[ 45.661005] audit: type=1800 audit(1585456373.873:30): pid=7989 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 49.543576] kauditd_printk_skb: 4 callbacks suppressed [ 49.543589] audit: type=1400 audit(1585456377.773:35): avc: denied { map } for pid=8162 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.151' (ECDSA) to the list of known hosts. [ 56.514735] audit: type=1400 audit(1585456384.743:36): avc: denied { map } for pid=8174 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/03/29 04:33:04 parsed 1 programs [ 57.968295] audit: type=1400 audit(1585456386.203:37): avc: denied { map } for pid=8174 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=17147 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2020/03/29 04:33:06 executed programs: 0 [ 58.165772] IPVS: ftp: loaded support on port[0] = 21 [ 58.230681] chnl_net:caif_netlink_parms(): no params data found [ 58.283237] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.290420] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.298238] device bridge_slave_0 entered promiscuous mode [ 58.308625] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.315304] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.322366] device bridge_slave_1 entered promiscuous mode [ 58.339801] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.349011] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.366616] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 58.374610] team0: Port device team_slave_0 added [ 58.380379] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 58.387918] team0: Port device team_slave_1 added [ 58.403921] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 58.410377] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 58.436663] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 58.448586] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 58.454922] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 58.480954] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 58.491822] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.499747] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.556590] device hsr_slave_0 entered promiscuous mode [ 58.604523] device hsr_slave_1 entered promiscuous mode [ 58.665080] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 58.674002] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 58.729937] audit: type=1400 audit(1585456386.963:38): avc: denied { create } for pid=8190 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 58.754447] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.756039] audit: type=1400 audit(1585456386.963:39): avc: denied { write } for pid=8190 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 58.761848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.787493] audit: type=1400 audit(1585456386.963:40): avc: denied { read } for pid=8190 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 58.792968] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.822704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.861608] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 58.868582] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.877392] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 58.888346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.907235] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.925907] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.933340] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 58.945643] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 58.953336] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.963280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.971376] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.977805] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.989607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.998406] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.004988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.021628] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.030218] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 59.047760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.055932] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.063400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.074453] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 59.080569] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 59.094846] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 59.102592] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 59.110025] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 59.121108] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 59.136521] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 59.148273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 59.190627] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 59.198335] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 59.205521] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 59.216787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.225268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.232550] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.242416] device veth0_vlan entered promiscuous mode [ 59.252967] device veth1_vlan entered promiscuous mode [ 59.268644] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 59.278797] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 59.286524] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 59.295783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 59.307647] device veth0_macvtap entered promiscuous mode [ 59.313959] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 59.322865] device veth1_macvtap entered promiscuous mode [ 59.329719] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 59.338891] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 59.349396] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 59.359077] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 59.366624] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 59.373432] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 59.381215] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 59.389202] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 59.397111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 59.407542] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 59.414972] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 59.422164] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 59.430204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 59.545456] audit: type=1400 audit(1585456387.783:41): avc: denied { associate } for pid=8190 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 59.633139] ================================================================== [ 59.640769] BUG: KASAN: use-after-free in __list_add_valid+0x93/0xa0 [ 59.647388] Read of size 8 at addr ffff88807dcec260 by task syz-executor.0/8233 [ 59.654925] [ 59.656558] CPU: 1 PID: 8233 Comm: syz-executor.0 Not tainted 4.19.113-syzkaller #0 [ 59.664350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.673793] Call Trace: [ 59.676380] dump_stack+0x188/0x20d [ 59.680015] ? __list_add_valid+0x93/0xa0 [ 59.684336] print_address_description.cold+0x7c/0x212 [ 59.689615] ? __list_add_valid+0x93/0xa0 [ 59.693861] kasan_report.cold+0x88/0x2b9 [ 59.698099] __list_add_valid+0x93/0xa0 [ 59.702222] rdma_listen+0x609/0x880 [ 59.705932] ucma_listen+0x14d/0x1c0 [ 59.709636] ? ucma_notify+0x190/0x190 [ 59.713537] ? __might_fault+0x192/0x1d0 [ 59.717595] ? _copy_from_user+0xd2/0x140 [ 59.721734] ? ucma_notify+0x190/0x190 [ 59.725631] ucma_write+0x285/0x350 [ 59.729281] ? ucma_open+0x280/0x280 [ 59.733010] ? __fget+0x319/0x510 [ 59.736474] __vfs_write+0xf7/0x760 [ 59.740090] ? ucma_open+0x280/0x280 [ 59.743809] ? kernel_read+0x110/0x110 [ 59.747690] ? __inode_security_revalidate+0xd3/0x120 [ 59.752911] ? avc_policy_seqno+0x9/0x70 [ 59.757051] ? selinux_file_permission+0x87/0x520 [ 59.761918] ? security_file_permission+0x84/0x220 [ 59.766950] vfs_write+0x206/0x550 [ 59.770504] ksys_write+0x12b/0x2a0 [ 59.774135] ? __ia32_sys_read+0xb0/0xb0 [ 59.778207] ? __ia32_sys_clock_settime+0x260/0x260 [ 59.783221] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 59.787976] ? trace_hardirqs_off_caller+0x55/0x210 [ 59.793000] ? do_syscall_64+0x21/0x620 [ 59.797079] do_syscall_64+0xf9/0x620 [ 59.800874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 59.806059] RIP: 0033:0x45c849 [ 59.809237] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 59.828135] RSP: 002b:00007f61becf0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 59.835844] RAX: ffffffffffffffda RBX: 00007f61becf16d4 RCX: 000000000045c849 [ 59.843101] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 59.850370] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 59.857667] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 59.865038] R13: 0000000000000cc0 R14: 00000000004cee4e R15: 000000000076bf0c [ 59.872472] [ 59.874125] Allocated by task 8227: [ 59.877776] kasan_kmalloc+0xbf/0xe0 [ 59.881490] kmem_cache_alloc_trace+0x14d/0x7a0 [ 59.886158] __rdma_create_id+0x5b/0x630 [ 59.890235] ucma_create_id+0x1cb/0x5a0 [ 59.894217] ucma_write+0x285/0x350 [ 59.897979] __vfs_write+0xf7/0x760 [ 59.901630] vfs_write+0x206/0x550 [ 59.905235] ksys_write+0x12b/0x2a0 [ 59.908885] do_syscall_64+0xf9/0x620 [ 59.912771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 59.917987] [ 59.919708] Freed by task 8226: [ 59.923282] __kasan_slab_free+0xf7/0x140 [ 59.927649] kfree+0xce/0x220 [ 59.931460] ucma_close+0x10b/0x320 [ 59.935088] __fput+0x2cd/0x890 [ 59.938365] task_work_run+0x13f/0x1b0 [ 59.942243] exit_to_usermode_loop+0x25a/0x2b0 [ 59.946826] do_syscall_64+0x538/0x620 [ 59.950766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 59.955944] [ 59.957618] The buggy address belongs to the object at ffff88807dcec080 [ 59.957618] which belongs to the cache kmalloc-2048 of size 2048 [ 59.970459] The buggy address is located 480 bytes inside of [ 59.970459] 2048-byte region [ffff88807dcec080, ffff88807dcec880) [ 59.982418] The buggy address belongs to the page: [ 59.987353] page:ffffea0001f73b00 count:1 mapcount:0 mapping:ffff88812c3dcc40 index:0x0 compound_mapcount: 0 [ 59.997840] flags: 0xfffe0000008100(slab|head) [ 60.002429] raw: 00fffe0000008100 ffffea0002394c08 ffffea0002337b88 ffff88812c3dcc40 [ 60.010424] raw: 0000000000000000 ffff88807dcec080 0000000100000003 0000000000000000 [ 60.019331] page dumped because: kasan: bad access detected [ 60.025597] [ 60.027276] Memory state around the buggy address: [ 60.032216] ffff88807dcec100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.039675] ffff88807dcec180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.047054] >ffff88807dcec200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.055075] ^ [ 60.061563] ffff88807dcec280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.069012] ffff88807dcec300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.076365] ================================================================== [ 60.083709] Disabling lock debugging due to kernel taint [ 60.094015] Kernel panic - not syncing: panic_on_warn set ... [ 60.094015] [ 60.101459] CPU: 1 PID: 8233 Comm: syz-executor.0 Tainted: G B 4.19.113-syzkaller #0 [ 60.110640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.119989] Call Trace: [ 60.122597] dump_stack+0x188/0x20d [ 60.126235] panic+0x26a/0x50e [ 60.129552] ? __warn_printk+0xf3/0xf3 [ 60.133566] ? preempt_schedule_common+0x4a/0xc0 [ 60.138327] ? __list_add_valid+0x93/0xa0 [ 60.142499] ? ___preempt_schedule+0x16/0x18 [ 60.146921] ? trace_hardirqs_on+0x55/0x210 [ 60.151601] ? __list_add_valid+0x93/0xa0 [ 60.155754] kasan_end_report+0x43/0x49 [ 60.160072] kasan_report.cold+0xa4/0x2b9 [ 60.164221] __list_add_valid+0x93/0xa0 [ 60.168204] rdma_listen+0x609/0x880 [ 60.171907] ucma_listen+0x14d/0x1c0 [ 60.175615] ? ucma_notify+0x190/0x190 [ 60.179756] ? __might_fault+0x192/0x1d0 [ 60.183827] ? _copy_from_user+0xd2/0x140 [ 60.187983] ? ucma_notify+0x190/0x190 [ 60.191864] ucma_write+0x285/0x350 [ 60.195497] ? ucma_open+0x280/0x280 [ 60.199204] ? __fget+0x319/0x510 [ 60.202833] __vfs_write+0xf7/0x760 [ 60.207255] ? ucma_open+0x280/0x280 [ 60.210959] ? kernel_read+0x110/0x110 [ 60.214841] ? __inode_security_revalidate+0xd3/0x120 [ 60.220168] ? avc_policy_seqno+0x9/0x70 [ 60.228176] ? selinux_file_permission+0x87/0x520 [ 60.233202] ? security_file_permission+0x84/0x220 [ 60.238181] vfs_write+0x206/0x550 [ 60.241820] ksys_write+0x12b/0x2a0 [ 60.245437] ? __ia32_sys_read+0xb0/0xb0 [ 60.249635] ? __ia32_sys_clock_settime+0x260/0x260 [ 60.254665] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 60.259521] ? trace_hardirqs_off_caller+0x55/0x210 [ 60.265003] ? do_syscall_64+0x21/0x620 [ 60.268972] do_syscall_64+0xf9/0x620 [ 60.272761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 60.277939] RIP: 0033:0x45c849 [ 60.281742] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 60.302247] RSP: 002b:00007f61becf0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 60.310069] RAX: ffffffffffffffda RBX: 00007f61becf16d4 RCX: 000000000045c849 [ 60.317436] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 60.325264] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 60.332610] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 60.339875] R13: 0000000000000cc0 R14: 00000000004cee4e R15: 000000000076bf0c [ 60.348413] Kernel Offset: disabled [ 60.352074] Rebooting in 86400 seconds..