[ 400.596886] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 400.603941] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 400.613224] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 400.620149] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 400.629535] device bridge_slave_1 left promiscuous mode [ 400.635693] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.677736] device bridge_slave_0 left promiscuous mode [ 400.683330] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.740667] device veth1_macvtap left promiscuous mode [ 400.746599] device veth0_macvtap left promiscuous mode [ 400.751911] device veth1_vlan left promiscuous mode [ 400.758069] device veth0_vlan left promiscuous mode [ 400.853496] device hsr_slave_1 left promiscuous mode [ 400.898613] device hsr_slave_0 left promiscuous mode [ 400.943448] team0 (unregistering): Port device team_slave_1 removed [ 400.952556] team0 (unregistering): Port device team_slave_0 removed [ 400.962301] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 401.009161] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 401.073992] bond0 (unregistering): Released all slaves Warning: Permanently added '10.128.15.218' (ECDSA) to the list of known hosts. [ 402.684036] IPVS: ftp: loaded support on port[0] = 21 [ 402.705340] ================================================================== [ 402.712911] BUG: KASAN: use-after-free in xfrm6_tunnel_destroy+0x59d/0x680 [ 402.719912] Read of size 8 at addr ffff8881e3634ef8 by task kworker/1:4/865 [ 402.727070] [ 402.728682] CPU: 1 PID: 865 Comm: kworker/1:4 Not tainted 4.14.217-syzkaller #0 [ 402.736105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.745443] Workqueue: events xfrm_state_gc_task [ 402.750185] Call Trace: [ 402.752842] dump_stack+0xf7/0x137 [ 402.756360] ? xfrm6_tunnel_destroy+0x59d/0x680 [ 402.761016] print_address_description.cold.7+0x9/0x1c9 [ 402.766529] ? xfrm6_tunnel_destroy+0x59d/0x680 [ 402.771278] kasan_report.cold.8+0x11a/0x2d3 [ 402.775664] __asan_report_load8_noabort+0x14/0x20 [ 402.780568] xfrm6_tunnel_destroy+0x59d/0x680 [ 402.785141] ? xfrm_state_gc_task+0x318/0x760 [ 402.789611] ? rcu_read_lock_sched_held+0x108/0x120 [ 402.794605] xfrm_state_gc_task+0x46a/0x760 [ 402.798982] ? xfrm_state_unregister_afinfo+0x160/0x160 [ 402.804328] process_one_work+0x79e/0x16c0 [ 402.808543] ? pwq_dec_nr_in_flight+0x2b0/0x2b0 [ 402.813193] worker_thread+0xcc/0xee0 [ 402.816973] kthread+0x338/0x400 [ 402.820325] ? process_one_work+0x16c0/0x16c0 [ 402.824824] ? kthread_create_on_node+0xa0/0xa0 [ 402.829471] ret_from_fork+0x24/0x30 [ 402.833161] [ 402.834766] Allocated by task 5825: [ 402.838370] save_stack_trace+0x16/0x20 [ 402.842415] save_stack+0x43/0xd0 [ 402.845843] kasan_kmalloc+0xc7/0xe0 [ 402.849529] __kmalloc+0x15b/0x7b0 [ 402.853145] ops_init+0xc2/0x380 [ 402.856496] setup_net+0x233/0x4f0 [ 402.860007] copy_net_ns+0x16b/0x3c0 [ 402.863696] create_new_namespaces+0x476/0x740 [ 402.868259] unshare_nsproxy_namespaces+0x87/0x1a0 [ 402.873171] SyS_unshare+0x299/0x6e0 [ 402.876858] do_syscall_64+0x1c7/0x5b0 [ 402.880726] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 402.885909] [ 402.887511] Freed by task 28: [ 402.890609] save_stack_trace+0x16/0x20 [ 402.894556] save_stack+0x43/0xd0 [ 402.897984] kasan_slab_free+0x71/0xc0 [ 402.901968] kfree+0xcc/0x270 [ 402.905223] ops_free_list.part.9+0x1b4/0x2c0 [ 402.909689] cleanup_net+0x420/0x7f0 [ 402.913387] process_one_work+0x79e/0x16c0 [ 402.917594] worker_thread+0xcc/0xee0 [ 402.921367] kthread+0x338/0x400 [ 402.924707] ret_from_fork+0x24/0x30 [ 402.928393] [ 402.929995] The buggy address belongs to the object at ffff8881e3634700 [ 402.929995] which belongs to the cache kmalloc-8192 of size 8192 [ 402.942807] The buggy address is located 2040 bytes inside of [ 402.942807] 8192-byte region [ffff8881e3634700, ffff8881e3636700) [ 402.954837] The buggy address belongs to the page: [ 402.959741] page:ffffea00078d8d00 count:1 mapcount:0 mapping:ffff8881e3634700 index:0x0 compound_mapcount: 0 [ 402.969696] flags: 0x17ffe0000008100(slab|head) [ 402.977118] raw: 017ffe0000008100 ffff8881e3634700 0000000000000000 0000000100000001 [ 402.985014] raw: ffffea00078d0520 ffffea00078c2f20 ffff8881f6002080 0000000000000000 [ 402.992934] page dumped because: kasan: bad access detected [ 402.998726] [ 403.000350] Memory state around the buggy address: [ 403.005341] ffff8881e3634d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 403.012688] ffff8881e3634e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 403.020029] >ffff8881e3634e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 403.027364] ^ [ 403.034627] ffff8881e3634f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 403.041967] ffff8881e3634f80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 403.049299] ================================================================== [ 403.056634] Disabling lock debugging due to kernel taint [ 403.062351] Kernel panic - not syncing: panic_on_warn set ... [ 403.062351] [ 403.069712] CPU: 1 PID: 865 Comm: kworker/1:4 Tainted: G B 4.14.217-syzkaller #0 [ 403.078920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.088295] Workqueue: events xfrm_state_gc_task [ 403.093025] Call Trace: [ 403.095595] dump_stack+0xf7/0x137 [ 403.099143] ? xfrm6_tunnel_destroy+0x59d/0x680 [ 403.103794] panic+0x1b0/0x358 [ 403.106980] ? add_taint.cold.5+0x11/0x11 [ 403.111107] ? xfrm6_tunnel_destroy+0x59d/0x680 [ 403.115768] kasan_end_report+0x47/0x4f [ 403.119718] kasan_report.cold.8+0x76/0x2d3 [ 403.124019] __asan_report_load8_noabort+0x14/0x20 [ 403.129118] xfrm6_tunnel_destroy+0x59d/0x680 [ 403.133610] ? xfrm_state_gc_task+0x318/0x760 [ 403.138092] ? rcu_read_lock_sched_held+0x108/0x120 [ 403.143363] xfrm_state_gc_task+0x46a/0x760 [ 403.147661] ? xfrm_state_unregister_afinfo+0x160/0x160 [ 403.153012] process_one_work+0x79e/0x16c0 [ 403.157331] ? pwq_dec_nr_in_flight+0x2b0/0x2b0 [ 403.161986] worker_thread+0xcc/0xee0 [ 403.165772] kthread+0x338/0x400 [ 403.169110] ? process_one_work+0x16c0/0x16c0 [ 403.173857] ? kthread_create_on_node+0xa0/0xa0 [ 403.178568] ret_from_fork+0x24/0x30 [ 403.184133] Kernel Offset: disabled [ 403.187753] Rebooting in 86400 seconds..