[ 87.024911][ T28] audit: type=1800 audit(1581982088.012:25): pid=9926 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 87.775141][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 87.775152][ T28] audit: type=1800 audit(1581982088.762:29): pid=9926 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 87.801474][ T28] audit: type=1800 audit(1581982088.762:30): pid=9926 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.46' (ECDSA) to the list of known hosts. executing program executing program syzkaller login: [ 111.866558][ C1] hrtimer: interrupt took 30420 ns executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 112.164329][T10159] ================================================================== [ 112.172878][T10159] BUG: KASAN: use-after-free in __list_add_valid+0x9a/0xa0 [ 112.180569][T10159] Read of size 8 at addr ffff888093bbb1e0 by task syz-executor570/10159 [ 112.189098][T10159] [ 112.191727][T10159] CPU: 1 PID: 10159 Comm: syz-executor570 Not tainted 5.6.0-rc2-next-20200217-syzkaller #0 [ 112.202157][T10159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.212707][T10159] Call Trace: [ 112.216367][T10159] dump_stack+0x197/0x210 [ 112.220755][T10159] ? __list_add_valid+0x9a/0xa0 [ 112.225763][T10159] print_address_description.constprop.0.cold+0xd4/0x30b [ 112.234299][T10159] ? __list_add_valid+0x9a/0xa0 [ 112.239251][T10159] ? __list_add_valid+0x9a/0xa0 [ 112.244431][T10159] __kasan_report.cold+0x1b/0x32 [ 112.249587][T10159] ? __list_add_valid+0x9a/0xa0 [ 112.259781][T10159] kasan_report+0x12/0x20 [ 112.264640][T10159] __asan_report_load8_noabort+0x14/0x20 [ 112.270966][T10159] __list_add_valid+0x9a/0xa0 [ 112.275777][T10159] rdma_listen+0x6b7/0x970 [ 112.280378][T10159] ? _raw_spin_unlock+0x28/0x40 [ 112.285473][T10159] ucma_listen+0x14d/0x1c0 [ 112.290227][T10159] ? ucma_notify+0x190/0x190 [ 112.295104][T10159] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 112.301603][T10159] ? _copy_from_user+0x12c/0x1a0 [ 112.306777][T10159] ucma_write+0x2d7/0x3c0 [ 112.311377][T10159] ? ucma_notify+0x190/0x190 [ 112.316225][T10159] ? ucma_open+0x290/0x290 [ 112.320880][T10159] ? apparmor_file_permission+0x27/0x30 [ 112.327239][T10159] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 112.333582][T10159] ? security_file_permission+0x8f/0x380 [ 112.339598][T10159] __vfs_write+0x8a/0x110 [ 112.344357][T10159] ? ucma_open+0x290/0x290 [ 112.349274][T10159] vfs_write+0x268/0x5d0 [ 112.353868][T10159] ksys_write+0x220/0x290 [ 112.358557][T10159] ? __ia32_sys_read+0xb0/0xb0 [ 112.363881][T10159] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 112.370165][T10159] ? do_syscall_64+0x26/0x790 [ 112.375263][T10159] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 112.382282][T10159] ? do_syscall_64+0x26/0x790 [ 112.387245][T10159] __x64_sys_write+0x73/0xb0 [ 112.392237][T10159] do_syscall_64+0xfa/0x790 [ 112.396908][T10159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 112.402969][T10159] RIP: 0033:0x446a69 [ 112.408035][T10159] Code: e8 5c b3 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 0b 08 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 112.433253][T10159] RSP: 002b:00007fdd8433eda8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 112.443438][T10159] RAX: ffffffffffffffda RBX: 00000000006dbc28 RCX: 0000000000446a69 [ 112.453112][T10159] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000004 [ 112.463372][T10159] RBP: 00000000006dbc20 R08: 0000000000000000 R09: 0000000000000000 [ 112.471624][T10159] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006dbc2c [ 112.480024][T10159] R13: 0000000000000000 R14: 0000000000000000 R15: 20c49ba5e353f7cf [ 112.488854][T10159] [ 112.491384][T10159] Allocated by task 10155: [ 112.496160][T10159] save_stack+0x23/0x90 [ 112.500431][T10159] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 112.506675][T10159] kasan_kmalloc+0x9/0x10 [ 112.511192][T10159] kmem_cache_alloc_trace+0x158/0x790 [ 112.516746][T10159] __rdma_create_id+0x5e/0x870 [ 112.521567][T10159] ucma_create_id+0x1de/0x620 [ 112.526899][T10159] ucma_write+0x2d7/0x3c0 [ 112.531766][T10159] __vfs_write+0x8a/0x110 [ 112.536233][T10159] vfs_write+0x268/0x5d0 [ 112.540954][T10159] ksys_write+0x220/0x290 [ 112.545574][T10159] __x64_sys_write+0x73/0xb0 [ 112.551196][T10159] do_syscall_64+0xfa/0x790 [ 112.556282][T10159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 112.562367][T10159] [ 112.565170][T10159] Freed by task 10157: [ 112.569507][T10159] save_stack+0x23/0x90 [ 112.573971][T10159] __kasan_slab_free+0x102/0x150 [ 112.579740][T10159] kasan_slab_free+0xe/0x10 [ 112.584737][T10159] kfree+0x10a/0x2c0 [ 112.588952][T10159] rdma_destroy_id+0x7c6/0xdd0 [ 112.594493][T10159] ucma_close+0x115/0x310 [ 112.598829][T10159] __fput+0x2ff/0x890 [ 112.603040][T10159] ____fput+0x16/0x20 [ 112.607396][T10159] task_work_run+0x145/0x1c0 [ 112.612235][T10159] do_exit+0xbcb/0x3030 [ 112.616488][T10159] do_group_exit+0x135/0x360 [ 112.621274][T10159] get_signal+0x47c/0x24f0 [ 112.626150][T10159] do_signal+0x87/0x1700 [ 112.631022][T10159] exit_to_usermode_loop+0x286/0x380 [ 112.636637][T10159] do_syscall_64+0x676/0x790 [ 112.641716][T10159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 112.648182][T10159] [ 112.650762][T10159] The buggy address belongs to the object at ffff888093bbb000 [ 112.650762][T10159] which belongs to the cache kmalloc-2k of size 2048 [ 112.665831][T10159] The buggy address is located 480 bytes inside of [ 112.665831][T10159] 2048-byte region [ffff888093bbb000, ffff888093bbb800) [ 112.679677][T10159] The buggy address belongs to the page: [ 112.685493][T10159] page:ffffea00024eeec0 refcount:1 mapcount:0 mapping:00000000f8d67f88 index:0x0 [ 112.695264][T10159] flags: 0xfffe0000000200(slab) [ 112.700408][T10159] raw: 00fffe0000000200 ffffea00026b2908 ffffea00024eee88 ffff8880aa400e00 [ 112.709791][T10159] raw: 0000000000000000 ffff888093bbb000 0000000100000001 0000000000000000 [ 112.719115][T10159] page dumped because: kasan: bad access detected [ 112.726247][T10159] [ 112.728945][T10159] Memory state around the buggy address: [ 112.735496][T10159] ffff888093bbb080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 112.743895][T10159] ffff888093bbb100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 112.752067][T10159] >ffff888093bbb180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 112.760704][T10159] ^ [ 112.768108][T10159] ffff888093bbb200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 112.776833][T10159] ffff888093bbb280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 112.785304][T10159] ================================================================== [ 112.793938][T10159] Disabling lock debugging due to kernel taint [ 112.802132][T10159] Kernel panic - not syncing: panic_on_warn set ... [ 112.809074][T10159] CPU: 1 PID: 10159 Comm: syz-executor570 Tainted: G B 5.6.0-rc2-next-20200217-syzkaller #0 [ 112.820867][T10159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.832195][T10159] Call Trace: [ 112.835574][T10159] dump_stack+0x197/0x210 [ 112.840516][T10159] panic+0x2e3/0x75c [ 112.844735][T10159] ? add_taint.cold+0x16/0x16 [ 112.849420][T10159] ? __list_add_valid+0x9a/0xa0 [ 112.854357][T10159] ? preempt_schedule+0x4b/0x60 [ 112.859398][T10159] ? ___preempt_schedule+0x16/0x18 [ 112.865023][T10159] ? trace_hardirqs_on+0x5e/0x240 [ 112.870368][T10159] ? __list_add_valid+0x9a/0xa0 [ 112.875573][T10159] end_report+0x47/0x4f [ 112.879808][T10159] ? __list_add_valid+0x9a/0xa0 [ 112.884873][T10159] __kasan_report.cold+0xe/0x32 [ 112.890031][T10159] ? __list_add_valid+0x9a/0xa0 [ 112.895366][T10159] kasan_report+0x12/0x20 [ 112.899921][T10159] __asan_report_load8_noabort+0x14/0x20 [ 112.905845][T10159] __list_add_valid+0x9a/0xa0 [ 112.911280][T10159] rdma_listen+0x6b7/0x970 [ 112.915788][T10159] ? _raw_spin_unlock+0x28/0x40 [ 112.921086][T10159] ucma_listen+0x14d/0x1c0 [ 112.926205][T10159] ? ucma_notify+0x190/0x190 [ 112.931045][T10159] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 112.937962][T10159] ? _copy_from_user+0x12c/0x1a0 [ 112.943216][T10159] ucma_write+0x2d7/0x3c0 [ 112.947793][T10159] ? ucma_notify+0x190/0x190 [ 112.952819][T10159] ? ucma_open+0x290/0x290 [ 112.957370][T10159] ? apparmor_file_permission+0x27/0x30 [ 112.963318][T10159] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 112.970050][T10159] ? security_file_permission+0x8f/0x380 [ 112.976357][T10159] __vfs_write+0x8a/0x110 [ 112.980844][T10159] ? ucma_open+0x290/0x290 [ 112.985710][T10159] vfs_write+0x268/0x5d0 [ 112.990691][T10159] ksys_write+0x220/0x290 [ 112.995566][T10159] ? __ia32_sys_read+0xb0/0xb0 [ 113.000836][T10159] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 113.006917][T10159] ? do_syscall_64+0x26/0x790 [ 113.012374][T10159] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 113.019137][T10159] ? do_syscall_64+0x26/0x790 [ 113.024340][T10159] __x64_sys_write+0x73/0xb0 [ 113.029406][T10159] do_syscall_64+0xfa/0x790 [ 113.034196][T10159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 113.040752][T10159] RIP: 0033:0x446a69 [ 113.044865][T10159] Code: e8 5c b3 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 0b 08 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 113.066073][T10159] RSP: 002b:00007fdd8433eda8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 113.074972][T10159] RAX: ffffffffffffffda RBX: 00000000006dbc28 RCX: 0000000000446a69 [ 113.083395][T10159] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000004 [ 113.092015][T10159] RBP: 00000000006dbc20 R08: 0000000000000000 R09: 0000000000000000 [ 113.101373][T10159] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006dbc2c [ 113.110224][T10159] R13: 0000000000000000 R14: 0000000000000000 R15: 20c49ba5e353f7cf [ 113.119475][T10159] Kernel Offset: disabled [ 113.124000][T10159] Rebooting in 86400 seconds..