[ 36.437901] audit: type=1800 audit(1551628488.052:27): pid=7546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 36.457865] audit: type=1800 audit(1551628488.052:28): pid=7546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 37.193676] audit: type=1800 audit(1551628488.852:29): pid=7546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 37.216355] audit: type=1800 audit(1551628488.872:30): pid=7546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.203' (ECDSA) to the list of known hosts. 2019/03/03 15:55:11 parsed 1 programs 2019/03/03 15:55:12 executed programs: 0 syzkaller login: [ 61.008351] IPVS: ftp: loaded support on port[0] = 21 [ 61.055983] chnl_net:caif_netlink_parms(): no params data found [ 61.081076] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.087694] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.094878] device bridge_slave_0 entered promiscuous mode [ 61.101905] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.108339] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.115221] device bridge_slave_1 entered promiscuous mode [ 61.129240] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 61.137827] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.153239] team0: Port device team_slave_0 added [ 61.159232] team0: Port device team_slave_1 added [ 61.229817] device hsr_slave_0 entered promiscuous mode [ 61.298769] device hsr_slave_1 entered promiscuous mode [ 61.374821] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.381273] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.388039] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.394500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.421764] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.432991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.441836] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.450244] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.457299] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 61.467423] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.476238] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.483939] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.490303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.509165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.516705] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.523074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.531497] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.539814] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.547294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.554831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.563652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 61.571840] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.586993] 8021q: adding VLAN 0 to HW filter on device batadv0 2019/03/03 15:55:17 executed programs: 190 2019/03/03 15:55:22 executed programs: 385 [ 72.262242] ================================================================== [ 72.269815] BUG: KASAN: use-after-free in __list_add_valid+0x9a/0xa0 [ 72.276294] Read of size 8 at addr ffff8880a79e6420 by task syz-executor.0/10302 [ 72.283818] [ 72.285450] CPU: 0 PID: 10302 Comm: syz-executor.0 Not tainted 5.0.0-rc8+ #3 [ 72.292645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.301992] Call Trace: [ 72.304586] dump_stack+0x172/0x1f0 [ 72.308214] ? __list_add_valid+0x9a/0xa0 [ 72.312368] print_address_description.cold+0x7c/0x20d [ 72.317632] ? __list_add_valid+0x9a/0xa0 [ 72.321769] ? __list_add_valid+0x9a/0xa0 [ 72.325907] kasan_report.cold+0x1b/0x40 [ 72.329974] ? __list_add_valid+0x9a/0xa0 [ 72.334130] __asan_report_load8_noabort+0x14/0x20 [ 72.339047] __list_add_valid+0x9a/0xa0 [ 72.343013] rdma_listen+0x63b/0x8e0 [ 72.346718] ucma_listen+0x14d/0x1c0 [ 72.350422] ? ucma_notify+0x190/0x190 [ 72.354299] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 72.359824] ? _copy_from_user+0xdd/0x150 [ 72.363976] ucma_write+0x2da/0x3c0 [ 72.367618] ? ucma_notify+0x190/0x190 [ 72.371515] ? ucma_open+0x290/0x290 [ 72.375239] ? __fget+0x340/0x540 [ 72.378709] __vfs_write+0x116/0x8e0 [ 72.382416] ? lock_downgrade+0x810/0x810 [ 72.386549] ? ucma_open+0x290/0x290 [ 72.390298] ? kernel_read+0x120/0x120 [ 72.394171] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 72.399089] ? common_file_perm+0x1d6/0x6f0 [ 72.403406] ? apparmor_file_permission+0x25/0x30 [ 72.408272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 72.413828] ? security_file_permission+0x94/0x320 [ 72.418761] ? rw_verify_area+0x118/0x360 [ 72.422919] vfs_write+0x20c/0x580 [ 72.426446] ksys_write+0xea/0x1f0 [ 72.429973] ? __ia32_sys_read+0xb0/0xb0 [ 72.434023] ? do_syscall_64+0x26/0x610 [ 72.437988] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 72.443335] ? do_syscall_64+0x26/0x610 [ 72.447318] __x64_sys_write+0x73/0xb0 [ 72.451193] do_syscall_64+0x103/0x610 [ 72.455095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 72.460277] RIP: 0033:0x457e29 [ 72.463467] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 72.482351] RSP: 002b:00007fe2b3273c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 72.490060] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 72.497321] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000003 [ 72.504583] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 72.511836] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b32746d4 [ 72.519089] R13: 00000000004cd9b8 R14: 00000000004dcc38 R15: 00000000ffffffff [ 72.526345] [ 72.527956] Allocated by task 10297: [ 72.531660] save_stack+0x45/0xd0 [ 72.535099] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 72.540014] kasan_kmalloc+0x9/0x10 [ 72.543625] kmem_cache_alloc_trace+0x151/0x760 [ 72.548311] __rdma_create_id+0x5f/0x4e0 [ 72.552377] ucma_create_id+0x1de/0x640 [ 72.556364] ucma_write+0x2da/0x3c0 [ 72.559975] __vfs_write+0x116/0x8e0 [ 72.563684] vfs_write+0x20c/0x580 [ 72.567217] ksys_write+0xea/0x1f0 [ 72.570748] __x64_sys_write+0x73/0xb0 [ 72.574624] do_syscall_64+0x103/0x610 [ 72.578498] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 72.583666] [ 72.585271] Freed by task 10293: [ 72.588638] save_stack+0x45/0xd0 [ 72.592091] __kasan_slab_free+0x102/0x150 [ 72.596396] kasan_slab_free+0xe/0x10 [ 72.600180] kfree+0xcf/0x230 [ 72.603294] rdma_destroy_id+0x723/0xab0 [ 72.607359] ucma_close+0x115/0x320 [ 72.610980] __fput+0x2df/0x8d0 [ 72.614259] ____fput+0x16/0x20 [ 72.617522] task_work_run+0x14a/0x1c0 [ 72.621439] exit_to_usermode_loop+0x273/0x2c0 [ 72.626031] do_syscall_64+0x52d/0x610 [ 72.629909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 72.635077] [ 72.636689] The buggy address belongs to the object at ffff8880a79e6240 [ 72.636689] which belongs to the cache kmalloc-2k of size 2048 [ 72.649349] The buggy address is located 480 bytes inside of [ 72.649349] 2048-byte region [ffff8880a79e6240, ffff8880a79e6a40) [ 72.661291] The buggy address belongs to the page: [ 72.666216] page:ffffea00029e7980 count:1 mapcount:0 mapping:ffff88812c3f0c40 index:0x0 compound_mapcount: 0 [ 72.676208] flags: 0x1fffc0000010200(slab|head) [ 72.680864] raw: 01fffc0000010200 ffffea00022af188 ffffea00023ab588 ffff88812c3f0c40 [ 72.688739] raw: 0000000000000000 ffff8880a79e6240 0000000100000003 0000000000000000 [ 72.696609] page dumped because: kasan: bad access detected [ 72.702391] [ 72.703998] Memory state around the buggy address: [ 72.708922] ffff8880a79e6300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.716273] ffff8880a79e6380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.723709] >ffff8880a79e6400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.731048] ^ [ 72.735458] ffff8880a79e6480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.742813] ffff8880a79e6500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.750162] ================================================================== [ 72.757499] Disabling lock debugging due to kernel taint [ 72.763435] Kernel panic - not syncing: panic_on_warn set ... [ 72.769327] CPU: 0 PID: 10302 Comm: syz-executor.0 Tainted: G B 5.0.0-rc8+ #3 [ 72.777881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.787225] Call Trace: [ 72.789801] dump_stack+0x172/0x1f0 [ 72.793417] panic+0x2cb/0x65c [ 72.796610] ? __warn_printk+0xf3/0xf3 [ 72.800480] ? __list_add_valid+0x9a/0xa0 [ 72.804646] ? preempt_schedule+0x4b/0x60 [ 72.808798] ? ___preempt_schedule+0x16/0x18 [ 72.813222] ? trace_hardirqs_on+0x5e/0x230 [ 72.817531] ? __list_add_valid+0x9a/0xa0 [ 72.821688] end_report+0x47/0x4f [ 72.825126] ? __list_add_valid+0x9a/0xa0 [ 72.829257] kasan_report.cold+0xe/0x40 [ 72.833250] ? __list_add_valid+0x9a/0xa0 [ 72.837394] __asan_report_load8_noabort+0x14/0x20 [ 72.842316] __list_add_valid+0x9a/0xa0 [ 72.846289] rdma_listen+0x63b/0x8e0 [ 72.850051] ucma_listen+0x14d/0x1c0 [ 72.853754] ? ucma_notify+0x190/0x190 [ 72.857629] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 72.863152] ? _copy_from_user+0xdd/0x150 [ 72.867299] ucma_write+0x2da/0x3c0 [ 72.870921] ? ucma_notify+0x190/0x190 [ 72.874792] ? ucma_open+0x290/0x290 [ 72.878490] ? __fget+0x340/0x540 [ 72.881930] __vfs_write+0x116/0x8e0 [ 72.885637] ? lock_downgrade+0x810/0x810 [ 72.889775] ? ucma_open+0x290/0x290 [ 72.893476] ? kernel_read+0x120/0x120 [ 72.897368] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 72.902305] ? common_file_perm+0x1d6/0x6f0 [ 72.906634] ? apparmor_file_permission+0x25/0x30 [ 72.911473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 72.917008] ? security_file_permission+0x94/0x320 [ 72.921927] ? rw_verify_area+0x118/0x360 [ 72.926064] vfs_write+0x20c/0x580 [ 72.929622] ksys_write+0xea/0x1f0 [ 72.933169] ? __ia32_sys_read+0xb0/0xb0 [ 72.937230] ? do_syscall_64+0x26/0x610 [ 72.941189] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 72.946545] ? do_syscall_64+0x26/0x610 [ 72.950523] __x64_sys_write+0x73/0xb0 [ 72.954411] do_syscall_64+0x103/0x610 [ 72.958283] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 72.963452] RIP: 0033:0x457e29 [ 72.966639] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 72.985520] RSP: 002b:00007fe2b3273c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 72.993207] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 73.000457] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000003 [ 73.007707] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 73.014958] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b32746d4 [ 73.022209] R13: 00000000004cd9b8 R14: 00000000004dcc38 R15: 00000000ffffffff [ 73.030466] Kernel Offset: disabled [ 73.034088] Rebooting in 86400 seconds..