[ 464.736856] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 464.743744] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 464.752099] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 464.758851] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 464.768452] device bridge_slave_1 left promiscuous mode [ 464.774087] bridge0: port 2(bridge_slave_1) entered disabled state [ 464.828297] device bridge_slave_0 left promiscuous mode [ 464.833766] bridge0: port 1(bridge_slave_0) entered disabled state [ 464.890546] device veth1_macvtap left promiscuous mode [ 464.896414] device veth0_macvtap left promiscuous mode [ 464.901720] device veth1_vlan left promiscuous mode [ 464.908019] device veth0_vlan left promiscuous mode [ 465.007502] device hsr_slave_1 left promiscuous mode [ 465.048177] device hsr_slave_0 left promiscuous mode [ 465.092785] team0 (unregistering): Port device team_slave_1 removed [ 465.101578] team0 (unregistering): Port device team_slave_0 removed [ 465.111305] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 465.157680] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 465.212851] bond0 (unregistering): Released all slaves Warning: Permanently added '10.128.0.108' (ECDSA) to the list of known hosts. [ 466.820197] IPVS: ftp: loaded support on port[0] = 21 [ 466.844672] ================================================================== [ 466.852172] BUG: KASAN: use-after-free in xfrm6_tunnel_destroy+0x59d/0x680 [ 466.859164] Read of size 8 at addr ffff8881e6362438 by task kworker/0:1/16006 [ 466.866634] [ 466.868240] CPU: 0 PID: 16006 Comm: kworker/0:1 Not tainted 4.14.210-syzkaller #0 [ 466.875833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.885215] Workqueue: events xfrm_state_gc_task [ 466.889945] Call Trace: [ 466.892507] dump_stack+0xf7/0x13b [ 466.896025] ? xfrm6_tunnel_destroy+0x59d/0x680 [ 466.900671] print_address_description.cold.7+0x9/0x1c9 [ 466.906008] ? xfrm6_tunnel_destroy+0x59d/0x680 [ 466.910650] kasan_report.cold.8+0x11a/0x2d3 [ 466.915035] __asan_report_load8_noabort+0x14/0x20 [ 466.919953] xfrm6_tunnel_destroy+0x59d/0x680 [ 466.924424] ? xfrm_state_gc_task+0x318/0x760 [ 466.928894] ? rcu_read_lock_sched_held+0x108/0x120 [ 466.933900] xfrm_state_gc_task+0x46a/0x760 [ 466.938197] ? xfrm_state_unregister_afinfo+0x160/0x160 [ 466.943538] process_one_work+0x79e/0x16c0 [ 466.947774] ? pwq_dec_nr_in_flight+0x2b0/0x2b0 [ 466.952434] worker_thread+0xcc/0xee0 [ 466.956213] kthread+0x338/0x400 [ 466.959563] ? process_one_work+0x16c0/0x16c0 [ 466.964029] ? kthread_create_on_node+0xa0/0xa0 [ 466.968672] ret_from_fork+0x24/0x30 [ 466.972359] [ 466.973965] Allocated by task 5810: [ 466.977566] save_stack_trace+0x16/0x20 [ 466.981514] save_stack+0x43/0xd0 [ 466.984937] kasan_kmalloc+0xc7/0xe0 [ 466.988642] __kmalloc+0x15b/0x7b0 [ 466.992156] ops_init+0xc2/0x380 [ 466.995495] setup_net+0x233/0x4f0 [ 466.999029] copy_net_ns+0x16b/0x3c0 [ 467.002716] create_new_namespaces+0x476/0x740 [ 467.007271] unshare_nsproxy_namespaces+0x87/0x1a0 [ 467.012191] SyS_unshare+0x299/0x6e0 [ 467.015881] do_syscall_64+0x1c7/0x5b0 [ 467.019772] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 467.024935] [ 467.026535] Freed by task 5: [ 467.029527] save_stack_trace+0x16/0x20 [ 467.033472] save_stack+0x43/0xd0 [ 467.036916] kasan_slab_free+0x71/0xc0 [ 467.040800] kfree+0xcc/0x270 [ 467.043879] ops_free_list.part.9+0x1b4/0x2c0 [ 467.048346] cleanup_net+0x420/0x7f0 [ 467.052032] process_one_work+0x79e/0x16c0 [ 467.056239] worker_thread+0xcc/0xee0 [ 467.060030] kthread+0x338/0x400 [ 467.063369] ret_from_fork+0x24/0x30 [ 467.067178] [ 467.068795] The buggy address belongs to the object at ffff8881e6361c40 [ 467.068795] which belongs to the cache kmalloc-8192 of size 8192 [ 467.081597] The buggy address is located 2040 bytes inside of [ 467.081597] 8192-byte region [ffff8881e6361c40, ffff8881e6363c40) [ 467.093618] The buggy address belongs to the page: [ 467.098539] page:ffffea000798d800 count:1 mapcount:0 mapping:ffff8881e6361c40 index:0x0 compound_mapcount: 0 [ 467.108499] flags: 0x17ffe0000008100(slab|head) [ 467.113158] raw: 017ffe0000008100 ffff8881e6361c40 0000000000000000 0000000100000001 [ 467.121011] raw: ffffea0007964520 ffffea0007957e20 ffff8881f6002080 0000000000000000 [ 467.128879] page dumped because: kasan: bad access detected [ 467.134563] [ 467.136179] Memory state around the buggy address: [ 467.141080] ffff8881e6362300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 467.148410] ffff8881e6362380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 467.155765] >ffff8881e6362400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 467.163100] ^ [ 467.168260] ffff8881e6362480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 467.175594] ffff8881e6362500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 467.182924] ================================================================== [ 467.190253] Disabling lock debugging due to kernel taint [ 467.195737] Kernel panic - not syncing: panic_on_warn set ... [ 467.195737] [ 467.203098] CPU: 0 PID: 16006 Comm: kworker/0:1 Tainted: G B 4.14.210-syzkaller #0 [ 467.211921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.221318] Workqueue: events xfrm_state_gc_task [ 467.226050] Call Trace: [ 467.228617] dump_stack+0xf7/0x13b [ 467.232132] ? xfrm6_tunnel_destroy+0x59d/0x680 [ 467.236776] panic+0x1b0/0x358 [ 467.239951] ? add_taint.cold.5+0x11/0x11 [ 467.244073] ? xfrm6_tunnel_destroy+0x59d/0x680 [ 467.248719] kasan_end_report+0x47/0x4f [ 467.252669] kasan_report.cold.8+0x76/0x2d3 [ 467.257007] __asan_report_load8_noabort+0x14/0x20 [ 467.261947] xfrm6_tunnel_destroy+0x59d/0x680 [ 467.266417] ? xfrm_state_gc_task+0x318/0x760 [ 467.270884] ? rcu_read_lock_sched_held+0x108/0x120 [ 467.275874] xfrm_state_gc_task+0x46a/0x760 [ 467.280169] ? xfrm_state_unregister_afinfo+0x160/0x160 [ 467.285509] process_one_work+0x79e/0x16c0 [ 467.289719] ? pwq_dec_nr_in_flight+0x2b0/0x2b0 [ 467.294361] worker_thread+0xcc/0xee0 [ 467.298138] kthread+0x338/0x400 [ 467.301494] ? process_one_work+0x16c0/0x16c0 [ 467.305960] ? kthread_create_on_node+0xa0/0xa0 [ 467.310600] ret_from_fork+0x24/0x30 [ 467.315799] Kernel Offset: disabled [ 467.319411] Rebooting in 86400 seconds..