[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 27.777335] kauditd_printk_skb: 7 callbacks suppressed [ 27.777348] audit: type=1800 audit(1540912808.957:29): pid=5568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 27.804491] audit: type=1800 audit(1540912808.957:30): pid=5568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.107' (ECDSA) to the list of known hosts. syzkaller login: [ 35.992883] IPVS: ftp: loaded support on port[0] = 21 [ 36.156440] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.163422] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.170389] device bridge_slave_0 entered promiscuous mode [ 36.189862] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.196345] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.203433] device bridge_slave_1 entered promiscuous mode [ 36.220609] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 36.238679] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 36.288957] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 36.309110] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 36.385070] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 36.392538] team0: Port device team_slave_0 added [ 36.409533] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 36.416802] team0: Port device team_slave_1 added [ 36.433898] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 36.453888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 36.473503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 36.494061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 36.639602] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.646047] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.652939] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.659274] bridge0: port 1(bridge_slave_0) entered forwarding state RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument [ 37.167898] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.220730] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 37.270354] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 37.277116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.284732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.342657] 8021q: adding VLAN 0 to HW filter on device team0 executing program [ 37.631102] ================================================================== [ 37.638562] BUG: KASAN: slab-out-of-bounds in _decode_session6+0x134a/0x1500 [ 37.645737] Read of size 1 at addr ffff8801c9fc42c7 by task syz-executor526/5723 [ 37.653249] [ 37.654871] CPU: 1 PID: 5723 Comm: syz-executor526 Not tainted 4.19.0+ #311 [ 37.661950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.671302] Call Trace: [ 37.673913] dump_stack+0x244/0x39d [ 37.677527] ? dump_stack_print_info.cold.1+0x20/0x20 [ 37.682717] ? printk+0xa7/0xcf [ 37.686009] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 37.690755] print_address_description.cold.7+0x9/0x1ff [ 37.696119] kasan_report.cold.8+0x242/0x309 [ 37.700515] ? _decode_session6+0x134a/0x1500 [ 37.704998] __asan_report_load1_noabort+0x14/0x20 [ 37.709931] _decode_session6+0x134a/0x1500 [ 37.714271] __xfrm_decode_session+0x71/0x140 [ 37.718768] vti6_tnl_xmit+0x3fc/0x1c10 [ 37.722732] ? __lock_acquire+0x62f/0x4c20 [ 37.726985] ? vti6_tnl_create2+0x430/0x430 [ 37.731293] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 37.736817] ? check_preemption_disabled+0x48/0x280 [ 37.741831] dev_hard_start_xmit+0x295/0xc90 [ 37.746231] ? dev_direct_xmit+0x6b0/0x6b0 [ 37.750455] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 37.755976] ? netif_skb_features+0x690/0xb70 [ 37.760454] ? rcu_softirq_qs+0x20/0x20 [ 37.764416] ? lock_acquire+0x1ed/0x520 [ 37.768376] ? __dev_queue_xmit+0x3063/0x3ad0 [ 37.772905] ? kasan_check_read+0x11/0x20 [ 37.777069] ? do_raw_spin_lock+0x14f/0x350 [ 37.781378] ? rwlock_bug.part.2+0x90/0x90 [ 37.785597] ? netif_skb_features+0xb70/0xb70 [ 37.790078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 37.795601] ? check_preemption_disabled+0x48/0x280 [ 37.800602] __dev_queue_xmit+0x2f71/0x3ad0 [ 37.804906] ? save_stack+0x43/0xd0 [ 37.808511] ? kasan_kmalloc+0xc7/0xe0 [ 37.812384] ? __kmalloc_node_track_caller+0x50/0x70 [ 37.817479] ? netdev_pick_tx+0x310/0x310 [ 37.821613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 37.827136] ? check_preemption_disabled+0x48/0x280 [ 37.832144] ? __lock_is_held+0xb5/0x140 [ 37.836195] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 37.841193] ? skb_release_data+0x1c4/0x880 [ 37.845525] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 37.850793] ? kasan_unpoison_shadow+0x35/0x50 [ 37.855359] ? skb_tx_error+0x2f0/0x2f0 [ 37.859362] ? __kmalloc_node_track_caller+0x50/0x70 [ 37.864474] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 37.869996] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 37.875520] ? kasan_check_write+0x14/0x20 [ 37.879750] ? pskb_expand_head+0x6b3/0x10f0 [ 37.884162] ? find_held_lock+0x36/0x1c0 [ 37.888216] ? skb_release_data+0x880/0x880 [ 37.892537] ? __alloc_skb+0x770/0x770 [ 37.896415] ? __lock_is_held+0xb5/0x140 [ 37.900478] ? kasan_check_write+0x14/0x20 [ 37.904695] ? __skb_clone+0x6c7/0xa00 [ 37.908566] ? __copy_skb_header+0x6b0/0x6b0 [ 37.912959] ? kmem_cache_alloc+0x33a/0x730 [ 37.917283] ? depot_save_stack+0x292/0x470 [ 37.921600] ? skb_ensure_writable+0x15e/0x640 [ 37.926173] dev_queue_xmit+0x17/0x20 [ 37.929984] ? dev_queue_xmit+0x17/0x20 [ 37.933951] __bpf_redirect+0x5cf/0xb20 [ 37.937935] bpf_clone_redirect+0x2f6/0x490 [ 37.942267] bpf_prog_c39d1ba309a769f7+0x21f/0x1000 [ 37.947285] ? bpf_test_run+0x175/0x780 [ 37.951247] ? lock_downgrade+0x900/0x900 [ 37.955395] ? ktime_get+0x332/0x400 [ 37.959098] ? find_held_lock+0x36/0x1c0 [ 37.963151] ? lock_acquire+0x1ed/0x520 [ 37.967111] ? bpf_test_run+0x3cb/0x780 [ 37.971074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 37.976599] ? check_preemption_disabled+0x48/0x280 [ 37.981606] ? kasan_check_read+0x11/0x20 [ 37.985738] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 37.990995] ? rcu_softirq_qs+0x20/0x20 [ 37.994955] ? bpf_cgroup_storage_release+0x220/0x220 [ 38.000129] ? skb_try_coalesce+0x1b70/0x1b70 [ 38.004618] ? bpf_test_run+0x25d/0x780 [ 38.008584] ? netlink_diag_dump+0x2a0/0x2a0 [ 38.012979] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 38.018520] ? bpf_test_init.isra.10+0x70/0x100 [ 38.023175] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 38.027916] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 38.032753] ? bpf_prog_add+0x69/0xd0 [ 38.036550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 38.042084] ? __bpf_prog_get+0x9b/0x290 [ 38.046135] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 38.050970] ? bpf_prog_test_run+0x130/0x1a0 [ 38.055362] ? __x64_sys_bpf+0x3d8/0x520 [ 38.059412] ? bpf_prog_get+0x20/0x20 [ 38.063251] ? do_syscall_64+0x1b9/0x820 [ 38.067295] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 38.072644] ? syscall_return_slowpath+0x5e0/0x5e0 [ 38.077558] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 38.082389] ? trace_hardirqs_on_caller+0x310/0x310 [ 38.087392] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 38.092393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 38.097919] ? prepare_exit_to_usermode+0x291/0x3b0 [ 38.102920] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 38.107802] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 38.113156] [ 38.114766] Allocated by task 5723: [ 38.118380] save_stack+0x43/0xd0 [ 38.121825] kasan_kmalloc+0xc7/0xe0 [ 38.125529] __kmalloc_node_track_caller+0x50/0x70 [ 38.130466] __kmalloc_reserve.isra.40+0x41/0xe0 [ 38.135210] pskb_expand_head+0x230/0x10f0 [ 38.139447] skb_ensure_writable+0x3dd/0x640 [ 38.143857] bpf_clone_redirect+0x14a/0x490 [ 38.148170] bpf_prog_c39d1ba309a769f7+0x21f/0x1000 [ 38.153160] [ 38.154767] Freed by task 4274: [ 38.158030] save_stack+0x43/0xd0 [ 38.161474] __kasan_slab_free+0x102/0x150 [ 38.165706] kasan_slab_free+0xe/0x10 [ 38.169491] kfree+0xcf/0x230 [ 38.172612] load_elf_binary+0x25b4/0x5620 [ 38.176832] search_binary_handler+0x17d/0x570 [ 38.181427] __do_execve_file.isra.33+0x1661/0x25d0 [ 38.186436] __x64_sys_execve+0x8f/0xc0 [ 38.190398] do_syscall_64+0x1b9/0x820 [ 38.194273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 38.199444] [ 38.201059] The buggy address belongs to the object at ffff8801c9fc40c0 [ 38.201059] which belongs to the cache kmalloc-512 of size 512 [ 38.213721] The buggy address is located 7 bytes to the right of [ 38.213721] 512-byte region [ffff8801c9fc40c0, ffff8801c9fc42c0) [ 38.225923] The buggy address belongs to the page: [ 38.230848] page:ffffea000727f100 count:1 mapcount:0 mapping:ffff8801da800940 index:0x0 [ 38.238978] flags: 0x2fffc0000000200(slab) [ 38.243230] raw: 02fffc0000000200 ffffea000747a008 ffffea000727f3c8 ffff8801da800940 [ 38.251094] raw: 0000000000000000 ffff8801c9fc40c0 0000000100000006 0000000000000000 [ 38.258954] page dumped because: kasan: bad access detected [ 38.264649] [ 38.266260] Memory state around the buggy address: [ 38.271167] ffff8801c9fc4180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.278515] ffff8801c9fc4200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.285872] >ffff8801c9fc4280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 38.293208] ^ [ 38.298634] ffff8801c9fc4300: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 38.306000] ffff8801c9fc4380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.313350] ================================================================== [ 38.320689] Disabling lock debugging due to kernel taint [ 38.326167] Kernel panic - not syncing: panic_on_warn set ... [ 38.326167] [ 38.333542] CPU: 1 PID: 5723 Comm: syz-executor526 Tainted: G B 4.19.0+ #311 [ 38.342027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 38.351358] Call Trace: [ 38.353933] dump_stack+0x244/0x39d [ 38.357543] ? dump_stack_print_info.cold.1+0x20/0x20 [ 38.362716] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 38.367455] panic+0x238/0x4e7 [ 38.370627] ? add_taint.cold.5+0x16/0x16 [ 38.374762] ? trace_hardirqs_on+0x9a/0x310 [ 38.379067] ? trace_hardirqs_on+0xb4/0x310 [ 38.383370] ? trace_hardirqs_on+0xb4/0x310 [ 38.387677] kasan_end_report+0x47/0x4f [ 38.391634] kasan_report.cold.8+0x76/0x309 [ 38.395939] ? _decode_session6+0x134a/0x1500 [ 38.400417] __asan_report_load1_noabort+0x14/0x20 [ 38.405328] _decode_session6+0x134a/0x1500 [ 38.409638] __xfrm_decode_session+0x71/0x140 [ 38.414118] vti6_tnl_xmit+0x3fc/0x1c10 [ 38.418101] ? __lock_acquire+0x62f/0x4c20 [ 38.422323] ? vti6_tnl_create2+0x430/0x430 [ 38.426647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 38.432173] ? check_preemption_disabled+0x48/0x280 [ 38.437181] dev_hard_start_xmit+0x295/0xc90 [ 38.441577] ? dev_direct_xmit+0x6b0/0x6b0 [ 38.445792] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 38.451324] ? netif_skb_features+0x690/0xb70 [ 38.455800] ? rcu_softirq_qs+0x20/0x20 [ 38.459757] ? lock_acquire+0x1ed/0x520 [ 38.463712] ? __dev_queue_xmit+0x3063/0x3ad0 [ 38.468189] ? kasan_check_read+0x11/0x20 [ 38.472320] ? do_raw_spin_lock+0x14f/0x350 [ 38.476638] ? rwlock_bug.part.2+0x90/0x90 [ 38.480852] ? netif_skb_features+0xb70/0xb70 [ 38.485347] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 38.490873] ? check_preemption_disabled+0x48/0x280 [ 38.495878] __dev_queue_xmit+0x2f71/0x3ad0 [ 38.500201] ? save_stack+0x43/0xd0 [ 38.503810] ? kasan_kmalloc+0xc7/0xe0 [ 38.507676] ? __kmalloc_node_track_caller+0x50/0x70 [ 38.512764] ? netdev_pick_tx+0x310/0x310 [ 38.516895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 38.522414] ? check_preemption_disabled+0x48/0x280 [ 38.527413] ? __lock_is_held+0xb5/0x140 [ 38.531460] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 38.536461] ? skb_release_data+0x1c4/0x880 [ 38.540764] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 38.546024] ? kasan_unpoison_shadow+0x35/0x50 [ 38.550587] ? skb_tx_error+0x2f0/0x2f0 [ 38.554546] ? __kmalloc_node_track_caller+0x50/0x70 [ 38.559630] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 38.565149] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 38.570671] ? kasan_check_write+0x14/0x20 [ 38.574889] ? pskb_expand_head+0x6b3/0x10f0 [ 38.579290] ? find_held_lock+0x36/0x1c0 [ 38.583336] ? skb_release_data+0x880/0x880 [ 38.587637] ? __alloc_skb+0x770/0x770 [ 38.591508] ? __lock_is_held+0xb5/0x140 [ 38.595568] ? kasan_check_write+0x14/0x20 [ 38.599783] ? __skb_clone+0x6c7/0xa00 [ 38.603654] ? __copy_skb_header+0x6b0/0x6b0 [ 38.608044] ? kmem_cache_alloc+0x33a/0x730 [ 38.612347] ? depot_save_stack+0x292/0x470 [ 38.616654] ? skb_ensure_writable+0x15e/0x640 [ 38.621220] dev_queue_xmit+0x17/0x20 [ 38.625002] ? dev_queue_xmit+0x17/0x20 [ 38.628958] __bpf_redirect+0x5cf/0xb20 [ 38.632918] bpf_clone_redirect+0x2f6/0x490 [ 38.637222] bpf_prog_c39d1ba309a769f7+0x21f/0x1000 [ 38.642220] ? bpf_test_run+0x175/0x780 [ 38.646175] ? lock_downgrade+0x900/0x900 [ 38.650304] ? ktime_get+0x332/0x400 [ 38.654015] ? find_held_lock+0x36/0x1c0 [ 38.658063] ? lock_acquire+0x1ed/0x520 [ 38.662019] ? bpf_test_run+0x3cb/0x780 [ 38.665987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 38.671538] ? check_preemption_disabled+0x48/0x280 [ 38.676549] ? kasan_check_read+0x11/0x20 [ 38.680680] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 38.685938] ? rcu_softirq_qs+0x20/0x20 [ 38.689899] ? bpf_cgroup_storage_release+0x220/0x220 [ 38.695093] ? skb_try_coalesce+0x1b70/0x1b70 [ 38.699572] ? bpf_test_run+0x25d/0x780 [ 38.703551] ? netlink_diag_dump+0x2a0/0x2a0 [ 38.707957] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 38.713478] ? bpf_test_init.isra.10+0x70/0x100 [ 38.718129] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 38.722873] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 38.727699] ? bpf_prog_add+0x69/0xd0 [ 38.731482] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 38.737014] ? __bpf_prog_get+0x9b/0x290 [ 38.741057] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 38.745892] ? bpf_prog_test_run+0x130/0x1a0 [ 38.750295] ? __x64_sys_bpf+0x3d8/0x520 [ 38.754336] ? bpf_prog_get+0x20/0x20 [ 38.758150] ? do_syscall_64+0x1b9/0x820 [ 38.762194] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 38.767541] ? syscall_return_slowpath+0x5e0/0x5e0 [ 38.772451] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 38.777492] ? trace_hardirqs_on_caller+0x310/0x310 [ 38.782503] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 38.787513] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 38.793046] ? prepare_exit_to_usermode+0x291/0x3b0 [ 38.798045] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 38.802879] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 38.809071] Kernel Offset: disabled [ 38.812712] Rebooting in 86400 seconds..