Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 36.918811] audit: type=1800 audit(1569411361.816:33): pid=7250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 36.942802] audit: type=1800 audit(1569411361.816:34): pid=7250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 41.214272] audit: type=1400 audit(1569411366.106:35): avc: denied { map } for pid=7423 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.154' (ECDSA) to the list of known hosts. [ 47.749539] audit: type=1400 audit(1569411372.646:36): avc: denied { map } for pid=7435 comm="syz-executor217" path="/root/syz-executor217527030" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 47.769704] IPVS: ftp: loaded support on port[0] = 21 [ 47.827585] chnl_net:caif_netlink_parms(): no params data found [ 47.858441] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.865049] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.872322] device bridge_slave_0 entered promiscuous mode [ 47.879796] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.886165] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.893307] device bridge_slave_1 entered promiscuous mode [ 47.907927] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 47.916672] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 47.933349] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 47.940946] team0: Port device team_slave_0 added [ 47.946319] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 47.953652] team0: Port device team_slave_1 added [ 47.958898] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.966072] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.019842] device hsr_slave_0 entered promiscuous mode [ 48.057895] device hsr_slave_1 entered promiscuous mode [ 48.127998] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 48.134976] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 48.148830] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.155250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.162220] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.168643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.200542] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 48.206656] 8021q: adding VLAN 0 to HW filter on device bond0 [ 48.215009] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 48.223996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.242653] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.250060] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.257121] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 48.267676] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 48.273788] 8021q: adding VLAN 0 to HW filter on device team0 [ 48.282556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.291274] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.297675] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.306635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.314993] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.321399] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.336446] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 48.345854] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 48.355583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 48.366210] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.378174] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 48.389459] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready executing program [ 48.395486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 48.402752] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.416561] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 48.426223] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 48.436220] audit: type=1400 audit(1569411373.336:37): avc: denied { create } for pid=7436 comm="syz-executor217" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 48.549148] ================================================================== [ 48.556648] BUG: KASAN: use-after-free in pids_release+0x228/0x250 [ 48.562995] Read of size 8 at addr ffff88808872b388 by task syz-executor217/7435 [ 48.570527] [ 48.572143] CPU: 1 PID: 7435 Comm: syz-executor217 Not tainted 4.19.75 #0 [ 48.579051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 48.588387] Call Trace: [ 48.590964] dump_stack+0x172/0x1f0 [ 48.594576] ? pids_release+0x228/0x250 [ 48.598569] print_address_description.cold+0x7c/0x20d [ 48.603842] ? pids_release+0x228/0x250 [ 48.607802] kasan_report.cold+0x8c/0x2ba [ 48.611944] __asan_report_load8_noabort+0x14/0x20 [ 48.616866] pids_release+0x228/0x250 [ 48.620658] cgroup_release+0x101/0x4a0 [ 48.624626] ? proc_tid_base_readdir+0x30/0x30 [ 48.629205] ? cgroup_exit+0x520/0x520 [ 48.633078] ? kasan_check_read+0x11/0x20 [ 48.637223] release_task+0x194/0x1630 [ 48.641094] ? _raw_spin_unlock_irq+0x28/0x90 [ 48.645571] ? lockdep_hardirqs_on+0x415/0x5d0 [ 48.650137] ? trace_hardirqs_on+0x67/0x220 [ 48.654448] wait_consider_task+0x2c95/0x3910 [ 48.658981] ? release_task+0x1630/0x1630 [ 48.663111] ? lock_acquire+0x16f/0x3f0 [ 48.667065] ? do_wait+0x3aa/0x9d0 [ 48.670593] ? kasan_check_write+0x14/0x20 [ 48.674813] do_wait+0x439/0x9d0 [ 48.678187] ? wait_consider_task+0x3910/0x3910 [ 48.682923] kernel_wait4+0x171/0x290 [ 48.686708] ? __ia32_sys_waitid+0x140/0x140 [ 48.691101] ? task_stopped_code+0x180/0x180 [ 48.695492] ? find_held_lock+0x35/0x130 [ 48.699535] ? __do_page_fault+0x676/0xe90 [ 48.703789] __do_sys_wait4+0x147/0x160 [ 48.707750] ? kernel_wait4+0x290/0x290 [ 48.711711] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 48.717235] ? up_read+0x1a/0x110 [ 48.720671] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 48.726199] ? __do_page_fault+0x484/0xe90 [ 48.730434] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 48.735175] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 48.739919] ? do_syscall_64+0x26/0x620 [ 48.743893] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 48.749257] ? do_syscall_64+0x26/0x620 [ 48.753228] __x64_sys_wait4+0x97/0xf0 [ 48.757099] do_syscall_64+0xfd/0x620 [ 48.760892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 48.766063] RIP: 0033:0x40240a [ 48.769240] Code: c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 8b 05 4e 87 2d 00 85 c0 75 36 45 31 d2 48 63 d2 48 63 ff b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 d0 ff ff ff f7 [ 48.788125] RSP: 002b:00007fff65420c88 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 48.795827] RAX: ffffffffffffffda RBX: 0000000000001d0c RCX: 000000000040240a [ 48.803080] RDX: 0000000040000000 RSI: 00007fff65420c94 RDI: ffffffffffffffff [ 48.810344] RBP: 00000000006d3018 R08: 0000000000000000 R09: 000055555649c880 [ 48.817605] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004033c0 [ 48.824863] R13: 0000000000403450 R14: 0000000000000000 R15: 0000000000000000 [ 48.832123] [ 48.833735] Allocated by task 7435: [ 48.837362] save_stack+0x45/0xd0 [ 48.840800] kasan_kmalloc+0xce/0xf0 [ 48.844494] kasan_slab_alloc+0xf/0x20 [ 48.848365] kmem_cache_alloc_node+0x144/0x710 [ 48.852928] copy_process.part.0+0x1ce0/0x7a30 [ 48.857508] _do_fork+0x257/0xfd0 [ 48.860949] __x64_sys_clone+0xbf/0x150 [ 48.864903] do_syscall_64+0xfd/0x620 [ 48.868686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 48.873849] [ 48.875476] Freed by task 7438: [ 48.878740] save_stack+0x45/0xd0 [ 48.882186] __kasan_slab_free+0x102/0x150 [ 48.886404] kasan_slab_free+0xe/0x10 [ 48.890192] kmem_cache_free+0x86/0x260 [ 48.894147] free_task+0xdd/0x120 [ 48.897591] __put_task_struct+0x20f/0x4c0 [ 48.901814] finish_task_switch+0x52b/0x780 [ 48.906118] __schedule+0x86e/0x1dc0 [ 48.909824] schedule+0x92/0x1c0 [ 48.913194] worker_thread+0x248/0xe40 [ 48.917063] kthread+0x354/0x420 [ 48.920415] ret_from_fork+0x24/0x30 [ 48.924105] [ 48.925712] The buggy address belongs to the object at ffff88808872a2c0 [ 48.925712] which belongs to the cache task_struct of size 6080 [ 48.938451] The buggy address is located 4296 bytes inside of [ 48.938451] 6080-byte region [ffff88808872a2c0, ffff88808872ba80) [ 48.950478] The buggy address belongs to the page: [ 48.955423] page:ffffea000221ca80 count:1 mapcount:0 mapping:ffff88812c26d800 index:0x0 compound_mapcount: 0 [ 48.965379] flags: 0x1fffc0000008100(slab|head) [ 48.970038] raw: 01fffc0000008100 ffffea00027f5888 ffffea00021ce188 ffff88812c26d800 [ 48.977914] raw: 0000000000000000 ffff88808872a2c0 0000000100000001 0000000000000000 [ 48.985798] page dumped because: kasan: bad access detected [ 48.991495] [ 48.993100] Memory state around the buggy address: [ 48.998019] ffff88808872b280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.005370] ffff88808872b300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.012713] >ffff88808872b380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.020153] ^ [ 49.023761] ffff88808872b400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.031101] ffff88808872b480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.038448] ================================================================== [ 49.045785] Disabling lock debugging due to kernel taint [ 49.053182] Kernel panic - not syncing: panic_on_warn set ... [ 49.053182] [ 49.060581] CPU: 1 PID: 7435 Comm: syz-executor217 Tainted: G B 4.19.75 #0 [ 49.068878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 49.078300] Call Trace: [ 49.080887] dump_stack+0x172/0x1f0 [ 49.084507] ? pids_release+0x228/0x250 [ 49.088472] panic+0x263/0x507 [ 49.091658] ? __warn_printk+0xf3/0xf3 [ 49.095529] ? pids_release+0x228/0x250 [ 49.099487] ? preempt_schedule+0x4b/0x60 [ 49.103614] ? ___preempt_schedule+0x16/0x18 [ 49.108014] ? trace_hardirqs_on+0x5e/0x220 [ 49.112317] ? pids_release+0x228/0x250 [ 49.116279] kasan_end_report+0x47/0x4f [ 49.120237] kasan_report.cold+0xa9/0x2ba [ 49.124393] __asan_report_load8_noabort+0x14/0x20 [ 49.129318] pids_release+0x228/0x250 [ 49.133101] cgroup_release+0x101/0x4a0 [ 49.137065] ? proc_tid_base_readdir+0x30/0x30 [ 49.141630] ? cgroup_exit+0x520/0x520 [ 49.145502] ? kasan_check_read+0x11/0x20 [ 49.149640] release_task+0x194/0x1630 [ 49.153509] ? _raw_spin_unlock_irq+0x28/0x90 [ 49.158008] ? lockdep_hardirqs_on+0x415/0x5d0 [ 49.162570] ? trace_hardirqs_on+0x67/0x220 [ 49.166874] wait_consider_task+0x2c95/0x3910 [ 49.171354] ? release_task+0x1630/0x1630 [ 49.175545] ? lock_acquire+0x16f/0x3f0 [ 49.179515] ? do_wait+0x3aa/0x9d0 [ 49.183050] ? kasan_check_write+0x14/0x20 [ 49.187418] do_wait+0x439/0x9d0 [ 49.190823] ? wait_consider_task+0x3910/0x3910 [ 49.195481] kernel_wait4+0x171/0x290 [ 49.199271] ? __ia32_sys_waitid+0x140/0x140 [ 49.203668] ? task_stopped_code+0x180/0x180 [ 49.208102] ? find_held_lock+0x35/0x130 [ 49.212149] ? __do_page_fault+0x676/0xe90 [ 49.216369] __do_sys_wait4+0x147/0x160 [ 49.220386] ? kernel_wait4+0x290/0x290 [ 49.224345] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 49.229872] ? up_read+0x1a/0x110 [ 49.233311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 49.238875] ? __do_page_fault+0x484/0xe90 [ 49.243093] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 49.247830] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 49.252574] ? do_syscall_64+0x26/0x620 [ 49.256532] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 49.261877] ? do_syscall_64+0x26/0x620 [ 49.265834] __x64_sys_wait4+0x97/0xf0 [ 49.269714] do_syscall_64+0xfd/0x620 [ 49.273498] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 49.278679] RIP: 0033:0x40240a [ 49.281853] Code: c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 8b 05 4e 87 2d 00 85 c0 75 36 45 31 d2 48 63 d2 48 63 ff b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 d0 ff ff ff f7 [ 49.300746] RSP: 002b:00007fff65420c88 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 49.308440] RAX: ffffffffffffffda RBX: 0000000000001d0c RCX: 000000000040240a [ 49.315694] RDX: 0000000040000000 RSI: 00007fff65420c94 RDI: ffffffffffffffff [ 49.322947] RBP: 00000000006d3018 R08: 0000000000000000 R09: 000055555649c880 [ 49.330219] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004033c0 [ 49.338781] R13: 0000000000403450 R14: 0000000000000000 R15: 0000000000000000 [ 49.347413] Kernel Offset: disabled [ 49.351061] Rebooting in 86400 seconds..