[info] Using makefile-style concurrent boot in runlevel 2. [ 23.804141] audit: type=1800 audit(1541366820.146:21): pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [ 23.829113] audit: type=1800 audit(1541366820.146:22): pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2447 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.57' (ECDSA) to the list of known hosts. syzkaller login: [ 40.015904] IPVS: ftp: loaded support on port[0] = 21 [ 40.171141] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.177979] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.185366] device bridge_slave_0 entered promiscuous mode [ 40.204599] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.211404] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.219080] device bridge_slave_1 entered promiscuous mode [ 40.243419] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 40.261156] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 40.310202] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 40.331555] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 40.410562] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 40.417871] team0: Port device team_slave_0 added [ 40.434664] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 40.441812] team0: Port device team_slave_1 added [ 40.459947] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 40.479544] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 40.498978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 40.519232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 40.663425] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.669921] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.676819] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.683232] bridge0: port 1(bridge_slave_0) entered forwarding state RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument [ 41.186353] 8021q: adding VLAN 0 to HW filter on device bond0 [ 41.237427] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 41.288388] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 41.294550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.302679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.347814] 8021q: adding VLAN 0 to HW filter on device team0 executing program [ 41.610654] ================================================================== [ 41.618138] BUG: KASAN: slab-out-of-bounds in ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 41.626023] Read of size 1 at addr ffff8801c9cf3a47 by task syz-executor052/5645 [ 41.633530] [ 41.635141] CPU: 1 PID: 5645 Comm: syz-executor052 Not tainted 4.19.0+ #97 [ 41.642129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.651465] Call Trace: [ 41.654041] dump_stack+0x244/0x39d [ 41.657663] ? dump_stack_print_info.cold.1+0x20/0x20 [ 41.662856] ? printk+0xa7/0xcf [ 41.666115] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 41.670853] print_address_description.cold.7+0x9/0x1ff [ 41.676198] kasan_report.cold.8+0x242/0x309 [ 41.680607] ? ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 41.685701] __asan_report_load1_noabort+0x14/0x20 [ 41.690609] ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 41.695531] ip6_tnl_start_xmit+0x49f/0x25a0 [ 41.699922] ? ip6_tnl_xmit+0x3730/0x3730 [ 41.704076] ? mark_held_locks+0x130/0x130 [ 41.708297] ? zap_class+0x640/0x640 [ 41.712009] ? __lock_acquire+0x62f/0x4c20 [ 41.716242] ? zap_class+0x640/0x640 [ 41.719959] ? zap_class+0x640/0x640 [ 41.723654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 41.729202] ? check_preemption_disabled+0x48/0x280 [ 41.734218] ? __lock_is_held+0xb5/0x140 [ 41.738276] dev_hard_start_xmit+0x295/0xc90 [ 41.742669] ? dev_direct_xmit+0x6b0/0x6b0 [ 41.746896] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 41.752535] ? netif_skb_features+0x690/0xb70 [ 41.757013] ? rcu_softirq_qs+0x20/0x20 [ 41.760983] ? validate_xmit_xfrm+0x1ef/0xda0 [ 41.765467] ? validate_xmit_skb+0x80c/0xf30 [ 41.769859] ? netif_skb_features+0xb70/0xb70 [ 41.774369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 41.779889] ? check_preemption_disabled+0x48/0x280 [ 41.784930] ? check_preemption_disabled+0x48/0x280 [ 41.789935] __dev_queue_xmit+0x2f71/0x3ad0 [ 41.794253] ? save_stack+0x43/0xd0 [ 41.797862] ? kasan_kmalloc+0xc7/0xe0 [ 41.801732] ? __kmalloc_node_track_caller+0x50/0x70 [ 41.806847] ? netdev_pick_tx+0x310/0x310 [ 41.811006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 41.816635] ? check_preemption_disabled+0x48/0x280 [ 41.821638] ? __lock_is_held+0xb5/0x140 [ 41.825690] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 41.830711] ? skb_release_data+0x1c4/0x880 [ 41.835030] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 41.840290] ? kasan_unpoison_shadow+0x35/0x50 [ 41.844893] ? skb_tx_error+0x2f0/0x2f0 [ 41.848857] ? __kmalloc_node_track_caller+0x50/0x70 [ 41.853946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 41.859468] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 41.865077] ? kasan_check_write+0x14/0x20 [ 41.869310] ? pskb_expand_head+0x6b3/0x10f0 [ 41.873705] ? find_held_lock+0x36/0x1c0 [ 41.877759] ? skb_release_data+0x880/0x880 [ 41.882065] ? __alloc_skb+0x770/0x770 [ 41.885938] ? __lock_is_held+0xb5/0x140 [ 41.889985] ? kasan_check_write+0x14/0x20 [ 41.894214] ? __skb_clone+0x6c7/0xa00 [ 41.898083] ? __copy_skb_header+0x6b0/0x6b0 [ 41.902470] ? kmem_cache_alloc+0x33a/0x730 [ 41.906774] ? depot_save_stack+0x292/0x470 [ 41.911082] ? skb_ensure_writable+0x15e/0x640 [ 41.915676] dev_queue_xmit+0x17/0x20 [ 41.919478] ? dev_queue_xmit+0x17/0x20 [ 41.923450] __bpf_redirect+0x5cf/0xb20 [ 41.927424] bpf_clone_redirect+0x2f6/0x490 [ 41.931733] bpf_prog_759a992c578a3894+0xcba/0x1000 [ 41.936740] ? bpf_test_run+0x175/0x780 [ 41.940697] ? lock_downgrade+0x900/0x900 [ 41.944827] ? ktime_get+0x332/0x400 [ 41.948542] ? find_held_lock+0x36/0x1c0 [ 41.952607] ? lock_acquire+0x1ed/0x520 [ 41.956564] ? bpf_test_run+0x3cb/0x780 [ 41.960522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 41.966052] ? check_preemption_disabled+0x48/0x280 [ 41.971052] ? kasan_check_read+0x11/0x20 [ 41.975371] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 41.980633] ? rcu_softirq_qs+0x20/0x20 [ 41.984605] ? bpf_cgroup_storage_release+0x220/0x220 [ 41.989781] ? skb_try_coalesce+0x1b70/0x1b70 [ 41.994271] ? bpf_test_run+0x25d/0x780 [ 41.998240] ? netlink_diag_dump+0x2a0/0x2a0 [ 42.002632] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 42.008157] ? bpf_test_init.isra.10+0x70/0x100 [ 42.012816] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 42.017562] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 42.022400] ? bpf_prog_add+0x69/0xd0 [ 42.026206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 42.031728] ? __bpf_prog_get+0x9b/0x290 [ 42.035777] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 42.040618] ? bpf_prog_test_run+0x130/0x1a0 [ 42.045025] ? __x64_sys_bpf+0x3d8/0x520 [ 42.049161] ? bpf_prog_get+0x20/0x20 [ 42.052954] ? do_syscall_64+0x1b9/0x820 [ 42.056999] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 42.062363] ? syscall_return_slowpath+0x5e0/0x5e0 [ 42.067275] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 42.072108] ? trace_hardirqs_on_caller+0x310/0x310 [ 42.077121] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 42.082123] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 42.087643] ? prepare_exit_to_usermode+0x291/0x3b0 [ 42.092691] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 42.097541] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 42.102904] [ 42.104516] Allocated by task 5645: [ 42.108124] save_stack+0x43/0xd0 [ 42.111572] kasan_kmalloc+0xc7/0xe0 [ 42.115269] __kmalloc_node_track_caller+0x50/0x70 [ 42.120185] __kmalloc_reserve.isra.40+0x41/0xe0 [ 42.124921] pskb_expand_head+0x230/0x10f0 [ 42.129148] skb_ensure_writable+0x3dd/0x640 [ 42.133536] bpf_clone_redirect+0x14a/0x490 [ 42.137854] bpf_prog_759a992c578a3894+0xcba/0x1000 [ 42.142868] [ 42.144481] Freed by task 4267: [ 42.147743] save_stack+0x43/0xd0 [ 42.151181] __kasan_slab_free+0x102/0x150 [ 42.155396] kasan_slab_free+0xe/0x10 [ 42.159200] kfree+0xcf/0x230 [ 42.162291] load_elf_binary+0x25b4/0x5620 [ 42.166507] search_binary_handler+0x17d/0x570 [ 42.171070] __do_execve_file.isra.33+0x1661/0x25d0 [ 42.176066] __x64_sys_execve+0x8f/0xc0 [ 42.180025] do_syscall_64+0x1b9/0x820 [ 42.183895] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 42.189072] [ 42.190687] The buggy address belongs to the object at ffff8801c9cf3840 [ 42.190687] which belongs to the cache kmalloc-512 of size 512 [ 42.203328] The buggy address is located 7 bytes to the right of [ 42.203328] 512-byte region [ffff8801c9cf3840, ffff8801c9cf3a40) [ 42.215528] The buggy address belongs to the page: [ 42.220441] page:ffffea0007273cc0 count:1 mapcount:0 mapping:ffff8801da800940 index:0x0 [ 42.228566] flags: 0x2fffc0000000200(slab) [ 42.232803] raw: 02fffc0000000200 ffffea0007273b48 ffffea0007264388 ffff8801da800940 [ 42.240784] raw: 0000000000000000 ffff8801c9cf30c0 0000000100000006 0000000000000000 [ 42.248658] page dumped because: kasan: bad access detected [ 42.254349] [ 42.255970] Memory state around the buggy address: [ 42.260878] ffff8801c9cf3900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.268225] ffff8801c9cf3980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.275567] >ffff8801c9cf3a00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 42.282908] ^ [ 42.288376] ffff8801c9cf3a80: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 42.295718] ffff8801c9cf3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.303052] ================================================================== [ 42.310386] Disabling lock debugging due to kernel taint [ 42.315877] Kernel panic - not syncing: panic_on_warn set ... [ 42.321778] CPU: 1 PID: 5645 Comm: syz-executor052 Tainted: G B 4.19.0+ #97 [ 42.330168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 42.339513] Call Trace: [ 42.342086] dump_stack+0x244/0x39d [ 42.345694] ? dump_stack_print_info.cold.1+0x20/0x20 [ 42.350871] panic+0x2ad/0x55c [ 42.354072] ? add_taint.cold.5+0x16/0x16 [ 42.358220] ? trace_hardirqs_on+0xb4/0x310 [ 42.362527] kasan_end_report+0x47/0x4f [ 42.366480] kasan_report.cold.8+0x76/0x309 [ 42.370782] ? ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 42.375866] __asan_report_load1_noabort+0x14/0x20 [ 42.380791] ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 42.385707] ip6_tnl_start_xmit+0x49f/0x25a0 [ 42.390096] ? ip6_tnl_xmit+0x3730/0x3730 [ 42.394231] ? mark_held_locks+0x130/0x130 [ 42.398463] ? zap_class+0x640/0x640 [ 42.402160] ? __lock_acquire+0x62f/0x4c20 [ 42.406378] ? zap_class+0x640/0x640 [ 42.410089] ? zap_class+0x640/0x640 [ 42.413784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 42.419310] ? check_preemption_disabled+0x48/0x280 [ 42.424320] ? __lock_is_held+0xb5/0x140 [ 42.428371] dev_hard_start_xmit+0x295/0xc90 [ 42.432775] ? dev_direct_xmit+0x6b0/0x6b0 [ 42.436992] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 42.442520] ? netif_skb_features+0x690/0xb70 [ 42.447014] ? rcu_softirq_qs+0x20/0x20 [ 42.450967] ? validate_xmit_xfrm+0x1ef/0xda0 [ 42.455443] ? validate_xmit_skb+0x80c/0xf30 [ 42.459832] ? netif_skb_features+0xb70/0xb70 [ 42.464306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 42.469848] ? check_preemption_disabled+0x48/0x280 [ 42.474843] ? check_preemption_disabled+0x48/0x280 [ 42.479841] __dev_queue_xmit+0x2f71/0x3ad0 [ 42.484156] ? save_stack+0x43/0xd0 [ 42.487762] ? kasan_kmalloc+0xc7/0xe0 [ 42.491664] ? __kmalloc_node_track_caller+0x50/0x70 [ 42.496771] ? netdev_pick_tx+0x310/0x310 [ 42.500900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 42.506455] ? check_preemption_disabled+0x48/0x280 [ 42.511460] ? __lock_is_held+0xb5/0x140 [ 42.515502] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 42.520515] ? skb_release_data+0x1c4/0x880 [ 42.524845] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 42.530106] ? kasan_unpoison_shadow+0x35/0x50 [ 42.534681] ? skb_tx_error+0x2f0/0x2f0 [ 42.538654] ? __kmalloc_node_track_caller+0x50/0x70 [ 42.543756] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 42.549274] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 42.554792] ? kasan_check_write+0x14/0x20 [ 42.559008] ? pskb_expand_head+0x6b3/0x10f0 [ 42.563426] ? find_held_lock+0x36/0x1c0 [ 42.567468] ? skb_release_data+0x880/0x880 [ 42.571770] ? __alloc_skb+0x770/0x770 [ 42.575645] ? __lock_is_held+0xb5/0x140 [ 42.579707] ? kasan_check_write+0x14/0x20 [ 42.583922] ? __skb_clone+0x6c7/0xa00 [ 42.587789] ? __copy_skb_header+0x6b0/0x6b0 [ 42.592350] ? kmem_cache_alloc+0x33a/0x730 [ 42.596653] ? depot_save_stack+0x292/0x470 [ 42.600961] ? skb_ensure_writable+0x15e/0x640 [ 42.605528] dev_queue_xmit+0x17/0x20 [ 42.609306] ? dev_queue_xmit+0x17/0x20 [ 42.613264] __bpf_redirect+0x5cf/0xb20 [ 42.617222] bpf_clone_redirect+0x2f6/0x490 [ 42.621525] bpf_prog_759a992c578a3894+0xcba/0x1000 [ 42.626539] ? bpf_test_run+0x175/0x780 [ 42.630535] ? lock_downgrade+0x900/0x900 [ 42.634669] ? ktime_get+0x332/0x400 [ 42.638362] ? find_held_lock+0x36/0x1c0 [ 42.642403] ? lock_acquire+0x1ed/0x520 [ 42.646358] ? bpf_test_run+0x3cb/0x780 [ 42.650314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 42.655831] ? check_preemption_disabled+0x48/0x280 [ 42.660826] ? kasan_check_read+0x11/0x20 [ 42.664952] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 42.670220] ? rcu_softirq_qs+0x20/0x20 [ 42.674190] ? bpf_cgroup_storage_release+0x220/0x220 [ 42.679360] ? skb_try_coalesce+0x1b70/0x1b70 [ 42.683833] ? bpf_test_run+0x25d/0x780 [ 42.687788] ? netlink_diag_dump+0x2a0/0x2a0 [ 42.692174] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 42.697790] ? bpf_test_init.isra.10+0x70/0x100 [ 42.702438] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 42.707172] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 42.711995] ? bpf_prog_add+0x69/0xd0 [ 42.715772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 42.721306] ? __bpf_prog_get+0x9b/0x290 [ 42.725346] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 42.730176] ? bpf_prog_test_run+0x130/0x1a0 [ 42.734689] ? __x64_sys_bpf+0x3d8/0x520 [ 42.738815] ? bpf_prog_get+0x20/0x20 [ 42.742625] ? do_syscall_64+0x1b9/0x820 [ 42.746669] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 42.752030] ? syscall_return_slowpath+0x5e0/0x5e0 [ 42.756940] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 42.761783] ? trace_hardirqs_on_caller+0x310/0x310 [ 42.766783] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 42.771867] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 42.777382] ? prepare_exit_to_usermode+0x291/0x3b0 [ 42.782409] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 42.787234] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 42.793895] Kernel Offset: disabled [ 42.797521] Rebooting in 86400 seconds..