[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 28.150058] kauditd_printk_skb: 8 callbacks suppressed [ 28.150070] audit: type=1800 audit(1540912795.937:29): pid=5565 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 28.184221] audit: type=1800 audit(1540912795.937:30): pid=5565 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 46.023702] sshd (5707) used greatest stack depth: 15744 bytes left Warning: Permanently added '10.128.0.88' (ECDSA) to the list of known hosts. [ 52.742860] IPVS: ftp: loaded support on port[0] = 21 [ 52.898544] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.905738] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.913197] device bridge_slave_0 entered promiscuous mode [ 52.933730] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.940320] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.947441] device bridge_slave_1 entered promiscuous mode [ 52.965716] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 52.983973] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 53.031837] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 53.052534] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 53.128455] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 53.136182] team0: Port device team_slave_0 added [ 53.154491] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 53.162127] team0: Port device team_slave_1 added [ 53.180715] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.200106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.219856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.238671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 53.385290] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.392282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.399775] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.406465] bridge0: port 1(bridge_slave_0) entered forwarding state RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument [ 53.927417] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.981141] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.033946] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.040251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.049283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.093787] 8021q: adding VLAN 0 to HW filter on device team0 executing program [ 54.382288] ================================================================== [ 54.389750] BUG: KASAN: slab-out-of-bounds in _decode_session6+0x134a/0x1500 [ 54.396933] Read of size 1 at addr ffff8801bb888707 by task syz-executor411/5722 [ 54.404459] [ 54.406083] CPU: 0 PID: 5722 Comm: syz-executor411 Not tainted 4.19.0+ #162 [ 54.413186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.422538] Call Trace: [ 54.425131] dump_stack+0x244/0x39d [ 54.428797] ? dump_stack_print_info.cold.1+0x20/0x20 [ 54.433988] ? printk+0xa7/0xcf [ 54.437270] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 54.442027] print_address_description.cold.7+0x9/0x1ff [ 54.447426] kasan_report.cold.8+0x242/0x309 [ 54.451841] ? _decode_session6+0x134a/0x1500 [ 54.456478] __asan_report_load1_noabort+0x14/0x20 [ 54.461414] _decode_session6+0x134a/0x1500 [ 54.465860] __xfrm_decode_session+0x71/0x140 [ 54.470643] vti6_tnl_xmit+0x3fc/0x1c10 [ 54.474627] ? __lock_acquire+0x62f/0x4c20 [ 54.478962] ? vti6_tnl_create2+0x430/0x430 [ 54.483294] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 54.488940] ? check_preemption_disabled+0x48/0x280 [ 54.493979] dev_hard_start_xmit+0x295/0xc90 [ 54.498391] ? dev_direct_xmit+0x6b0/0x6b0 [ 54.502628] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 54.508259] ? netif_skb_features+0x690/0xb70 [ 54.512787] ? rcu_softirq_qs+0x20/0x20 [ 54.516768] ? lock_acquire+0x1ed/0x520 [ 54.520742] ? __dev_queue_xmit+0x3063/0x3ad0 [ 54.525243] ? kasan_check_read+0x11/0x20 [ 54.529389] ? do_raw_spin_lock+0x14f/0x350 [ 54.533825] ? rwlock_bug.part.2+0x90/0x90 [ 54.538059] ? netif_skb_features+0xb70/0xb70 [ 54.542879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 54.548429] ? check_preemption_disabled+0x48/0x280 [ 54.553451] __dev_queue_xmit+0x2f71/0x3ad0 [ 54.557939] ? save_stack+0x43/0xd0 [ 54.561565] ? kasan_kmalloc+0xc7/0xe0 [ 54.565449] ? __kmalloc_node_track_caller+0x50/0x70 [ 54.570556] ? netdev_pick_tx+0x310/0x310 [ 54.574825] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 54.580369] ? check_preemption_disabled+0x48/0x280 [ 54.585389] ? __lock_is_held+0xb5/0x140 [ 54.589453] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 54.594472] ? skb_release_data+0x1c4/0x880 [ 54.598796] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 54.604073] ? kasan_unpoison_shadow+0x35/0x50 [ 54.608656] ? skb_tx_error+0x2f0/0x2f0 [ 54.612646] ? __kmalloc_node_track_caller+0x50/0x70 [ 54.617906] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 54.623445] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 54.628984] ? kasan_check_write+0x14/0x20 [ 54.633219] ? pskb_expand_head+0x6b3/0x10f0 [ 54.637808] ? find_held_lock+0x36/0x1c0 [ 54.641962] ? skb_release_data+0x880/0x880 [ 54.646287] ? __alloc_skb+0x770/0x770 [ 54.650200] ? __lock_is_held+0xb5/0x140 [ 54.654399] ? kasan_check_write+0x14/0x20 [ 54.658632] ? __skb_clone+0x6c7/0xa00 [ 54.662520] ? __copy_skb_header+0x6b0/0x6b0 [ 54.666928] ? kmem_cache_alloc+0x33a/0x730 [ 54.671251] ? depot_save_stack+0x292/0x470 [ 54.676391] ? skb_ensure_writable+0x15e/0x640 [ 54.681144] dev_queue_xmit+0x17/0x20 [ 54.684976] ? dev_queue_xmit+0x17/0x20 [ 54.689093] __bpf_redirect+0x5cf/0xb20 [ 54.693357] bpf_clone_redirect+0x2f6/0x490 [ 54.697684] bpf_prog_c39d1ba309a769f7+0xb09/0x1000 [ 54.702699] ? bpf_test_run+0x175/0x780 [ 54.706989] ? lock_downgrade+0x900/0x900 [ 54.711139] ? ktime_get+0x332/0x400 [ 54.714888] ? find_held_lock+0x36/0x1c0 [ 54.718951] ? lock_acquire+0x1ed/0x520 [ 54.722924] ? bpf_test_run+0x3cb/0x780 [ 54.726903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 54.732441] ? check_preemption_disabled+0x48/0x280 [ 54.737458] ? kasan_check_read+0x11/0x20 [ 54.741752] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 54.747181] ? rcu_softirq_qs+0x20/0x20 [ 54.751182] ? bpf_cgroup_storage_release+0x220/0x220 [ 54.756373] ? skb_try_coalesce+0x1b70/0x1b70 [ 54.760959] ? bpf_test_run+0x25d/0x780 [ 54.765371] ? netlink_diag_dump+0x2a0/0x2a0 [ 54.769781] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 54.775317] ? bpf_test_init.isra.10+0x70/0x100 [ 54.779987] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 54.784745] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 54.789586] ? bpf_prog_add+0x69/0xd0 [ 54.793386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 54.798917] ? __bpf_prog_get+0x9b/0x290 [ 54.802977] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 54.807827] ? bpf_prog_test_run+0x130/0x1a0 [ 54.812481] ? __x64_sys_bpf+0x3d8/0x520 [ 54.816772] ? bpf_prog_get+0x20/0x20 [ 54.820587] ? do_syscall_64+0x1b9/0x820 [ 54.824781] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 54.830147] ? syscall_return_slowpath+0x5e0/0x5e0 [ 54.835224] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 54.840083] ? trace_hardirqs_on_caller+0x310/0x310 [ 54.845099] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 54.850120] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 54.855686] ? prepare_exit_to_usermode+0x291/0x3b0 [ 54.860706] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 54.865555] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 54.871301] [ 54.872925] Allocated by task 5722: [ 54.876553] save_stack+0x43/0xd0 [ 54.880001] kasan_kmalloc+0xc7/0xe0 [ 54.883711] __kmalloc_node_track_caller+0x50/0x70 [ 54.888642] __kmalloc_reserve.isra.40+0x41/0xe0 [ 54.893674] pskb_expand_head+0x230/0x10f0 [ 54.898055] skb_ensure_writable+0x3dd/0x640 [ 54.902466] bpf_clone_redirect+0x14a/0x490 [ 54.906788] bpf_prog_c39d1ba309a769f7+0xb09/0x1000 [ 54.911979] [ 54.913608] Freed by task 3501: [ 54.917002] save_stack+0x43/0xd0 [ 54.920462] __kasan_slab_free+0x102/0x150 [ 54.924700] kasan_slab_free+0xe/0x10 [ 54.928887] kfree+0xcf/0x230 [ 54.932180] skb_free_head+0x99/0xc0 [ 54.936141] skb_release_data+0x6a4/0x880 [ 54.940471] skb_release_all+0x4a/0x60 [ 54.944358] consume_skb+0x1ae/0x570 [ 54.948070] skb_free_datagram+0x1a/0xf0 [ 54.952133] unix_dgram_recvmsg+0xd6d/0x1b10 [ 54.956569] sock_recvmsg+0xd0/0x110 [ 54.960283] __sys_recvfrom+0x311/0x5d0 [ 54.964376] __x64_sys_recvfrom+0xe1/0x1a0 [ 54.968845] do_syscall_64+0x1b9/0x820 [ 54.972959] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 54.978282] [ 54.980029] The buggy address belongs to the object at ffff8801bb888500 [ 54.980029] which belongs to the cache kmalloc-512 of size 512 [ 54.993317] The buggy address is located 7 bytes to the right of [ 54.993317] 512-byte region [ffff8801bb888500, ffff8801bb888700) [ 55.005644] The buggy address belongs to the page: [ 55.010577] page:ffffea0006ee2200 count:1 mapcount:0 mapping:ffff8801da800940 index:0x0 [ 55.018831] flags: 0x2fffc0000000200(slab) [ 55.023076] raw: 02fffc0000000200 ffffea0006ed52c8 ffffea0006f05248 ffff8801da800940 [ 55.030963] raw: 0000000000000000 ffff8801bb888000 0000000100000006 0000000000000000 [ 55.038838] page dumped because: kasan: bad access detected [ 55.044539] [ 55.046190] Memory state around the buggy address: [ 55.051229] ffff8801bb888600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.058950] ffff8801bb888680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.066618] >ffff8801bb888700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.074440] ^ [ 55.077918] ffff8801bb888780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.085413] ffff8801bb888800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.092768] ================================================================== [ 55.100272] Disabling lock debugging due to kernel taint [ 55.106057] Kernel panic - not syncing: panic_on_warn set ... [ 55.106057] [ 55.113451] CPU: 0 PID: 5722 Comm: syz-executor411 Tainted: G B 4.19.0+ #162 [ 55.122065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 55.131417] Call Trace: [ 55.134233] dump_stack+0x244/0x39d [ 55.137956] ? dump_stack_print_info.cold.1+0x20/0x20 [ 55.143183] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 55.148095] panic+0x238/0x4e7 [ 55.151415] ? add_taint.cold.5+0x16/0x16 [ 55.155696] ? trace_hardirqs_on+0x9a/0x310 [ 55.160186] ? trace_hardirqs_on+0xb4/0x310 [ 55.164739] ? trace_hardirqs_on+0xb4/0x310 [ 55.169293] kasan_end_report+0x47/0x4f [ 55.173641] kasan_report.cold.8+0x76/0x309 [ 55.178086] ? _decode_session6+0x134a/0x1500 [ 55.182729] __asan_report_load1_noabort+0x14/0x20 [ 55.187672] _decode_session6+0x134a/0x1500 [ 55.192115] __xfrm_decode_session+0x71/0x140 [ 55.196615] vti6_tnl_xmit+0x3fc/0x1c10 [ 55.200842] ? __lock_acquire+0x62f/0x4c20 [ 55.205227] ? vti6_tnl_create2+0x430/0x430 [ 55.209928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 55.215471] ? check_preemption_disabled+0x48/0x280 [ 55.220625] dev_hard_start_xmit+0x295/0xc90 [ 55.225040] ? dev_direct_xmit+0x6b0/0x6b0 [ 55.229299] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 55.234848] ? netif_skb_features+0x690/0xb70 [ 55.239658] ? rcu_softirq_qs+0x20/0x20 [ 55.244123] ? lock_acquire+0x1ed/0x520 [ 55.248126] ? __dev_queue_xmit+0x3063/0x3ad0 [ 55.252650] ? kasan_check_read+0x11/0x20 [ 55.256797] ? do_raw_spin_lock+0x14f/0x350 [ 55.261120] ? rwlock_bug.part.2+0x90/0x90 [ 55.265470] ? netif_skb_features+0xb70/0xb70 [ 55.269966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 55.275514] ? check_preemption_disabled+0x48/0x280 [ 55.280800] __dev_queue_xmit+0x2f71/0x3ad0 [ 55.285132] ? save_stack+0x43/0xd0 [ 55.288876] ? kasan_kmalloc+0xc7/0xe0 [ 55.292909] ? __kmalloc_node_track_caller+0x50/0x70 [ 55.298129] ? netdev_pick_tx+0x310/0x310 [ 55.302735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 55.308755] ? check_preemption_disabled+0x48/0x280 [ 55.313781] ? __lock_is_held+0xb5/0x140 [ 55.318093] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 55.323258] ? skb_release_data+0x1c4/0x880 [ 55.327610] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 55.333024] ? kasan_unpoison_shadow+0x35/0x50 [ 55.337731] ? skb_tx_error+0x2f0/0x2f0 [ 55.341710] ? __kmalloc_node_track_caller+0x50/0x70 [ 55.347342] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 55.353000] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 55.358773] ? kasan_check_write+0x14/0x20 [ 55.363119] ? pskb_expand_head+0x6b3/0x10f0 [ 55.367557] ? find_held_lock+0x36/0x1c0 [ 55.371621] ? skb_release_data+0x880/0x880 [ 55.376052] ? __alloc_skb+0x770/0x770 [ 55.379941] ? __lock_is_held+0xb5/0x140 [ 55.384091] ? kasan_check_write+0x14/0x20 [ 55.388417] ? __skb_clone+0x6c7/0xa00 [ 55.392310] ? __copy_skb_header+0x6b0/0x6b0 [ 55.396847] ? kmem_cache_alloc+0x33a/0x730 [ 55.401512] ? depot_save_stack+0x292/0x470 [ 55.405835] ? skb_ensure_writable+0x15e/0x640 [ 55.410534] dev_queue_xmit+0x17/0x20 [ 55.414443] ? dev_queue_xmit+0x17/0x20 [ 55.418575] __bpf_redirect+0x5cf/0xb20 [ 55.422833] bpf_clone_redirect+0x2f6/0x490 [ 55.427293] bpf_prog_c39d1ba309a769f7+0xb09/0x1000 [ 55.432423] ? bpf_test_run+0x175/0x780 [ 55.436400] ? lock_downgrade+0x900/0x900 [ 55.440544] ? ktime_get+0x332/0x400 [ 55.444265] ? find_held_lock+0x36/0x1c0 [ 55.448447] ? lock_acquire+0x1ed/0x520 [ 55.452423] ? bpf_test_run+0x3cb/0x780 [ 55.456453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 55.461994] ? check_preemption_disabled+0x48/0x280 [ 55.467130] ? kasan_check_read+0x11/0x20 [ 55.471311] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 55.476585] ? rcu_softirq_qs+0x20/0x20 [ 55.480559] ? bpf_cgroup_storage_release+0x220/0x220 [ 55.485752] ? skb_try_coalesce+0x1b70/0x1b70 [ 55.490250] ? bpf_test_run+0x25d/0x780 [ 55.494228] ? netlink_diag_dump+0x2a0/0x2a0 [ 55.498636] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 55.504203] ? bpf_test_init.isra.10+0x70/0x100 [ 55.508874] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 55.513693] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 55.518557] ? bpf_prog_add+0x69/0xd0 [ 55.522362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 55.527908] ? __bpf_prog_get+0x9b/0x290 [ 55.531981] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 55.536820] ? bpf_prog_test_run+0x130/0x1a0 [ 55.541233] ? __x64_sys_bpf+0x3d8/0x520 [ 55.545427] ? bpf_prog_get+0x20/0x20 [ 55.549242] ? do_syscall_64+0x1b9/0x820 [ 55.553305] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 55.558725] ? syscall_return_slowpath+0x5e0/0x5e0 [ 55.563654] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 55.568501] ? trace_hardirqs_on_caller+0x310/0x310 [ 55.573581] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 55.578604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 55.584142] ? prepare_exit_to_usermode+0x291/0x3b0 [ 55.589209] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 55.594057] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 55.600582] Kernel Offset: disabled [ 55.604503] Rebooting in 86400 seconds..