[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 27.517406] kauditd_printk_skb: 8 callbacks suppressed [ 27.517418] audit: type=1800 audit(1541023975.121:29): pid=5568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 27.548569] audit: type=1800 audit(1541023975.121:30): pid=5568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.23' (ECDSA) to the list of known hosts. syzkaller login: [ 60.960009] IPVS: ftp: loaded support on port[0] = 21 [ 61.117992] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.124781] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.131995] device bridge_slave_0 entered promiscuous mode [ 61.150669] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.157415] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.164362] device bridge_slave_1 entered promiscuous mode [ 61.183851] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.202124] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.251501] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 61.272080] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.348230] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.356077] team0: Port device team_slave_0 added [ 61.373157] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.380568] team0: Port device team_slave_1 added [ 61.398658] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.419950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.439169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.459228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 61.609856] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.616318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.623126] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.629586] bridge0: port 1(bridge_slave_0) entered forwarding state RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument [ 62.155955] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.209279] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.260620] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.267156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.277062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.323165] 8021q: adding VLAN 0 to HW filter on device team0 executing program [ 62.609439] ================================================================== [ 62.617004] BUG: KASAN: slab-out-of-bounds in ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 62.624896] Read of size 1 at addr ffff8801ca36d4c7 by task syz-executor487/5724 [ 62.632422] [ 62.634039] CPU: 0 PID: 5724 Comm: syz-executor487 Not tainted 4.19.0+ #164 [ 62.641121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.650455] Call Trace: [ 62.653029] dump_stack+0x244/0x39d [ 62.656644] ? dump_stack_print_info.cold.1+0x20/0x20 [ 62.661817] ? printk+0xa7/0xcf [ 62.665083] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 62.669840] print_address_description.cold.7+0x9/0x1ff [ 62.675191] kasan_report.cold.8+0x242/0x309 [ 62.679587] ? ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 62.684677] __asan_report_load1_noabort+0x14/0x20 [ 62.689594] ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 62.694514] ip6_tnl_start_xmit+0x49f/0x25a0 [ 62.698918] ? ip6_tnl_xmit+0x3730/0x3730 [ 62.703060] ? mark_held_locks+0x130/0x130 [ 62.707504] ? zap_class+0x640/0x640 [ 62.711210] ? __lock_acquire+0x62f/0x4c20 [ 62.715442] ? zap_class+0x640/0x640 [ 62.719143] ? zap_class+0x640/0x640 [ 62.722842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 62.728367] ? check_preemption_disabled+0x48/0x280 [ 62.733378] ? __lock_is_held+0xb5/0x140 [ 62.737439] dev_hard_start_xmit+0x295/0xc90 [ 62.741841] ? dev_direct_xmit+0x6b0/0x6b0 [ 62.746155] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 62.751688] ? netif_skb_features+0x690/0xb70 [ 62.756164] ? rcu_softirq_qs+0x20/0x20 [ 62.760141] ? validate_xmit_xfrm+0x1ef/0xda0 [ 62.764664] ? validate_xmit_skb+0x80c/0xf30 [ 62.769059] ? netif_skb_features+0xb70/0xb70 [ 62.773566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 62.779260] ? check_preemption_disabled+0x48/0x280 [ 62.784258] ? check_preemption_disabled+0x48/0x280 [ 62.789261] __dev_queue_xmit+0x2f71/0x3ad0 [ 62.793569] ? save_stack+0x43/0xd0 [ 62.797229] ? kasan_kmalloc+0xc7/0xe0 [ 62.801107] ? __kmalloc_node_track_caller+0x50/0x70 [ 62.806209] ? netdev_pick_tx+0x310/0x310 [ 62.810352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 62.815880] ? check_preemption_disabled+0x48/0x280 [ 62.820887] ? __lock_is_held+0xb5/0x140 [ 62.824937] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 62.829939] ? skb_release_data+0x1c4/0x880 [ 62.834245] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 62.839699] ? kasan_unpoison_shadow+0x35/0x50 [ 62.844265] ? skb_tx_error+0x2f0/0x2f0 [ 62.848230] ? __kmalloc_node_track_caller+0x50/0x70 [ 62.853314] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 62.858851] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 62.864384] ? kasan_check_write+0x14/0x20 [ 62.868610] ? pskb_expand_head+0x6b3/0x10f0 [ 62.873010] ? skb_release_data+0x880/0x880 [ 62.877314] ? __alloc_skb+0x770/0x770 [ 62.881197] ? __lock_is_held+0xb5/0x140 [ 62.885247] ? kasan_check_write+0x14/0x20 [ 62.889465] ? __skb_clone+0x6c7/0xa00 [ 62.893333] ? __copy_skb_header+0x6b0/0x6b0 [ 62.897724] ? kmem_cache_alloc+0x33a/0x730 [ 62.902030] ? depot_save_stack+0x292/0x470 [ 62.906337] ? skb_ensure_writable+0x15e/0x640 [ 62.910915] dev_queue_xmit+0x17/0x20 [ 62.914708] ? dev_queue_xmit+0x17/0x20 [ 62.918726] __bpf_redirect+0x5cf/0xb20 [ 62.922695] bpf_clone_redirect+0x2f6/0x490 [ 62.927011] bpf_prog_759a992c578a3894+0x6b1/0x1000 [ 62.932012] ? bpf_test_run+0x175/0x780 [ 62.935984] ? lock_downgrade+0x900/0x900 [ 62.940120] ? ktime_get+0x332/0x400 [ 62.943825] ? find_held_lock+0x36/0x1c0 [ 62.947875] ? lock_acquire+0x1ed/0x520 [ 62.951834] ? bpf_test_run+0x3cb/0x780 [ 62.955842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 62.961373] ? check_preemption_disabled+0x48/0x280 [ 62.966437] ? kasan_check_read+0x11/0x20 [ 62.970649] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 62.975922] ? rcu_softirq_qs+0x20/0x20 [ 62.979880] ? bpf_cgroup_storage_release+0x220/0x220 [ 62.985072] ? skb_try_coalesce+0x1b70/0x1b70 [ 62.989557] ? bpf_test_run+0x25d/0x780 [ 62.993555] ? netlink_diag_dump+0x2a0/0x2a0 [ 62.997966] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 63.003488] ? bpf_test_init.isra.10+0x70/0x100 [ 63.008145] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 63.012890] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 63.017716] ? bpf_prog_add+0x69/0xd0 [ 63.021500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 63.027022] ? __bpf_prog_get+0x9b/0x290 [ 63.031071] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 63.035899] ? bpf_prog_test_run+0x130/0x1a0 [ 63.040295] ? __x64_sys_bpf+0x3d8/0x520 [ 63.044339] ? bpf_prog_get+0x20/0x20 [ 63.048133] ? do_syscall_64+0x1b9/0x820 [ 63.052194] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 63.057562] ? syscall_return_slowpath+0x5e0/0x5e0 [ 63.062490] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 63.067322] ? trace_hardirqs_on_caller+0x310/0x310 [ 63.072324] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 63.077325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 63.082863] ? prepare_exit_to_usermode+0x291/0x3b0 [ 63.087867] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 63.092703] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 63.098063] [ 63.099671] Allocated by task 5724: [ 63.103280] save_stack+0x43/0xd0 [ 63.106717] kasan_kmalloc+0xc7/0xe0 [ 63.110440] __kmalloc_node_track_caller+0x50/0x70 [ 63.115372] __kmalloc_reserve.isra.40+0x41/0xe0 [ 63.120115] pskb_expand_head+0x230/0x10f0 [ 63.124342] skb_ensure_writable+0x3dd/0x640 [ 63.128765] bpf_clone_redirect+0x14a/0x490 [ 63.133069] bpf_prog_759a992c578a3894+0x6b1/0x1000 [ 63.138059] [ 63.139668] Freed by task 4274: [ 63.142932] save_stack+0x43/0xd0 [ 63.146368] __kasan_slab_free+0x102/0x150 [ 63.150585] kasan_slab_free+0xe/0x10 [ 63.154366] kfree+0xcf/0x230 [ 63.157473] load_elf_binary+0x25a8/0x5620 [ 63.161709] search_binary_handler+0x17d/0x570 [ 63.166279] __do_execve_file.isra.33+0x1661/0x25d0 [ 63.171277] __x64_sys_execve+0x8f/0xc0 [ 63.175234] do_syscall_64+0x1b9/0x820 [ 63.179108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 63.184275] [ 63.185885] The buggy address belongs to the object at ffff8801ca36d2c0 [ 63.185885] which belongs to the cache kmalloc-512 of size 512 [ 63.198544] The buggy address is located 7 bytes to the right of [ 63.198544] 512-byte region [ffff8801ca36d2c0, ffff8801ca36d4c0) [ 63.210749] The buggy address belongs to the page: [ 63.215661] page:ffffea000728db40 count:1 mapcount:0 mapping:ffff8801da800940 index:0x0 [ 63.223789] flags: 0x2fffc0000000200(slab) [ 63.228041] raw: 02fffc0000000200 ffffea000728d988 ffffea000728e108 ffff8801da800940 [ 63.235905] raw: 0000000000000000 ffff8801ca36d040 0000000100000006 0000000000000000 [ 63.243764] page dumped because: kasan: bad access detected [ 63.249449] [ 63.251055] Memory state around the buggy address: [ 63.255966] ffff8801ca36d380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.263309] ffff8801ca36d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.270650] >ffff8801ca36d480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 63.277986] ^ [ 63.283415] ffff8801ca36d500: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 63.290771] ffff8801ca36d580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.298112] ================================================================== [ 63.305448] Disabling lock debugging due to kernel taint [ 63.310940] Kernel panic - not syncing: panic_on_warn set ... [ 63.310940] [ 63.318316] CPU: 0 PID: 5724 Comm: syz-executor487 Tainted: G B 4.19.0+ #164 [ 63.326804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.336141] Call Trace: [ 63.338711] dump_stack+0x244/0x39d [ 63.342322] ? dump_stack_print_info.cold.1+0x20/0x20 [ 63.347496] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 63.352238] panic+0x238/0x4e7 [ 63.355413] ? add_taint.cold.5+0x16/0x16 [ 63.359551] ? trace_hardirqs_on+0xb4/0x310 [ 63.363859] kasan_end_report+0x47/0x4f [ 63.367823] kasan_report.cold.8+0x76/0x309 [ 63.372127] ? ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 63.377257] __asan_report_load1_noabort+0x14/0x20 [ 63.382168] ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 63.387095] ip6_tnl_start_xmit+0x49f/0x25a0 [ 63.391501] ? ip6_tnl_xmit+0x3730/0x3730 [ 63.395671] ? mark_held_locks+0x130/0x130 [ 63.399886] ? zap_class+0x640/0x640 [ 63.403581] ? __lock_acquire+0x62f/0x4c20 [ 63.407802] ? zap_class+0x640/0x640 [ 63.411503] ? zap_class+0x640/0x640 [ 63.415203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 63.420723] ? check_preemption_disabled+0x48/0x280 [ 63.425741] ? __lock_is_held+0xb5/0x140 [ 63.429794] dev_hard_start_xmit+0x295/0xc90 [ 63.434196] ? dev_direct_xmit+0x6b0/0x6b0 [ 63.438423] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 63.443946] ? netif_skb_features+0x690/0xb70 [ 63.448425] ? rcu_softirq_qs+0x20/0x20 [ 63.452388] ? validate_xmit_xfrm+0x1ef/0xda0 [ 63.456875] ? validate_xmit_skb+0x80c/0xf30 [ 63.461285] ? netif_skb_features+0xb70/0xb70 [ 63.465769] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 63.471307] ? check_preemption_disabled+0x48/0x280 [ 63.476315] ? check_preemption_disabled+0x48/0x280 [ 63.481321] __dev_queue_xmit+0x2f71/0x3ad0 [ 63.485632] ? save_stack+0x43/0xd0 [ 63.489239] ? kasan_kmalloc+0xc7/0xe0 [ 63.493108] ? __kmalloc_node_track_caller+0x50/0x70 [ 63.498198] ? netdev_pick_tx+0x310/0x310 [ 63.502351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 63.507891] ? check_preemption_disabled+0x48/0x280 [ 63.512918] ? __lock_is_held+0xb5/0x140 [ 63.516968] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 63.521966] ? skb_release_data+0x1c4/0x880 [ 63.526270] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 63.531536] ? kasan_unpoison_shadow+0x35/0x50 [ 63.536105] ? skb_tx_error+0x2f0/0x2f0 [ 63.540074] ? __kmalloc_node_track_caller+0x50/0x70 [ 63.545165] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 63.550691] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 63.556217] ? kasan_check_write+0x14/0x20 [ 63.560435] ? pskb_expand_head+0x6b3/0x10f0 [ 63.564833] ? skb_release_data+0x880/0x880 [ 63.569147] ? __alloc_skb+0x770/0x770 [ 63.573026] ? __lock_is_held+0xb5/0x140 [ 63.577079] ? kasan_check_write+0x14/0x20 [ 63.581298] ? __skb_clone+0x6c7/0xa00 [ 63.585172] ? __copy_skb_header+0x6b0/0x6b0 [ 63.589562] ? kmem_cache_alloc+0x33a/0x730 [ 63.593868] ? depot_save_stack+0x292/0x470 [ 63.598174] ? skb_ensure_writable+0x15e/0x640 [ 63.602753] dev_queue_xmit+0x17/0x20 [ 63.606549] ? dev_queue_xmit+0x17/0x20 [ 63.610534] __bpf_redirect+0x5cf/0xb20 [ 63.614503] bpf_clone_redirect+0x2f6/0x490 [ 63.618818] bpf_prog_759a992c578a3894+0x6b1/0x1000 [ 63.623819] ? bpf_test_run+0x175/0x780 [ 63.627776] ? lock_downgrade+0x900/0x900 [ 63.631923] ? ktime_get+0x332/0x400 [ 63.635625] ? find_held_lock+0x36/0x1c0 [ 63.639673] ? lock_acquire+0x1ed/0x520 [ 63.643633] ? bpf_test_run+0x3cb/0x780 [ 63.647598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 63.653125] ? check_preemption_disabled+0x48/0x280 [ 63.658130] ? kasan_check_read+0x11/0x20 [ 63.662261] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 63.667518] ? rcu_softirq_qs+0x20/0x20 [ 63.671482] ? bpf_cgroup_storage_release+0x220/0x220 [ 63.676658] ? skb_try_coalesce+0x1b70/0x1b70 [ 63.681136] ? bpf_test_run+0x25d/0x780 [ 63.685093] ? netlink_diag_dump+0x2a0/0x2a0 [ 63.689486] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 63.695005] ? bpf_test_init.isra.10+0x70/0x100 [ 63.699658] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 63.704402] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 63.709228] ? bpf_prog_add+0x69/0xd0 [ 63.713029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 63.718554] ? __bpf_prog_get+0x9b/0x290 [ 63.722604] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 63.727430] ? bpf_prog_test_run+0x130/0x1a0 [ 63.731837] ? __x64_sys_bpf+0x3d8/0x520 [ 63.735878] ? bpf_prog_get+0x20/0x20 [ 63.739685] ? do_syscall_64+0x1b9/0x820 [ 63.743745] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 63.749092] ? syscall_return_slowpath+0x5e0/0x5e0 [ 63.754003] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 63.758834] ? trace_hardirqs_on_caller+0x310/0x310 [ 63.763837] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 63.768837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 63.774355] ? prepare_exit_to_usermode+0x291/0x3b0 [ 63.779357] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 63.784275] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 63.790469] Kernel Offset: disabled [ 63.794090] Rebooting in 86400 seconds..