[info] Using makefile-style concurrent boot in runlevel 2. [ 25.074854] audit: type=1800 audit(1541218605.923:21): pid=5526 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 36.323322] sshd (5666) used greatest stack depth: 15744 bytes left Warning: Permanently added '10.128.0.101' (ECDSA) to the list of known hosts. [ 46.125331] IPVS: ftp: loaded support on port[0] = 21 [ 46.285654] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.292478] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.300106] device bridge_slave_0 entered promiscuous mode [ 46.318334] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.324998] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.331954] device bridge_slave_1 entered promiscuous mode [ 46.350149] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.368293] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.419497] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 46.440392] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 46.516216] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 46.523469] team0: Port device team_slave_0 added [ 46.539567] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 46.546770] team0: Port device team_slave_1 added [ 46.564778] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 46.584593] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 46.603323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.624663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 46.771080] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.777541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.784574] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.790946] bridge0: port 1(bridge_slave_0) entered forwarding state RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument [ 47.303261] 8021q: adding VLAN 0 to HW filter on device bond0 [ 47.355353] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 47.407471] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 47.413728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.420930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.465470] 8021q: adding VLAN 0 to HW filter on device team0 executing program [ 47.754468] ================================================================== [ 47.761946] BUG: KASAN: slab-out-of-bounds in ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 47.769729] Read of size 1 at addr ffff8801badc3487 by task syz-executor342/5686 [ 47.777240] [ 47.778917] CPU: 0 PID: 5686 Comm: syz-executor342 Not tainted 4.19.0-next-20181102+ #104 [ 47.787264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 47.796609] Call Trace: [ 47.799193] dump_stack+0x244/0x39d [ 47.802811] ? dump_stack_print_info.cold.1+0x20/0x20 [ 47.807991] ? printk+0xa7/0xcf [ 47.811267] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 47.816026] print_address_description.cold.7+0x9/0x1ff [ 47.821439] kasan_report.cold.8+0x242/0x309 [ 47.825843] ? ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 47.830934] __asan_report_load1_noabort+0x14/0x20 [ 47.835855] ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 47.840779] ip6_tnl_start_xmit+0x49f/0x25a0 [ 47.845175] ? ip6_tnl_xmit+0x3730/0x3730 [ 47.849363] ? mark_held_locks+0x130/0x130 [ 47.853588] ? zap_class+0x640/0x640 [ 47.857289] ? __lock_acquire+0x62f/0x4c20 [ 47.861511] ? zap_class+0x640/0x640 [ 47.865284] ? zap_class+0x640/0x640 [ 47.869002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 47.874531] ? check_preemption_disabled+0x48/0x280 [ 47.879542] ? __lock_is_held+0xb5/0x140 [ 47.883597] dev_hard_start_xmit+0x290/0xc80 [ 47.888001] ? dev_direct_xmit+0x6b0/0x6b0 [ 47.892226] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 47.897748] ? netif_skb_features+0x690/0xb70 [ 47.902226] ? rcu_softirq_qs+0x20/0x20 [ 47.906195] ? validate_xmit_xfrm+0x1ef/0xda0 [ 47.910734] ? validate_xmit_skb+0x80c/0xf30 [ 47.915139] ? netif_skb_features+0xb70/0xb70 [ 47.919617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 47.925277] ? check_preemption_disabled+0x48/0x280 [ 47.930298] ? check_preemption_disabled+0x48/0x280 [ 47.935313] __dev_queue_xmit+0x2f9d/0x3ac0 [ 47.939628] ? save_stack+0x43/0xd0 [ 47.943242] ? kasan_kmalloc+0xc7/0xe0 [ 47.947117] ? __kmalloc_node_track_caller+0x50/0x70 [ 47.952211] ? netdev_pick_tx+0x310/0x310 [ 47.956353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 47.961876] ? check_preemption_disabled+0x48/0x280 [ 47.966888] ? __lock_is_held+0xb5/0x140 [ 47.970940] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 47.975953] ? skb_release_data+0x1c4/0x880 [ 47.980276] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 47.985548] ? kasan_unpoison_shadow+0x35/0x50 [ 47.990121] ? skb_tx_error+0x2f0/0x2f0 [ 47.994093] ? __kmalloc_node_track_caller+0x50/0x70 [ 47.999196] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 48.004730] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 48.010365] ? kasan_check_write+0x14/0x20 [ 48.014593] ? pskb_expand_head+0x6b3/0x10f0 [ 48.018997] ? skb_release_data+0x880/0x880 [ 48.023301] ? __alloc_skb+0x770/0x770 [ 48.027188] ? __lock_is_held+0xb5/0x140 [ 48.031317] ? kasan_check_write+0x14/0x20 [ 48.035547] ? __skb_clone+0x6c7/0xa00 [ 48.039431] ? __copy_skb_header+0x6b0/0x6b0 [ 48.043833] ? kmem_cache_alloc+0x33a/0x730 [ 48.048191] ? depot_save_stack+0x292/0x470 [ 48.052508] ? skb_ensure_writable+0x15e/0x640 [ 48.057081] dev_queue_xmit+0x17/0x20 [ 48.060877] ? dev_queue_xmit+0x17/0x20 [ 48.064841] __bpf_redirect+0x5cf/0xb20 [ 48.068813] bpf_clone_redirect+0x2f6/0x490 [ 48.073131] bpf_prog_759a992c578a3894+0xc72/0x1000 [ 48.078137] ? bpf_test_run+0x175/0x780 [ 48.082106] ? lock_downgrade+0x900/0x900 [ 48.086244] ? ktime_get+0x332/0x400 [ 48.089951] ? find_held_lock+0x36/0x1c0 [ 48.094000] ? lock_acquire+0x1ed/0x520 [ 48.097968] ? bpf_test_run+0x3cb/0x780 [ 48.101957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 48.107488] ? check_preemption_disabled+0x48/0x280 [ 48.112505] ? kasan_check_read+0x11/0x20 [ 48.116644] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 48.121913] ? rcu_softirq_qs+0x20/0x20 [ 48.125877] ? bpf_cgroup_storage_release+0x220/0x220 [ 48.131055] ? skb_try_coalesce+0x1b70/0x1b70 [ 48.135611] ? bpf_test_run+0x25d/0x780 [ 48.139585] ? netlink_diag_dump+0x2a0/0x2a0 [ 48.143985] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 48.149507] ? bpf_test_init.isra.10+0x70/0x100 [ 48.154173] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 48.158935] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 48.163768] ? bpf_prog_add+0x69/0xd0 [ 48.167568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 48.173138] ? __bpf_prog_get+0x9b/0x290 [ 48.177195] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 48.182027] ? bpf_prog_test_run+0x130/0x1a0 [ 48.186427] ? __x64_sys_bpf+0x3d8/0x520 [ 48.190473] ? bpf_prog_get+0x20/0x20 [ 48.194272] ? do_syscall_64+0x1b9/0x820 [ 48.198327] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 48.203688] ? syscall_return_slowpath+0x5e0/0x5e0 [ 48.208606] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 48.213444] ? trace_hardirqs_on_caller+0x310/0x310 [ 48.218451] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 48.223454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 48.228978] ? prepare_exit_to_usermode+0x291/0x3b0 [ 48.234008] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 48.238846] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 48.244340] [ 48.245952] Allocated by task 5686: [ 48.249618] save_stack+0x43/0xd0 [ 48.253070] kasan_kmalloc+0xc7/0xe0 [ 48.256771] __kmalloc_node_track_caller+0x50/0x70 [ 48.261696] __kmalloc_reserve.isra.40+0x41/0xe0 [ 48.266440] pskb_expand_head+0x230/0x10f0 [ 48.270659] skb_ensure_writable+0x3dd/0x640 [ 48.275059] bpf_clone_redirect+0x14a/0x490 [ 48.279368] bpf_prog_759a992c578a3894+0xc72/0x1000 [ 48.284365] [ 48.285977] Freed by task 3502: [ 48.289242] save_stack+0x43/0xd0 [ 48.292682] __kasan_slab_free+0x102/0x150 [ 48.296905] kasan_slab_free+0xe/0x10 [ 48.300696] kfree+0xcf/0x230 [ 48.303789] skb_free_head+0x99/0xc0 [ 48.307556] skb_release_data+0x6a4/0x880 [ 48.311702] skb_release_all+0x4a/0x60 [ 48.315581] consume_skb+0x1a9/0x560 [ 48.319292] skb_free_datagram+0x1a/0xf0 [ 48.323345] unix_dgram_recvmsg+0xd6d/0x1b10 [ 48.327857] sock_recvmsg+0xd0/0x110 [ 48.331625] __sys_recvfrom+0x311/0x5d0 [ 48.335594] __x64_sys_recvfrom+0xe1/0x1a0 [ 48.339814] do_syscall_64+0x1b9/0x820 [ 48.343692] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 48.348927] [ 48.350547] The buggy address belongs to the object at ffff8801badc3280 [ 48.350547] which belongs to the cache kmalloc-512 of size 512 [ 48.363298] The buggy address is located 7 bytes to the right of [ 48.363298] 512-byte region [ffff8801badc3280, ffff8801badc3480) [ 48.375553] The buggy address belongs to the page: [ 48.380473] page:ffffea0006eb70c0 count:1 mapcount:0 mapping:ffff8801da800940 index:0x0 [ 48.388601] flags: 0x2fffc0000000200(slab) [ 48.392840] raw: 02fffc0000000200 ffffea0006fad288 ffffea0006eb8688 ffff8801da800940 [ 48.400712] raw: 0000000000000000 ffff8801badc3000 0000000100000006 0000000000000000 [ 48.408579] page dumped because: kasan: bad access detected [ 48.414274] [ 48.415885] Memory state around the buggy address: [ 48.420803] ffff8801badc3380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.428153] ffff8801badc3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.435499] >ffff8801badc3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.442843] ^ [ 48.446205] ffff8801badc3500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.453552] ffff8801badc3580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.460896] ================================================================== [ 48.468243] Disabling lock debugging due to kernel taint [ 48.473744] Kernel panic - not syncing: panic_on_warn set ... [ 48.479658] CPU: 0 PID: 5686 Comm: syz-executor342 Tainted: G B 4.19.0-next-20181102+ #104 [ 48.489360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 48.498698] Call Trace: [ 48.501276] dump_stack+0x244/0x39d [ 48.504895] ? dump_stack_print_info.cold.1+0x20/0x20 [ 48.510074] panic+0x2ad/0x55c [ 48.513249] ? add_taint.cold.5+0x16/0x16 [ 48.517387] ? trace_hardirqs_on+0xb4/0x310 [ 48.521701] kasan_end_report+0x47/0x4f [ 48.525663] kasan_report.cold.8+0x76/0x309 [ 48.529972] ? ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 48.535063] __asan_report_load1_noabort+0x14/0x20 [ 48.539987] ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 48.544911] ip6_tnl_start_xmit+0x49f/0x25a0 [ 48.549313] ? ip6_tnl_xmit+0x3730/0x3730 [ 48.553454] ? mark_held_locks+0x130/0x130 [ 48.557674] ? zap_class+0x640/0x640 [ 48.561372] ? __lock_acquire+0x62f/0x4c20 [ 48.565693] ? zap_class+0x640/0x640 [ 48.569422] ? zap_class+0x640/0x640 [ 48.573131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 48.578659] ? check_preemption_disabled+0x48/0x280 [ 48.583678] ? __lock_is_held+0xb5/0x140 [ 48.587741] dev_hard_start_xmit+0x290/0xc80 [ 48.592144] ? dev_direct_xmit+0x6b0/0x6b0 [ 48.596374] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 48.601903] ? netif_skb_features+0x690/0xb70 [ 48.606384] ? rcu_softirq_qs+0x20/0x20 [ 48.610348] ? validate_xmit_xfrm+0x1ef/0xda0 [ 48.614832] ? validate_xmit_skb+0x80c/0xf30 [ 48.619238] ? netif_skb_features+0xb70/0xb70 [ 48.623727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 48.629257] ? check_preemption_disabled+0x48/0x280 [ 48.634269] ? check_preemption_disabled+0x48/0x280 [ 48.639284] __dev_queue_xmit+0x2f9d/0x3ac0 [ 48.643642] ? save_stack+0x43/0xd0 [ 48.647262] ? kasan_kmalloc+0xc7/0xe0 [ 48.651200] ? __kmalloc_node_track_caller+0x50/0x70 [ 48.656298] ? netdev_pick_tx+0x310/0x310 [ 48.660436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 48.665961] ? check_preemption_disabled+0x48/0x280 [ 48.670963] ? __lock_is_held+0xb5/0x140 [ 48.675012] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 48.680019] ? skb_release_data+0x1c4/0x880 [ 48.684325] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 48.689593] ? kasan_unpoison_shadow+0x35/0x50 [ 48.694166] ? skb_tx_error+0x2f0/0x2f0 [ 48.698127] ? __kmalloc_node_track_caller+0x50/0x70 [ 48.703222] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 48.708750] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 48.714281] ? kasan_check_write+0x14/0x20 [ 48.718501] ? pskb_expand_head+0x6b3/0x10f0 [ 48.722896] ? skb_release_data+0x880/0x880 [ 48.727218] ? __alloc_skb+0x770/0x770 [ 48.731094] ? __lock_is_held+0xb5/0x140 [ 48.735145] ? kasan_check_write+0x14/0x20 [ 48.739363] ? __skb_clone+0x6c7/0xa00 [ 48.743230] ? __copy_skb_header+0x6b0/0x6b0 [ 48.747619] ? kmem_cache_alloc+0x33a/0x730 [ 48.751924] ? depot_save_stack+0x292/0x470 [ 48.756231] ? skb_ensure_writable+0x15e/0x640 [ 48.760800] dev_queue_xmit+0x17/0x20 [ 48.764582] ? dev_queue_xmit+0x17/0x20 [ 48.768536] __bpf_redirect+0x5cf/0xb20 [ 48.772494] bpf_clone_redirect+0x2f6/0x490 [ 48.776804] bpf_prog_759a992c578a3894+0xc72/0x1000 [ 48.781807] ? bpf_test_run+0x175/0x780 [ 48.785769] ? lock_downgrade+0x900/0x900 [ 48.789900] ? ktime_get+0x332/0x400 [ 48.793609] ? find_held_lock+0x36/0x1c0 [ 48.797666] ? lock_acquire+0x1ed/0x520 [ 48.801622] ? bpf_test_run+0x3cb/0x780 [ 48.805596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 48.811114] ? check_preemption_disabled+0x48/0x280 [ 48.816119] ? kasan_check_read+0x11/0x20 [ 48.820250] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 48.825508] ? rcu_softirq_qs+0x20/0x20 [ 48.829463] ? bpf_cgroup_storage_release+0x220/0x220 [ 48.834659] ? skb_try_coalesce+0x1b70/0x1b70 [ 48.839143] ? bpf_test_run+0x25d/0x780 [ 48.843106] ? netlink_diag_dump+0x2a0/0x2a0 [ 48.847519] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 48.853037] ? bpf_test_init.isra.10+0x70/0x100 [ 48.857691] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 48.862436] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 48.867275] ? bpf_prog_add+0x69/0xd0 [ 48.871072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 48.876592] ? __bpf_prog_get+0x9b/0x290 [ 48.880637] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 48.885460] ? bpf_prog_test_run+0x130/0x1a0 [ 48.889848] ? __x64_sys_bpf+0x3d8/0x520 [ 48.893894] ? bpf_prog_get+0x20/0x20 [ 48.897685] ? do_syscall_64+0x1b9/0x820 [ 48.901728] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 48.907072] ? syscall_return_slowpath+0x5e0/0x5e0 [ 48.911984] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 48.916814] ? trace_hardirqs_on_caller+0x310/0x310 [ 48.921852] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 48.926868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 48.932390] ? prepare_exit_to_usermode+0x291/0x3b0 [ 48.937394] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 48.942227] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 48.948428] Kernel Offset: disabled [ 48.952049] Rebooting in 86400 seconds..