[ 37.286869] audit: type=1800 audit(1569200047.792:32): pid=7295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 38.238005] audit: type=1800 audit(1569200048.822:33): pid=7295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.145' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 45.591255] kauditd_printk_skb: 2 callbacks suppressed [ 45.591270] audit: type=1400 audit(1569200056.172:36): avc: denied { map } for pid=7482 comm="syz-executor951" path="/root/syz-executor951815553" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 45.629212] FAULT_INJECTION: forcing a failure. [ 45.629212] name failslab, interval 1, probability 0, space 0, times 1 [ 45.641923] CPU: 1 PID: 7482 Comm: syz-executor951 Not tainted 4.19.75 #0 [ 45.649036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 45.658664] Call Trace: [ 45.661457] dump_stack+0x172/0x1f0 [ 45.665309] should_fail.cold+0xa/0x1b [ 45.669539] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 45.674824] ? lock_downgrade+0x810/0x810 [ 45.679208] __should_failslab+0x121/0x190 [ 45.683562] should_failslab+0x9/0x14 [ 45.687709] kmem_cache_alloc_trace+0x2cc/0x760 [ 45.692487] ? kasan_check_read+0x11/0x20 [ 45.697089] cma_alloc_port+0x4d/0x190 [ 45.701360] rdma_bind_addr+0x165a/0x1f80 [ 45.705715] ? cma_ndev_work_handler+0x1b0/0x1b0 [ 45.710669] ? __radix_tree_lookup+0x219/0x380 [ 45.715343] ? wait_for_completion+0x440/0x440 [ 45.720389] rdma_listen+0xa3/0x8e0 [ 45.724242] ucma_listen+0x14d/0x1c0 [ 45.727986] ? ucma_notify+0x190/0x190 [ 45.732289] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 45.738054] ? _copy_from_user+0xdd/0x150 [ 45.742297] ucma_write+0x2d7/0x3c0 [ 45.746139] ? ucma_notify+0x190/0x190 [ 45.750057] ? ucma_open+0x290/0x290 [ 45.753776] __vfs_write+0x114/0x810 [ 45.757491] ? ucma_open+0x290/0x290 [ 45.761546] ? kernel_read+0x120/0x120 [ 45.765676] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 45.771591] ? __inode_security_revalidate+0xda/0x120 [ 45.777513] ? avc_policy_seqno+0xd/0x70 [ 45.781581] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 45.786792] ? selinux_file_permission+0x92/0x550 [ 45.791906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 45.797737] ? security_file_permission+0x89/0x230 [ 45.802692] ? rw_verify_area+0x118/0x360 [ 45.807057] vfs_write+0x20c/0x560 [ 45.810978] ksys_write+0x14f/0x2d0 [ 45.814722] ? __ia32_sys_read+0xb0/0xb0 [ 45.819005] ? do_syscall_64+0x26/0x620 [ 45.822989] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 45.828365] ? do_syscall_64+0x26/0x620 [ 45.832534] __x64_sys_write+0x73/0xb0 [ 45.836924] do_syscall_64+0xfd/0x620 [ 45.840894] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 45.846092] RIP: 0033:0x4405d9 [ 45.849377] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b 14 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 45.868602] RSP: 002b:00007ffecdddda38 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 45.876807] RAX: ffffffffffffffda RBX: 00007ffecdddda40 RCX: 00000000004405d9 [ 45.884612] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000003 [ 45.891979] RBP: 0000000000000004 R08: 0000000000000001 R09: 00007ffecddd0031 [ 45.899390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000401ec0 [ 45.907028] R13: 0000000000401f50 R14: 0000000000000000 R15: 0000000000000000 [ 45.917253] ================================================================== [ 45.925122] BUG: KASAN: use-after-free in wait_consider_task+0x1b51/0x3910 [ 45.932128] Read of size 4 at addr ffff88808306a4ec by task sshd/7480 [ 45.938873] [ 45.940498] CPU: 0 PID: 7480 Comm: sshd Not tainted 4.19.75 #0 [ 45.946465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 45.956215] Call Trace: [ 45.958840] dump_stack+0x172/0x1f0 [ 45.962477] ? wait_consider_task+0x1b51/0x3910 [ 45.967252] print_address_description.cold+0x7c/0x20d [ 45.972749] ? wait_consider_task+0x1b51/0x3910 [ 45.977421] kasan_report.cold+0x8c/0x2ba [ 45.981574] __asan_report_load4_noabort+0x14/0x20 [ 45.986612] wait_consider_task+0x1b51/0x3910 [ 45.991136] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 45.996625] ? add_wait_queue+0x112/0x170 [ 46.000805] ? release_task+0x1630/0x1630 [ 46.005035] ? lock_acquire+0x16f/0x3f0 [ 46.009110] ? do_wait+0x3aa/0x9d0 [ 46.012943] ? kasan_check_write+0x14/0x20 [ 46.017337] do_wait+0x439/0x9d0 [ 46.020705] ? wait_consider_task+0x3910/0x3910 [ 46.025412] ? mark_held_locks+0x100/0x100 [ 46.029650] kernel_wait4+0x171/0x290 [ 46.033478] ? __ia32_sys_waitid+0x140/0x140 [ 46.037930] ? task_stopped_code+0x180/0x180 [ 46.042428] __do_sys_wait4+0x147/0x160 [ 46.046389] ? kernel_wait4+0x290/0x290 [ 46.050364] ? kasan_check_read+0x11/0x20 [ 46.054520] ? _copy_to_user+0xc9/0x120 [ 46.058493] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 46.064196] ? __x64_sys_rt_sigprocmask+0x21d/0x2e0 [ 46.069321] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 46.074092] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 46.079138] ? do_syscall_64+0x26/0x620 [ 46.083105] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 46.088464] ? do_syscall_64+0x26/0x620 [ 46.092437] __x64_sys_wait4+0x97/0xf0 [ 46.096435] do_syscall_64+0xfd/0x620 [ 46.100227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 46.105419] RIP: 0033:0x7f659b09ea3e [ 46.109146] Code: 90 90 90 90 90 90 90 90 90 90 90 90 48 83 ec 28 8b 05 c2 eb 2d 00 85 c0 75 1d 45 31 d2 48 63 d2 48 63 ff b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 48 83 c4 28 c3 89 54 24 08 48 89 74 24 10 [ 46.128235] RSP: 002b:00007ffd6d6581c0 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 46.135949] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f659b09ea3e [ 46.143207] RDX: 0000000000000001 RSI: 00007ffd6d6581fc RDI: ffffffffffffffff [ 46.150463] RBP: 000055682674dc88 R08: 00007ffd6d6582c0 R09: 0101010101010101 [ 46.157826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000556826f7d9b0 [ 46.165429] R13: 000055682674bfb4 R14: 0000000000000028 R15: 000055682674dca0 [ 46.172704] [ 46.174317] Allocated by task 7480: [ 46.177949] save_stack+0x45/0xd0 [ 46.181387] kasan_kmalloc+0xce/0xf0 [ 46.185084] kasan_slab_alloc+0xf/0x20 [ 46.188958] kmem_cache_alloc_node+0x144/0x710 [ 46.193555] copy_process.part.0+0x1ce0/0x7a30 [ 46.198132] _do_fork+0x257/0xfd0 [ 46.201587] __x64_sys_clone+0xbf/0x150 [ 46.205588] do_syscall_64+0xfd/0x620 [ 46.209456] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 46.214658] [ 46.216287] Freed by task 0: [ 46.219310] save_stack+0x45/0xd0 [ 46.222791] __kasan_slab_free+0x102/0x150 [ 46.227403] kasan_slab_free+0xe/0x10 [ 46.231194] kmem_cache_free+0x86/0x260 [ 46.235253] free_task+0xdd/0x120 [ 46.238694] __put_task_struct+0x20f/0x4c0 [ 46.243001] finish_task_switch+0x52b/0x780 [ 46.247310] __schedule+0x86e/0x1dc0 [ 46.251010] schedule_idle+0x58/0x80 [ 46.254704] do_idle+0x192/0x560 [ 46.258067] cpu_startup_entry+0xc8/0xe0 [ 46.262201] start_secondary+0x3e8/0x5b0 [ 46.266248] secondary_startup_64+0xa4/0xb0 [ 46.270550] [ 46.272164] The buggy address belongs to the object at ffff88808306a080 [ 46.272164] which belongs to the cache task_struct of size 6080 [ 46.284894] The buggy address is located 1132 bytes inside of [ 46.284894] 6080-byte region [ffff88808306a080, ffff88808306b840) [ 46.297884] The buggy address belongs to the page: [ 46.302823] page:ffffea00020c1a80 count:1 mapcount:0 mapping:ffff88812c26d800 index:0x0 compound_mapcount: 0 [ 46.312950] flags: 0x1fffc0000008100(slab|head) [ 46.317789] raw: 01fffc0000008100 ffffea00027cf808 ffffea00020c7608 ffff88812c26d800 [ 46.325682] raw: 0000000000000000 ffff88808306a080 0000000100000001 0000000000000000 [ 46.335125] page dumped because: kasan: bad access detected [ 46.340817] [ 46.342425] Memory state around the buggy address: [ 46.347340] ffff88808306a380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 46.354773] ffff88808306a400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 46.362129] >ffff88808306a480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 46.369472] ^ [ 46.376222] ffff88808306a500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 46.383663] ffff88808306a580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 46.391019] ================================================================== [ 46.398538] Disabling lock debugging due to kernel taint [ 46.404084] Kernel panic - not syncing: panic_on_warn set ... [ 46.404084] [ 46.411499] CPU: 0 PID: 7480 Comm: sshd Tainted: G B 4.19.75 #0 [ 46.419192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 46.428540] Call Trace: [ 46.431177] dump_stack+0x172/0x1f0 [ 46.434811] ? wait_consider_task+0x1b51/0x3910 [ 46.439471] panic+0x263/0x507 [ 46.442664] ? __warn_printk+0xf3/0xf3 [ 46.446567] ? retint_kernel+0x2d/0x2d [ 46.450458] ? trace_hardirqs_on+0x5e/0x220 [ 46.454769] ? wait_consider_task+0x1b51/0x3910 [ 46.459429] kasan_end_report+0x47/0x4f [ 46.463409] kasan_report.cold+0xa9/0x2ba [ 46.467545] __asan_report_load4_noabort+0x14/0x20 [ 46.472462] wait_consider_task+0x1b51/0x3910 [ 46.476960] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 46.482048] ? add_wait_queue+0x112/0x170 [ 46.486414] ? release_task+0x1630/0x1630 [ 46.490561] ? lock_acquire+0x16f/0x3f0 [ 46.494545] ? do_wait+0x3aa/0x9d0 [ 46.498088] ? kasan_check_write+0x14/0x20 [ 46.502400] do_wait+0x439/0x9d0 [ 46.505775] ? wait_consider_task+0x3910/0x3910 [ 46.510782] ? mark_held_locks+0x100/0x100 [ 46.515093] kernel_wait4+0x171/0x290 [ 46.518903] ? __ia32_sys_waitid+0x140/0x140 [ 46.523472] ? task_stopped_code+0x180/0x180 [ 46.527876] __do_sys_wait4+0x147/0x160 [ 46.531841] ? kernel_wait4+0x290/0x290 [ 46.535816] ? kasan_check_read+0x11/0x20 [ 46.539964] ? _copy_to_user+0xc9/0x120 [ 46.544681] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 46.550231] ? __x64_sys_rt_sigprocmask+0x21d/0x2e0 [ 46.555246] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 46.560092] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 46.564839] ? do_syscall_64+0x26/0x620 [ 46.568797] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 46.574288] ? do_syscall_64+0x26/0x620 [ 46.578276] __x64_sys_wait4+0x97/0xf0 [ 46.582177] do_syscall_64+0xfd/0x620 [ 46.585976] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 46.591182] RIP: 0033:0x7f659b09ea3e [ 46.594893] Code: 90 90 90 90 90 90 90 90 90 90 90 90 48 83 ec 28 8b 05 c2 eb 2d 00 85 c0 75 1d 45 31 d2 48 63 d2 48 63 ff b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 48 83 c4 28 c3 89 54 24 08 48 89 74 24 10 [ 46.613872] RSP: 002b:00007ffd6d6581c0 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 46.621580] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f659b09ea3e [ 46.628920] RDX: 0000000000000001 RSI: 00007ffd6d6581fc RDI: ffffffffffffffff [ 46.636303] RBP: 000055682674dc88 R08: 00007ffd6d6582c0 R09: 0101010101010101 [ 46.643571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000556826f7d9b0 [ 46.650830] R13: 000055682674bfb4 R14: 0000000000000028 R15: 000055682674dca0 [ 46.659737] Kernel Offset: disabled [ 46.663379] Rebooting in 86400 seconds..