Warning: Permanently added '10.128.1.45' (ECDSA) to the list of known hosts. 2021/11/19 11:01:18 fuzzer started 2021/11/19 11:01:19 connecting to host at 10.128.0.163:35627 2021/11/19 11:01:19 checking machine... 2021/11/19 11:01:19 checking revisions... 2021/11/19 11:01:19 testing simple program... [ 19.870844][ T23] audit: type=1400 audit(1637319679.120:73): avc: denied { getattr } for pid=362 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 19.890286][ T371] cgroup: Unknown subsys name 'net' [ 19.894283][ T23] audit: type=1400 audit(1637319679.120:74): avc: denied { read } for pid=362 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 19.920299][ T23] audit: type=1400 audit(1637319679.120:75): avc: denied { open } for pid=362 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 19.920408][ T371] cgroup: Unknown subsys name 'devices' [ 19.943636][ T23] audit: type=1400 audit(1637319679.120:76): avc: denied { read } for pid=362 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.971825][ T23] audit: type=1400 audit(1637319679.120:77): avc: denied { open } for pid=362 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.995174][ T23] audit: type=1400 audit(1637319679.120:78): avc: denied { mounton } for pid=371 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.017960][ T23] audit: type=1400 audit(1637319679.120:79): avc: denied { mount } for pid=371 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.040083][ T23] audit: type=1400 audit(1637319679.150:80): avc: denied { unmount } for pid=371 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.114987][ T371] cgroup: Unknown subsys name 'hugetlb' [ 20.120646][ T371] cgroup: Unknown subsys name 'rlimit' [ 20.244763][ T23] audit: type=1400 audit(1637319679.500:81): avc: denied { setattr } for pid=371 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.280407][ T23] audit: type=1400 audit(1637319679.530:82): avc: denied { execmem } for pid=372 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.352615][ T373] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.359668][ T373] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.367097][ T373] device bridge_slave_0 entered promiscuous mode [ 20.373925][ T373] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.380944][ T373] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.388569][ T373] device bridge_slave_1 entered promiscuous mode [ 20.418566][ T373] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.425670][ T373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.432931][ T373] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.440001][ T373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.457734][ T374] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.465128][ T374] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.472355][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.480674][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.490111][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.498265][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.505294][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.524521][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.532746][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.541362][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.549635][ T374] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.556669][ T374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.564194][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.572046][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.583557][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.597853][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.606939][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.615698][ T19] ================================================================================ [ 20.625000][ T19] UBSAN: object-size-mismatch in ./include/linux/skbuff.h:2023:28 [ 20.632783][ T19] member access within address ffffc900001471c0 with insufficient space [ 20.633487][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 20.641119][ T19] for an object of type 'struct sk_buff' [ 20.655579][ T19] CPU: 1 PID: 19 Comm: kworker/1:0 Not tainted 5.10.79-syzkaller-01226-g706ebf15a1f9 #0 [ 20.665274][ T19] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 20.675322][ T19] Workqueue: ipv6_addrconf addrconf_dad_work [ 20.681276][ T19] Call Trace: [ 20.684545][ T19] dump_stack_lvl+0x1e2/0x24b [ 20.689194][ T19] ? show_regs_print_info+0x18/0x18 [ 20.694388][ T19] ? wg_allowedips_lookup_dst+0x190/0x190 [ 20.700093][ T19] dump_stack+0x15/0x1d [ 20.704222][ T19] ubsan_type_mismatch_common+0x1ed/0x3a0 [ 20.709916][ T19] ? __sanitizer_cov_trace_switch+0x74/0x90 [ 20.715796][ T19] __ubsan_handle_type_mismatch_v1+0x5b/0x70 [ 20.721760][ T19] wg_xmit+0x4a2/0xae0 [ 20.725829][ T19] ? wg_stop+0x140/0x140 [ 20.730065][ T19] ? __sanitizer_cov_trace_const_cmp2+0x19/0x20 [ 20.736285][ T19] netdev_start_xmit+0x8a/0x160 [ 20.741132][ T19] dev_hard_start_xmit+0x18d/0x2f0 [ 20.746220][ T19] __dev_queue_xmit+0xfbe/0x1bb0 [ 20.751137][ T19] ? dev_queue_xmit+0x20/0x20 [ 20.755790][ T19] ? __local_bh_enable_ip+0xa8/0x170 [ 20.761062][ T19] ? do_raw_spin_unlock+0x50/0x50 [ 20.766060][ T19] ? _local_bh_enable+0x30/0x30 [ 20.770881][ T19] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 20.777703][ T19] ? ndisc_constructor+0x690/0x8a0 [ 20.782802][ T19] ? _raw_write_unlock_bh+0x31/0x47 [ 20.788020][ T19] ? dev_hard_header+0xdb/0xf0 [ 20.792771][ T19] dev_queue_xmit+0x17/0x20 [ 20.797262][ T19] neigh_connected_output+0x288/0x2b0 [ 20.802649][ T19] ip6_finish_output2+0xde2/0x1440 [ 20.807742][ T19] ? __rcu_read_lock+0x50/0x50 [ 20.812495][ T19] ? __ip6_finish_output+0x520/0x520 [ 20.817778][ T19] ? dst_cow_metrics_generic+0x55/0x1d0 [ 20.823312][ T19] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 20.829533][ T19] ? ip6_skb_dst_mtu+0xaf/0x260 [ 20.834361][ T19] __ip6_finish_output+0x3e4/0x520 [ 20.839452][ T19] ip6_finish_output+0x3f/0x220 [ 20.844277][ T19] ? ip6_output+0x1d3/0x4b0 [ 20.848754][ T19] ip6_output+0x1f8/0x4b0 [ 20.853056][ T19] ? asan.module_dtor+0x20/0x20 [ 20.857880][ T19] ? skb_dst+0x40/0x40 [ 20.861923][ T19] ? __rcu_read_lock+0x50/0x50 [ 20.866661][ T19] ? selinux_ipv6_forward+0x50/0x50 [ 20.871831][ T19] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 20.877519][ T19] ? nf_hook_slow+0x150/0x1b0 [ 20.882169][ T19] NF_HOOK+0xdd/0x280 [ 20.886124][ T19] ? addrconf_addr_solict_mult+0xe0/0xe0 [ 20.891726][ T19] ? NF_HOOK+0x280/0x280 [ 20.895940][ T19] ? __rcu_read_lock+0x50/0x50 [ 20.900689][ T19] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 20.906900][ T19] ? ndisc_send_skb+0x547/0x9f0 [ 20.911723][ T19] ? memcpy+0x56/0x70 [ 20.915678][ T19] ndisc_send_skb+0x646/0x9f0 [ 20.920342][ T19] ? slab_post_alloc_hook+0x90/0xa0 [ 20.925535][ T19] ? ndisc_fill_addr_option+0x2f0/0x2f0 [ 20.931063][ T19] ? skb_set_owner_w+0x1a8/0x310 [ 20.935975][ T19] ? __sanitizer_cov_trace_cmp4+0x19/0x20 [ 20.941666][ T19] ? skb_put+0x11d/0x200 [ 20.945879][ T19] ndisc_send_rs+0x26c/0x360 [ 20.950442][ T19] addrconf_dad_completed+0x4f3/0x9f0 [ 20.955793][ T19] ? addrconf_dad_stop+0x430/0x430 [ 20.960882][ T19] ? mutex_unlock+0x34/0x40 [ 20.965442][ T19] addrconf_dad_work+0x9c1/0x1520 [ 20.970455][ T19] ? move_linked_works+0x118/0x130 [ 20.975538][ T19] ? ipv6_use_optimistic_addr+0x1d0/0x1d0 [ 20.981240][ T19] ? __kasan_check_write+0x14/0x20 [ 20.986326][ T19] process_one_work+0x3ca/0x660 [ 20.991162][ T19] worker_thread+0x709/0xa20 [ 20.995728][ T19] kthread+0x371/0x390 [ 20.999771][ T19] ? pr_cont_work+0x110/0x110 [ 21.004423][ T19] ? __list_add+0xc0/0xc0 [ 21.008725][ T19] ret_from_fork+0x1f/0x30 [ 21.013166][ T19] ================================================================================ [ 21.022452][ T19] ================================================================================ [ 21.031738][ T19] UBSAN: object-size-mismatch in ./include/linux/skbuff.h:1916:2 [ 21.039470][ T19] member access within address ffffc900001471c0 with insufficient space [ 21.047875][ T19] for an object of type 'struct sk_buff' [ 21.053505][ T19] CPU: 1 PID: 19 Comm: kworker/1:0 Not tainted 5.10.79-syzkaller-01226-g706ebf15a1f9 #0 [ 21.063200][ T19] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 21.073430][ T19] Workqueue: ipv6_addrconf addrconf_dad_work [ 21.079397][ T19] Call Trace: [ 21.082665][ T19] dump_stack_lvl+0x1e2/0x24b [ 21.087315][ T19] ? show_regs_print_info+0x18/0x18 [ 21.092487][ T19] ? wg_allowedips_lookup_dst+0x190/0x190 [ 21.098179][ T19] dump_stack+0x15/0x1d [ 21.102310][ T19] ubsan_type_mismatch_common+0x1ed/0x3a0 [ 21.108001][ T19] __ubsan_handle_type_mismatch_v1+0x5b/0x70 [ 21.113955][ T19] wg_xmit+0x513/0xae0 [ 21.117998][ T19] ? wg_stop+0x140/0x140 [ 21.122216][ T19] ? __sanitizer_cov_trace_const_cmp2+0x19/0x20 [ 21.128428][ T19] netdev_start_xmit+0x8a/0x160 [ 21.133254][ T19] dev_hard_start_xmit+0x18d/0x2f0 [ 21.138340][ T19] __dev_queue_xmit+0xfbe/0x1bb0 [ 21.143248][ T19] ? dev_queue_xmit+0x20/0x20 [ 21.147898][ T19] ? __local_bh_enable_ip+0xa8/0x170 [ 21.153163][ T19] ? do_raw_spin_unlock+0x50/0x50 [ 21.158160][ T19] ? _local_bh_enable+0x30/0x30 [ 21.162985][ T19] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 21.169200][ T19] ? ndisc_constructor+0x690/0x8a0 [ 21.174285][ T19] ? _raw_write_unlock_bh+0x31/0x47 [ 21.179465][ T19] ? dev_hard_header+0xdb/0xf0 [ 21.184201][ T19] dev_queue_xmit+0x17/0x20 [ 21.188678][ T19] neigh_connected_output+0x288/0x2b0 [ 21.194027][ T19] ip6_finish_output2+0xde2/0x1440 [ 21.199111][ T19] ? __rcu_read_lock+0x50/0x50 [ 21.203845][ T19] ? __ip6_finish_output+0x520/0x520 [ 21.209118][ T19] ? dst_cow_metrics_generic+0x55/0x1d0 [ 21.214636][ T19] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 21.220863][ T19] ? ip6_skb_dst_mtu+0xaf/0x260 [ 21.225687][ T19] __ip6_finish_output+0x3e4/0x520 [ 21.230770][ T19] ip6_finish_output+0x3f/0x220 [ 21.235596][ T19] ? ip6_output+0x1d3/0x4b0 [ 21.240083][ T19] ip6_output+0x1f8/0x4b0 [ 21.244385][ T19] ? asan.module_dtor+0x20/0x20 [ 21.249207][ T19] ? skb_dst+0x40/0x40 [ 21.253250][ T19] ? __rcu_read_lock+0x50/0x50 [ 21.257988][ T19] ? selinux_ipv6_forward+0x50/0x50 [ 21.263158][ T19] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 21.268849][ T19] ? nf_hook_slow+0x150/0x1b0 [ 21.273497][ T19] NF_HOOK+0xdd/0x280 [ 21.277451][ T19] ? addrconf_addr_solict_mult+0xe0/0xe0 [ 21.283054][ T19] ? NF_HOOK+0x280/0x280 [ 21.287269][ T19] ? __rcu_read_lock+0x50/0x50 [ 21.292006][ T19] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 21.298217][ T19] ? ndisc_send_skb+0x547/0x9f0 [ 21.303043][ T19] ? memcpy+0x56/0x70 [ 21.307000][ T19] ndisc_send_skb+0x646/0x9f0 [ 21.311662][ T19] ? slab_post_alloc_hook+0x90/0xa0 [ 21.316844][ T19] ? ndisc_fill_addr_option+0x2f0/0x2f0 [ 21.322367][ T19] ? skb_set_owner_w+0x1a8/0x310 [ 21.327278][ T19] ? __sanitizer_cov_trace_cmp4+0x19/0x20 [ 21.332969][ T19] ? skb_put+0x11d/0x200 [ 21.337185][ T19] ndisc_send_rs+0x26c/0x360 [ 21.341747][ T19] addrconf_dad_completed+0x4f3/0x9f0 [ 21.347093][ T19] ? addrconf_dad_stop+0x430/0x430 [ 21.352199][ T19] ? mutex_unlock+0x34/0x40 [ 21.356676][ T19] addrconf_dad_work+0x9c1/0x1520 [ 21.361675][ T19] ? move_linked_works+0x118/0x130 [ 21.366757][ T19] ? ipv6_use_optimistic_addr+0x1d0/0x1d0 [ 21.372537][ T19] ? __kasan_check_write+0x14/0x20 [ 21.377620][ T19] process_one_work+0x3ca/0x660 [ 21.382444][ T19] worker_thread+0x709/0xa20 [ 21.387016][ T19] kthread+0x371/0x390 [ 21.391055][ T19] ? pr_cont_work+0x110/0x110 [ 21.395717][ T19] ? __list_add+0xc0/0xc0 [ 21.400036][ T19] ret_from_fork+0x1f/0x30 [ 21.404477][ T19] ================================================================================ [ 21.415107][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! 2021/11/19 11:01:20 building call list... [ 21.433013][ T373] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 22.033627][ T9] device bridge_slave_1 left promiscuous mode [ 22.039779][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.047803][ T9] device bridge_slave_0 left promiscuous mode [ 22.054135][ T9] bridge0: port 1(bridge_slave_0) entered disabled state