582219911.546:42): avc: denied { map } for pid=10806 comm="syz-executor150" path="/root/syz-executor150892776" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 112.009529][T10807] IPVS: ftp: loaded support on port[0] = 21 [ 112.062302][T10807] chnl_net:caif_netlink_parms(): no params data found [ 112.106883][T10807] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.114553][T10807] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.122407][T10807] device bridge_slave_0 entered promiscuous mode [ 112.132239][T10807] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.139587][T10807] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.147573][T10807] device bridge_slave_1 entered promiscuous mode [ 112.166207][T10807] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 112.178175][T10807] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 112.198913][T10807] team0: Port device team_slave_0 added [ 112.207507][T10807] team0: Port device team_slave_1 added [ 112.224143][T10807] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 112.231223][T10807] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 112.257297][T10807] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 112.270397][T10807] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 112.277481][T10807] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 112.303445][T10807] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 112.375732][T10807] device hsr_slave_0 entered promiscuous mode [ 112.413547][T10807] device hsr_slave_1 entered promiscuous mode [ 112.553849][ T27] audit: type=1400 audit(1582219912.126:43): avc: denied { create } for pid=10807 comm="syz-executor150" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 112.557475][T10807] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 112.587932][ T27] audit: type=1400 audit(1582219912.126:44): avc: denied { write } for pid=10807 comm="syz-executor150" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 112.612771][ T27] audit: type=1400 audit(1582219912.126:45): avc: denied { read } for pid=10807 comm="syz-executor150" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 112.655989][T10807] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 112.706583][T10807] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 112.766317][T10807] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 112.842400][T10807] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.849848][T10807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.857944][T10807] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.865090][T10807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.922079][T10807] 8021q: adding VLAN 0 to HW filter on device bond0 [ 112.939271][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 112.950208][ T2803] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.959126][ T2803] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.967444][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 112.981736][T10807] 8021q: adding VLAN 0 to HW filter on device team0 [ 112.994381][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.003508][ T2761] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.010625][ T2761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.022335][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.032113][ T2803] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.039404][ T2803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.063304][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 113.071923][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 113.081554][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 113.090632][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.099833][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 113.109361][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 113.129106][ T2789] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 113.137810][ T2789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 113.146429][ T2789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 113.155931][ T2789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 113.164876][ T2789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.177024][T10807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 113.198409][ T2789] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 113.208125][ T2789] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 113.222859][T10807] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 113.245961][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 113.256115][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 113.277602][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 113.286968][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.297933][T10807] device veth0_vlan entered promiscuous mode [ 113.305609][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.313777][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 113.328291][T10807] device veth1_vlan entered promiscuous mode [ 113.355082][ T2789] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 113.363617][ T2789] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 113.371869][ T2789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 113.381567][ T2789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 113.394131][T10807] device veth0_macvtap entered promiscuous mode [ 113.406547][T10807] device veth1_macvtap entered promiscuous mode [ 113.427384][T10807] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 113.434969][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 113.444798][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 113.452839][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 113.461940][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 113.475108][T10807] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 113.483779][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 113.492537][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 113.653445][ C1] ================================================================== [ 113.662159][ C1] BUG: KASAN: use-after-free in find_match+0xb39/0xc90 [ 113.669012][ C1] Read of size 8 at addr ffff8880a3520320 by task kworker/1:4/2761 [ 113.676934][ C1] [ 113.679283][ C1] CPU: 1 PID: 2761 Comm: kworker/1:4 Not tainted 5.6.0-rc2-syzkaller #0 [ 113.687631][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.697697][ C1] Workqueue: ipv6_addrconf addrconf_dad_work [ 113.703683][ C1] Call Trace: [ 113.706968][ C1] [ 113.709874][ C1] dump_stack+0x197/0x210 [ 113.714204][ C1] ? find_match+0xb39/0xc90 [ 113.718732][ C1] print_address_description.constprop.0.cold+0xd4/0x30b [ 113.725757][ C1] ? find_match+0xb39/0xc90 [ 113.730251][ C1] ? find_match+0xb39/0xc90 [ 113.734752][ C1] __kasan_report.cold+0x1b/0x32 [ 113.739726][ C1] ? find_match+0xb39/0xc90 [ 113.744241][ C1] kasan_report+0x12/0x20 [ 113.748584][ C1] __asan_report_load8_noabort+0x14/0x20 [ 113.754229][ C1] find_match+0xb39/0xc90 [ 113.758554][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 113.763587][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 113.769434][ C1] __find_rr_leaf+0x14e/0x750 [ 113.774176][ C1] ? nexthop_is_blackhole+0x690/0x690 [ 113.779545][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 113.785854][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 113.790887][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 113.796695][ C1] fib6_table_lookup+0x697/0xdb0 [ 113.801652][ C1] ? rt6_age_exceptions+0x130/0x130 [ 113.806859][ C1] ? __kasan_check_read+0x11/0x20 [ 113.811874][ C1] ip6_pol_route+0x1f6/0xa70 [ 113.816487][ C1] ? ip6_pol_route_lookup+0x12e0/0x12e0 [ 113.822042][ C1] ? flow_hash_from_keys+0x2c4/0x8c0 [ 113.828454][ C1] ip6_pol_route_input+0x65/0x80 [ 113.833663][ C1] fib6_rule_lookup+0x133/0x7d0 [ 113.838566][ C1] ? ip6_pol_route+0xa70/0xa70 [ 113.843344][ C1] ? fib6_lookup+0x340/0x340 [ 113.847984][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 113.854227][ C1] ? nf_conntrack_icmpv6_error+0x3c1/0x560 [ 113.860340][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 113.866261][ C1] ip6_route_input_lookup+0xb7/0xd0 [ 113.871593][ C1] ip6_route_input+0x5f0/0xa40 [ 113.876439][ C1] ? ip6_route_check_nh+0x670/0x670 [ 113.881645][ C1] ? cpuup_canceled+0xf8/0x1d0 [ 113.886431][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 113.891898][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 113.897867][ C1] ip6_rcv_finish_core.isra.0+0x174/0x590 [ 113.904982][ C1] ip6_rcv_finish+0x17a/0x310 [ 113.909678][ C1] ipv6_rcv+0x10e/0x420 [ 113.914525][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 113.920081][ C1] ? __lock_acquire+0x16f2/0x4a00 [ 113.925173][ C1] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 113.931065][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 113.936982][ C1] __netif_receive_skb_one_core+0x113/0x1a0 [ 113.942888][ C1] ? __netif_receive_skb_core+0x30b0/0x30b0 [ 113.948825][ C1] ? lock_acquire+0x190/0x410 [ 113.953724][ C1] ? process_backlog+0x1b5/0x780 [ 113.958765][ C1] __netif_receive_skb+0x2c/0x1d0 [ 113.963955][ C1] process_backlog+0x226/0x780 [ 113.968901][ C1] ? net_rx_action+0x27b/0x1120 [ 113.973824][ C1] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 113.979122][ C1] net_rx_action+0x508/0x1120 [ 113.983825][ C1] ? napi_busy_loop+0x970/0x970 [ 113.988681][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 113.994363][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 114.000406][ C1] ? ip6_finish_output2+0x10d3/0x25c0 [ 114.005853][ C1] ? trace_hardirqs_on+0x67/0x240 [ 114.010939][ C1] __do_softirq+0x262/0x98c [ 114.015454][ C1] ? ip6_finish_output2+0x10d3/0x25c0 [ 114.020819][ C1] do_softirq_own_stack+0x2a/0x40 [ 114.025832][ C1] [ 114.028762][ C1] do_softirq.part.0+0x11a/0x170 [ 114.033685][ C1] __local_bh_enable_ip+0x211/0x270 [ 114.038978][ C1] ip6_finish_output2+0x1101/0x25c0 [ 114.044210][ C1] ? ip6_frag_next+0xb20/0xb20 [ 114.049110][ C1] ? lock_downgrade+0x920/0x920 [ 114.054088][ C1] ? __kasan_check_read+0x11/0x20 [ 114.059137][ C1] __ip6_finish_output+0x444/0xaa0 [ 114.064249][ C1] ? __ip6_finish_output+0x444/0xaa0 [ 114.069624][ C1] ip6_finish_output+0x38/0x1f0 [ 114.074514][ C1] ip6_output+0x25e/0x880 [ 114.079268][ C1] ? ip6_finish_output+0x1f0/0x1f0 [ 114.085170][ C1] ? __ip6_finish_output+0xaa0/0xaa0 [ 114.090466][ C1] ndisc_send_skb+0xf1f/0x1490 [ 114.095290][ C1] ? nf_hook.constprop.0+0x560/0x560 [ 114.100589][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 114.106829][ C1] ? skb_set_owner_w+0x265/0x410 [ 114.111847][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 114.117567][ C1] ndisc_send_ns+0x3a9/0x850 [ 114.122167][ C1] ? mark_held_locks+0xa4/0xf0 [ 114.126940][ C1] ? ndisc_netdev_event+0x5e0/0x5e0 [ 114.132279][ C1] ? lockdep_hardirqs_on+0x421/0x5e0 [ 114.137656][ C1] ? addrconf_dad_work+0xb2c/0x11d0 [ 114.142866][ C1] ? trace_hardirqs_on+0x67/0x240 [ 114.147884][ C1] ? addrconf_dad_work+0xb2c/0x11d0 [ 114.153190][ C1] addrconf_dad_work+0xbf3/0x11d0 [ 114.158906][ C1] ? addrconf_dad_completed+0xbb0/0xbb0 [ 114.164455][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 114.170440][ C1] ? trace_hardirqs_on+0x67/0x240 [ 114.175516][ C1] process_one_work+0xa05/0x17a0 [ 114.180763][ C1] ? mark_held_locks+0xf0/0xf0 [ 114.185893][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 114.191266][ C1] ? lock_acquire+0x190/0x410 [ 114.195976][ C1] worker_thread+0x98/0xe40 [ 114.200498][ C1] kthread+0x361/0x430 [ 114.204558][ C1] ? process_one_work+0x17a0/0x17a0 [ 114.209778][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 114.215560][ C1] ret_from_fork+0x24/0x30 [ 114.220029][ C1] [ 114.222451][ C1] Allocated by task 10807: [ 114.226866][ C1] save_stack+0x23/0x90 [ 114.231042][ C1] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 114.236696][ C1] kasan_kmalloc+0x9/0x10 [ 114.241027][ C1] __kmalloc_node+0x4e/0x70 [ 114.245531][ C1] kvmalloc_node+0x68/0x100 [ 114.250246][ C1] alloc_netdev_mqs+0x98/0xe40 [ 114.255157][ C1] vti6_init_net+0x244/0x810 [ 114.259734][ C1] ops_init+0xb3/0x420 [ 114.263822][ C1] setup_net+0x2d5/0x8b0 [ 114.268092][ C1] copy_net_ns+0x29e/0x5a0 [ 114.272503][ C1] create_new_namespaces+0x403/0xb50 [ 114.277787][ C1] unshare_nsproxy_namespaces+0xc2/0x200 [ 114.283420][ C1] ksys_unshare+0x444/0x980 [ 114.287932][ C1] __x64_sys_unshare+0x31/0x40 [ 114.292799][ C1] do_syscall_64+0xfa/0x790 [ 114.297304][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 114.303174][ C1] [ 114.305525][ C1] Freed by task 10807: [ 114.309607][ C1] save_stack+0x23/0x90 [ 114.313859][ C1] __kasan_slab_free+0x102/0x150 [ 114.318802][ C1] kasan_slab_free+0xe/0x10 [ 114.323301][ C1] kfree+0x10a/0x2c0 [ 114.327246][ C1] __netdev_name_node_alt_destroy+0x1ff/0x2a0 [ 114.333333][ C1] netdev_name_node_alt_destroy+0x57/0x80 [ 114.339040][ C1] rtnl_linkprop.isra.0+0x575/0x6f0 [ 114.344883][ C1] rtnl_dellinkprop+0x46/0x60 [ 114.349560][ C1] rtnetlink_rcv_msg+0x45e/0xaf0 [ 114.354486][ C1] netlink_rcv_skb+0x177/0x450 [ 114.359420][ C1] rtnetlink_rcv+0x1d/0x30 [ 114.363829][ C1] netlink_unicast+0x59e/0x7e0 [ 114.368587][ C1] netlink_sendmsg+0x91c/0xea0 [ 114.373336][ C1] sock_sendmsg+0xd7/0x130 [ 114.377747][ C1] ____sys_sendmsg+0x753/0x880 [ 114.382623][ C1] ___sys_sendmsg+0x100/0x170 [ 114.387439][ C1] __sys_sendmsg+0x105/0x1d0 [ 114.392032][ C1] __x64_sys_sendmsg+0x78/0xb0 [ 114.396782][ C1] do_syscall_64+0xfa/0x790 [ 114.401279][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 114.407151][ C1] [ 114.409478][ C1] The buggy address belongs to the object at ffff8880a3520000 [ 114.409478][ C1] which belongs to the cache kmalloc-4k of size 4096 [ 114.423716][ C1] The buggy address is located 800 bytes inside of [ 114.423716][ C1] 4096-byte region [ffff8880a3520000, ffff8880a3521000) [ 114.437399][ C1] The buggy address belongs to the page: [ 114.443048][ C1] page:ffffea00028d4800 refcount:1 mapcount:0 mapping:ffff8880aa402000 index:0x0 compound_mapcount: 0 [ 114.455282][ C1] flags: 0xfffe0000010200(slab|head) [ 114.460736][ C1] raw: 00fffe0000010200 ffffea0001f77b08 ffffea0002501208 ffff8880aa402000 [ 114.469366][ C1] raw: 0000000000000000 ffff8880a3520000 0000000100000001 0000000000000000 [ 114.478298][ C1] page dumped because: kasan: bad access detected [ 114.484762][ C1] [ 114.487085][ C1] Memory state around the buggy address: [ 114.492731][ C1] ffff8880a3520200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 114.500802][ C1] ffff8880a3520280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 114.508856][ C1] >ffff8880a3520300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 114.516905][ C1] ^ [ 114.522010][ C1] ffff8880a3520380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 114.530066][ C1] ffff8880a3520400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 114.538141][ C1] ================================================================== [ 114.546203][ C1] Disabling lock debugging due to kernel taint [ 114.552421][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 114.559005][ C1] CPU: 1 PID: 2761 Comm: kworker/1:4 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 114.568911][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.579234][ C1] Workqueue: ipv6_addrconf addrconf_dad_work [ 114.585256][ C1] Call Trace: [ 114.588669][ C1] [ 114.591519][ C1] dump_stack+0x197/0x210 [ 114.595838][ C1] panic+0x2e3/0x75c [ 114.599854][ C1] ? add_taint.cold+0x16/0x16 [ 114.604530][ C1] ? trace_hardirqs_on+0x5e/0x240 [ 114.609550][ C1] ? trace_hardirqs_on+0x5e/0x240 [ 114.614571][ C1] ? find_match+0xb39/0xc90 [ 114.619072][ C1] end_report+0x47/0x4f [ 114.623228][ C1] ? find_match+0xb39/0xc90 [ 114.627802][ C1] __kasan_report.cold+0xe/0x32 [ 114.632655][ C1] ? find_match+0xb39/0xc90 [ 114.637412][ C1] kasan_report+0x12/0x20 [ 114.641918][ C1] __asan_report_load8_noabort+0x14/0x20 [ 114.647596][ C1] find_match+0xb39/0xc90 [ 114.651974][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 114.657108][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 114.662917][ C1] __find_rr_leaf+0x14e/0x750 [ 114.667596][ C1] ? nexthop_is_blackhole+0x690/0x690 [ 114.673056][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 114.679215][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 114.684373][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 114.690296][ C1] fib6_table_lookup+0x697/0xdb0 [ 114.695340][ C1] ? rt6_age_exceptions+0x130/0x130 [ 114.700523][ C1] ? __kasan_check_read+0x11/0x20 [ 114.705663][ C1] ip6_pol_route+0x1f6/0xa70 [ 114.710353][ C1] ? ip6_pol_route_lookup+0x12e0/0x12e0 [ 114.716042][ C1] ? flow_hash_from_keys+0x2c4/0x8c0 [ 114.721325][ C1] ip6_pol_route_input+0x65/0x80 [ 114.726429][ C1] fib6_rule_lookup+0x133/0x7d0 [ 114.731279][ C1] ? ip6_pol_route+0xa70/0xa70 [ 114.736053][ C1] ? fib6_lookup+0x340/0x340 [ 114.740643][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 114.746880][ C1] ? nf_conntrack_icmpv6_error+0x3c1/0x560 [ 114.752785][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 114.758682][ C1] ip6_route_input_lookup+0xb7/0xd0 [ 114.763956][ C1] ip6_route_input+0x5f0/0xa40 [ 114.768705][ C1] ? ip6_route_check_nh+0x670/0x670 [ 114.773980][ C1] ? cpuup_canceled+0xf8/0x1d0 [ 114.778766][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 114.783786][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 114.789597][ C1] ip6_rcv_finish_core.isra.0+0x174/0x590 [ 114.795302][ C1] ip6_rcv_finish+0x17a/0x310 [ 114.799976][ C1] ipv6_rcv+0x10e/0x420 [ 114.804132][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 114.809585][ C1] ? __lock_acquire+0x16f2/0x4a00 [ 114.814603][ C1] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 114.820509][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 114.825969][ C1] __netif_receive_skb_one_core+0x113/0x1a0 [ 114.831847][ C1] ? __netif_receive_skb_core+0x30b0/0x30b0 [ 114.837842][ C1] ? lock_acquire+0x190/0x410 [ 114.842502][ C1] ? process_backlog+0x1b5/0x780 [ 114.847788][ C1] __netif_receive_skb+0x2c/0x1d0 [ 114.852803][ C1] process_backlog+0x226/0x780 [ 114.857613][ C1] ? net_rx_action+0x27b/0x1120 [ 114.862472][ C1] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 114.867761][ C1] net_rx_action+0x508/0x1120 [ 114.872512][ C1] ? napi_busy_loop+0x970/0x970 [ 114.877364][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 114.882917][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 114.888895][ C1] ? ip6_finish_output2+0x10d3/0x25c0 [ 114.894542][ C1] ? trace_hardirqs_on+0x67/0x240 [ 114.899559][ C1] __do_softirq+0x262/0x98c [ 114.904151][ C1] ? ip6_finish_output2+0x10d3/0x25c0 [ 114.909521][ C1] do_softirq_own_stack+0x2a/0x40 [ 114.914527][ C1] [ 114.917474][ C1] do_softirq.part.0+0x11a/0x170 [ 114.922415][ C1] __local_bh_enable_ip+0x211/0x270 [ 114.927693][ C1] ip6_finish_output2+0x1101/0x25c0 [ 114.932957][ C1] ? ip6_frag_next+0xb20/0xb20 [ 114.937760][ C1] ? lock_downgrade+0x920/0x920 [ 114.942815][ C1] ? __kasan_check_read+0x11/0x20 [ 114.947852][ C1] __ip6_finish_output+0x444/0xaa0 [ 114.952963][ C1] ? __ip6_finish_output+0x444/0xaa0 [ 114.958283][ C1] ip6_finish_output+0x38/0x1f0 [ 114.963176][ C1] ip6_output+0x25e/0x880 [ 114.967520][ C1] ? ip6_finish_output+0x1f0/0x1f0 [ 114.972629][ C1] ? __ip6_finish_output+0xaa0/0xaa0 [ 114.978006][ C1] ndisc_send_skb+0xf1f/0x1490 [ 114.982757][ C1] ? nf_hook.constprop.0+0x560/0x560 [ 114.988260][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 114.994766][ C1] ? skb_set_owner_w+0x265/0x410 [ 114.999702][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 115.005427][ C1] ndisc_send_ns+0x3a9/0x850 [ 115.010046][ C1] ? mark_held_locks+0xa4/0xf0 [ 115.014811][ C1] ? ndisc_netdev_event+0x5e0/0x5e0 [ 115.020003][ C1] ? lockdep_hardirqs_on+0x421/0x5e0 [ 115.025416][ C1] ? addrconf_dad_work+0xb2c/0x11d0 [ 115.030611][ C1] ? trace_hardirqs_on+0x67/0x240 [ 115.035695][ C1] ? addrconf_dad_work+0xb2c/0x11d0 [ 115.040927][ C1] addrconf_dad_work+0xbf3/0x11d0 [ 115.046517][ C1] ? addrconf_dad_completed+0xbb0/0xbb0 [ 115.052095][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 115.058165][ C1] ? trace_hardirqs_on+0x67/0x240 [ 115.063188][ C1] process_one_work+0xa05/0x17a0 [ 115.068143][ C1] ? mark_held_locks+0xf0/0xf0 [ 115.072901][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 115.078337][ C1] ? lock_acquire+0x190/0x410 [ 115.083040][ C1] worker_thread+0x98/0xe40 [ 115.087572][ C1] kthread+0x361/0x430 [ 115.091670][ C1] ? process_one_work+0x17a0/0x17a0 [ 115.096865][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 115.103810][ C1] ret_from_fork+0x24/0x30 [ 115.109699][ C1] Kernel Offset: disabled [ 115.114027][ C1] Rebooting in 86400 seconds..