[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 54.029918][ T26] audit: type=1800 audit(1572047280.815:25): pid=8482 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 54.066285][ T26] audit: type=1800 audit(1572047280.815:26): pid=8482 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 54.105433][ T26] audit: type=1800 audit(1572047280.815:27): pid=8482 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.44' (ECDSA) to the list of known hosts. 2019/10/25 23:48:10 fuzzer started 2019/10/25 23:48:12 dialing manager at 10.128.0.26:45165 2019/10/25 23:48:12 syscalls: 2534 2019/10/25 23:48:12 code coverage: enabled 2019/10/25 23:48:12 comparison tracing: enabled 2019/10/25 23:48:12 extra coverage: extra coverage is not supported by the kernel 2019/10/25 23:48:12 setuid sandbox: enabled 2019/10/25 23:48:12 namespace sandbox: enabled 2019/10/25 23:48:12 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/25 23:48:12 fault injection: enabled 2019/10/25 23:48:12 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/25 23:48:12 net packet injection: enabled 2019/10/25 23:48:12 net device setup: enabled 2019/10/25 23:48:12 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 23:50:18 executing program 0: r0 = socket(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'team0\x00\x00\x00\t\x00', 0x2}, 0x18) ioctl(r0, 0x8918, 0x0) 23:50:18 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() getpriority(0x1, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) syzkaller login: [ 192.160819][ T8650] IPVS: ftp: loaded support on port[0] = 21 [ 192.292730][ T8652] IPVS: ftp: loaded support on port[0] = 21 23:50:19 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{}, "0de91a1c2fc9ed43", "02a839a6c7986edc3f8a6200c88e37de79b97525cedefaa0bded32e7d887ec99", "612a56d3", "7b23285ee4861a88"}, 0x280) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) writev(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377bd7b3eb23d90c8f0c69b08db538753bcf550f05d219f8c6ca03228dd8d293261ba071190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e", 0x74}, {&(0x7f00000003c0)="b1252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d81b53e3fce25735962003d59c73b5c7e008a287d2a1d4", 0x30}, {&(0x7f0000000700)="c2e03ca050ae6e9864a1798b5cc6822a6179ef8da5cd850e45cd71cd4dfe222335695c1aa3", 0x25}], 0x3) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="2321200a8117fb62d5eb1b3c750c75c5533f018823a1699743876915922a9b66379e3db9e87bb57e1d384bfe3042c49ef9134937af481f2b44e023b3c35f0b8810707ef1dacca01048b2c20b884e0efb76d2659a715f3b513e331597c9d3c9afed9390b357d0744ddc020aedf819000000000000000832ff0769dea9ed32487d2bf1acafcf98d817857774004608d609000000701f793b97fdcccc62273deb40c4e69857745a810000000000009755979c72f645e9898fb9d61b0ec3a669af77550098323d175d496b"], 0xc9) sendmmsg$inet(r0, &(0x7f0000000b40)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="8c", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000007c0)="6704848d55e654ad6f06f85d5c8caed968361a080c9a53252ca10c8e9f2257b4300eccf6f7e8f49e10382d24c8e304851ba9f674097b80c63dc396090a3762753a1400aba6fc2b7dcec89c4c03bb4f4a995e7f0d40", 0x55}], 0x1}}], 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 192.401316][ T8650] chnl_net:caif_netlink_parms(): no params data found [ 192.533844][ T8650] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.552008][ T8650] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.560528][ T8650] device bridge_slave_0 entered promiscuous mode [ 192.592778][ T8656] IPVS: ftp: loaded support on port[0] = 21 [ 192.599024][ T8650] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.608427][ T8650] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.621024][ T8650] device bridge_slave_1 entered promiscuous mode [ 192.641147][ T8652] chnl_net:caif_netlink_parms(): no params data found 23:50:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000080)) [ 192.670672][ T8650] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.708328][ T8650] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.765171][ T8650] team0: Port device team_slave_0 added [ 192.798969][ T8652] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.816192][ T8652] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.824260][ T8652] device bridge_slave_0 entered promiscuous mode [ 192.840311][ T8650] team0: Port device team_slave_1 added [ 192.881910][ T8652] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.891654][ T8652] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.900355][ T8652] device bridge_slave_1 entered promiscuous mode 23:50:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000000c0)=""/148, 0x94}], 0x1, 0x0) preadv(r2, &(0x7f0000000480), 0x10000000000000f3, 0x0) [ 192.949165][ T8650] device hsr_slave_0 entered promiscuous mode [ 193.026339][ T8650] device hsr_slave_1 entered promiscuous mode [ 193.105601][ T8658] IPVS: ftp: loaded support on port[0] = 21 [ 193.155073][ T8661] IPVS: ftp: loaded support on port[0] = 21 [ 193.168343][ T8652] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 23:50:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) recvmmsg(r0, &(0x7f0000001f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 193.239563][ T8652] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.273735][ T8656] chnl_net:caif_netlink_parms(): no params data found [ 193.316138][ T8650] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.323351][ T8650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.331241][ T8650] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.338343][ T8650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.381766][ T3021] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.389972][ T3021] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.408577][ T8652] team0: Port device team_slave_0 added [ 193.415369][ T8652] team0: Port device team_slave_1 added [ 193.431728][ T8664] IPVS: ftp: loaded support on port[0] = 21 [ 193.451148][ T8656] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.458477][ T8656] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.467735][ T8656] device bridge_slave_0 entered promiscuous mode [ 193.479034][ T8656] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.487108][ T8656] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.494711][ T8656] device bridge_slave_1 entered promiscuous mode [ 193.547041][ T8656] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.559564][ T8656] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.595347][ T8656] team0: Port device team_slave_0 added [ 193.602930][ T8656] team0: Port device team_slave_1 added [ 193.647820][ T8652] device hsr_slave_0 entered promiscuous mode [ 193.706489][ T8652] device hsr_slave_1 entered promiscuous mode [ 193.766073][ T8652] debugfs: Directory 'hsr0' with parent '/' already present! [ 193.795375][ T8661] chnl_net:caif_netlink_parms(): no params data found [ 193.939134][ T8656] device hsr_slave_0 entered promiscuous mode [ 193.976333][ T8656] device hsr_slave_1 entered promiscuous mode [ 194.016029][ T8656] debugfs: Directory 'hsr0' with parent '/' already present! [ 194.068581][ T8661] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.075718][ T8661] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.083810][ T8661] device bridge_slave_0 entered promiscuous mode [ 194.091404][ T8661] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.098526][ T8661] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.106457][ T8661] device bridge_slave_1 entered promiscuous mode [ 194.120715][ T8658] chnl_net:caif_netlink_parms(): no params data found [ 194.134114][ T8650] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.184891][ T8661] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.197206][ T8661] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 194.234280][ T8664] chnl_net:caif_netlink_parms(): no params data found [ 194.277404][ T8650] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.291004][ T8656] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.298203][ T8656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.305463][ T8656] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.312566][ T8656] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.341528][ T3021] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.349046][ T3021] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.362137][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.370458][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.386343][ T8664] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.393393][ T8664] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.402367][ T8664] device bridge_slave_0 entered promiscuous mode [ 194.413736][ T8661] team0: Port device team_slave_0 added [ 194.421444][ T8658] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.428698][ T8658] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.436588][ T8658] device bridge_slave_0 entered promiscuous mode [ 194.444244][ T8658] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.451598][ T8658] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.459914][ T8658] device bridge_slave_1 entered promiscuous mode [ 194.468551][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.477089][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.485315][ T3021] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.492432][ T3021] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.500276][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.509379][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.517949][ T3021] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.524976][ T3021] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.532607][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.543138][ T8664] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.550862][ T8664] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.559689][ T8664] device bridge_slave_1 entered promiscuous mode [ 194.569801][ T8661] team0: Port device team_slave_1 added [ 194.583273][ T3528] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.607084][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.615639][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.634097][ T8658] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.653315][ T8664] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.665715][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.692333][ T8658] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 194.715750][ T8664] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 194.788975][ T8661] device hsr_slave_0 entered promiscuous mode [ 194.846368][ T8661] device hsr_slave_1 entered promiscuous mode [ 194.906350][ T8661] debugfs: Directory 'hsr0' with parent '/' already present! [ 194.915825][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.924972][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.937753][ T8658] team0: Port device team_slave_0 added [ 194.960557][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.969076][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.980865][ T8650] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 194.992174][ T8650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.004141][ T8658] team0: Port device team_slave_1 added [ 195.011322][ T8664] team0: Port device team_slave_0 added [ 195.031329][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.039698][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.062181][ T8664] team0: Port device team_slave_1 added [ 195.071132][ T8652] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.094958][ T8656] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.157731][ T8664] device hsr_slave_0 entered promiscuous mode [ 195.206433][ T8664] device hsr_slave_1 entered promiscuous mode [ 195.266002][ T8664] debugfs: Directory 'hsr0' with parent '/' already present! [ 195.309236][ T8658] device hsr_slave_0 entered promiscuous mode [ 195.366383][ T8658] device hsr_slave_1 entered promiscuous mode [ 195.416067][ T8658] debugfs: Directory 'hsr0' with parent '/' already present! [ 195.435045][ T8652] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.452130][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.460287][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.479254][ T8656] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.494697][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.503504][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.513905][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.523088][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.531634][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.539616][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.553364][ T8650] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 195.599064][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.615729][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.624616][ T3021] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.631729][ T3021] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.640218][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.649410][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.660010][ T3021] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.667245][ T3021] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.674977][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.684156][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.693992][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.702223][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.711182][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.720184][ T3021] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.727530][ T3021] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.788454][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.797538][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.809313][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.818446][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.826968][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.835142][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.843596][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.852528][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.861616][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.870158][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.878766][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.887468][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.895807][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.904259][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.912679][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.920784][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.938124][ T8656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.959945][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.974975][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.991204][ T8652] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 196.002584][ T8652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.019092][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.027869][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.099323][ T8652] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.119347][ T8661] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.144897][ T8656] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.194148][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.203959][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 23:50:23 executing program 0: r0 = memfd_create(&(0x7f0000000200)='eth0\x00', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xfe, 0x0, &(0x7f0000000000)) [ 196.238691][ T8661] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.271267][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.285372][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 23:50:23 executing program 0: setreuid(0x0, 0xee01) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) [ 196.315643][ T8668] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.322807][ T8668] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.339283][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.368520][ T8658] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.397865][ T8664] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.435308][ T8673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.447540][ T8673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.468830][ T8673] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.475963][ T8673] bridge0: port 2(bridge_slave_1) entered forwarding state 23:50:23 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r0, &(0x7f0000000600)="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", 0x200) 23:50:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') openat$cgroup_int(r0, &(0x7f0000000080)='cpu.weight\x00', 0x2, 0x0) [ 196.484252][ T8673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.506974][ T8673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.515758][ T8673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.550681][ T8673] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.551589][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 196.551601][ T26] audit: type=1800 audit(1572047423.335:31): pid=8701 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16518 res=0 [ 196.560028][ T8673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.587400][ T8673] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.618085][ T8673] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.655420][ T8664] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.699632][ T8658] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.722870][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.732581][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.742291][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 23:50:23 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r0, &(0x7f0000000600)="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", 0x200) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="ee", 0x1}], 0x1) truncate(&(0x7f00000000c0)='./file0\x00', 0x2) 23:50:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) [ 196.753996][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.768998][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.789989][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.804883][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.824226][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.848872][ T8661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.858650][ T26] audit: type=1800 audit(1572047423.645:32): pid=8716 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16525 res=0 [ 196.876072][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.912461][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.925071][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.932434][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.940834][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.950396][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 23:50:23 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x368, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffe4}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0cda366f055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49026b4bd2dcbf0c45ceecc872b56070000000000000036bc9e892451c93db0ed05311b9e56d77397f8640cef47628488498f2c8c6624e7329e5b17f60fe94e963686a647bbcddc1417ad47"], 0x0, 0x66}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 196.959375][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.966558][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.977188][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.986976][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.043509][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.066567][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.075637][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 23:50:23 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56a", @ANYRES32, @ANYBLOB="e6c5ebf5c5932eec510100019b3d7280"], 0x0, 0x34}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 197.102657][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.110031][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.140839][ T8725] ptrace attach of "/root/syz-executor.1"[8724] was attempted by "/root/syz-executor.1"[8725] [ 197.150993][ T8727] ptrace attach of "/root/syz-executor.0"[8726] was attempted by "/root/syz-executor.0"[8727] [ 197.163034][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.185213][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.195232][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.202457][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.226297][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.235268][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.253367][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.269106][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.279874][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.288956][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.327289][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.344140][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.355431][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 23:50:24 executing program 1: pipe(0x0) creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) [ 197.370801][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.384403][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.399571][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.417161][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.436834][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.452684][ C0] hrtimer: interrupt took 29795 ns [ 197.456096][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.478807][ T8661] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.500001][ T8664] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 197.526999][ T8664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.540589][ T8659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.549487][ T8659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.559339][ T8659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.568502][ T8659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.583256][ T8658] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 197.597977][ T8658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.623627][ T8664] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.634052][ T8659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.662475][ T8659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.685132][ T8658] 8021q: adding VLAN 0 to HW filter on device batadv0 23:50:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000080)) 23:50:24 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x98, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r3}]]}}}]}, 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000000)={@empty, 0x0, r3}) [ 198.738984][ T8755] ================================================================== [ 198.747376][ T8755] BUG: KASAN: use-after-free in nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 198.755699][ T8755] Read of size 1 at addr ffff88809ee3f904 by task syz-executor.5/8755 [ 198.764012][ T8755] [ 198.766348][ T8755] CPU: 1 PID: 8755 Comm: syz-executor.5 Not tainted 5.4.0-rc4-next-20191025 #0 [ 198.775267][ T8755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.785406][ T8755] Call Trace: [ 198.788709][ T8755] dump_stack+0x172/0x1f0 [ 198.793029][ T8755] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 198.799180][ T8755] print_address_description.constprop.0.cold+0xd4/0x30b [ 198.806191][ T8755] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 198.812161][ T8755] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 198.818130][ T8755] __kasan_report.cold+0x1b/0x41 [ 198.823125][ T8755] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 198.829095][ T8755] kasan_report+0x12/0x20 [ 198.833542][ T8755] __asan_report_load1_noabort+0x14/0x20 [ 198.839202][ T8755] nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 198.845000][ T8755] ? nf_ct_expect_unregister_notifier+0x140/0x140 [ 198.851607][ T8755] nf_confirm+0x3d8/0x4d0 [ 198.855935][ T8755] ipv4_confirm+0x14c/0x240 [ 198.860430][ T8755] nf_hook_slow+0xbc/0x1e0 [ 198.865103][ T8755] ip_output+0x40d/0x670 [ 198.869409][ T8755] ? ip_mc_output+0xf60/0xf60 [ 198.874076][ T8755] ? __ip_finish_output+0xbd0/0xbd0 [ 198.879367][ T8755] ? ip_make_skb+0x1b1/0x2c0 [ 198.883944][ T8755] ? ip_reply_glue_bits+0xc0/0xc0 [ 198.888957][ T8755] ip_local_out+0xbb/0x1b0 [ 198.893365][ T8755] ip_send_skb+0x42/0xf0 [ 198.897744][ T8755] udp_send_skb.isra.0+0x6d5/0x11b0 [ 198.902929][ T8755] ? xfrm_lookup_route+0x5b/0x1e0 [ 198.908030][ T8755] udp_sendmsg+0x1e8f/0x2810 [ 198.912622][ T8755] ? ip_reply_glue_bits+0xc0/0xc0 [ 198.917650][ T8755] ? udp_unicast_rcv_skb.isra.0+0x360/0x360 [ 198.923534][ T8755] ? tomoyo_unix_entry+0x5d0/0x5d0 [ 198.928641][ T8755] ? ___might_sleep+0x163/0x2c0 [ 198.933482][ T8755] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 198.939101][ T8755] ? aa_sk_perm+0x288/0x870 [ 198.943594][ T8755] ? __kasan_check_read+0x11/0x20 [ 198.948607][ T8755] ? mark_lock+0xc2/0x1220 [ 198.953012][ T8755] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 198.958546][ T8755] inet_sendmsg+0x9e/0xe0 [ 198.962865][ T8755] ? inet_sendmsg+0x9e/0xe0 [ 198.967358][ T8755] ? inet_send_prepare+0x4e0/0x4e0 [ 198.972455][ T8755] sock_sendmsg+0xd7/0x130 [ 198.977051][ T8755] kernel_sendmsg+0x44/0x50 [ 198.981592][ T8755] rxrpc_send_abort_packet+0x479/0xe70 [ 198.987057][ T8755] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 198.992361][ T8755] ? rxrpc_send_ack_packet+0x2640/0x2640 [ 198.997999][ T8755] ? find_held_lock+0x35/0x130 [ 199.002761][ T8755] ? lockdep_hardirqs_on+0x421/0x5e0 [ 199.008036][ T8755] ? rxrpc_release_calls_on_socket+0x6d3/0x1320 [ 199.014298][ T8755] ? trace_hardirqs_on+0x67/0x240 [ 199.019312][ T8755] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 199.024851][ T8755] ? __local_bh_enable_ip+0x15a/0x270 [ 199.030217][ T8755] rxrpc_release_calls_on_socket+0x6db/0x1320 [ 199.036276][ T8755] ? rxrpc_discard_prealloc+0x65f/0xf20 [ 199.041807][ T8755] ? rxrpc_release+0x238/0x550 [ 199.046562][ T8755] rxrpc_release+0x2a6/0x550 [ 199.051151][ T8755] __sock_release+0xce/0x280 [ 199.055743][ T8755] sock_close+0x1e/0x30 [ 199.059886][ T8755] __fput+0x2ff/0x890 [ 199.063858][ T8755] ? __sock_release+0x280/0x280 [ 199.068699][ T8755] ____fput+0x16/0x20 [ 199.072684][ T8755] task_work_run+0x145/0x1c0 [ 199.077268][ T8755] get_signal+0x206e/0x24f0 [ 199.081760][ T8755] ? ___sys_recvmsg+0x5c0/0x5c0 [ 199.086600][ T8755] ? lock_downgrade+0x920/0x920 [ 199.091451][ T8755] do_signal+0x87/0x1700 [ 199.095821][ T8755] ? setup_sigcontext+0x7d0/0x7d0 [ 199.100864][ T8755] ? put_timespec64+0xda/0x140 [ 199.105619][ T8755] ? __sys_recvmmsg+0x131/0x270 [ 199.110467][ T8755] ? exit_to_usermode_loop+0x43/0x380 [ 199.115837][ T8755] ? do_syscall_64+0x65f/0x760 [ 199.120588][ T8755] ? exit_to_usermode_loop+0x43/0x380 [ 199.125953][ T8755] ? lockdep_hardirqs_on+0x421/0x5e0 [ 199.131747][ T8755] ? trace_hardirqs_on+0x67/0x240 [ 199.136761][ T8755] exit_to_usermode_loop+0x286/0x380 [ 199.142036][ T8755] do_syscall_64+0x65f/0x760 [ 199.146616][ T8755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.152493][ T8755] RIP: 0033:0x459f39 [ 199.156384][ T8755] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.175976][ T8755] RSP: 002b:00007f07e529bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 199.184390][ T8755] RAX: fffffffffffffe00 RBX: 0000000000000005 RCX: 0000000000459f39 [ 199.192363][ T8755] RDX: 0000000000000001 RSI: 0000000020001f40 RDI: 0000000000000005 [ 199.200341][ T8755] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 199.208313][ T8755] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f07e529c6d4 [ 199.216272][ T8755] R13: 00000000004c78d7 R14: 00000000004dd5e0 R15: 00000000ffffffff [ 199.224504][ T8755] [ 199.226818][ T8755] Allocated by task 8755: [ 199.231141][ T8755] save_stack+0x23/0x90 [ 199.235280][ T8755] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 199.240895][ T8755] kasan_krealloc+0x84/0xc0 [ 199.245387][ T8755] krealloc+0xa6/0xd0 [ 199.249359][ T8755] nf_ct_ext_add+0x2c7/0x630 [ 199.253933][ T8755] init_conntrack.isra.0+0x5ed/0x11a0 [ 199.259410][ T8755] nf_conntrack_in+0xd94/0x1460 [ 199.264246][ T8755] ipv4_conntrack_local+0x127/0x220 [ 199.269431][ T8755] nf_hook_slow+0xbc/0x1e0 [ 199.273843][ T8755] __ip_local_out+0x403/0x870 [ 199.278602][ T8755] ip_local_out+0x2d/0x1b0 [ 199.283005][ T8755] ip_send_skb+0x42/0xf0 [ 199.287234][ T8755] udp_send_skb.isra.0+0x6d5/0x11b0 [ 199.292424][ T8755] udp_sendmsg+0x1e8f/0x2810 [ 199.296999][ T8755] inet_sendmsg+0x9e/0xe0 [ 199.301314][ T8755] sock_sendmsg+0xd7/0x130 [ 199.305713][ T8755] kernel_sendmsg+0x44/0x50 [ 199.310203][ T8755] rxrpc_send_abort_packet+0x479/0xe70 [ 199.315647][ T8755] rxrpc_release_calls_on_socket+0x6db/0x1320 [ 199.321698][ T8755] rxrpc_release+0x2a6/0x550 [ 199.326358][ T8755] __sock_release+0xce/0x280 [ 199.330943][ T8755] sock_close+0x1e/0x30 [ 199.335087][ T8755] __fput+0x2ff/0x890 [ 199.339059][ T8755] ____fput+0x16/0x20 [ 199.343026][ T8755] task_work_run+0x145/0x1c0 [ 199.347609][ T8755] get_signal+0x206e/0x24f0 [ 199.352102][ T8755] do_signal+0x87/0x1700 [ 199.356345][ T8755] exit_to_usermode_loop+0x286/0x380 [ 199.361646][ T8755] do_syscall_64+0x65f/0x760 [ 199.366223][ T8755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.372094][ T8755] [ 199.374484][ T8755] Freed by task 8755: [ 199.378466][ T8755] save_stack+0x23/0x90 [ 199.382606][ T8755] __kasan_slab_free+0x102/0x150 [ 199.387530][ T8755] kasan_slab_free+0xe/0x10 [ 199.392016][ T8755] kfree+0x10a/0x2c0 [ 199.395969][ T8755] nf_ct_ext_destroy+0x2ab/0x2e0 [ 199.400911][ T8755] nf_conntrack_free+0x8f/0xe0 [ 199.405661][ T8755] destroy_conntrack+0x1a2/0x270 [ 199.410650][ T8755] nf_conntrack_destroy+0xed/0x230 [ 199.415749][ T8755] __nf_conntrack_confirm+0x21ca/0x2830 [ 199.421281][ T8755] nf_confirm+0x3e7/0x4d0 [ 199.425597][ T8755] ipv4_confirm+0x14c/0x240 [ 199.430086][ T8755] nf_hook_slow+0xbc/0x1e0 [ 199.434488][ T8755] ip_output+0x40d/0x670 [ 199.438719][ T8755] ip_local_out+0xbb/0x1b0 [ 199.443122][ T8755] ip_send_skb+0x42/0xf0 [ 199.447438][ T8755] udp_send_skb.isra.0+0x6d5/0x11b0 [ 199.452629][ T8755] udp_sendmsg+0x1e8f/0x2810 [ 199.457213][ T8755] inet_sendmsg+0x9e/0xe0 [ 199.461536][ T8755] sock_sendmsg+0xd7/0x130 [ 199.465962][ T8755] kernel_sendmsg+0x44/0x50 [ 199.470470][ T8755] rxrpc_send_abort_packet+0x479/0xe70 [ 199.475936][ T8755] rxrpc_release_calls_on_socket+0x6db/0x1320 [ 199.481991][ T8755] rxrpc_release+0x2a6/0x550 [ 199.486568][ T8755] __sock_release+0xce/0x280 [ 199.491141][ T8755] sock_close+0x1e/0x30 [ 199.495286][ T8755] __fput+0x2ff/0x890 [ 199.499272][ T8755] ____fput+0x16/0x20 [ 199.503243][ T8755] task_work_run+0x145/0x1c0 [ 199.507818][ T8755] get_signal+0x206e/0x24f0 [ 199.512310][ T8755] do_signal+0x87/0x1700 [ 199.516538][ T8755] exit_to_usermode_loop+0x286/0x380 [ 199.521851][ T8755] do_syscall_64+0x65f/0x760 [ 199.526599][ T8755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.532477][ T8755] [ 199.534797][ T8755] The buggy address belongs to the object at ffff88809ee3f900 [ 199.534797][ T8755] which belongs to the cache kmalloc-128 of size 128 [ 199.548849][ T8755] The buggy address is located 4 bytes inside of [ 199.548849][ T8755] 128-byte region [ffff88809ee3f900, ffff88809ee3f980) [ 199.561936][ T8755] The buggy address belongs to the page: [ 199.567557][ T8755] page:ffffea00027b8fc0 refcount:1 mapcount:0 mapping:ffff8880aa400700 index:0x0 [ 199.576652][ T8755] flags: 0x1fffc0000000200(slab) [ 199.581595][ T8755] raw: 01fffc0000000200 ffffea000262a588 ffffea00023e3d88 ffff8880aa400700 [ 199.590209][ T8755] raw: 0000000000000000 ffff88809ee3f000 0000000100000010 0000000000000000 [ 199.598808][ T8755] page dumped because: kasan: bad access detected [ 199.605200][ T8755] [ 199.607514][ T8755] Memory state around the buggy address: [ 199.613163][ T8755] ffff88809ee3f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 199.621233][ T8755] ffff88809ee3f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 199.629289][ T8755] >ffff88809ee3f900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 199.637430][ T8755] ^ [ 199.641654][ T8755] ffff88809ee3f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 199.649836][ T8755] ffff88809ee3fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.657967][ T8755] ================================================================== [ 199.666027][ T8755] Disabling lock debugging due to kernel taint [ 199.686448][ T8755] Kernel panic - not syncing: panic_on_warn set ... [ 199.693083][ T8755] CPU: 1 PID: 8755 Comm: syz-executor.5 Tainted: G B 5.4.0-rc4-next-20191025 #0 [ 199.703626][ T8755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.713830][ T8755] Call Trace: [ 199.717122][ T8755] dump_stack+0x172/0x1f0 [ 199.721443][ T8755] panic+0x2e3/0x75c [ 199.725336][ T8755] ? add_taint.cold+0x16/0x16 [ 199.730015][ T8755] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 199.735980][ T8755] ? preempt_schedule+0x4b/0x60 [ 199.740818][ T8755] ? ___preempt_schedule+0x16/0x18 [ 199.745925][ T8755] ? trace_hardirqs_on+0x5e/0x240 [ 199.750943][ T8755] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 199.757038][ T8755] end_report+0x47/0x4f [ 199.761184][ T8755] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 199.767147][ T8755] __kasan_report.cold+0xe/0x41 [ 199.771983][ T8755] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 199.777947][ T8755] kasan_report+0x12/0x20 [ 199.782272][ T8755] __asan_report_load1_noabort+0x14/0x20 [ 199.787893][ T8755] nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 199.793684][ T8755] ? nf_ct_expect_unregister_notifier+0x140/0x140 [ 199.800121][ T8755] nf_confirm+0x3d8/0x4d0 [ 199.804575][ T8755] ipv4_confirm+0x14c/0x240 [ 199.809064][ T8755] nf_hook_slow+0xbc/0x1e0 [ 199.813473][ T8755] ip_output+0x40d/0x670 [ 199.817702][ T8755] ? ip_mc_output+0xf60/0xf60 [ 199.822387][ T8755] ? __ip_finish_output+0xbd0/0xbd0 [ 199.827583][ T8755] ? ip_make_skb+0x1b1/0x2c0 [ 199.832167][ T8755] ? ip_reply_glue_bits+0xc0/0xc0 [ 199.837178][ T8755] ip_local_out+0xbb/0x1b0 [ 199.841578][ T8755] ip_send_skb+0x42/0xf0 [ 199.845809][ T8755] udp_send_skb.isra.0+0x6d5/0x11b0 [ 199.850990][ T8755] ? xfrm_lookup_route+0x5b/0x1e0 [ 199.856000][ T8755] udp_sendmsg+0x1e8f/0x2810 [ 199.860620][ T8755] ? ip_reply_glue_bits+0xc0/0xc0 [ 199.865631][ T8755] ? udp_unicast_rcv_skb.isra.0+0x360/0x360 [ 199.871509][ T8755] ? tomoyo_unix_entry+0x5d0/0x5d0 [ 199.876747][ T8755] ? ___might_sleep+0x163/0x2c0 [ 199.881590][ T8755] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 199.887217][ T8755] ? aa_sk_perm+0x288/0x870 [ 199.891704][ T8755] ? __kasan_check_read+0x11/0x20 [ 199.896762][ T8755] ? mark_lock+0xc2/0x1220 [ 199.901167][ T8755] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 199.906732][ T8755] inet_sendmsg+0x9e/0xe0 [ 199.911051][ T8755] ? inet_sendmsg+0x9e/0xe0 [ 199.915546][ T8755] ? inet_send_prepare+0x4e0/0x4e0 [ 199.920640][ T8755] sock_sendmsg+0xd7/0x130 [ 199.925040][ T8755] kernel_sendmsg+0x44/0x50 [ 199.929533][ T8755] rxrpc_send_abort_packet+0x479/0xe70 [ 199.934974][ T8755] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 199.940242][ T8755] ? rxrpc_send_ack_packet+0x2640/0x2640 [ 199.945866][ T8755] ? find_held_lock+0x35/0x130 [ 199.950622][ T8755] ? lockdep_hardirqs_on+0x421/0x5e0 [ 199.955900][ T8755] ? rxrpc_release_calls_on_socket+0x6d3/0x1320 [ 199.962141][ T8755] ? trace_hardirqs_on+0x67/0x240 [ 199.967189][ T8755] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 199.972722][ T8755] ? __local_bh_enable_ip+0x15a/0x270 [ 199.978083][ T8755] rxrpc_release_calls_on_socket+0x6db/0x1320 [ 199.984135][ T8755] ? rxrpc_discard_prealloc+0x65f/0xf20 [ 199.989666][ T8755] ? rxrpc_release+0x238/0x550 [ 199.994427][ T8755] rxrpc_release+0x2a6/0x550 [ 199.999002][ T8755] __sock_release+0xce/0x280 [ 200.003577][ T8755] sock_close+0x1e/0x30 [ 200.007719][ T8755] __fput+0x2ff/0x890 [ 200.011686][ T8755] ? __sock_release+0x280/0x280 [ 200.016653][ T8755] ____fput+0x16/0x20 [ 200.020627][ T8755] task_work_run+0x145/0x1c0 [ 200.025211][ T8755] get_signal+0x206e/0x24f0 [ 200.029713][ T8755] ? ___sys_recvmsg+0x5c0/0x5c0 [ 200.034562][ T8755] ? lock_downgrade+0x920/0x920 [ 200.039522][ T8755] do_signal+0x87/0x1700 [ 200.043757][ T8755] ? setup_sigcontext+0x7d0/0x7d0 [ 200.048830][ T8755] ? put_timespec64+0xda/0x140 [ 200.053595][ T8755] ? __sys_recvmmsg+0x131/0x270 [ 200.058435][ T8755] ? exit_to_usermode_loop+0x43/0x380 [ 200.063796][ T8755] ? do_syscall_64+0x65f/0x760 [ 200.068551][ T8755] ? exit_to_usermode_loop+0x43/0x380 [ 200.073914][ T8755] ? lockdep_hardirqs_on+0x421/0x5e0 [ 200.079183][ T8755] ? trace_hardirqs_on+0x67/0x240 [ 200.084281][ T8755] exit_to_usermode_loop+0x286/0x380 [ 200.089567][ T8755] do_syscall_64+0x65f/0x760 [ 200.094330][ T8755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.100300][ T8755] RIP: 0033:0x459f39 [ 200.104183][ T8755] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 200.124017][ T8755] RSP: 002b:00007f07e529bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 200.132443][ T8755] RAX: fffffffffffffe00 RBX: 0000000000000005 RCX: 0000000000459f39 [ 200.140550][ T8755] RDX: 0000000000000001 RSI: 0000000020001f40 RDI: 0000000000000005 [ 200.148509][ T8755] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 200.156468][ T8755] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f07e529c6d4 [ 200.164448][ T8755] R13: 00000000004c78d7 R14: 00000000004dd5e0 R15: 00000000ffffffff [ 200.174088][ T8755] Kernel Offset: disabled [ 200.178472][ T8755] Rebooting in 86400 seconds..