syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) MTD: Attempt to mount non-MTD device "/dev/loop1" romfs: VFS: Can't find a romfs filesystem on dev loop1. ================================================================================ UBSAN: Undefined behaviour in ./include/net/red.h:272:18 shift exponent 253 is too large for 64-bit type 'long unsigned int' CPU: 0 PID: 8375 Comm: syz-executor.0 Not tainted 4.19.152-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x22c/0x33e lib/dump_stack.c:118 ubsan_epilogue+0xe/0x3a lib/ubsan.c:161 __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 lib/ubsan.c:422 red_calc_qavg_from_idle_time include/net/red.h:272 [inline] red_calc_qavg include/net/red.h:313 [inline] red_enqueue+0x2064/0x2200 net/sched/sch_red.c:68 __dev_xmit_skb net/core/dev.c:3494 [inline] __dev_queue_xmit+0x14e1/0x2ec0 net/core/dev.c:3807 neigh_resolve_output+0x55a/0x950 net/core/neighbour.c:1374 neigh_output include/net/neighbour.h:501 [inline] ip6_finish_output2+0x1184/0x2370 net/ipv6/ip6_output.c:120 ip6_finish_output+0x610/0xcc0 net/ipv6/ip6_output.c:154 NF_HOOK_COND include/linux/netfilter.h:278 [inline] ip6_output+0x205/0x7c0 net/ipv6/ip6_output.c:171 dst_output include/net/dst.h:455 [inline] NF_HOOK include/linux/netfilter.h:289 [inline] ip6_xmit+0xe46/0x2110 net/ipv6/ip6_output.c:275 sctp_v6_xmit+0x38e/0x720 net/sctp/ipv6.c:229 sctp_packet_transmit+0x1c3c/0x3210 net/sctp/output.c:641 sctp_packet_singleton net/sctp/outqueue.c:792 [inline] sctp_outq_flush_ctrl.constprop.0+0x6d3/0xc50 net/sctp/outqueue.c:923 sctp_outq_flush net/sctp/outqueue.c:1205 [inline] sctp_outq_uncork+0x10b/0x200 net/sctp/outqueue.c:777 sctp_cmd_interpreter net/sctp/sm_sideeffect.c:1815 [inline] sctp_side_effects net/sctp/sm_sideeffect.c:1199 [inline] sctp_do_sm+0x520/0x4fd0 net/sctp/sm_sideeffect.c:1170 sctp_primitive_ASSOCIATE+0x98/0xc0 net/sctp/primitive.c:88 __sctp_connect+0x908/0xd40 net/sctp/socket.c:1244 sctp_connect net/sctp/socket.c:4523 [inline] sctp_inet_connect+0x14b/0x1b0 net/sctp/socket.c:4538 __sys_connect+0x265/0x2c0 net/socket.c:1663 __do_sys_connect net/socket.c:1674 [inline] __se_sys_connect net/socket.c:1671 [inline] __x64_sys_connect+0x6f/0xb0 net/socket.c:1671 do_syscall_64+0xf9/0x670 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45de59 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fc2eb7dcc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a RAX: ffffffffffffffda RBX: 0000000000002380 RCX: 000000000045de59 RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000004 RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c R13: 00007ffed67e842f R14: 00007fc2eb7dd9c0 R15: 000000000118bf2c ================================================================================ device syzkaller1 entered promiscuous mode FAT-fs (loop4): Unrecognized mount option "iocWarset=maccyrillic£¨>Ì)q" or missing value audit: type=1804 audit(1603050071.560:17): pid=8484 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir911526945/syzkaller.12NxcY/12/file0/bus" dev="ramfs" ino=30623 res=1 Process accounting resumed device syzkaller1 entered promiscuous mode EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue FAT-fs (loop4): Unrecognized mount option "iocWarset=maccyrillic£¨>Ì)q" or missing value nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. XFS (loop4): Invalid superblock magic number XFS (loop4): Invalid superblock magic number audit: type=1804 audit(1603050072.650:18): pid=8528 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir915896415/syzkaller.kSI0Km/10/bus" dev="sda1" ino=15762 res=1 netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. audit: type=1804 audit(1603050072.860:19): pid=8574 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir542737286/syzkaller.jGt9ly/13/bus" dev="sda1" ino=15828 res=1 audit: type=1804 audit(1603050072.990:20): pid=8577 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir542737286/syzkaller.jGt9ly/13/bus" dev="sda1" ino=15828 res=1 audit: type=1804 audit(1603050073.550:21): pid=8596 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir915896415/syzkaller.kSI0Km/10/bus" dev="sda1" ino=15762 res=1 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. audit: type=1804 audit(1603050073.720:22): pid=8609 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir911526945/syzkaller.12NxcY/16/bus" dev="sda1" ino=15831 res=1 L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. audit: type=1804 audit(1603050073.780:23): pid=8577 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir542737286/syzkaller.jGt9ly/13/bus" dev="sda1" ino=15828 res=1 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. audit: type=1804 audit(1603050073.790:24): pid=8577 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir542737286/syzkaller.jGt9ly/13/bus" dev="sda1" ino=15828 res=1 overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. overlayfs: 'file0' not a directory audit: type=1804 audit(1603050073.910:25): pid=8609 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir911526945/syzkaller.12NxcY/16/bus" dev="sda1" ino=15831 res=1 overlayfs: './file0' not a directory audit: type=1804 audit(1603050073.910:26): pid=8615 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir911526945/syzkaller.12NxcY/16/bus" dev="sda1" ino=15831 res=1 netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 20996)! netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. EXT4-fs (loop1): group descriptors corrupted! IPVS: ftp: loaded support on port[0] = 21 EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 not in group (block 20996)! EXT4-fs (loop1): group descriptors corrupted! TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. IPVS: ftp: loaded support on port[0] = 21 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 'syz-executor.1': attribute type 29 has an invalid length. netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. IPVS: ftp: loaded support on port[0] = 21 MTD: Attempt to mount non-MTD device "/dev/loop2" cramfs: wrong magic netlink: 'syz-executor.1': attribute type 29 has an invalid length. kauditd_printk_skb: 8 callbacks suppressed audit: type=1804 audit(1603050076.990:35): pid=8823 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir864105502/syzkaller.GBaiua/21/bus" dev="sda1" ino=15851 res=1 netlink: 'syz-executor.1': attribute type 29 has an invalid length. netlink: 'syz-executor.1': attribute type 29 has an invalid length. netlink: 'syz-executor.1': attribute type 29 has an invalid length. audit: type=1804 audit(1603050077.490:36): pid=8858 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir864105502/syzkaller.GBaiua/21/bus" dev="sda1" ino=15851 res=1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8856 comm=syz-executor.4 device bridge_slave_0 left promiscuous mode bridge0: port 1(bridge_slave_0) entered disabled state bond1: bridge_slave_0 is up - this may be due to an out of date ifenslave SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8856 comm=syz-executor.4 bond1: bridge_slave_0 is up - this may be due to an out of date ifenslave MTD: Attempt to mount non-MTD device "/dev/loop2" cramfs: wrong magic audit: type=1804 audit(1603050078.170:37): pid=8890 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir864105502/syzkaller.GBaiua/22/bus" dev="sda1" ino=15830 res=1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8898 comm=syz-executor.4 team0: Device ipvlan1 failed to register rx_handler