[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 26.437983] kauditd_printk_skb: 7 callbacks suppressed [ 26.437995] audit: type=1800 audit(1538095580.382:29): pid=5219 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 26.471923] audit: type=1800 audit(1538095580.382:30): pid=5219 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.0' (ECDSA) to the list of known hosts. 2018/09/28 00:47:02 parsed 1 programs 2018/09/28 00:47:03 executed programs: 0 syzkaller login: [ 69.396181] IPVS: ftp: loaded support on port[0] = 21 [ 69.650451] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.657337] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.665264] device bridge_slave_0 entered promiscuous mode [ 69.684168] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.690742] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.698501] device bridge_slave_1 entered promiscuous mode [ 69.717100] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 69.735609] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 69.787321] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 69.808853] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 69.884234] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 69.891482] team0: Port device team_slave_0 added [ 69.908294] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 69.915585] team0: Port device team_slave_1 added [ 69.933891] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 69.952463] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 69.971120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 69.989919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.138667] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.145155] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.152054] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.158614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.698289] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.752318] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 70.807106] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 70.813309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.821241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.866729] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.235441] hrtimer: interrupt took 27166 ns 2018/09/28 00:47:08 executed programs: 36 [ 78.172583] ================================================================== [ 78.180128] BUG: KASAN: use-after-free in do_raw_spin_lock+0x1c0/0x200 [ 78.186794] Read of size 4 at addr ffff8801b154b4fc by task syz-executor0/5978 [ 78.194379] [ 78.196037] CPU: 0 PID: 5978 Comm: syz-executor0 Not tainted 4.19.0-rc5+ #257 [ 78.203305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.212655] Call Trace: [ 78.215247] dump_stack+0x1c4/0x2b4 [ 78.218886] ? dump_stack_print_info.cold.2+0x52/0x52 [ 78.224077] ? printk+0xa7/0xcf [ 78.227362] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 78.232133] print_address_description.cold.8+0x9/0x1ff [ 78.237505] kasan_report.cold.9+0x242/0x309 [ 78.241916] ? do_raw_spin_lock+0x1c0/0x200 [ 78.246245] __asan_report_load4_noabort+0x14/0x20 [ 78.251182] do_raw_spin_lock+0x1c0/0x200 [ 78.255340] _raw_spin_lock_bh+0x39/0x40 [ 78.259405] ? vhost_transport_send_pkt+0x12e/0x380 [ 78.264459] vhost_transport_send_pkt+0x12e/0x380 [ 78.269303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 78.274852] ? vhost_vsock_dev_open+0x5a0/0x5a0 [ 78.279523] ? virtio_transport_send_pkt_info+0x2e7/0x460 [ 78.285065] ? __local_bh_enable_ip+0x160/0x260 [ 78.289744] virtio_transport_send_pkt_info+0x31d/0x460 [ 78.295115] virtio_transport_connect+0x17c/0x220 [ 78.299975] ? virtio_transport_send_pkt_info+0x460/0x460 [ 78.305527] ? vsock_auto_bind+0xa9/0xe0 [ 78.309597] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 78.315138] vsock_stream_connect+0x4ed/0xe40 [ 78.319643] ? vsock_dgram_connect+0x500/0x500 [ 78.324247] ? finish_wait+0x430/0x430 [ 78.328137] ? aa_af_perm+0x5a0/0x5a0 [ 78.331957] ? apparmor_socket_connect+0xb6/0x160 [ 78.336972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 78.342517] ? security_socket_connect+0x94/0xc0 [ 78.347280] __sys_connect+0x37d/0x4c0 [ 78.351195] ? __ia32_sys_accept+0xb0/0xb0 [ 78.355447] ? kasan_check_read+0x11/0x20 [ 78.359599] ? _copy_to_user+0xc8/0x110 [ 78.363577] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 78.369116] ? put_timespec64+0x10f/0x1b0 [ 78.373272] ? do_syscall_64+0x9a/0x820 [ 78.377249] ? do_syscall_64+0x9a/0x820 [ 78.381225] ? lockdep_hardirqs_on+0x421/0x5c0 [ 78.385813] ? trace_hardirqs_on+0xbd/0x310 [ 78.390138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 78.395683] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 78.401064] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 78.406525] __x64_sys_connect+0x73/0xb0 [ 78.410593] do_syscall_64+0x1b9/0x820 [ 78.414494] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 78.419864] ? syscall_return_slowpath+0x5e0/0x5e0 [ 78.424799] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 78.429644] ? trace_hardirqs_on_caller+0x310/0x310 [ 78.434667] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 78.440466] ? prepare_exit_to_usermode+0x291/0x3b0 [ 78.445491] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 78.450343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 78.455534] RIP: 0033:0x457579 [ 78.458728] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 78.477633] RSP: 002b:00007fb8670e2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 78.485343] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 78.492610] RDX: 0000000000000010 RSI: 0000000020000200 RDI: 0000000000000008 [ 78.499880] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 78.507151] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb8670e36d4 [ 78.514438] R13: 00000000004bdb1a R14: 00000000004cc658 R15: 00000000ffffffff [ 78.521724] [ 78.523349] Allocated by task 5978: [ 78.526979] save_stack+0x43/0xd0 [ 78.530444] kasan_kmalloc+0xc7/0xe0 [ 78.534158] __kmalloc_node+0x47/0x70 [ 78.537997] kvmalloc_node+0xb9/0xf0 [ 78.541711] vhost_vsock_dev_open+0xa2/0x5a0 [ 78.546119] misc_open+0x3ca/0x560 [ 78.549655] chrdev_open+0x25a/0x710 [ 78.553370] do_dentry_open+0x499/0x1250 [ 78.557442] vfs_open+0xa0/0xd0 [ 78.560726] path_openat+0x12bf/0x5160 [ 78.564614] do_filp_open+0x255/0x380 [ 78.568431] do_sys_open+0x568/0x700 [ 78.572148] __x64_sys_openat+0x9d/0x100 [ 78.576206] do_syscall_64+0x1b9/0x820 [ 78.580098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 78.585279] [ 78.586900] Freed by task 5976: [ 78.590176] save_stack+0x43/0xd0 [ 78.593630] __kasan_slab_free+0x102/0x150 [ 78.597865] kasan_slab_free+0xe/0x10 [ 78.601666] kfree+0xcf/0x230 [ 78.604772] kvfree+0x61/0x70 [ 78.607894] vhost_vsock_dev_release+0x4f4/0x720 [ 78.612673] __fput+0x385/0xa30 [ 78.615961] ____fput+0x15/0x20 [ 78.619245] task_work_run+0x1e8/0x2a0 [ 78.623134] exit_to_usermode_loop+0x318/0x380 [ 78.627720] do_syscall_64+0x6be/0x820 [ 78.631634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 78.636811] [ 78.638447] The buggy address belongs to the object at ffff8801b1542800 [ 78.638447] which belongs to the cache kmalloc-65536 of size 65536 [ 78.651455] The buggy address is located 36092 bytes inside of [ 78.651455] 65536-byte region [ffff8801b1542800, ffff8801b1552800) [ 78.663671] The buggy address belongs to the page: [ 78.668604] page:ffffea0006c55000 count:1 mapcount:0 mapping:ffff8801da802500 index:0x0 compound_mapcount: 0 [ 78.678578] flags: 0x2fffc0000008100(slab|head) [ 78.683253] raw: 02fffc0000008100 ffffea0006c54808 ffffea0006c55808 ffff8801da802500 [ 78.691163] raw: 0000000000000000 ffff8801b1542800 0000000100000001 0000000000000000 [ 78.699032] page dumped because: kasan: bad access detected [ 78.704746] [ 78.706369] Memory state around the buggy address: [ 78.711299] ffff8801b154b380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.718683] ffff8801b154b400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.726044] >ffff8801b154b480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.733397] ^ [ 78.740693] ffff8801b154b500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.748066] ffff8801b154b580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.755432] ================================================================== [ 78.762786] Disabling lock debugging due to kernel taint [ 78.768308] Kernel panic - not syncing: panic_on_warn set ... [ 78.768308] [ 78.775677] CPU: 0 PID: 5978 Comm: syz-executor0 Tainted: G B 4.19.0-rc5+ #257 [ 78.784318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.793654] Call Trace: [ 78.796248] dump_stack+0x1c4/0x2b4 [ 78.799885] ? dump_stack_print_info.cold.2+0x52/0x52 [ 78.805075] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 78.809815] panic+0x238/0x4e7 [ 78.813005] ? add_taint.cold.5+0x16/0x16 [ 78.817139] ? trace_hardirqs_on+0xb4/0x310 [ 78.821459] kasan_end_report+0x47/0x4f [ 78.825446] kasan_report.cold.9+0x76/0x309 [ 78.829754] ? do_raw_spin_lock+0x1c0/0x200 [ 78.834060] __asan_report_load4_noabort+0x14/0x20 [ 78.838974] do_raw_spin_lock+0x1c0/0x200 [ 78.843112] _raw_spin_lock_bh+0x39/0x40 [ 78.847160] ? vhost_transport_send_pkt+0x12e/0x380 [ 78.852173] vhost_transport_send_pkt+0x12e/0x380 [ 78.857000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 78.862521] ? vhost_vsock_dev_open+0x5a0/0x5a0 [ 78.867176] ? virtio_transport_send_pkt_info+0x2e7/0x460 [ 78.872698] ? __local_bh_enable_ip+0x160/0x260 [ 78.877354] virtio_transport_send_pkt_info+0x31d/0x460 [ 78.882706] virtio_transport_connect+0x17c/0x220 [ 78.887535] ? virtio_transport_send_pkt_info+0x460/0x460 [ 78.893056] ? vsock_auto_bind+0xa9/0xe0 [ 78.897103] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 78.902624] vsock_stream_connect+0x4ed/0xe40 [ 78.907104] ? vsock_dgram_connect+0x500/0x500 [ 78.911686] ? finish_wait+0x430/0x430 [ 78.915569] ? aa_af_perm+0x5a0/0x5a0 [ 78.919358] ? apparmor_socket_connect+0xb6/0x160 [ 78.924185] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 78.929706] ? security_socket_connect+0x94/0xc0 [ 78.934454] __sys_connect+0x37d/0x4c0 [ 78.938330] ? __ia32_sys_accept+0xb0/0xb0 [ 78.942549] ? kasan_check_read+0x11/0x20 [ 78.946703] ? _copy_to_user+0xc8/0x110 [ 78.950662] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 78.956185] ? put_timespec64+0x10f/0x1b0 [ 78.960320] ? do_syscall_64+0x9a/0x820 [ 78.964281] ? do_syscall_64+0x9a/0x820 [ 78.968260] ? lockdep_hardirqs_on+0x421/0x5c0 [ 78.972830] ? trace_hardirqs_on+0xbd/0x310 [ 78.977150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 78.982672] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 78.988019] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 78.993486] __x64_sys_connect+0x73/0xb0 [ 78.997534] do_syscall_64+0x1b9/0x820 [ 79.001405] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 79.006773] ? syscall_return_slowpath+0x5e0/0x5e0 [ 79.011691] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 79.016520] ? trace_hardirqs_on_caller+0x310/0x310 [ 79.021523] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 79.026546] ? prepare_exit_to_usermode+0x291/0x3b0 [ 79.031551] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 79.036384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 79.041562] RIP: 0033:0x457579 [ 79.044742] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 79.063628] RSP: 002b:00007fb8670e2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 79.071326] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 79.078576] RDX: 0000000000000010 RSI: 0000000020000200 RDI: 0000000000000008 [ 79.085829] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 79.093085] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb8670e36d4 [ 79.100337] R13: 00000000004bdb1a R14: 00000000004cc658 R15: 00000000ffffffff [ 79.108699] Kernel Offset: disabled [ 79.112329] Rebooting in 86400 seconds..