[ 89.958594][ T26] audit: type=1800 audit(1580773918.841:26): pid=9561 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 90.719883][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 90.719895][ T26] audit: type=1800 audit(1580773919.621:29): pid=9561 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 90.746566][ T26] audit: type=1800 audit(1580773919.621:30): pid=9561 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.8' (ECDSA) to the list of known hosts. 2020/02/03 23:59:23 parsed 1 programs 2020/02/03 23:59:25 executed programs: 0 syzkaller login: [ 536.262269][ T9735] IPVS: ftp: loaded support on port[0] = 21 [ 536.319489][ T9735] chnl_net:caif_netlink_parms(): no params data found [ 536.353784][ T9735] bridge0: port 1(bridge_slave_0) entered blocking state [ 536.361583][ T9735] bridge0: port 1(bridge_slave_0) entered disabled state [ 536.369687][ T9735] device bridge_slave_0 entered promiscuous mode [ 536.378278][ T9735] bridge0: port 2(bridge_slave_1) entered blocking state [ 536.385394][ T9735] bridge0: port 2(bridge_slave_1) entered disabled state [ 536.393191][ T9735] device bridge_slave_1 entered promiscuous mode [ 536.409703][ T9735] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 536.420396][ T9735] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 536.439360][ T9735] team0: Port device team_slave_0 added [ 536.446842][ T9735] team0: Port device team_slave_1 added [ 536.461483][ T9735] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 536.468521][ T9735] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 536.494571][ T9735] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 536.506816][ T9735] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 536.514166][ T9735] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 536.540228][ T9735] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 536.620248][ T9735] device hsr_slave_0 entered promiscuous mode [ 536.658214][ T9735] device hsr_slave_1 entered promiscuous mode [ 536.758648][ T9735] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 536.800644][ T9735] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 536.851356][ T9735] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 536.900354][ T9735] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 536.950072][ T9735] bridge0: port 2(bridge_slave_1) entered blocking state [ 536.957251][ T9735] bridge0: port 2(bridge_slave_1) entered forwarding state [ 536.965141][ T9735] bridge0: port 1(bridge_slave_0) entered blocking state [ 536.972261][ T9735] bridge0: port 1(bridge_slave_0) entered forwarding state [ 537.015322][ T9735] 8021q: adding VLAN 0 to HW filter on device bond0 [ 537.028270][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 537.049177][ T2973] bridge0: port 1(bridge_slave_0) entered disabled state [ 537.068112][ T2973] bridge0: port 2(bridge_slave_1) entered disabled state [ 537.076139][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 537.089022][ T9735] 8021q: adding VLAN 0 to HW filter on device team0 [ 537.111708][ T2769] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 537.120147][ T2769] bridge0: port 1(bridge_slave_0) entered blocking state [ 537.127238][ T2769] bridge0: port 1(bridge_slave_0) entered forwarding state [ 537.148198][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 537.156660][ T2886] bridge0: port 2(bridge_slave_1) entered blocking state [ 537.163765][ T2886] bridge0: port 2(bridge_slave_1) entered forwarding state [ 537.172519][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 537.181973][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 537.199632][ T2769] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 537.209034][ T2769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 537.217112][ T2769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 537.227672][ T9735] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 537.247228][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 537.254878][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 537.268125][ T9735] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 537.286392][ T2769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 537.307570][ T2769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 537.316993][ T2769] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 537.326300][ T2769] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 537.336410][ T9735] device veth0_vlan entered promiscuous mode [ 537.350100][ T9735] device veth1_vlan entered promiscuous mode [ 537.372230][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 537.380937][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 537.391800][ T9735] device veth0_macvtap entered promiscuous mode [ 537.402003][ T9735] device veth1_macvtap entered promiscuous mode [ 537.418901][ T9735] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 537.426618][ T2769] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 537.434842][ T2769] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 537.442811][ T2769] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 537.451453][ T2769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 537.463508][ T9735] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 537.471960][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 537.481309][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2020/02/03 23:59:30 executed programs: 139 [ 545.068237][T10844] ================================================================== [ 545.076659][T10844] BUG: KASAN: use-after-free in vgem_gem_dumb_create+0x238/0x250 [ 545.085713][T10844] Read of size 8 at addr ffff888098bcc908 by task syz-executor.0/10844 [ 545.093973][T10844] [ 545.096301][T10844] CPU: 1 PID: 10844 Comm: syz-executor.0 Not tainted 5.5.0-syzkaller #0 [ 545.104608][T10844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.114698][T10844] Call Trace: [ 545.120162][T10844] dump_stack+0x197/0x210 [ 545.124565][T10844] ? vgem_gem_dumb_create+0x238/0x250 [ 545.130086][T10844] print_address_description.constprop.0.cold+0xd4/0x30b [ 545.137190][T10844] ? vgem_gem_dumb_create+0x238/0x250 [ 545.142557][T10844] ? vgem_gem_dumb_create+0x238/0x250 [ 545.147925][T10844] __kasan_report.cold+0x1b/0x32 [ 545.152857][T10844] ? vgem_gem_dumb_create+0x238/0x250 [ 545.158227][T10844] kasan_report+0x12/0x20 [ 545.162554][T10844] __asan_report_load8_noabort+0x14/0x20 [ 545.168187][T10844] vgem_gem_dumb_create+0x238/0x250 [ 545.173436][T10844] drm_mode_create_dumb+0x282/0x310 [ 545.178722][T10844] drm_mode_create_dumb_ioctl+0x26/0x30 [ 545.184303][T10844] drm_ioctl_kernel+0x244/0x300 [ 545.189145][T10844] ? drm_mode_create_dumb+0x310/0x310 [ 545.194505][T10844] ? drm_setversion+0x8c0/0x8c0 [ 545.199462][T10844] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 545.205736][T10844] ? _copy_from_user+0x12c/0x1a0 [ 545.210886][T10844] drm_ioctl+0x54e/0xa60 [ 545.215158][T10844] ? drm_mode_create_dumb+0x310/0x310 [ 545.220541][T10844] ? drm_ioctl_kernel+0x300/0x300 [ 545.225626][T10844] ? ksys_dup3+0x3e0/0x3e0 [ 545.230064][T10844] ? ns_to_kernel_old_timeval+0x100/0x100 [ 545.236051][T10844] ? tomoyo_file_ioctl+0x23/0x30 [ 545.240980][T10844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 545.247255][T10844] ? security_file_ioctl+0x8d/0xc0 [ 545.252365][T10844] ? drm_ioctl_kernel+0x300/0x300 [ 545.257412][T10844] ksys_ioctl+0x123/0x180 [ 545.261740][T10844] __x64_sys_ioctl+0x73/0xb0 [ 545.266350][T10844] do_syscall_64+0xfa/0x790 [ 545.270917][T10844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.276801][T10844] RIP: 0033:0x45b399 [ 545.280690][T10844] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 545.300471][T10844] RSP: 002b:00007fd715ea6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 545.308882][T10844] RAX: ffffffffffffffda RBX: 00007fd715ea76d4 RCX: 000000000045b399 [ 545.316843][T10844] RDX: 0000000020000000 RSI: 00000000c02064b2 RDI: 0000000000000003 [ 545.324806][T10844] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 545.333638][T10844] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 545.341691][T10844] R13: 0000000000000285 R14: 00000000004d1588 R15: 000000000075bfd4 [ 545.349736][T10844] [ 545.352150][T10844] Allocated by task 10844: [ 545.356652][T10844] save_stack+0x23/0x90 [ 545.360941][T10844] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 545.366571][T10844] kasan_kmalloc+0x9/0x10 [ 545.370890][T10844] kmem_cache_alloc_trace+0x158/0x790 [ 545.376259][T10844] __vgem_gem_create+0x49/0x100 [ 545.381106][T10844] vgem_gem_dumb_create+0xd7/0x250 [ 545.386211][T10844] drm_mode_create_dumb+0x282/0x310 [ 545.391436][T10844] drm_mode_create_dumb_ioctl+0x26/0x30 [ 545.396974][T10844] drm_ioctl_kernel+0x244/0x300 [ 545.401872][T10844] drm_ioctl+0x54e/0xa60 [ 545.406108][T10844] ksys_ioctl+0x123/0x180 [ 545.410442][T10844] __x64_sys_ioctl+0x73/0xb0 [ 545.415025][T10844] do_syscall_64+0xfa/0x790 [ 545.419562][T10844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.425442][T10844] [ 545.427758][T10844] Freed by task 10844: [ 545.431851][T10844] save_stack+0x23/0x90 [ 545.435999][T10844] __kasan_slab_free+0x102/0x150 [ 545.440983][T10844] kasan_slab_free+0xe/0x10 [ 545.445545][T10844] kfree+0x10a/0x2c0 [ 545.449448][T10844] vgem_gem_free_object+0xbe/0xe0 [ 545.454504][T10844] drm_gem_object_free+0x100/0x220 [ 545.459607][T10844] drm_gem_object_put_unlocked+0x196/0x1c0 [ 545.465399][T10844] vgem_gem_dumb_create+0x115/0x250 [ 545.470578][T10844] drm_mode_create_dumb+0x282/0x310 [ 545.475762][T10844] drm_mode_create_dumb_ioctl+0x26/0x30 [ 545.481297][T10844] drm_ioctl_kernel+0x244/0x300 [ 545.486136][T10844] drm_ioctl+0x54e/0xa60 [ 545.490438][T10844] ksys_ioctl+0x123/0x180 [ 545.494764][T10844] __x64_sys_ioctl+0x73/0xb0 [ 545.499346][T10844] do_syscall_64+0xfa/0x790 [ 545.503881][T10844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.509795][T10844] [ 545.512116][T10844] The buggy address belongs to the object at ffff888098bcc800 [ 545.512116][T10844] which belongs to the cache kmalloc-1k of size 1024 [ 545.526171][T10844] The buggy address is located 264 bytes inside of [ 545.526171][T10844] 1024-byte region [ffff888098bcc800, ffff888098bccc00) [ 545.539513][T10844] The buggy address belongs to the page: [ 545.545163][T10844] page:ffffea000262f300 refcount:1 mapcount:0 mapping:ffff8880aa400c40 index:0x0 [ 545.554490][T10844] flags: 0xfffe0000000200(slab) [ 545.559340][T10844] raw: 00fffe0000000200 ffffea00024fa548 ffffea0002784f88 ffff8880aa400c40 [ 545.567924][T10844] raw: 0000000000000000 ffff888098bcc000 0000000100000002 0000000000000000 [ 545.576527][T10844] page dumped because: kasan: bad access detected [ 545.582924][T10844] [ 545.585241][T10844] Memory state around the buggy address: [ 545.590904][T10844] ffff888098bcc800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 545.598962][T10844] ffff888098bcc880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 545.607027][T10844] >ffff888098bcc900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 545.615120][T10844] ^ [ 545.619432][T10844] ffff888098bcc980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 545.627614][T10844] ffff888098bcca00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 545.635748][T10844] ================================================================== [ 545.643797][T10844] Disabling lock debugging due to kernel taint [ 545.650938][T10844] Kernel panic - not syncing: panic_on_warn set ... [ 545.657631][T10844] CPU: 1 PID: 10844 Comm: syz-executor.0 Tainted: G B 5.5.0-syzkaller #0 [ 545.667327][T10844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.677377][T10844] Call Trace: [ 545.680659][T10844] dump_stack+0x197/0x210 [ 545.685073][T10844] panic+0x2e3/0x75c [ 545.688962][T10844] ? add_taint.cold+0x16/0x16 [ 545.693664][T10844] ? vgem_gem_dumb_create+0x238/0x250 [ 545.699029][T10844] ? preempt_schedule+0x4b/0x60 [ 545.704053][T10844] ? ___preempt_schedule+0x16/0x18 [ 545.709201][T10844] ? trace_hardirqs_on+0x5e/0x240 [ 545.714213][T10844] ? vgem_gem_dumb_create+0x238/0x250 [ 545.719575][T10844] end_report+0x47/0x4f [ 545.723756][T10844] ? vgem_gem_dumb_create+0x238/0x250 [ 545.729117][T10844] __kasan_report.cold+0xe/0x32 [ 545.733971][T10844] ? vgem_gem_dumb_create+0x238/0x250 [ 545.739335][T10844] kasan_report+0x12/0x20 [ 545.743649][T10844] __asan_report_load8_noabort+0x14/0x20 [ 545.749263][T10844] vgem_gem_dumb_create+0x238/0x250 [ 545.754450][T10844] drm_mode_create_dumb+0x282/0x310 [ 545.759630][T10844] drm_mode_create_dumb_ioctl+0x26/0x30 [ 545.765153][T10844] drm_ioctl_kernel+0x244/0x300 [ 545.769981][T10844] ? drm_mode_create_dumb+0x310/0x310 [ 545.775346][T10844] ? drm_setversion+0x8c0/0x8c0 [ 545.780188][T10844] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 545.786412][T10844] ? _copy_from_user+0x12c/0x1a0 [ 545.791354][T10844] drm_ioctl+0x54e/0xa60 [ 545.795621][T10844] ? drm_mode_create_dumb+0x310/0x310 [ 545.800992][T10844] ? drm_ioctl_kernel+0x300/0x300 [ 545.806003][T10844] ? ksys_dup3+0x3e0/0x3e0 [ 545.810400][T10844] ? ns_to_kernel_old_timeval+0x100/0x100 [ 545.816155][T10844] ? tomoyo_file_ioctl+0x23/0x30 [ 545.821085][T10844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 545.827313][T10844] ? security_file_ioctl+0x8d/0xc0 [ 545.832406][T10844] ? drm_ioctl_kernel+0x300/0x300 [ 545.837464][T10844] ksys_ioctl+0x123/0x180 [ 545.841790][T10844] __x64_sys_ioctl+0x73/0xb0 [ 545.846382][T10844] do_syscall_64+0xfa/0x790 [ 545.850877][T10844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.856758][T10844] RIP: 0033:0x45b399 [ 545.860635][T10844] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 545.880275][T10844] RSP: 002b:00007fd715ea6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 545.888690][T10844] RAX: ffffffffffffffda RBX: 00007fd715ea76d4 RCX: 000000000045b399 [ 545.896701][T10844] RDX: 0000000020000000 RSI: 00000000c02064b2 RDI: 0000000000000003 [ 545.904659][T10844] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 545.912618][T10844] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 545.920576][T10844] R13: 0000000000000285 R14: 00000000004d1588 R15: 000000000075bfd4 [ 545.930029][T10844] Kernel Offset: disabled [ 545.934358][T10844] Rebooting in 86400 seconds..