[info] Using makefile-style concurrent boot in runlevel 2. [ 24.721212] audit: type=1800 audit(1540912740.853:21): pid=5500 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [ 24.741948] audit: type=1800 audit(1540912740.853:22): pid=5500 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2447 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.40' (ECDSA) to the list of known hosts. syzkaller login: [ 56.873320] IPVS: ftp: loaded support on port[0] = 21 [ 57.025061] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.032199] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.039176] device bridge_slave_0 entered promiscuous mode [ 57.057555] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.064033] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.070931] device bridge_slave_1 entered promiscuous mode [ 57.088040] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.105732] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.154448] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 57.174164] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 57.247646] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.254975] team0: Port device team_slave_0 added [ 57.271504] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.278584] team0: Port device team_slave_1 added [ 57.295872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.314084] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.332772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.351538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 57.497220] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.503690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.510579] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.516907] bridge0: port 1(bridge_slave_0) entered forwarding state RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument [ 58.014313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.064494] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 58.115071] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.121539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.128570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.179695] 8021q: adding VLAN 0 to HW filter on device team0 executing program [ 58.453808] ================================================================== [ 58.461229] BUG: KASAN: slab-out-of-bounds in _decode_session6+0x134a/0x1500 [ 58.468484] Read of size 1 at addr ffff8801cde0e707 by task syz-executor843/5657 [ 58.476067] [ 58.477685] CPU: 0 PID: 5657 Comm: syz-executor843 Not tainted 4.19.0-next-20181030+ #101 [ 58.485974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 58.495301] Call Trace: [ 58.497875] dump_stack+0x244/0x39d [ 58.501485] ? dump_stack_print_info.cold.1+0x20/0x20 [ 58.506657] ? printk+0xa7/0xcf [ 58.509919] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 58.514795] print_address_description.cold.7+0x9/0x1ff [ 58.520161] kasan_report.cold.8+0x242/0x309 [ 58.524547] ? _decode_session6+0x134a/0x1500 [ 58.529019] __asan_report_load1_noabort+0x14/0x20 [ 58.533923] _decode_session6+0x134a/0x1500 [ 58.538242] __xfrm_decode_session+0x71/0x140 [ 58.542714] vti6_tnl_xmit+0x3fc/0x1c10 [ 58.546666] ? __lock_acquire+0x62f/0x4c20 [ 58.550895] ? vti6_tnl_create2+0x430/0x430 [ 58.555214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 58.560737] ? check_preemption_disabled+0x48/0x280 [ 58.565749] dev_hard_start_xmit+0x290/0xc80 [ 58.570146] ? dev_direct_xmit+0x6b0/0x6b0 [ 58.574364] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 58.579888] ? netif_skb_features+0x690/0xb70 [ 58.584363] ? rcu_softirq_qs+0x20/0x20 [ 58.588324] ? lock_acquire+0x1ed/0x520 [ 58.592278] ? __dev_queue_xmit+0x308f/0x3ac0 [ 58.596766] ? kasan_check_read+0x11/0x20 [ 58.600904] ? do_raw_spin_lock+0x14f/0x350 [ 58.605217] ? rwlock_bug.part.2+0x90/0x90 [ 58.609443] ? netif_skb_features+0xb70/0xb70 [ 58.613928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 58.619451] ? check_preemption_disabled+0x48/0x280 [ 58.624452] __dev_queue_xmit+0x2f9d/0x3ac0 [ 58.628757] ? save_stack+0x43/0xd0 [ 58.632366] ? kasan_kmalloc+0xc7/0xe0 [ 58.636240] ? __kmalloc_node_track_caller+0x50/0x70 [ 58.641327] ? netdev_pick_tx+0x310/0x310 [ 58.645456] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 58.650971] ? check_preemption_disabled+0x48/0x280 [ 58.655976] ? __lock_is_held+0xb5/0x140 [ 58.660022] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 58.665021] ? skb_release_data+0x1c4/0x880 [ 58.669323] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 58.674581] ? kasan_unpoison_shadow+0x35/0x50 [ 58.679143] ? skb_tx_error+0x2f0/0x2f0 [ 58.683099] ? __kmalloc_node_track_caller+0x50/0x70 [ 58.688184] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 58.693700] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 58.699288] ? kasan_check_write+0x14/0x20 [ 58.703512] ? pskb_expand_head+0x6b3/0x10f0 [ 58.707911] ? skb_release_data+0x880/0x880 [ 58.712213] ? __alloc_skb+0x770/0x770 [ 58.716086] ? __lock_is_held+0xb5/0x140 [ 58.720132] ? kasan_check_write+0x14/0x20 [ 58.724346] ? __skb_clone+0x6c7/0xa00 [ 58.728215] ? __copy_skb_header+0x6b0/0x6b0 [ 58.732606] ? kmem_cache_alloc+0x33a/0x730 [ 58.736909] ? depot_save_stack+0x292/0x470 [ 58.741214] ? skb_ensure_writable+0x15e/0x640 [ 58.745782] dev_queue_xmit+0x17/0x20 [ 58.749563] ? dev_queue_xmit+0x17/0x20 [ 58.753531] __bpf_redirect+0x5cf/0xb20 [ 58.757482] bpf_clone_redirect+0x2f6/0x490 [ 58.761784] bpf_prog_c39d1ba309a769f7+0x7cc/0x1000 [ 58.766778] ? bpf_test_run+0x175/0x780 [ 58.770731] ? lock_downgrade+0x900/0x900 [ 58.774855] ? ktime_get+0x332/0x400 [ 58.778547] ? find_held_lock+0x36/0x1c0 [ 58.782590] ? lock_acquire+0x1ed/0x520 [ 58.786539] ? bpf_test_run+0x3cb/0x780 [ 58.790490] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 58.796001] ? check_preemption_disabled+0x48/0x280 [ 58.800995] ? kasan_check_read+0x11/0x20 [ 58.805115] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 58.810384] ? rcu_softirq_qs+0x20/0x20 [ 58.814472] ? bpf_cgroup_storage_release+0x220/0x220 [ 58.819642] ? skb_try_coalesce+0x1b70/0x1b70 [ 58.824115] ? bpf_test_run+0x25d/0x780 [ 58.828100] ? netlink_diag_dump+0x2a0/0x2a0 [ 58.832544] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 58.838063] ? bpf_test_init.isra.10+0x70/0x100 [ 58.842721] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 58.847457] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 58.852288] ? bpf_prog_add+0x69/0xd0 [ 58.856107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 58.861615] ? __bpf_prog_get+0x9b/0x290 [ 58.865652] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 58.870486] ? bpf_prog_test_run+0x130/0x1a0 [ 58.875212] ? __x64_sys_bpf+0x3d8/0x520 [ 58.879287] ? bpf_prog_get+0x20/0x20 [ 58.883108] ? do_syscall_64+0x1b9/0x820 [ 58.887148] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 58.892523] ? syscall_return_slowpath+0x5e0/0x5e0 [ 58.897470] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 58.902309] ? trace_hardirqs_on_caller+0x310/0x310 [ 58.907303] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 58.912295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 58.917810] ? prepare_exit_to_usermode+0x291/0x3b0 [ 58.922809] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 58.927630] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 58.932974] [ 58.934577] Allocated by task 5657: [ 58.938197] save_stack+0x43/0xd0 [ 58.941636] kasan_kmalloc+0xc7/0xe0 [ 58.945327] __kmalloc_node_track_caller+0x50/0x70 [ 58.950235] __kmalloc_reserve.isra.40+0x41/0xe0 [ 58.954967] pskb_expand_head+0x230/0x10f0 [ 58.959180] skb_ensure_writable+0x3dd/0x640 [ 58.963567] bpf_clone_redirect+0x14a/0x490 [ 58.967867] bpf_prog_c39d1ba309a769f7+0x7cc/0x1000 [ 58.972851] [ 58.974454] Freed by task 4224: [ 58.977723] save_stack+0x43/0xd0 [ 58.981158] __kasan_slab_free+0x102/0x150 [ 58.985366] kasan_slab_free+0xe/0x10 [ 58.989149] kfree+0xcf/0x230 [ 58.992241] load_elf_binary+0x25b4/0x5620 [ 58.996454] search_binary_handler+0x17d/0x570 [ 59.001013] __do_execve_file.isra.33+0x1661/0x25d0 [ 59.006029] __x64_sys_execve+0x8f/0xc0 [ 59.010005] do_syscall_64+0x1b9/0x820 [ 59.013869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 59.019026] [ 59.020667] The buggy address belongs to the object at ffff8801cde0e500 [ 59.020667] which belongs to the cache kmalloc-512 of size 512 [ 59.033319] The buggy address is located 7 bytes to the right of [ 59.033319] 512-byte region [ffff8801cde0e500, ffff8801cde0e700) [ 59.045511] The buggy address belongs to the page: [ 59.050416] page:ffffea0007378380 count:1 mapcount:0 mapping:ffff8801da800940 index:0x0 [ 59.058536] flags: 0x2fffc0000000200(slab) [ 59.062751] raw: 02fffc0000000200 ffffea0007374148 ffffea0007377f88 ffff8801da800940 [ 59.070610] raw: 0000000000000000 ffff8801cde0e000 0000000100000006 0000000000000000 [ 59.078463] page dumped because: kasan: bad access detected [ 59.084147] [ 59.085747] Memory state around the buggy address: [ 59.090658] ffff8801cde0e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 59.097991] ffff8801cde0e680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 59.105327] >ffff8801cde0e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.112659] ^ [ 59.116000] ffff8801cde0e780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.123348] ffff8801cde0e800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.130683] ================================================================== [ 59.138030] Disabling lock debugging due to kernel taint [ 59.143526] Kernel panic - not syncing: panic_on_warn set ... [ 59.149415] CPU: 0 PID: 5657 Comm: syz-executor843 Tainted: G B 4.19.0-next-20181030+ #101 [ 59.159202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.168532] Call Trace: [ 59.171112] dump_stack+0x244/0x39d [ 59.174719] ? dump_stack_print_info.cold.1+0x20/0x20 [ 59.179911] panic+0x2ad/0x55c [ 59.183081] ? add_taint.cold.5+0x16/0x16 [ 59.187210] ? trace_hardirqs_on+0x9a/0x310 [ 59.191510] ? trace_hardirqs_on+0xb4/0x310 [ 59.195808] ? trace_hardirqs_on+0xb4/0x310 [ 59.200131] kasan_end_report+0x47/0x4f [ 59.204091] kasan_report.cold.8+0x76/0x309 [ 59.208414] ? _decode_session6+0x134a/0x1500 [ 59.212903] __asan_report_load1_noabort+0x14/0x20 [ 59.217810] _decode_session6+0x134a/0x1500 [ 59.222117] __xfrm_decode_session+0x71/0x140 [ 59.226625] vti6_tnl_xmit+0x3fc/0x1c10 [ 59.230619] ? __lock_acquire+0x62f/0x4c20 [ 59.234840] ? vti6_tnl_create2+0x430/0x430 [ 59.239155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 59.244670] ? check_preemption_disabled+0x48/0x280 [ 59.249686] dev_hard_start_xmit+0x290/0xc80 [ 59.254106] ? dev_direct_xmit+0x6b0/0x6b0 [ 59.258320] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 59.263851] ? netif_skb_features+0x690/0xb70 [ 59.268323] ? rcu_softirq_qs+0x20/0x20 [ 59.272277] ? lock_acquire+0x1ed/0x520 [ 59.276229] ? __dev_queue_xmit+0x308f/0x3ac0 [ 59.280707] ? kasan_check_read+0x11/0x20 [ 59.284831] ? do_raw_spin_lock+0x14f/0x350 [ 59.289144] ? rwlock_bug.part.2+0x90/0x90 [ 59.293357] ? netif_skb_features+0xb70/0xb70 [ 59.297855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 59.303378] ? check_preemption_disabled+0x48/0x280 [ 59.308379] __dev_queue_xmit+0x2f9d/0x3ac0 [ 59.312681] ? save_stack+0x43/0xd0 [ 59.316287] ? kasan_kmalloc+0xc7/0xe0 [ 59.320154] ? __kmalloc_node_track_caller+0x50/0x70 [ 59.325260] ? netdev_pick_tx+0x310/0x310 [ 59.329391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 59.334906] ? check_preemption_disabled+0x48/0x280 [ 59.339903] ? __lock_is_held+0xb5/0x140 [ 59.343956] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 59.348947] ? skb_release_data+0x1c4/0x880 [ 59.353252] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 59.358524] ? kasan_unpoison_shadow+0x35/0x50 [ 59.363086] ? skb_tx_error+0x2f0/0x2f0 [ 59.367039] ? __kmalloc_node_track_caller+0x50/0x70 [ 59.372140] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 59.377677] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 59.383192] ? kasan_check_write+0x14/0x20 [ 59.387405] ? pskb_expand_head+0x6b3/0x10f0 [ 59.391797] ? skb_release_data+0x880/0x880 [ 59.396112] ? __alloc_skb+0x770/0x770 [ 59.400012] ? __lock_is_held+0xb5/0x140 [ 59.404081] ? kasan_check_write+0x14/0x20 [ 59.408306] ? __skb_clone+0x6c7/0xa00 [ 59.412171] ? __copy_skb_header+0x6b0/0x6b0 [ 59.416557] ? kmem_cache_alloc+0x33a/0x730 [ 59.420873] ? depot_save_stack+0x292/0x470 [ 59.425173] ? skb_ensure_writable+0x15e/0x640 [ 59.429748] dev_queue_xmit+0x17/0x20 [ 59.433531] ? dev_queue_xmit+0x17/0x20 [ 59.437484] __bpf_redirect+0x5cf/0xb20 [ 59.441442] bpf_clone_redirect+0x2f6/0x490 [ 59.445742] bpf_prog_c39d1ba309a769f7+0x7cc/0x1000 [ 59.450737] ? bpf_test_run+0x175/0x780 [ 59.454691] ? lock_downgrade+0x900/0x900 [ 59.458815] ? ktime_get+0x332/0x400 [ 59.462510] ? find_held_lock+0x36/0x1c0 [ 59.466551] ? lock_acquire+0x1ed/0x520 [ 59.470505] ? bpf_test_run+0x3cb/0x780 [ 59.474459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 59.479975] ? check_preemption_disabled+0x48/0x280 [ 59.484970] ? kasan_check_read+0x11/0x20 [ 59.489094] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 59.494344] ? rcu_softirq_qs+0x20/0x20 [ 59.498310] ? bpf_cgroup_storage_release+0x220/0x220 [ 59.503492] ? skb_try_coalesce+0x1b70/0x1b70 [ 59.507966] ? bpf_test_run+0x25d/0x780 [ 59.511939] ? netlink_diag_dump+0x2a0/0x2a0 [ 59.516330] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 59.521844] ? bpf_test_init.isra.10+0x70/0x100 [ 59.526488] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 59.531222] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 59.536037] ? bpf_prog_add+0x69/0xd0 [ 59.539813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 59.545330] ? __bpf_prog_get+0x9b/0x290 [ 59.549367] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 59.554191] ? bpf_prog_test_run+0x130/0x1a0 [ 59.558574] ? __x64_sys_bpf+0x3d8/0x520 [ 59.562614] ? bpf_prog_get+0x20/0x20 [ 59.566408] ? do_syscall_64+0x1b9/0x820 [ 59.570450] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 59.575791] ? syscall_return_slowpath+0x5e0/0x5e0 [ 59.580700] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 59.585535] ? trace_hardirqs_on_caller+0x310/0x310 [ 59.590529] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 59.595527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 59.601047] ? prepare_exit_to_usermode+0x291/0x3b0 [ 59.606041] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 59.610866] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 59.617103] Kernel Offset: disabled [ 59.620727] Rebooting in 86400 seconds..