[ OK ] Started OpenBSD Secure Shell server. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.59' (ECDSA) to the list of known hosts. 2020/07/18 08:48:52 fuzzer started 2020/07/18 08:48:53 dialing manager at 10.128.0.26:41463 2020/07/18 08:48:53 syscalls: 2944 2020/07/18 08:48:53 code coverage: enabled 2020/07/18 08:48:53 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2020/07/18 08:48:53 extra coverage: enabled 2020/07/18 08:48:53 setuid sandbox: enabled 2020/07/18 08:48:53 namespace sandbox: enabled 2020/07/18 08:48:53 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/18 08:48:53 fault injection: enabled 2020/07/18 08:48:53 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/18 08:48:53 net packet injection: enabled 2020/07/18 08:48:53 net device setup: enabled 2020/07/18 08:48:53 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/07/18 08:48:53 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/18 08:48:53 USB emulation: /dev/raw-gadget does not exist 08:52:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f0000000040)) syzkaller login: [ 390.359180][ T8475] IPVS: ftp: loaded support on port[0] = 21 [ 390.614539][ T8475] chnl_net:caif_netlink_parms(): no params data found [ 390.865474][ T8475] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.873944][ T8475] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.883270][ T8475] device bridge_slave_0 entered promiscuous mode [ 390.897474][ T8475] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.905595][ T8475] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.914956][ T8475] device bridge_slave_1 entered promiscuous mode [ 390.970304][ T8475] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 390.985656][ T8475] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 391.038234][ T8475] team0: Port device team_slave_0 added [ 391.050230][ T8475] team0: Port device team_slave_1 added [ 391.098423][ T8475] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 391.105673][ T8475] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 391.131873][ T8475] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 391.145565][ T8475] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 391.152606][ T8475] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 391.178907][ T8475] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 391.394067][ T8475] device hsr_slave_0 entered promiscuous mode [ 391.434650][ T8475] device hsr_slave_1 entered promiscuous mode [ 391.882426][ T8475] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 391.937552][ T8475] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 391.982118][ T8475] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 392.070351][ T8475] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 392.305025][ T8475] 8021q: adding VLAN 0 to HW filter on device bond0 [ 392.346215][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 392.356237][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 392.389994][ T8475] 8021q: adding VLAN 0 to HW filter on device team0 [ 392.427496][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 392.437179][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 392.449591][ T32] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.457025][ T32] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.505153][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 392.514489][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 392.524341][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 392.534343][ T32] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.541546][ T32] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.550599][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 392.561501][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 392.635493][ T8475] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 392.649427][ T8475] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 392.664270][ T3243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 392.675059][ T3243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 392.685269][ T3243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 392.696399][ T3243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 392.706677][ T3243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 392.716499][ T3243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 392.727005][ T3243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 392.736914][ T3243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 392.748956][ T3243] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 392.759082][ T3243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 392.832340][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 392.840263][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 392.876998][ T8475] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 392.958698][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 392.969507][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 393.017366][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 393.027111][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 393.048642][ T8475] device veth0_vlan entered promiscuous mode [ 393.067016][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 393.076492][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 393.096428][ T8475] device veth1_vlan entered promiscuous mode [ 393.158767][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 393.168525][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 393.178479][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 393.188464][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 393.206703][ T8475] device veth0_macvtap entered promiscuous mode [ 393.227190][ T8475] device veth1_macvtap entered promiscuous mode [ 393.270537][ T8475] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 393.281007][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 393.290957][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 393.303630][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 393.313746][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 393.336300][ T8475] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 393.374131][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 393.384389][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 08:52:59 executing program 0: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = gettid() madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x200e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) ptrace$getregset(0x4205, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB], 0x14f) r2 = syz_open_procfs(r0, &(0x7f0000000100)='net/protocols\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0xa) sendfile(r3, r2, 0x0, 0x7fffffff) [ 393.661449][ T8688] ===================================================== [ 393.668457][ T8688] BUG: KMSAN: uninit-value in nl_fib_input+0x31f/0xdb0 [ 393.675323][ T8688] CPU: 0 PID: 8688 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 393.683912][ T8688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.693982][ T8688] Call Trace: [ 393.697313][ T8688] dump_stack+0x1df/0x240 [ 393.701670][ T8688] kmsan_report+0xf7/0x1e0 [ 393.706119][ T8688] __msan_warning+0x58/0xa0 [ 393.710658][ T8688] nl_fib_input+0x31f/0xdb0 [ 393.715214][ T8688] ? kmsan_get_metadata+0x11d/0x180 [ 393.720557][ T8688] netlink_unicast+0xf9e/0x1100 [ 393.725456][ T8688] ? ip_fib_net_exit+0x630/0x630 [ 393.730465][ T8688] netlink_sendmsg+0x1246/0x14d0 [ 393.735478][ T8688] ? netlink_getsockopt+0x1440/0x1440 [ 393.740945][ T8688] kernel_sendmsg+0x433/0x440 [ 393.745714][ T8688] sock_no_sendpage+0x235/0x300 [ 393.750617][ T8688] ? sock_no_mmap+0x30/0x30 [ 393.755168][ T8688] sock_sendpage+0x1e1/0x2c0 [ 393.759809][ T8688] pipe_to_sendpage+0x38c/0x4c0 [ 393.764690][ T8688] ? sock_fasync+0x250/0x250 [ 393.769336][ T8688] __splice_from_pipe+0x565/0xf00 [ 393.774911][ T8688] ? generic_splice_sendpage+0x2d0/0x2d0 [ 393.780617][ T8688] generic_splice_sendpage+0x1d5/0x2d0 [ 393.786121][ T8688] ? iter_file_splice_write+0x1800/0x1800 [ 393.791863][ T8688] direct_splice_actor+0x1fd/0x580 [ 393.797007][ T8688] ? kmsan_get_metadata+0x4f/0x180 [ 393.802159][ T8688] splice_direct_to_actor+0x6b2/0xf50 [ 393.807546][ T8688] ? do_splice_direct+0x580/0x580 [ 393.812616][ T8688] do_splice_direct+0x342/0x580 [ 393.817519][ T8688] do_sendfile+0x101b/0x1d40 [ 393.822182][ T8688] __se_sys_sendfile64+0x2bb/0x360 [ 393.827318][ T8688] ? kmsan_get_metadata+0x4f/0x180 [ 393.832455][ T8688] __x64_sys_sendfile64+0x56/0x70 [ 393.837577][ T8688] do_syscall_64+0xb0/0x150 [ 393.842162][ T8688] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 393.848069][ T8688] RIP: 0033:0x45c1d9 [ 393.851964][ T8688] Code: Bad RIP value. [ 393.856037][ T8688] RSP: 002b:00007fef52f75c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 393.864465][ T8688] RAX: ffffffffffffffda RBX: 0000000000025a00 RCX: 000000000045c1d9 [ 393.872452][ T8688] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000006 [ 393.880445][ T8688] RBP: 000000000078bfe8 R08: 0000000000000000 R09: 0000000000000000 [ 393.888441][ T8688] R10: 000000007fffffff R11: 0000000000000246 R12: 000000000078bfac [ 393.896438][ T8688] R13: 0000000000c9fb6f R14: 00007fef52f769c0 R15: 000000000078bfac [ 393.904448][ T8688] [ 393.906785][ T8688] Uninit was stored to memory at: [ 393.911830][ T8688] kmsan_internal_chain_origin+0xad/0x130 [ 393.917568][ T8688] kmsan_memcpy_memmove_metadata+0x272/0x2e0 [ 393.923566][ T8688] kmsan_memcpy_metadata+0xb/0x10 [ 393.928640][ T8688] __msan_memcpy+0x43/0x50 [ 393.933072][ T8688] _copy_from_iter_full+0xbfe/0x13b0 [ 393.938395][ T8688] netlink_sendmsg+0xfaa/0x14d0 [ 393.943258][ T8688] kernel_sendmsg+0x433/0x440 [ 393.947945][ T8688] sock_no_sendpage+0x235/0x300 [ 393.952810][ T8688] sock_sendpage+0x1e1/0x2c0 [ 393.957411][ T8688] pipe_to_sendpage+0x38c/0x4c0 [ 393.962275][ T8688] __splice_from_pipe+0x565/0xf00 [ 393.967305][ T8688] generic_splice_sendpage+0x1d5/0x2d0 [ 393.972771][ T8688] direct_splice_actor+0x1fd/0x580 [ 393.977892][ T8688] splice_direct_to_actor+0x6b2/0xf50 [ 393.983271][ T8688] do_splice_direct+0x342/0x580 [ 393.988129][ T8688] do_sendfile+0x101b/0x1d40 [ 393.992731][ T8688] __se_sys_sendfile64+0x2bb/0x360 [ 393.997853][ T8688] __x64_sys_sendfile64+0x56/0x70 [ 394.002895][ T8688] do_syscall_64+0xb0/0x150 [ 394.007415][ T8688] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 394.013304][ T8688] [ 394.015633][ T8688] Uninit was created at: [ 394.019910][ T8688] kmsan_save_stack_with_flags+0x3c/0x90 [ 394.025564][ T8688] kmsan_alloc_page+0xb9/0x180 [ 394.030344][ T8688] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 394.035911][ T8688] alloc_pages_current+0x672/0x990 [ 394.041034][ T8688] push_pipe+0x605/0xb70 [ 394.045288][ T8688] iov_iter_get_pages_alloc+0x18a9/0x21c0 [ 394.051022][ T8688] do_splice_to+0x4fc/0x14f0 [ 394.055647][ T8688] splice_direct_to_actor+0x45c/0xf50 [ 394.061041][ T8688] do_splice_direct+0x342/0x580 [ 394.066002][ T8688] do_sendfile+0x101b/0x1d40 [ 394.070612][ T8688] __se_sys_sendfile64+0x2bb/0x360 [ 394.075740][ T8688] __x64_sys_sendfile64+0x56/0x70 [ 394.080783][ T8688] do_syscall_64+0xb0/0x150 [ 394.085309][ T8688] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 394.091197][ T8688] ===================================================== [ 394.098128][ T8688] Disabling lock debugging due to kernel taint [ 394.104283][ T8688] Kernel panic - not syncing: panic_on_warn set ... [ 394.110883][ T8688] CPU: 0 PID: 8688 Comm: syz-executor.0 Tainted: G B 5.8.0-rc5-syzkaller #0 [ 394.120943][ T8688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.131000][ T8688] Call Trace: [ 394.134310][ T8688] dump_stack+0x1df/0x240 [ 394.138661][ T8688] panic+0x3d5/0xc3e [ 394.142606][ T8688] kmsan_report+0x1df/0x1e0 [ 394.147140][ T8688] __msan_warning+0x58/0xa0 [ 394.151672][ T8688] nl_fib_input+0x31f/0xdb0 [ 394.156226][ T8688] ? kmsan_get_metadata+0x11d/0x180 [ 394.161457][ T8688] netlink_unicast+0xf9e/0x1100 [ 394.166333][ T8688] ? ip_fib_net_exit+0x630/0x630 [ 394.171298][ T8688] netlink_sendmsg+0x1246/0x14d0 [ 394.176283][ T8688] ? netlink_getsockopt+0x1440/0x1440 [ 394.181731][ T8688] kernel_sendmsg+0x433/0x440 [ 394.186454][ T8688] sock_no_sendpage+0x235/0x300 [ 394.191349][ T8688] ? sock_no_mmap+0x30/0x30 [ 394.196049][ T8688] sock_sendpage+0x1e1/0x2c0 [ 394.200679][ T8688] pipe_to_sendpage+0x38c/0x4c0 [ 394.205560][ T8688] ? sock_fasync+0x250/0x250 [ 394.210197][ T8688] __splice_from_pipe+0x565/0xf00 [ 394.215251][ T8688] ? generic_splice_sendpage+0x2d0/0x2d0 [ 394.220955][ T8688] generic_splice_sendpage+0x1d5/0x2d0 [ 394.226465][ T8688] ? iter_file_splice_write+0x1800/0x1800 [ 394.232211][ T8688] direct_splice_actor+0x1fd/0x580 [ 394.237359][ T8688] ? kmsan_get_metadata+0x4f/0x180 [ 394.242491][ T8688] splice_direct_to_actor+0x6b2/0xf50 [ 394.247877][ T8688] ? do_splice_direct+0x580/0x580 [ 394.252974][ T8688] do_splice_direct+0x342/0x580 [ 394.257862][ T8688] do_sendfile+0x101b/0x1d40 [ 394.262522][ T8688] __se_sys_sendfile64+0x2bb/0x360 [ 394.267648][ T8688] ? kmsan_get_metadata+0x4f/0x180 [ 394.272779][ T8688] __x64_sys_sendfile64+0x56/0x70 [ 394.277815][ T8688] do_syscall_64+0xb0/0x150 [ 394.282331][ T8688] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 394.288225][ T8688] RIP: 0033:0x45c1d9 [ 394.292113][ T8688] Code: Bad RIP value. [ 394.296187][ T8688] RSP: 002b:00007fef52f75c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 394.304616][ T8688] RAX: ffffffffffffffda RBX: 0000000000025a00 RCX: 000000000045c1d9 [ 394.312627][ T8688] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000006 [ 394.320615][ T8688] RBP: 000000000078bfe8 R08: 0000000000000000 R09: 0000000000000000 [ 394.328601][ T8688] R10: 000000007fffffff R11: 0000000000000246 R12: 000000000078bfac [ 394.336594][ T8688] R13: 0000000000c9fb6f R14: 00007fef52f769c0 R15: 000000000078bfac [ 394.345689][ T8688] Kernel Offset: 0x5400000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 394.357391][ T8688] Rebooting in 86400 seconds..