[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.19' (ECDSA) to the list of known hosts. syzkaller login: [ 36.438979] IPVS: ftp: loaded support on port[0] = 21 [ 36.513574] chnl_net:caif_netlink_parms(): no params data found [ 36.593640] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.600306] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.610050] device bridge_slave_0 entered promiscuous mode [ 36.618097] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.624761] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.633201] device bridge_slave_1 entered promiscuous mode [ 36.651373] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 36.660466] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 36.679738] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 36.687503] team0: Port device team_slave_0 added [ 36.693629] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 36.701225] team0: Port device team_slave_1 added [ 36.716589] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.722944] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.749095] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.761053] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.767313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.794382] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.805797] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 36.813800] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 36.833428] device hsr_slave_0 entered promiscuous mode [ 36.839273] device hsr_slave_1 entered promiscuous mode [ 36.845871] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 36.853258] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 36.923323] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.930552] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.937846] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.944309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.976207] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 36.983731] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.993629] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 37.005700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.014204] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.022501] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.029484] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 37.040484] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 37.047007] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.056723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.064987] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.071770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.081272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.088949] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.095406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.110563] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 37.119303] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 37.130241] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 37.144545] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 37.155125] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.166187] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 37.173188] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.181816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.189540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 37.203978] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 37.211994] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 37.218926] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 37.229661] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.243393] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 37.253386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.290104] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 37.298525] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 37.306777] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 37.316397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.324309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.331679] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.340235] device veth0_vlan entered promiscuous mode [ 37.350158] device veth1_vlan entered promiscuous mode [ 37.356773] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 37.368029] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 37.379949] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 37.390323] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 37.399122] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 37.407209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.417998] device veth0_macvtap entered promiscuous mode [ 37.425545] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 37.433948] device veth1_macvtap entered promiscuous mode [ 37.443833] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 37.453565] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 37.465053] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.472303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.482019] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 37.492320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.502869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.615892] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 37.625107] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 37.646176] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 37.650244] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready executing program [ 37.664917] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 37.678733] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 37.689682] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 37.699754] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 37.716104] ================================================================== [ 37.723645] BUG: KASAN: slab-out-of-bounds in ipvlan_queue_xmit+0x9d2/0x18e0 [ 37.730866] Read of size 4 at addr ffff8880aaf6d4ff by task syz-executor370/8107 [ 37.738434] [ 37.740097] CPU: 1 PID: 8107 Comm: syz-executor370 Not tainted 4.19.163-syzkaller #0 [ 37.747977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.757339] Call Trace: [ 37.759934] dump_stack+0x1fc/0x2fe [ 37.763557] print_address_description.cold+0x54/0x219 [ 37.768842] kasan_report_error.cold+0x8a/0x1c7 [ 37.773514] ? ipvlan_queue_xmit+0x9d2/0x18e0 [ 37.778018] __asan_report_load4_noabort+0x88/0x90 [ 37.782954] ? __sanitizer_cov_trace_switch+0x40/0x80 [ 37.788166] ? ipvlan_queue_xmit+0x9d2/0x18e0 [ 37.792655] ipvlan_queue_xmit+0x9d2/0x18e0 [ 37.797082] ? skb_network_protocol+0x14b/0x570 [ 37.802301] ? ipvlan_process_multicast+0xcb0/0xcb0 [ 37.807311] ? skb_crc32c_csum_help+0x70/0x70 [ 37.811799] ? __alloc_skb+0x34f/0x560 [ 37.815674] ? netif_skb_features+0x5c1/0xb30 [ 37.820257] ? lock_downgrade+0x720/0x720 [ 37.824403] ? __skb_gso_segment+0x720/0x720 [ 37.828793] ? validate_xmit_xfrm+0x3dc/0xe30 [ 37.833279] ipvlan_start_xmit+0x4f/0x190 [ 37.837427] dev_direct_xmit+0x3f9/0x6d0 [ 37.841490] ? validate_xmit_skb_list+0x120/0x120 [ 37.846335] ? assoc_array_gc+0x11f0/0x1260 [ 37.850670] ? dev_pick_tx_cpu_id+0xd/0x70 [ 37.854898] packet_sendmsg+0x2474/0x6aff [ 37.859043] ? aa_sk_perm+0x534/0x930 [ 37.862941] ? compat_packet_setsockopt+0x160/0x160 [ 37.867945] ? aa_af_perm+0x230/0x230 [ 37.871947] ? lock_downgrade+0x720/0x720 [ 37.876080] ? lock_acquire+0x170/0x3c0 [ 37.880045] ? compat_packet_setsockopt+0x160/0x160 [ 37.885099] sock_sendmsg+0xc3/0x120 [ 37.888814] sock_write_iter+0x287/0x3c0 [ 37.892904] ? sock_sendmsg+0x120/0x120 [ 37.896894] ? security_file_permission+0x1c0/0x220 [ 37.901910] aio_write+0x37f/0x5c0 [ 37.907905] ? aio_setup_rw.isra.0+0x110/0x110 [ 37.912481] ? lock_downgrade+0x720/0x720 [ 37.916619] ? lock_downgrade+0x720/0x720 [ 37.920781] ? lock_acquire+0x170/0x3c0 [ 37.924741] ? __might_fault+0xef/0x1d0 [ 37.928703] io_submit_one+0xecd/0x20c0 [ 37.932675] ? lock_downgrade+0x720/0x720 [ 37.936822] ? aio_read+0x420/0x420 [ 37.940438] ? __might_fault+0x11f/0x1d0 [ 37.944515] __se_sys_io_submit+0x11b/0x4a0 [ 37.948830] ? io_submit_one+0x20c0/0x20c0 [ 37.953321] ? lock_downgrade+0x720/0x720 [ 37.957543] ? lock_acquire+0x170/0x3c0 [ 37.961540] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 37.966910] ? trace_hardirqs_off_caller+0x6e/0x210 [ 37.972109] ? do_syscall_64+0x21/0x620 [ 37.976104] do_syscall_64+0xf9/0x620 [ 37.979899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.985183] RIP: 0033:0x443ea9 [ 37.988380] Code: e8 5c 0b 03 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b 0d fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 38.007287] RSP: 002b:00007ffdb3402108 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 38.014989] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000443ea9 [ 38.022509] RDX: 0000000020000080 RSI: 0000000000000001 RDI: 00007fc68ccd8000 [ 38.029809] RBP: 00316e616c767069 R08: 0000001e00000140 R09: 0000001e00000140 [ 38.037082] R10: 0000001e00000140 R11: 0000000000000246 R12: 0000000000000003 [ 38.044359] R13: 0000000000000000 R14: 0000000000000040 R15: 0000000000000004 [ 38.051726] [ 38.053336] Allocated by task 1: [ 38.056701] kmem_cache_alloc+0x122/0x370 [ 38.060842] __alloc_file+0x21/0x330 [ 38.064562] alloc_empty_file+0x6d/0x170 [ 38.068613] path_openat+0xe9/0x2df0 [ 38.072326] do_filp_open+0x18c/0x3f0 [ 38.076127] do_sys_open+0x3b3/0x520 [ 38.079926] do_syscall_64+0xf9/0x620 [ 38.083723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 38.088904] [ 38.090530] Freed by task 9: [ 38.093535] kmem_cache_free+0x7f/0x260 [ 38.097569] rcu_process_callbacks+0x8ff/0x18b0 [ 38.102235] __do_softirq+0x26c/0x9a0 [ 38.106023] [ 38.107637] The buggy address belongs to the object at ffff8880aaf6d300 [ 38.107637] which belongs to the cache filp of size 456 [ 38.120304] The buggy address is located 55 bytes to the right of [ 38.120304] 456-byte region [ffff8880aaf6d300, ffff8880aaf6d4c8) [ 38.132623] The buggy address belongs to the page: [ 38.137542] page:ffffea0002abdb40 count:1 mapcount:0 mapping:ffff88823b846200 index:0x0 [ 38.145875] flags: 0xfff00000000100(slab) [ 38.150383] raw: 00fff00000000100 ffffea0002acc108 ffffea0002aba008 ffff88823b846200 [ 38.158260] raw: 0000000000000000 ffff8880aaf6d080 0000000100000006 0000000000000000 [ 38.166135] page dumped because: kasan: bad access detected [ 38.171848] [ 38.173472] Memory state around the buggy address: [ 38.179272] ffff8880aaf6d380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.186639] ffff8880aaf6d400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.194003] >ffff8880aaf6d480: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 38.201415] ^ [ 38.209032] ffff8880aaf6d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.216434] ffff8880aaf6d580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.223787] ================================================================== [ 38.231133] Disabling lock debugging due to kernel taint [ 38.236662] Kernel panic - not syncing: panic_on_warn set ... [ 38.236662] [ 38.244073] CPU: 1 PID: 8107 Comm: syz-executor370 Tainted: G B 4.19.163-syzkaller #0 [ 38.253436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 38.262794] Call Trace: [ 38.265393] dump_stack+0x1fc/0x2fe [ 38.269031] panic+0x26a/0x50e [ 38.272242] ? __warn_printk+0xf3/0xf3 [ 38.276135] ? retint_kernel+0x2d/0x2d [ 38.280035] ? trace_hardirqs_on+0x55/0x210 [ 38.284386] kasan_end_report+0x43/0x49 [ 38.288373] kasan_report_error.cold+0xa7/0x1c7 [ 38.293038] ? ipvlan_queue_xmit+0x9d2/0x18e0 [ 38.297543] __asan_report_load4_noabort+0x88/0x90 [ 38.302479] ? __sanitizer_cov_trace_switch+0x40/0x80 [ 38.307661] ? ipvlan_queue_xmit+0x9d2/0x18e0 [ 38.312667] ipvlan_queue_xmit+0x9d2/0x18e0 [ 38.317169] ? skb_network_protocol+0x14b/0x570 [ 38.321823] ? ipvlan_process_multicast+0xcb0/0xcb0 [ 38.326843] ? skb_crc32c_csum_help+0x70/0x70 [ 38.331326] ? __alloc_skb+0x34f/0x560 [ 38.335207] ? netif_skb_features+0x5c1/0xb30 [ 38.339702] ? lock_downgrade+0x720/0x720 [ 38.343839] ? __skb_gso_segment+0x720/0x720 [ 38.348250] ? validate_xmit_xfrm+0x3dc/0xe30 [ 38.352741] ipvlan_start_xmit+0x4f/0x190 [ 38.356888] dev_direct_xmit+0x3f9/0x6d0 [ 38.361036] ? validate_xmit_skb_list+0x120/0x120 [ 38.366084] ? assoc_array_gc+0x11f0/0x1260 [ 38.370401] ? dev_pick_tx_cpu_id+0xd/0x70 [ 38.374625] packet_sendmsg+0x2474/0x6aff [ 38.378767] ? aa_sk_perm+0x534/0x930 [ 38.382557] ? compat_packet_setsockopt+0x160/0x160 [ 38.387561] ? aa_af_perm+0x230/0x230 [ 38.391350] ? lock_downgrade+0x720/0x720 [ 38.395505] ? lock_acquire+0x170/0x3c0 [ 38.399486] ? compat_packet_setsockopt+0x160/0x160 [ 38.404854] sock_sendmsg+0xc3/0x120 [ 38.408891] sock_write_iter+0x287/0x3c0 [ 38.412994] ? sock_sendmsg+0x120/0x120 [ 38.416981] ? security_file_permission+0x1c0/0x220 [ 38.422160] aio_write+0x37f/0x5c0 [ 38.425686] ? aio_setup_rw.isra.0+0x110/0x110 [ 38.430276] ? lock_downgrade+0x720/0x720 [ 38.434421] ? lock_downgrade+0x720/0x720 [ 38.438568] ? lock_acquire+0x170/0x3c0 [ 38.442538] ? __might_fault+0xef/0x1d0 [ 38.446527] io_submit_one+0xecd/0x20c0 [ 38.451551] ? lock_downgrade+0x720/0x720 [ 38.455703] ? aio_read+0x420/0x420 [ 38.459701] ? __might_fault+0x11f/0x1d0 [ 38.463766] __se_sys_io_submit+0x11b/0x4a0 [ 38.468099] ? io_submit_one+0x20c0/0x20c0 [ 38.472327] ? lock_downgrade+0x720/0x720 [ 38.476992] ? lock_acquire+0x170/0x3c0 [ 38.481052] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 38.486409] ? trace_hardirqs_off_caller+0x6e/0x210 [ 38.491427] ? do_syscall_64+0x21/0x620 [ 38.495396] do_syscall_64+0xf9/0x620 [ 38.499238] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 38.504419] RIP: 0033:0x443ea9 [ 38.507594] Code: e8 5c 0b 03 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b 0d fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 38.526656] RSP: 002b:00007ffdb3402108 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 38.534623] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000443ea9 [ 38.541883] RDX: 0000000020000080 RSI: 0000000000000001 RDI: 00007fc68ccd8000 [ 38.549201] RBP: 00316e616c767069 R08: 0000001e00000140 R09: 0000001e00000140 [ 38.557047] R10: 0000001e00000140 R11: 0000000000000246 R12: 0000000000000003 [ 38.564402] R13: 0000000000000000 R14: 0000000000000040 R15: 0000000000000004 [ 38.572745] Kernel Offset: disabled [ 38.576376] Rebooting in 86400 seconds..