[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 25.021346] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 27.079926] random: sshd: uninitialized urandom read (32 bytes read) [ 27.494179] random: sshd: uninitialized urandom read (32 bytes read) [ 28.112940] random: sshd: uninitialized urandom read (32 bytes read) [ 28.331244] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.125' (ECDSA) to the list of known hosts. [ 33.884917] random: sshd: uninitialized urandom read (32 bytes read) [ 34.018582] IPVS: ftp: loaded support on port[0] = 21 [ 34.182907] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.189559] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.197027] device bridge_slave_0 entered promiscuous mode [ 34.214909] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.221289] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.228496] device bridge_slave_1 entered promiscuous mode [ 34.245517] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 34.263058] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 34.314699] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 34.334175] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 34.406972] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 34.414230] team0: Port device team_slave_0 added [ 34.430902] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 34.438021] team0: Port device team_slave_1 added [ 34.455270] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 34.474659] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 34.493724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 34.513349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 34.652772] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.659218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.666127] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.672472] bridge0: port 1(bridge_slave_0) entered forwarding state RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument [ 35.173223] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.225922] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 35.276092] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 35.282203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.289636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.336954] 8021q: adding VLAN 0 to HW filter on device team0 executing program [ 35.617398] ================================================================== [ 35.624846] BUG: KASAN: slab-out-of-bounds in ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 35.632650] Read of size 1 at addr ffff8801cf215287 by task syz-executor265/5557 [ 35.640300] [ 35.641919] CPU: 0 PID: 5557 Comm: syz-executor265 Not tainted 4.19.0-rc3-next-20180913+ #73 [ 35.650476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 35.659829] Call Trace: [ 35.662401] dump_stack+0x1d3/0x2c4 [ 35.666015] ? dump_stack_print_info.cold.2+0x52/0x52 [ 35.671206] ? printk+0xa7/0xcf [ 35.674473] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 35.679222] print_address_description.cold.8+0x9/0x1ff [ 35.684586] kasan_report.cold.9+0x242/0x309 [ 35.688995] ? ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 35.694088] __asan_report_load1_noabort+0x14/0x20 [ 35.699004] ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 35.703944] ip6_tnl_start_xmit+0x3e2/0x2370 [ 35.708342] ? ip6_tnl_xmit+0x3850/0x3850 [ 35.712482] ? mark_held_locks+0x130/0x130 [ 35.716708] ? graph_lock+0x170/0x170 [ 35.720495] ? __lock_acquire+0x7ec/0x4ec0 [ 35.724723] ? graph_lock+0x170/0x170 [ 35.728534] ? graph_lock+0x170/0x170 [ 35.732324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 35.737870] ? check_preemption_disabled+0x48/0x200 [ 35.742879] ? __lock_is_held+0xb5/0x140 [ 35.746955] dev_hard_start_xmit+0x290/0xc90 [ 35.751354] ? dev_direct_xmit+0x6b0/0x6b0 [ 35.755578] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 35.761102] ? netif_skb_features+0x690/0xb70 [ 35.765603] ? rcu_softirq_qs+0x20/0x20 [ 35.769568] ? validate_xmit_xfrm+0x1ef/0xda0 [ 35.774055] ? validate_xmit_skb+0x80c/0xf30 [ 35.778454] ? netif_skb_features+0xb70/0xb70 [ 35.782938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 35.788463] ? check_preemption_disabled+0x48/0x200 [ 35.793467] ? check_preemption_disabled+0x48/0x200 [ 35.798472] __dev_queue_xmit+0x2f67/0x3970 [ 35.802783] ? save_stack+0x43/0xd0 [ 35.806397] ? kasan_kmalloc+0xc7/0xe0 [ 35.810270] ? __kmalloc_node_track_caller+0x47/0x70 [ 35.815364] ? netdev_pick_tx+0x2d0/0x2d0 [ 35.819499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 35.825025] ? check_preemption_disabled+0x48/0x200 [ 35.830035] ? __lock_is_held+0xb5/0x140 [ 35.834084] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 35.839099] ? skb_release_data+0x1c4/0x880 [ 35.843440] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 35.848704] ? kasan_unpoison_shadow+0x35/0x50 [ 35.853273] ? skb_tx_error+0x2f0/0x2f0 [ 35.857254] ? __kmalloc_node_track_caller+0x47/0x70 [ 35.862347] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 35.867878] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 35.873403] ? kasan_check_write+0x14/0x20 [ 35.877636] ? pskb_expand_head+0x6b3/0x10f0 [ 35.882053] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 35.886536] ? skb_checksum+0x140/0x140 [ 35.890502] ? __lock_is_held+0xb5/0x140 [ 35.894552] ? kasan_check_write+0x14/0x20 [ 35.898771] ? __skb_clone+0x6c7/0xa00 [ 35.902655] ? __copy_skb_header+0x6b0/0x6b0 [ 35.907052] ? kmem_cache_alloc+0x33a/0x730 [ 35.911676] ? depot_save_stack+0x292/0x470 [ 35.916016] ? skb_ensure_writable+0x15e/0x640 [ 35.920597] dev_queue_xmit+0x17/0x20 [ 35.924399] ? dev_queue_xmit+0x17/0x20 [ 35.928405] __bpf_redirect+0x5cf/0xb20 [ 35.932370] bpf_clone_redirect+0x2f6/0x490 [ 35.937131] ? find_held_lock+0x36/0x1c0 [ 35.941181] bpf_prog_759a992c578a3894+0xd35/0x1000 [ 35.946186] ? bpf_test_run+0xf7/0x5a0 [ 35.950066] ? lock_downgrade+0x900/0x900 [ 35.954202] ? ktime_get+0x332/0x400 [ 35.957924] ? find_held_lock+0x36/0x1c0 [ 35.961973] ? lock_acquire+0x1ed/0x520 [ 35.965930] ? bpf_test_run+0x32e/0x5a0 [ 35.969916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 35.975440] ? check_preemption_disabled+0x48/0x200 [ 35.980447] ? kasan_check_read+0x11/0x20 [ 35.984582] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 35.989845] ? rcu_softirq_qs+0x20/0x20 [ 35.993805] ? __build_skb+0x359/0x430 [ 35.997693] ? skb_try_coalesce+0x1b70/0x1b70 [ 36.002192] ? bpf_test_run+0x1c0/0x5a0 [ 36.006157] ? netlink_diag_dump+0x2a0/0x2a0 [ 36.010556] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 36.016402] ? bpf_test_init.isra.9+0x70/0x100 [ 36.020992] ? bpf_prog_test_run_skb+0x634/0xb40 [ 36.025741] ? bpf_test_finish.isra.8+0x1f0/0x1f0 [ 36.030565] ? bpf_prog_add+0x69/0xd0 [ 36.034349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 36.039875] ? __bpf_prog_get+0x9b/0x290 [ 36.043922] ? bpf_test_finish.isra.8+0x1f0/0x1f0 [ 36.048752] ? bpf_prog_test_run+0x130/0x1a0 [ 36.053151] ? __x64_sys_bpf+0x3d8/0x510 [ 36.057201] ? bpf_prog_get+0x20/0x20 [ 36.061022] ? do_syscall_64+0x1b9/0x820 [ 36.065072] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 36.070420] ? syscall_return_slowpath+0x5e0/0x5e0 [ 36.075336] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 36.080166] ? trace_hardirqs_off+0x310/0x310 [ 36.084681] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 36.089717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 36.095255] ? prepare_exit_to_usermode+0x291/0x3b0 [ 36.100283] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 36.105119] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 36.110480] [ 36.112090] Allocated by task 5557: [ 36.115702] save_stack+0x43/0xd0 [ 36.119139] kasan_kmalloc+0xc7/0xe0 [ 36.122837] __kmalloc_node_track_caller+0x47/0x70 [ 36.127753] __kmalloc_reserve.isra.39+0x41/0xe0 [ 36.132491] pskb_expand_head+0x230/0x10f0 [ 36.136710] skb_ensure_writable+0x3dd/0x640 [ 36.141101] bpf_clone_redirect+0x14a/0x490 [ 36.145417] bpf_prog_759a992c578a3894+0xd35/0x1000 [ 36.150418] [ 36.152026] Freed by task 4106: [ 36.155289] save_stack+0x43/0xd0 [ 36.158723] __kasan_slab_free+0x102/0x150 [ 36.162935] kasan_slab_free+0xe/0x10 [ 36.166716] kfree+0xcf/0x230 [ 36.169804] load_elf_binary+0x25b4/0x5620 [ 36.174017] search_binary_handler+0x17d/0x570 [ 36.178584] __do_execve_file.isra.33+0x1661/0x25d0 [ 36.183583] __x64_sys_execve+0x8f/0xc0 [ 36.187540] do_syscall_64+0x1b9/0x820 [ 36.191411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 36.196575] [ 36.198190] The buggy address belongs to the object at ffff8801cf215080 [ 36.198190] which belongs to the cache kmalloc-512 of size 512 [ 36.210832] The buggy address is located 7 bytes to the right of [ 36.210832] 512-byte region [ffff8801cf215080, ffff8801cf215280) [ 36.223043] The buggy address belongs to the page: [ 36.227972] page:ffffea00073c8540 count:1 mapcount:0 mapping:ffff8801da800940 index:0x0 [ 36.236102] flags: 0x2fffc0000000200(slab) [ 36.240335] raw: 02fffc0000000200 ffffea00074e1f88 ffffea00073b1948 ffff8801da800940 [ 36.248199] raw: 0000000000000000 ffff8801cf215080 0000000100000006 0000000000000000 [ 36.256080] page dumped because: kasan: bad access detected [ 36.261783] [ 36.263407] Memory state around the buggy address: [ 36.268319] ffff8801cf215180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.275672] ffff8801cf215200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.283022] >ffff8801cf215280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.290365] ^ [ 36.293723] ffff8801cf215300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.301065] ffff8801cf215380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.308402] ================================================================== [ 36.315741] Disabling lock debugging due to kernel taint [ 36.321233] Kernel panic - not syncing: panic_on_warn set ... [ 36.321233] [ 36.328607] CPU: 0 PID: 5557 Comm: syz-executor265 Tainted: G B 4.19.0-rc3-next-20180913+ #73 [ 36.338586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.347922] Call Trace: [ 36.350510] dump_stack+0x1d3/0x2c4 [ 36.354121] ? dump_stack_print_info.cold.2+0x52/0x52 [ 36.359293] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 36.364058] panic+0x238/0x4e7 [ 36.367248] ? add_taint.cold.5+0x16/0x16 [ 36.371398] ? trace_hardirqs_on+0xb4/0x310 [ 36.375710] kasan_end_report+0x47/0x4f [ 36.379665] kasan_report.cold.9+0x76/0x309 [ 36.383994] ? ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 36.389087] __asan_report_load1_noabort+0x14/0x20 [ 36.394003] ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 36.398922] ip6_tnl_start_xmit+0x3e2/0x2370 [ 36.403325] ? ip6_tnl_xmit+0x3850/0x3850 [ 36.407472] ? mark_held_locks+0x130/0x130 [ 36.411694] ? graph_lock+0x170/0x170 [ 36.415477] ? __lock_acquire+0x7ec/0x4ec0 [ 36.419698] ? graph_lock+0x170/0x170 [ 36.423500] ? graph_lock+0x170/0x170 [ 36.427290] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 36.432816] ? check_preemption_disabled+0x48/0x200 [ 36.437820] ? __lock_is_held+0xb5/0x140 [ 36.441887] dev_hard_start_xmit+0x290/0xc90 [ 36.446300] ? dev_direct_xmit+0x6b0/0x6b0 [ 36.450523] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 36.456043] ? netif_skb_features+0x690/0xb70 [ 36.460543] ? rcu_softirq_qs+0x20/0x20 [ 36.464506] ? validate_xmit_xfrm+0x1ef/0xda0 [ 36.468990] ? validate_xmit_skb+0x80c/0xf30 [ 36.473396] ? netif_skb_features+0xb70/0xb70 [ 36.477877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 36.483397] ? check_preemption_disabled+0x48/0x200 [ 36.488406] ? check_preemption_disabled+0x48/0x200 [ 36.493441] __dev_queue_xmit+0x2f67/0x3970 [ 36.497748] ? save_stack+0x43/0xd0 [ 36.501356] ? kasan_kmalloc+0xc7/0xe0 [ 36.505224] ? __kmalloc_node_track_caller+0x47/0x70 [ 36.510324] ? netdev_pick_tx+0x2d0/0x2d0 [ 36.514463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 36.519988] ? check_preemption_disabled+0x48/0x200 [ 36.525027] ? __lock_is_held+0xb5/0x140 [ 36.529072] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 36.534084] ? skb_release_data+0x1c4/0x880 [ 36.538391] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 36.543682] ? kasan_unpoison_shadow+0x35/0x50 [ 36.548250] ? skb_tx_error+0x2f0/0x2f0 [ 36.552209] ? __kmalloc_node_track_caller+0x47/0x70 [ 36.557294] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 36.562828] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 36.568357] ? kasan_check_write+0x14/0x20 [ 36.572573] ? pskb_expand_head+0x6b3/0x10f0 [ 36.576968] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 36.581446] ? skb_checksum+0x140/0x140 [ 36.585403] ? __lock_is_held+0xb5/0x140 [ 36.589448] ? kasan_check_write+0x14/0x20 [ 36.593685] ? __skb_clone+0x6c7/0xa00 [ 36.597558] ? __copy_skb_header+0x6b0/0x6b0 [ 36.601945] ? kmem_cache_alloc+0x33a/0x730 [ 36.606251] ? depot_save_stack+0x292/0x470 [ 36.610557] ? skb_ensure_writable+0x15e/0x640 [ 36.615126] dev_queue_xmit+0x17/0x20 [ 36.618911] ? dev_queue_xmit+0x17/0x20 [ 36.622871] __bpf_redirect+0x5cf/0xb20 [ 36.626831] bpf_clone_redirect+0x2f6/0x490 [ 36.631146] ? find_held_lock+0x36/0x1c0 [ 36.635219] bpf_prog_759a992c578a3894+0xd35/0x1000 [ 36.640230] ? bpf_test_run+0xf7/0x5a0 [ 36.644100] ? lock_downgrade+0x900/0x900 [ 36.648247] ? ktime_get+0x332/0x400 [ 36.651946] ? find_held_lock+0x36/0x1c0 [ 36.655997] ? lock_acquire+0x1ed/0x520 [ 36.659952] ? bpf_test_run+0x32e/0x5a0 [ 36.663923] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 36.669444] ? check_preemption_disabled+0x48/0x200 [ 36.674453] ? kasan_check_read+0x11/0x20 [ 36.678602] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 36.683859] ? rcu_softirq_qs+0x20/0x20 [ 36.687816] ? __build_skb+0x359/0x430 [ 36.691689] ? skb_try_coalesce+0x1b70/0x1b70 [ 36.696169] ? bpf_test_run+0x1c0/0x5a0 [ 36.700143] ? netlink_diag_dump+0x2a0/0x2a0 [ 36.704537] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 36.710054] ? bpf_test_init.isra.9+0x70/0x100 [ 36.714630] ? bpf_prog_test_run_skb+0x634/0xb40 [ 36.719396] ? bpf_test_finish.isra.8+0x1f0/0x1f0 [ 36.724235] ? bpf_prog_add+0x69/0xd0 [ 36.728022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 36.733555] ? __bpf_prog_get+0x9b/0x290 [ 36.737601] ? bpf_test_finish.isra.8+0x1f0/0x1f0 [ 36.742425] ? bpf_prog_test_run+0x130/0x1a0 [ 36.746829] ? __x64_sys_bpf+0x3d8/0x510 [ 36.750874] ? bpf_prog_get+0x20/0x20 [ 36.754675] ? do_syscall_64+0x1b9/0x820 [ 36.758720] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 36.764067] ? syscall_return_slowpath+0x5e0/0x5e0 [ 36.768979] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 36.773816] ? trace_hardirqs_off+0x310/0x310 [ 36.778313] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 36.783318] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 36.788837] ? prepare_exit_to_usermode+0x291/0x3b0 [ 36.793852] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 36.798685] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 36.804867] Kernel Offset: disabled [ 36.808490] Rebooting in 86400 seconds..