Warning: Permanently added '10.128.0.173' (ECDSA) to the list of known hosts. 2021/11/10 00:32:29 fuzzer started 2021/11/10 00:32:29 connecting to host at 10.128.0.163:34451 2021/11/10 00:32:29 checking machine... 2021/11/10 00:32:29 checking revisions... 2021/11/10 00:32:29 testing simple program... [ 19.472860][ T23] audit: type=1400 audit(1636504349.520:73): avc: denied { getattr } for pid=362 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 19.478221][ T23] audit: type=1400 audit(1636504349.520:74): avc: denied { read } for pid=362 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 19.484710][ T23] audit: type=1400 audit(1636504349.520:75): avc: denied { open } for pid=362 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 19.488756][ T370] cgroup: Unknown subsys name 'net' [ 19.492175][ T23] audit: type=1400 audit(1636504349.520:76): avc: denied { read } for pid=362 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.515970][ T23] audit: type=1400 audit(1636504349.520:77): avc: denied { open } for pid=362 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.516133][ T370] cgroup: Unknown subsys name 'devices' [ 19.539989][ T23] audit: type=1400 audit(1636504349.530:78): avc: denied { mounton } for pid=370 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.568953][ T23] audit: type=1400 audit(1636504349.530:79): avc: denied { mount } for pid=370 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.591695][ T23] audit: type=1400 audit(1636504349.540:80): avc: denied { unmount } for pid=370 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.702449][ T370] cgroup: Unknown subsys name 'hugetlb' [ 19.708372][ T370] cgroup: Unknown subsys name 'rlimit' [ 19.812519][ T23] audit: type=1400 audit(1636504349.860:81): avc: denied { setattr } for pid=370 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.836124][ T23] audit: type=1400 audit(1636504349.880:82): avc: denied { execmem } for pid=372 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 19.915187][ T373] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.922351][ T373] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.929680][ T373] device bridge_slave_0 entered promiscuous mode [ 19.936984][ T373] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.944497][ T373] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.952438][ T373] device bridge_slave_1 entered promiscuous mode [ 19.983075][ T373] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.990715][ T373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.998128][ T373] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.005274][ T373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.023598][ T374] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.031271][ T374] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.039069][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.047410][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.056370][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.064790][ T74] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.072196][ T74] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.091268][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.099692][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.108624][ T74] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.115818][ T74] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.123226][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.132331][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.149728][ T122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.158523][ T122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.167573][ T122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.176718][ T122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.186664][ T122] ================================================================================ [ 20.196180][ T122] UBSAN: object-size-mismatch in ./include/linux/skbuff.h:2023:28 [ 20.204189][ T122] member access within address ffffc90000b371c0 with insufficient space [ 20.212564][ T122] for an object of type 'struct sk_buff' [ 20.218292][ T122] CPU: 0 PID: 122 Comm: kworker/0:2 Not tainted 5.10.78-syzkaller-01155-gbb235e8cc2b6 #0 [ 20.228093][ T122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 20.238337][ T122] Workqueue: ipv6_addrconf addrconf_dad_work [ 20.244412][ T122] Call Trace: [ 20.248154][ T122] dump_stack_lvl+0x1e2/0x24b [ 20.252981][ T122] ? show_regs_print_info+0x18/0x18 [ 20.258265][ T122] ? wg_allowedips_lookup_dst+0x190/0x190 [ 20.264154][ T122] dump_stack+0x15/0x1d [ 20.268311][ T122] ubsan_type_mismatch_common+0x1ed/0x3a0 [ 20.274028][ T122] ? __sanitizer_cov_trace_switch+0x74/0x90 [ 20.279947][ T122] __ubsan_handle_type_mismatch_v1+0x5b/0x70 [ 20.286112][ T122] wg_xmit+0x4a2/0xae0 [ 20.290163][ T122] ? wg_stop+0x140/0x140 [ 20.294384][ T122] ? __sanitizer_cov_trace_const_cmp2+0x19/0x20 [ 20.300688][ T122] netdev_start_xmit+0x8a/0x160 [ 20.305731][ T122] dev_hard_start_xmit+0x18d/0x2f0 [ 20.311164][ T122] __dev_queue_xmit+0xfbe/0x1bb0 [ 20.316362][ T122] ? dev_queue_xmit+0x20/0x20 [ 20.321020][ T122] ? __local_bh_enable_ip+0xa8/0x170 [ 20.326283][ T122] ? do_raw_spin_unlock+0x50/0x50 [ 20.331556][ T122] ? _local_bh_enable+0x30/0x30 [ 20.336541][ T122] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 20.342777][ T122] ? ndisc_constructor+0x690/0x8a0 [ 20.348645][ T122] ? _raw_write_unlock_bh+0x31/0x47 [ 20.354354][ T122] ? dev_hard_header+0xdb/0xf0 [ 20.359294][ T122] dev_queue_xmit+0x17/0x20 [ 20.363954][ T122] neigh_connected_output+0x288/0x2b0 [ 20.369769][ T122] ip6_finish_output2+0xde2/0x1440 [ 20.374969][ T122] ? __rcu_read_lock+0x50/0x50 [ 20.379803][ T122] ? __ip6_finish_output+0x520/0x520 [ 20.385258][ T122] ? dst_cow_metrics_generic+0x55/0x1d0 [ 20.390819][ T122] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 20.397139][ T122] ? ip6_skb_dst_mtu+0xaf/0x260 [ 20.402086][ T122] __ip6_finish_output+0x3e4/0x520 [ 20.407205][ T122] ip6_finish_output+0x3f/0x220 [ 20.412136][ T122] ? ip6_output+0x1d3/0x4b0 [ 20.416622][ T122] ip6_output+0x1f8/0x4b0 [ 20.421215][ T122] ? asan.module_dtor+0x20/0x20 [ 20.426244][ T122] ? skb_dst+0x40/0x40 [ 20.431351][ T122] ? __rcu_read_lock+0x50/0x50 [ 20.436539][ T122] ? selinux_ipv6_forward+0x50/0x50 [ 20.441886][ T122] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 20.448142][ T122] ? nf_hook_slow+0x150/0x1b0 [ 20.453007][ T122] NF_HOOK+0xdd/0x280 [ 20.456983][ T122] ? addrconf_addr_solict_mult+0xe0/0xe0 [ 20.462756][ T122] ? NF_HOOK+0x280/0x280 [ 20.467146][ T122] ? __rcu_read_lock+0x50/0x50 [ 20.472166][ T122] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 20.478606][ T122] ? ndisc_send_skb+0x547/0x9f0 [ 20.483625][ T122] ? memcpy+0x56/0x70 [ 20.487729][ T122] ndisc_send_skb+0x646/0x9f0 [ 20.492427][ T122] ? slab_post_alloc_hook+0x90/0xa0 [ 20.497627][ T122] ? ndisc_fill_addr_option+0x2f0/0x2f0 [ 20.503233][ T122] ? skb_set_owner_w+0x1a8/0x310 [ 20.508401][ T122] ? __sanitizer_cov_trace_cmp4+0x19/0x20 [ 20.514122][ T122] ? skb_put+0x11d/0x200 [ 20.518446][ T122] ndisc_send_rs+0x26c/0x360 [ 20.523053][ T122] addrconf_dad_completed+0x4f3/0x9f0 [ 20.528509][ T122] ? addrconf_dad_stop+0x430/0x430 [ 20.533681][ T122] addrconf_dad_work+0x9c1/0x1520 [ 20.538844][ T122] ? move_linked_works+0x118/0x130 [ 20.544188][ T122] ? ipv6_use_optimistic_addr+0x1d0/0x1d0 [ 20.549927][ T122] ? __kasan_check_write+0x14/0x20 [ 20.555089][ T122] process_one_work+0x3ca/0x660 [ 20.560017][ T122] worker_thread+0x709/0xa20 [ 20.564583][ T122] ? __kthread_parkme+0x11b/0x150 [ 20.569830][ T122] kthread+0x371/0x390 [ 20.574410][ T122] ? pr_cont_work+0x110/0x110 [ 20.579287][ T122] ? __list_add+0xc0/0xc0 [ 20.583635][ T122] ret_from_fork+0x1f/0x30 [ 20.588169][ T122] ================================================================================ [ 20.598095][ T122] ================================================================================ [ 20.607562][ T122] UBSAN: object-size-mismatch in ./include/linux/skbuff.h:1916:2 [ 20.615477][ T122] member access within address ffffc90000b371c0 with insufficient space [ 20.623986][ T122] for an object of type 'struct sk_buff' [ 20.629713][ T122] CPU: 0 PID: 122 Comm: kworker/0:2 Not tainted 5.10.78-syzkaller-01155-gbb235e8cc2b6 #0 [ 20.639574][ T122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 20.650485][ T122] Workqueue: ipv6_addrconf addrconf_dad_work [ 20.656471][ T122] Call Trace: [ 20.659765][ T122] dump_stack_lvl+0x1e2/0x24b [ 20.664443][ T122] ? show_regs_print_info+0x18/0x18 [ 20.669881][ T122] ? wg_allowedips_lookup_dst+0x190/0x190 [ 20.675708][ T122] dump_stack+0x15/0x1d [ 20.679846][ T122] ubsan_type_mismatch_common+0x1ed/0x3a0 [ 20.685560][ T122] __ubsan_handle_type_mismatch_v1+0x5b/0x70 [ 20.691520][ T122] wg_xmit+0x513/0xae0 [ 20.695568][ T122] ? wg_stop+0x140/0x140 [ 20.699790][ T122] ? __sanitizer_cov_trace_const_cmp2+0x19/0x20 [ 20.706337][ T122] netdev_start_xmit+0x8a/0x160 [ 20.711273][ T122] dev_hard_start_xmit+0x18d/0x2f0 [ 20.716742][ T122] __dev_queue_xmit+0xfbe/0x1bb0 [ 20.721781][ T122] ? dev_queue_xmit+0x20/0x20 [ 20.726462][ T122] ? __local_bh_enable_ip+0xa8/0x170 [ 20.731888][ T122] ? do_raw_spin_unlock+0x50/0x50 [ 20.736991][ T122] ? _local_bh_enable+0x30/0x30 [ 20.742004][ T122] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 20.748379][ T122] ? ndisc_constructor+0x690/0x8a0 [ 20.753587][ T122] ? _raw_write_unlock_bh+0x31/0x47 [ 20.759084][ T122] ? dev_hard_header+0xdb/0xf0 [ 20.764738][ T122] dev_queue_xmit+0x17/0x20 [ 20.769223][ T122] neigh_connected_output+0x288/0x2b0 [ 20.774702][ T122] ip6_finish_output2+0xde2/0x1440 [ 20.779892][ T122] ? __rcu_read_lock+0x50/0x50 [ 20.784634][ T122] ? __ip6_finish_output+0x520/0x520 [ 20.789977][ T122] ? dst_cow_metrics_generic+0x55/0x1d0 [ 20.795536][ T122] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 20.801753][ T122] ? ip6_skb_dst_mtu+0xaf/0x260 [ 20.806671][ T122] __ip6_finish_output+0x3e4/0x520 [ 20.812672][ T122] ip6_finish_output+0x3f/0x220 [ 20.817522][ T122] ? ip6_output+0x1d3/0x4b0 [ 20.822008][ T122] ip6_output+0x1f8/0x4b0 [ 20.826381][ T122] ? asan.module_dtor+0x20/0x20 [ 20.831833][ T122] ? skb_dst+0x40/0x40 [ 20.835997][ T122] ? __rcu_read_lock+0x50/0x50 [ 20.840834][ T122] ? selinux_ipv6_forward+0x50/0x50 [ 20.846315][ T122] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 20.852569][ T122] ? nf_hook_slow+0x150/0x1b0 [ 20.857972][ T122] NF_HOOK+0xdd/0x280 [ 20.862132][ T122] ? addrconf_addr_solict_mult+0xe0/0xe0 [ 20.869013][ T122] ? NF_HOOK+0x280/0x280 [ 20.873569][ T122] ? __rcu_read_lock+0x50/0x50 [ 20.878795][ T122] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 20.885342][ T122] ? ndisc_send_skb+0x547/0x9f0 [ 20.891001][ T122] ? memcpy+0x56/0x70 [ 20.895499][ T122] ndisc_send_skb+0x646/0x9f0 [ 20.900531][ T122] ? slab_post_alloc_hook+0x90/0xa0 [ 20.906429][ T122] ? ndisc_fill_addr_option+0x2f0/0x2f0 [ 20.912230][ T122] ? skb_set_owner_w+0x1a8/0x310 [ 20.919127][ T122] ? __sanitizer_cov_trace_cmp4+0x19/0x20 [ 20.925372][ T122] ? skb_put+0x11d/0x200 [ 20.930006][ T122] ndisc_send_rs+0x26c/0x360 [ 20.934675][ T122] addrconf_dad_completed+0x4f3/0x9f0 [ 20.940137][ T122] ? addrconf_dad_stop+0x430/0x430 [ 20.945402][ T122] addrconf_dad_work+0x9c1/0x1520 [ 20.950436][ T122] ? move_linked_works+0x118/0x130 [ 20.955798][ T122] ? ipv6_use_optimistic_addr+0x1d0/0x1d0 [ 20.961739][ T122] ? __kasan_check_write+0x14/0x20 [ 20.967225][ T122] process_one_work+0x3ca/0x660 [ 20.972121][ T122] worker_thread+0x709/0xa20 [ 20.976837][ T122] ? __kthread_parkme+0x11b/0x150 [ 20.981985][ T122] kthread+0x371/0x390 [ 20.986060][ T122] ? pr_cont_work+0x110/0x110 [ 20.990917][ T122] ? __list_add+0xc0/0xc0 [ 20.995335][ T122] ret_from_fork+0x1f/0x30 2021/11/10 00:32:31 building call list... [ 21.000001][ T122] ================================================================================ [ 21.020293][ T373] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 21.380601][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 21.600804][ T9] device bridge_slave_1 left promiscuous mode [ 21.607077][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.615129][ T9] device bridge_slave_0 left promiscuous mode [ 21.621568][ T9] bridge0: port 1(bridge_slave_0) entered disabled state