[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 36.953581] audit: type=1800 audit(1538284011.177:25): pid=5895 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 36.979451] audit: type=1800 audit(1538284011.187:26): pid=5895 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 37.015763] audit: type=1800 audit(1538284011.187:27): pid=5895 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.99' (ECDSA) to the list of known hosts. syzkaller login: [ 48.791002] IPVS: ftp: loaded support on port[0] = 21 [ 48.915567] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.922250] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.929368] device bridge_slave_0 entered promiscuous mode [ 48.944239] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.950786] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.957882] device bridge_slave_1 entered promiscuous mode [ 48.972483] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.988113] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.026699] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 49.042978] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 49.098528] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 49.106943] team0: Port device team_slave_0 added [ 49.120061] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 49.127172] team0: Port device team_slave_1 added [ 49.140915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 49.156578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 49.172892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.189414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 49.294835] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.301223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.307812] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.314125] bridge0: port 1(bridge_slave_0) entered forwarding state RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument [ 49.691760] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 49.698045] 8021q: adding VLAN 0 to HW filter on device bond0 [ 49.738484] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 49.779799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.786947] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 49.825560] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 49.831702] 8021q: adding VLAN 0 to HW filter on device team0 [ 49.856149] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 50.069028] ================================================================== [ 50.076418] BUG: KASAN: use-after-free in tcf_block_find+0x9d1/0xb90 [ 50.082898] Read of size 4 at addr ffff8801d28bc4b8 by task syz-executor190/6304 [ 50.090406] [ 50.092018] CPU: 0 PID: 6304 Comm: syz-executor190 Not tainted 4.19.0-rc5-next-20180928+ #84 [ 50.100576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.109929] Call Trace: [ 50.112503] dump_stack+0x1d3/0x2c4 [ 50.116117] ? dump_stack_print_info.cold.2+0x52/0x52 [ 50.121295] ? printk+0xa7/0xcf [ 50.124561] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 50.129305] print_address_description.cold.8+0x9/0x1ff [ 50.134658] kasan_report.cold.9+0x242/0x309 [ 50.139049] ? tcf_block_find+0x9d1/0xb90 [ 50.143286] __asan_report_load4_noabort+0x14/0x20 [ 50.148199] tcf_block_find+0x9d1/0xb90 [ 50.152217] tc_new_tfilter+0x497/0x1d10 [ 50.156270] ? mutex_trylock+0x2b0/0x2b0 [ 50.160320] ? tc_del_tfilter+0x1290/0x1290 [ 50.164627] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 50.170072] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 50.175601] ? apparmor_capable+0x355/0x6c0 [ 50.179963] ? __netlink_lookup+0x5b6/0xa90 [ 50.184378] ? apparmor_cred_transfer+0x590/0x590 [ 50.189207] ? rtnetlink_rcv_msg+0x3d3/0xc20 [ 50.193618] ? lock_downgrade+0x900/0x900 [ 50.197834] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 50.203362] ? rtnl_get_link+0x170/0x370 [ 50.207414] ? tc_del_tfilter+0x1290/0x1290 [ 50.211729] rtnetlink_rcv_msg+0x46a/0xc20 [ 50.215972] ? rtnetlink_put_metrics+0x690/0x690 [ 50.220740] netlink_rcv_skb+0x172/0x440 [ 50.224790] ? rtnetlink_put_metrics+0x690/0x690 [ 50.229543] ? netlink_ack+0xb80/0xb80 [ 50.233554] rtnetlink_rcv+0x1c/0x20 [ 50.237263] netlink_unicast+0x5a5/0x760 [ 50.241309] ? netlink_attachskb+0x9a0/0x9a0 [ 50.245721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 50.251245] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 50.256319] netlink_sendmsg+0xa18/0xfc0 [ 50.260377] ? netlink_unicast+0x760/0x760 [ 50.264608] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 50.269534] ? apparmor_socket_sendmsg+0x29/0x30 [ 50.274281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 50.279853] ? security_socket_sendmsg+0x94/0xc0 [ 50.284611] ? netlink_unicast+0x760/0x760 [ 50.288848] sock_sendmsg+0xd5/0x120 [ 50.292559] ___sys_sendmsg+0x7fd/0x930 [ 50.296535] ? copy_msghdr_from_user+0x580/0x580 [ 50.301279] ? __fd_install+0x2b5/0x8f0 [ 50.305241] ? lock_downgrade+0x900/0x900 [ 50.309390] ? lock_release+0x970/0x970 [ 50.313452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 50.318976] ? __fget_light+0x2e9/0x430 [ 50.322939] ? fget_raw+0x20/0x20 [ 50.326381] ? handle_mm_fault+0x42a/0xc70 [ 50.330614] ? __do_page_fault+0x59f/0xd10 [ 50.334837] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 50.339756] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 50.345401] ? sockfd_lookup_light+0xc5/0x160 [ 50.349884] __sys_sendmsg+0x11d/0x280 [ 50.353757] ? __ia32_sys_shutdown+0x80/0x80 [ 50.358147] ? kasan_check_write+0x14/0x20 [ 50.362363] ? up_read+0x225/0x2c0 [ 50.365882] ? up_read_non_owner+0x100/0x100 [ 50.370276] ? find_vma+0x34/0x190 [ 50.373802] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 50.379240] __x64_sys_sendmsg+0x78/0xb0 [ 50.383290] do_syscall_64+0x1b9/0x820 [ 50.387165] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 50.392512] ? syscall_return_slowpath+0x5e0/0x5e0 [ 50.397425] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 50.402251] ? trace_hardirqs_on_caller+0x310/0x310 [ 50.407250] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 50.412253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 50.417776] ? prepare_exit_to_usermode+0x291/0x3b0 [ 50.422778] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 50.427619] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 50.432792] RIP: 0033:0x441a19 [ 50.435984] Code: e8 0c ac 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 04 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 50.454934] RSP: 002b:00007ffd72b8df98 EFLAGS: 00000213 ORIG_RAX: 000000000000002e [ 50.462655] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441a19 [ 50.469919] RDX: 0000000000000000 RSI: 0000000020005000 RDI: 0000000000000003 [ 50.477171] RBP: 000000000000c382 R08: 0000000000000000 R09: 0000000000000000 [ 50.484422] R10: 0000000000ceb880 R11: 0000000000000213 R12: 0000000000000000 [ 50.491674] R13: 0000000000402430 R14: 0000000000000000 R15: 0000000000000000 [ 50.498929] [ 50.500541] Allocated by task 6127: [ 50.504160] save_stack+0x43/0xd0 [ 50.507756] kasan_kmalloc+0xc7/0xe0 [ 50.511458] __kmalloc_node+0x47/0x70 [ 50.515244] qdisc_alloc+0x10f/0xb50 [ 50.518941] qdisc_create_dflt+0x7a/0x1e0 [ 50.523078] dev_activate+0x82f/0xcb0 [ 50.526863] __dev_open+0x2cb/0x410 [ 50.530471] __dev_change_flags+0x730/0x9b0 [ 50.534775] dev_change_flags+0x89/0x150 [ 50.538829] do_setlink+0xb5f/0x3f20 [ 50.542524] rtnl_newlink+0x136f/0x1d40 [ 50.546480] rtnetlink_rcv_msg+0x46a/0xc20 [ 50.550699] netlink_rcv_skb+0x172/0x440 [ 50.554793] rtnetlink_rcv+0x1c/0x20 [ 50.558490] netlink_unicast+0x5a5/0x760 [ 50.562540] netlink_sendmsg+0xa18/0xfc0 [ 50.566586] sock_sendmsg+0xd5/0x120 [ 50.570291] ___sys_sendmsg+0x7fd/0x930 [ 50.574299] __sys_sendmsg+0x11d/0x280 [ 50.578183] __x64_sys_sendmsg+0x78/0xb0 [ 50.582242] do_syscall_64+0x1b9/0x820 [ 50.586119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 50.591281] [ 50.592888] Freed by task 9: [ 50.595939] save_stack+0x43/0xd0 [ 50.599462] __kasan_slab_free+0x102/0x150 [ 50.603683] kasan_slab_free+0xe/0x10 [ 50.607463] kfree+0xcf/0x230 [ 50.610550] qdisc_free+0x89/0x100 [ 50.614071] qdisc_free_cb+0x19/0x20 [ 50.617776] rcu_process_callbacks+0xff9/0x1ad0 [ 50.622429] __do_softirq+0x30b/0xb03 [ 50.626207] [ 50.627819] The buggy address belongs to the object at ffff8801d28bc480 [ 50.627819] which belongs to the cache kmalloc-1k of size 1024 [ 50.640457] The buggy address is located 56 bytes inside of [ 50.640457] 1024-byte region [ffff8801d28bc480, ffff8801d28bc880) [ 50.652312] The buggy address belongs to the page: [ 50.657234] page:ffffea00074a2f00 count:1 mapcount:0 mapping:ffff8801da800ac0 index:0x0 compound_mapcount: 0 [ 50.667192] flags: 0x2fffc0000010200(slab|head) [ 50.671846] raw: 02fffc0000010200 ffffea00074cf888 ffffea0007490b08 ffff8801da800ac0 [ 50.679711] raw: 0000000000000000 ffff8801d28bc000 0000000100000007 0000000000000000 [ 50.687567] page dumped because: kasan: bad access detected [ 50.693253] [ 50.694859] Memory state around the buggy address: [ 50.699766] ffff8801d28bc380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.707106] ffff8801d28bc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.714449] >ffff8801d28bc480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.721788] ^ [ 50.726963] ffff8801d28bc500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.734304] ffff8801d28bc580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.741643] ================================================================== [ 50.750392] Kernel panic - not syncing: panic_on_warn set ... [ 50.750392] [ 50.757770] CPU: 0 PID: 6304 Comm: syz-executor190 Tainted: G B 4.19.0-rc5-next-20180928+ #84 [ 50.767726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.777076] Call Trace: [ 50.779656] dump_stack+0x1d3/0x2c4 [ 50.783288] ? dump_stack_print_info.cold.2+0x52/0x52 [ 50.788482] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 50.793234] panic+0x238/0x4e7 [ 50.796417] ? add_taint.cold.5+0x16/0x16 [ 50.800554] ? preempt_schedule+0x4d/0x60 [ 50.804687] ? ___preempt_schedule+0x16/0x18 [ 50.809080] ? trace_hardirqs_on+0xb4/0x310 [ 50.813393] kasan_end_report+0x47/0x4f [ 50.817368] kasan_report.cold.9+0x76/0x309 [ 50.821823] ? tcf_block_find+0x9d1/0xb90 [ 50.825970] __asan_report_load4_noabort+0x14/0x20 [ 50.830887] tcf_block_find+0x9d1/0xb90 [ 50.834844] tc_new_tfilter+0x497/0x1d10 [ 50.838892] ? mutex_trylock+0x2b0/0x2b0 [ 50.842940] ? tc_del_tfilter+0x1290/0x1290 [ 50.847246] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 50.852690] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 50.858230] ? apparmor_capable+0x355/0x6c0 [ 50.862540] ? __netlink_lookup+0x5b6/0xa90 [ 50.866847] ? apparmor_cred_transfer+0x590/0x590 [ 50.871687] ? rtnetlink_rcv_msg+0x3d3/0xc20 [ 50.876086] ? lock_downgrade+0x900/0x900 [ 50.880223] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 50.885745] ? rtnl_get_link+0x170/0x370 [ 50.889806] ? tc_del_tfilter+0x1290/0x1290 [ 50.894115] rtnetlink_rcv_msg+0x46a/0xc20 [ 50.898385] ? rtnetlink_put_metrics+0x690/0x690 [ 50.903130] netlink_rcv_skb+0x172/0x440 [ 50.907182] ? rtnetlink_put_metrics+0x690/0x690 [ 50.911927] ? netlink_ack+0xb80/0xb80 [ 50.915804] rtnetlink_rcv+0x1c/0x20 [ 50.919504] netlink_unicast+0x5a5/0x760 [ 50.923556] ? netlink_attachskb+0x9a0/0x9a0 [ 50.927950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 50.933467] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 50.938469] netlink_sendmsg+0xa18/0xfc0 [ 50.942515] ? netlink_unicast+0x760/0x760 [ 50.946731] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 50.951643] ? apparmor_socket_sendmsg+0x29/0x30 [ 50.956383] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 50.962037] ? security_socket_sendmsg+0x94/0xc0 [ 50.966833] ? netlink_unicast+0x760/0x760 [ 50.971070] sock_sendmsg+0xd5/0x120 [ 50.974777] ___sys_sendmsg+0x7fd/0x930 [ 50.978735] ? copy_msghdr_from_user+0x580/0x580 [ 50.983478] ? __fd_install+0x2b5/0x8f0 [ 50.987438] ? lock_downgrade+0x900/0x900 [ 50.991571] ? lock_release+0x970/0x970 [ 50.995530] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 51.001049] ? __fget_light+0x2e9/0x430 [ 51.005002] ? fget_raw+0x20/0x20 [ 51.008439] ? handle_mm_fault+0x42a/0xc70 [ 51.012660] ? __do_page_fault+0x59f/0xd10 [ 51.016882] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 51.021798] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 51.027322] ? sockfd_lookup_light+0xc5/0x160 [ 51.031809] __sys_sendmsg+0x11d/0x280 [ 51.035685] ? __ia32_sys_shutdown+0x80/0x80 [ 51.040075] ? kasan_check_write+0x14/0x20 [ 51.044294] ? up_read+0x225/0x2c0 [ 51.047815] ? up_read_non_owner+0x100/0x100 [ 51.052205] ? find_vma+0x34/0x190 [ 51.055732] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 51.061166] __x64_sys_sendmsg+0x78/0xb0 [ 51.065319] do_syscall_64+0x1b9/0x820 [ 51.069202] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 51.074553] ? syscall_return_slowpath+0x5e0/0x5e0 [ 51.079463] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 51.084293] ? trace_hardirqs_on_caller+0x310/0x310 [ 51.089306] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 51.094312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 51.099842] ? prepare_exit_to_usermode+0x291/0x3b0 [ 51.104906] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 51.109750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.115026] RIP: 0033:0x441a19 [ 51.118202] Code: e8 0c ac 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 04 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 51.137089] RSP: 002b:00007ffd72b8df98 EFLAGS: 00000213 ORIG_RAX: 000000000000002e [ 51.144790] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441a19 [ 51.152043] RDX: 0000000000000000 RSI: 0000000020005000 RDI: 0000000000000003 [ 51.159292] RBP: 000000000000c382 R08: 0000000000000000 R09: 0000000000000000 [ 51.166545] R10: 0000000000ceb880 R11: 0000000000000213 R12: 0000000000000000 [ 51.173795] R13: 0000000000402430 R14: 0000000000000000 R15: 0000000000000000 [ 51.181917] Kernel Offset: disabled [ 51.185536] Rebooting in 86400 seconds..