[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.39' (ECDSA) to the list of known hosts. 2020/05/23 18:45:24 fuzzer started 2020/05/23 18:45:24 dialing manager at 10.128.0.26:38035 2020/05/23 18:45:24 syscalls: 2953 2020/05/23 18:45:24 code coverage: enabled 2020/05/23 18:45:24 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2020/05/23 18:45:24 extra coverage: enabled 2020/05/23 18:45:24 setuid sandbox: enabled 2020/05/23 18:45:24 namespace sandbox: enabled 2020/05/23 18:45:24 Android sandbox: enabled 2020/05/23 18:45:24 fault injection: enabled 2020/05/23 18:45:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/05/23 18:45:24 net packet injection: enabled 2020/05/23 18:45:24 net device setup: enabled 2020/05/23 18:45:24 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/05/23 18:45:24 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/05/23 18:45:24 USB emulation: /dev/raw-gadget does not exist 18:47:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x10404) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x0) splice(r3, 0x0, r4, 0x0, 0x4ffe0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) openat$vhost_vsock(0xffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="640000007d010000004a0001800100010004020000000000000000000000000000010900000000000000000000000000fe0011002f6465762f76686f73742d76736f636b000000040047504c0002002f5d050073797a3000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x64) sendto$inet6(r6, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f0000000040)='b', 0x1, 0x1, 0x0, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r6, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, 0x1, 0x9, 0x801, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x77}}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x1000000, 0xe, 0x0, &(0x7f0000000140)="e3d0e9d6d9d18e5f39868de363d3", 0x0, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syzkaller login: [ 215.058310][ T33] audit: type=1400 audit(1590259651.345:8): avc: denied { execmem } for pid=8782 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 215.350459][ T8783] IPVS: ftp: loaded support on port[0] = 21 [ 215.572454][ T8783] chnl_net:caif_netlink_parms(): no params data found [ 215.798623][ T8783] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.806852][ T8783] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.816199][ T8783] device bridge_slave_0 entered promiscuous mode [ 215.832105][ T8783] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.840244][ T8783] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.849569][ T8783] device bridge_slave_1 entered promiscuous mode [ 215.902942][ T8783] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 215.919558][ T8783] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 215.971269][ T8783] team0: Port device team_slave_0 added [ 215.983434][ T8783] team0: Port device team_slave_1 added [ 216.029501][ T8783] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 216.036825][ T8783] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 216.062995][ T8783] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 216.098977][ T8783] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 216.106626][ T8783] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 216.132843][ T8783] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 216.353758][ T8783] device hsr_slave_0 entered promiscuous mode [ 216.437546][ T8783] device hsr_slave_1 entered promiscuous mode [ 216.862787][ T8783] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 216.925241][ T8783] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 216.974796][ T8783] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 217.185080][ T8783] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 217.480423][ T8783] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.513666][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.523088][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.543172][ T8783] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.563649][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.573536][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.584162][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.591565][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.638326][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.647672][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.657988][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.667391][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.674643][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.683749][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.694738][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.705600][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.716440][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.732448][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.742659][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.753158][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.778311][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.787940][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.809873][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.819556][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.840473][ T8783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.884085][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 217.891948][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 217.919250][ T8783] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.964017][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 217.974264][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 218.021616][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 218.031562][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.048479][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.057689][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.077837][ T8783] device veth0_vlan entered promiscuous mode [ 218.111940][ T8783] device veth1_vlan entered promiscuous mode [ 218.162910][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 218.173323][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 218.182893][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 218.192691][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.231351][ T8783] device veth0_macvtap entered promiscuous mode [ 218.251673][ T8783] device veth1_macvtap entered promiscuous mode [ 218.293696][ T8783] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 218.302073][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 218.311436][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.320565][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 218.330326][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.357598][ T8783] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 218.391217][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.401366][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 218.843530][ T9007] [ 218.846002][ T9007] ********************************************************** [ 218.853919][ T9007] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 218.861451][ T9007] ** ** [ 218.868950][ T9007] ** trace_printk() being used. Allocating extra memory. ** [ 218.876361][ T9007] ** ** [ 218.883866][ T9007] ** This means that this is a DEBUG kernel and it is ** [ 218.891797][ T9007] ** unsafe for production use. ** [ 218.899294][ T9007] ** ** [ 218.906778][ T9007] ** If you see this message and you are not debugging ** [ 218.914199][ T9007] ** the kernel, report this immediately to your vendor! ** [ 218.921732][ T9007] ** ** [ 218.929271][ T9007] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 218.937283][ T9007] ********************************************************** [ 219.021074][ C0] hrtimer: interrupt took 45536 ns [ 219.069416][ T9008] ===================================================== [ 219.076397][ T9008] BUG: KMSAN: uninit-value in bpf_trace_printk+0x160/0x1380 [ 219.083693][ T9008] CPU: 1 PID: 9008 Comm: syz-executor.0 Not tainted 5.7.0-rc4-syzkaller #0 [ 219.092391][ T9008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.102444][ T9008] Call Trace: [ 219.105834][ T9008] dump_stack+0x1c9/0x220 [ 219.110360][ T9008] kmsan_report+0xf7/0x1e0 [ 219.114781][ T9008] __msan_warning+0x58/0xa0 [ 219.119328][ T9008] bpf_trace_printk+0x160/0x1380 [ 219.124285][ T9008] ? kmsan_get_metadata+0x4f/0x180 [ 219.129606][ T9008] ? kmsan_get_metadata+0x11d/0x180 [ 219.134896][ T9008] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 219.140730][ T9008] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 219.146799][ T9008] ? ktime_get+0x2b8/0x400 [ 219.151237][ T9008] ? 0xffffffffc02f59bc [ 219.155400][ T9008] bpf_prog_0605f9f479290f07+0x36/0x644 [ 219.160948][ T9008] ? 0xffffffffc02f59bc [ 219.165104][ T9008] bpf_test_run+0x60c/0xe50 [ 219.169661][ T9008] ? kmsan_get_metadata+0x11d/0x180 [ 219.174877][ T9008] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 219.180687][ T9008] bpf_prog_test_run_skb+0xe69/0x27c0 [ 219.186091][ T9008] ? bpf_prog_test_run_tracing+0x770/0x770 [ 219.191905][ T9008] __do_sys_bpf+0xb923/0x155f0 [ 219.196682][ T9008] ? kmsan_get_metadata+0x4f/0x180 [ 219.201975][ T9008] ? kmsan_internal_set_origin+0x75/0xb0 [ 219.207608][ T9008] ? kmsan_get_metadata+0x4f/0x180 [ 219.212729][ T9008] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 219.218652][ T9008] ? kmsan_get_metadata+0x11d/0x180 [ 219.224032][ T9008] ? kmsan_get_metadata+0x11d/0x180 [ 219.230189][ T9008] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 219.236014][ T9008] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 219.242095][ T9008] ? prepare_exit_to_usermode+0x1ca/0x520 [ 219.247823][ T9008] ? kmsan_get_metadata+0x4f/0x180 [ 219.252944][ T9008] ? kmsan_get_metadata+0x4f/0x180 [ 219.258065][ T9008] __se_sys_bpf+0x8e/0xa0 [ 219.262407][ T9008] __ia32_sys_bpf+0x4a/0x70 [ 219.266918][ T9008] ? __se_sys_bpf+0xa0/0xa0 [ 219.271601][ T9008] do_fast_syscall_32+0x3bf/0x6d0 [ 219.276645][ T9008] entry_SYSENTER_compat+0x68/0x77 [ 219.281751][ T9008] RIP: 0023:0xf7fd5dd9 [ 219.285835][ T9008] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 219.305976][ T9008] RSP: 002b:00000000f5daf0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 219.314487][ T9008] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000040 [ 219.322467][ T9008] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 219.330447][ T9008] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 219.338418][ T9008] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 219.346387][ T9008] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 219.355428][ T9008] [ 219.357757][ T9008] Local variable ----filename@process_measurement created at: [ 219.365306][ T9008] process_measurement+0x1c0/0x2ce0 [ 219.370508][ T9008] process_measurement+0x1c0/0x2ce0 [ 219.375693][ T9008] ===================================================== [ 219.382622][ T9008] Disabling lock debugging due to kernel taint [ 219.388773][ T9008] Kernel panic - not syncing: panic_on_warn set ... [ 219.395373][ T9008] CPU: 1 PID: 9008 Comm: syz-executor.0 Tainted: G B 5.7.0-rc4-syzkaller #0 [ 219.405339][ T9008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.415395][ T9008] Call Trace: [ 219.418695][ T9008] dump_stack+0x1c9/0x220 [ 219.423038][ T9008] panic+0x3d5/0xc3e [ 219.426968][ T9008] kmsan_report+0x1df/0x1e0 [ 219.431477][ T9008] __msan_warning+0x58/0xa0 [ 219.435989][ T9008] bpf_trace_printk+0x160/0x1380 [ 219.441014][ T9008] ? kmsan_get_metadata+0x4f/0x180 [ 219.446138][ T9008] ? kmsan_get_metadata+0x11d/0x180 [ 219.451339][ T9008] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 219.457143][ T9008] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 219.463213][ T9008] ? ktime_get+0x2b8/0x400 [ 219.469039][ T9008] ? 0xffffffffc02f59bc [ 219.473215][ T9008] bpf_prog_0605f9f479290f07+0x36/0x644 [ 219.478758][ T9008] ? 0xffffffffc02f59bc [ 219.482923][ T9008] bpf_test_run+0x60c/0xe50 [ 219.487434][ T9008] ? kmsan_get_metadata+0x11d/0x180 [ 219.492651][ T9008] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 219.498462][ T9008] bpf_prog_test_run_skb+0xe69/0x27c0 [ 219.503869][ T9008] ? bpf_prog_test_run_tracing+0x770/0x770 [ 219.509679][ T9008] __do_sys_bpf+0xb923/0x155f0 [ 219.514598][ T9008] ? kmsan_get_metadata+0x4f/0x180 [ 219.519719][ T9008] ? kmsan_internal_set_origin+0x75/0xb0 [ 219.525354][ T9008] ? kmsan_get_metadata+0x4f/0x180 [ 219.530473][ T9008] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 219.536388][ T9008] ? kmsan_get_metadata+0x11d/0x180 [ 219.541596][ T9008] ? kmsan_get_metadata+0x11d/0x180 [ 219.546798][ T9008] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 219.552609][ T9008] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 219.558680][ T9008] ? prepare_exit_to_usermode+0x1ca/0x520 [ 219.564402][ T9008] ? kmsan_get_metadata+0x4f/0x180 [ 219.569517][ T9008] ? kmsan_get_metadata+0x4f/0x180 [ 219.574636][ T9008] __se_sys_bpf+0x8e/0xa0 [ 219.578980][ T9008] __ia32_sys_bpf+0x4a/0x70 [ 219.583486][ T9008] ? __se_sys_bpf+0xa0/0xa0 [ 219.588004][ T9008] do_fast_syscall_32+0x3bf/0x6d0 [ 219.593044][ T9008] entry_SYSENTER_compat+0x68/0x77 [ 219.598152][ T9008] RIP: 0023:0xf7fd5dd9 [ 219.602219][ T9008] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 219.621840][ T9008] RSP: 002b:00000000f5daf0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 219.630264][ T9008] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000040 [ 219.638243][ T9008] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 219.646303][ T9008] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 219.654277][ T9008] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 219.662260][ T9008] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 219.671702][ T9008] Kernel Offset: 0x2c400000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 219.683403][ T9008] Rebooting in 86400 seconds..