[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.166' (ECDSA) to the list of known hosts. syzkaller login: [ 35.796017] IPVS: ftp: loaded support on port[0] = 21 [ 35.866458] chnl_net:caif_netlink_parms(): no params data found [ 35.936328] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.943283] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.951283] device bridge_slave_0 entered promiscuous mode [ 35.958815] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.965482] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.972618] device bridge_slave_1 entered promiscuous mode [ 35.990741] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 35.999616] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 36.017995] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 36.026113] team0: Port device team_slave_0 added [ 36.031695] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 36.039378] team0: Port device team_slave_1 added [ 36.055249] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.061502] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.086922] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.098386] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.104623] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.129905] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.140645] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 36.148381] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 36.167562] device hsr_slave_0 entered promiscuous mode [ 36.173299] device hsr_slave_1 entered promiscuous mode [ 36.179738] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 36.187019] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 36.251444] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.258191] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.265177] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.271569] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.303222] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 36.311344] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.320461] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 36.329850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.338705] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.346405] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.353700] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 36.364330] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 36.371151] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.380428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.389823] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.396443] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.406842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.415705] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.422086] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.437338] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 36.446726] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 36.456878] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 36.470125] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 36.480347] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 36.491737] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 36.499301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.507921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.516207] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 36.528697] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 36.536983] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 36.543800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 36.556211] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.568912] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 36.578771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.613055] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 36.620315] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 36.628118] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 36.637643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.645366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.652299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.661759] device veth0_vlan entered promiscuous mode [ 36.671087] device veth1_vlan entered promiscuous mode [ 36.677327] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 36.687141] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 36.698561] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 36.708161] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 36.715844] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 36.723113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.733536] device veth0_macvtap entered promiscuous mode [ 36.739986] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 36.748734] device veth1_macvtap entered promiscuous mode [ 36.758333] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 36.767933] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 36.778678] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.786214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.794725] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 36.805875] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.814138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 36.903043] ================================================================== [ 36.910576] BUG: KASAN: use-after-free in ipvlan_queue_xmit+0x9d2/0x18e0 [ 36.917536] Read of size 4 at addr ffff888098aead3f by task syz-executor100/8320 [ 36.925149] [ 36.926774] CPU: 1 PID: 8320 Comm: syz-executor100 Not tainted 4.19.190-syzkaller #0 [ 36.934645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.944386] Call Trace: [ 36.946981] dump_stack+0x1fc/0x2ef [ 36.950606] print_address_description.cold+0x54/0x219 [ 36.955990] kasan_report_error.cold+0x8a/0x1b9 [ 36.960750] ? ipvlan_queue_xmit+0x9d2/0x18e0 [ 36.965247] __asan_report_load4_noabort+0x88/0x90 [ 36.970180] ? __sanitizer_cov_trace_const_cmp4+0x20/0x20 [ 36.975827] ? ipvlan_queue_xmit+0x9d2/0x18e0 [ 36.980315] ipvlan_queue_xmit+0x9d2/0x18e0 [ 36.984625] ? skb_network_protocol+0x14b/0x570 [ 36.989302] ? ipvlan_process_multicast+0xcb0/0xcb0 [ 36.994313] ? skb_crc32c_csum_help+0x70/0x70 [ 36.999211] ? __alloc_skb+0x34f/0x560 [ 37.003194] ? netif_skb_features+0x5c1/0xb30 [ 37.007908] ? lock_downgrade+0x720/0x720 [ 37.012072] ? __skb_gso_segment+0x720/0x720 [ 37.016601] ? validate_xmit_xfrm+0x3dc/0xe30 [ 37.021310] ipvlan_start_xmit+0x4f/0x190 [ 37.025452] dev_direct_xmit+0x3f9/0x6d0 [ 37.029511] ? validate_xmit_skb_list+0x120/0x120 [ 37.034351] ? dev_pick_tx_cpu_id+0xd/0x70 [ 37.038588] packet_sendmsg+0x24e9/0x7130 [ 37.042736] ? mark_held_locks+0xb0/0xf0 [ 37.046818] ? aa_sk_perm+0x534/0x930 [ 37.050621] ? compat_packet_setsockopt+0x160/0x160 [ 37.055781] ? aa_af_perm+0x230/0x230 [ 37.059587] ? compat_packet_setsockopt+0x160/0x160 [ 37.064603] sock_sendmsg+0xc3/0x120 [ 37.068311] __sys_sendto+0x21a/0x320 [ 37.072131] ? __ia32_sys_getpeername+0xb0/0xb0 [ 37.076808] ? aa_af_perm+0x230/0x230 [ 37.080604] ? __sys_setsockopt+0x179/0x240 [ 37.084943] ? kernel_accept+0x310/0x310 [ 37.088992] ? __sys_socket+0x16d/0x200 [ 37.093043] __x64_sys_sendto+0xdd/0x1b0 [ 37.097099] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 37.101685] do_syscall_64+0xf9/0x620 [ 37.105577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.110757] RIP: 0033:0x443a99 [ 37.113990] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 37.132890] RSP: 002b:00007ffd89b8d218 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 37.140682] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443a99 [ 37.147962] RDX: 000000000000000e RSI: 0000000020000080 RDI: 0000000000000005 [ 37.155243] RBP: 0000000000000000 R08: 0000000020000040 R09: 0000000000000014 [ 37.162528] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd89b8d240 [ 37.169813] R13: 00000000000f4240 R14: 00000000004b8018 R15: 00000000004004b8 [ 37.177178] [ 37.178808] The buggy address belongs to the page: [ 37.183735] page:ffffea000262ba80 count:0 mapcount:0 mapping:0000000000000000 index:0x0 [ 37.191888] flags: 0xfff00000000000() [ 37.195773] raw: 00fff00000000000 ffffea0002bcf5c8 ffffea0002d23bc8 0000000000000000 [ 37.203652] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 37.211679] page dumped because: kasan: bad access detected [ 37.217375] [ 37.219075] Memory state around the buggy address: [ 37.223992] ffff888098aeac00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.231345] ffff888098aeac80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.238695] >ffff888098aead00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.246451] ^ [ 37.252389] ffff888098aead80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.259941] ffff888098aeae00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.267290] ================================================================== [ 37.274728] Disabling lock debugging due to kernel taint [ 37.280213] Kernel panic - not syncing: panic_on_warn set ... [ 37.280213] [ 37.287576] CPU: 1 PID: 8320 Comm: syz-executor100 Tainted: G B 4.19.190-syzkaller #0 [ 37.296853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.306205] Call Trace: [ 37.308895] dump_stack+0x1fc/0x2ef [ 37.312540] panic+0x26a/0x50e [ 37.315851] ? __warn_printk+0xf3/0xf3 [ 37.319740] ? retint_kernel+0x2d/0x2d [ 37.323616] ? trace_hardirqs_on+0x55/0x210 [ 37.327938] kasan_end_report+0x43/0x49 [ 37.331899] kasan_report_error.cold+0xa7/0x1b9 [ 37.336648] ? ipvlan_queue_xmit+0x9d2/0x18e0 [ 37.341137] __asan_report_load4_noabort+0x88/0x90 [ 37.346064] ? __sanitizer_cov_trace_const_cmp4+0x20/0x20 [ 37.351596] ? ipvlan_queue_xmit+0x9d2/0x18e0 [ 37.356084] ipvlan_queue_xmit+0x9d2/0x18e0 [ 37.360392] ? skb_network_protocol+0x14b/0x570 [ 37.365047] ? ipvlan_process_multicast+0xcb0/0xcb0 [ 37.370049] ? skb_crc32c_csum_help+0x70/0x70 [ 37.374536] ? __alloc_skb+0x34f/0x560 [ 37.378407] ? netif_skb_features+0x5c1/0xb30 [ 37.382897] ? lock_downgrade+0x720/0x720 [ 37.387124] ? __skb_gso_segment+0x720/0x720 [ 37.391550] ? validate_xmit_xfrm+0x3dc/0xe30 [ 37.396046] ipvlan_start_xmit+0x4f/0x190 [ 37.400195] dev_direct_xmit+0x3f9/0x6d0 [ 37.404240] ? validate_xmit_skb_list+0x120/0x120 [ 37.409078] ? dev_pick_tx_cpu_id+0xd/0x70 [ 37.413399] packet_sendmsg+0x24e9/0x7130 [ 37.417544] ? mark_held_locks+0xb0/0xf0 [ 37.421622] ? aa_sk_perm+0x534/0x930 [ 37.425415] ? compat_packet_setsockopt+0x160/0x160 [ 37.430437] ? aa_af_perm+0x230/0x230 [ 37.434240] ? compat_packet_setsockopt+0x160/0x160 [ 37.439385] sock_sendmsg+0xc3/0x120 [ 37.443280] __sys_sendto+0x21a/0x320 [ 37.447182] ? __ia32_sys_getpeername+0xb0/0xb0 [ 37.451947] ? aa_af_perm+0x230/0x230 [ 37.455738] ? __sys_setsockopt+0x179/0x240 [ 37.460049] ? kernel_accept+0x310/0x310 [ 37.464104] ? __sys_socket+0x16d/0x200 [ 37.468098] __x64_sys_sendto+0xdd/0x1b0 [ 37.472235] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 37.477120] do_syscall_64+0xf9/0x620 [ 37.480915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.486092] RIP: 0033:0x443a99 [ 37.489279] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 37.509495] RSP: 002b:00007ffd89b8d218 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 37.517194] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443a99 [ 37.524538] RDX: 000000000000000e RSI: 0000000020000080 RDI: 0000000000000005 [ 37.531971] RBP: 0000000000000000 R08: 0000000020000040 R09: 0000000000000014 [ 37.539267] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd89b8d240 [ 37.546548] R13: 00000000000f4240 R14: 00000000004b8018 R15: 00000000004004b8 [ 37.554796] Kernel Offset: disabled [ 37.558481] Rebooting in 86400 seconds..