Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 37.927375] audit: type=1800 audit(1569186646.237:33): pid=7395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 37.955719] audit: type=1800 audit(1569186646.247:34): pid=7395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 41.297876] audit: type=1400 audit(1569186649.607:35): avc: denied { map } for pid=7568 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.1.0' (ECDSA) to the list of known hosts. executing program [ 62.644916] audit: type=1400 audit(1569186670.957:36): avc: denied { map } for pid=7581 comm="syz-executor017" path="/root/syz-executor017942683" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 62.682146] FAULT_INJECTION: forcing a failure. [ 62.682146] name failslab, interval 1, probability 0, space 0, times 1 [ 62.696200] CPU: 0 PID: 7581 Comm: syz-executor017 Not tainted 4.19.75 #0 [ 62.704657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.715290] Call Trace: [ 62.717891] dump_stack+0x172/0x1f0 [ 62.721735] should_fail.cold+0xa/0x1b [ 62.726446] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 62.732134] ? lock_downgrade+0x810/0x810 [ 62.738105] __should_failslab+0x121/0x190 [ 62.743023] should_failslab+0x9/0x14 [ 62.747263] kmem_cache_alloc_trace+0x2cc/0x760 [ 62.752548] ? kasan_check_read+0x11/0x20 [ 62.758316] cma_alloc_port+0x4d/0x190 [ 62.763489] rdma_bind_addr+0x165a/0x1f80 [ 62.768178] ? __radix_tree_lookup+0x219/0x380 [ 62.774148] ? cma_ndev_work_handler+0x1b0/0x1b0 [ 62.779441] ucma_bind_ip+0x129/0x1b0 [ 62.783466] ? ucma_resolve_ip+0x210/0x210 [ 62.787877] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 62.793528] ? _copy_from_user+0xdd/0x150 [ 62.798184] ucma_write+0x2d7/0x3c0 [ 62.801958] ? ucma_resolve_ip+0x210/0x210 [ 62.806204] ? ucma_open+0x290/0x290 [ 62.809932] __vfs_write+0x114/0x810 [ 62.813714] ? ucma_open+0x290/0x290 [ 62.817826] ? kernel_read+0x120/0x120 [ 62.821740] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 62.827281] ? __inode_security_revalidate+0xda/0x120 [ 62.832475] ? avc_policy_seqno+0xd/0x70 [ 62.836531] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 62.841786] ? selinux_file_permission+0x92/0x550 [ 62.846832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 62.852381] ? security_file_permission+0x89/0x230 [ 62.857380] ? rw_verify_area+0x118/0x360 [ 62.861527] vfs_write+0x20c/0x560 [ 62.865088] ksys_write+0x14f/0x2d0 [ 62.868884] ? __ia32_sys_read+0xb0/0xb0 [ 62.872947] ? do_syscall_64+0x26/0x620 [ 62.877056] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 62.882440] ? do_syscall_64+0x26/0x620 [ 62.886562] __x64_sys_write+0x73/0xb0 [ 62.890599] do_syscall_64+0xfd/0x620 [ 62.894414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 62.899775] RIP: 0033:0x440669 [ 62.902961] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b 14 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 62.922444] RSP: 002b:00007ffd81690b68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 62.930247] RAX: ffffffffffffffda RBX: 00007ffd81690b70 RCX: 0000000000440669 [ 62.938368] RDX: 00000000000002a8 RSI: 0000000020000100 RDI: 0000000000000003 [ 62.945652] RBP: 0000000000000004 R08: 0000000000000001 R09: 00007ffd81690031 [ 62.953237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000401f50 [ 62.960724] R13: 0000000000401fe0 R14: 0000000000000000 R15: 0000000000000000 [ 62.971845] ================================================================== [ 62.979863] BUG: KASAN: use-after-free in wait_consider_task+0x1b51/0x3910 [ 62.987027] Read of size 4 at addr ffff88809a3e692c by task sshd/7579 [ 62.993611] [ 62.995234] CPU: 1 PID: 7579 Comm: sshd Not tainted 4.19.75 #0 [ 63.001226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.010589] Call Trace: [ 63.013185] dump_stack+0x172/0x1f0 [ 63.016825] ? wait_consider_task+0x1b51/0x3910 [ 63.021512] print_address_description.cold+0x7c/0x20d [ 63.026789] ? wait_consider_task+0x1b51/0x3910 [ 63.031474] kasan_report.cold+0x8c/0x2ba [ 63.035645] __asan_report_load4_noabort+0x14/0x20 [ 63.040574] wait_consider_task+0x1b51/0x3910 [ 63.045068] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 63.050174] ? add_wait_queue+0x112/0x170 [ 63.054331] ? release_task+0x1630/0x1630 [ 63.058465] ? lock_acquire+0x16f/0x3f0 [ 63.062741] ? do_wait+0x3aa/0x9d0 [ 63.066609] ? kasan_check_write+0x14/0x20 [ 63.070853] do_wait+0x439/0x9d0 [ 63.074220] ? wait_consider_task+0x3910/0x3910 [ 63.078880] ? mark_held_locks+0x100/0x100 [ 63.083144] kernel_wait4+0x171/0x290 [ 63.086964] ? __ia32_sys_waitid+0x140/0x140 [ 63.091395] ? task_stopped_code+0x180/0x180 [ 63.095808] __do_sys_wait4+0x147/0x160 [ 63.099786] ? kernel_wait4+0x290/0x290 [ 63.103759] ? kasan_check_read+0x11/0x20 [ 63.107898] ? _copy_to_user+0xc9/0x120 [ 63.111875] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 63.117501] ? __x64_sys_rt_sigprocmask+0x21d/0x2e0 [ 63.122532] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 63.127351] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 63.132122] ? do_syscall_64+0x26/0x620 [ 63.136091] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 63.141450] ? do_syscall_64+0x26/0x620 [ 63.145640] __x64_sys_wait4+0x97/0xf0 [ 63.149546] do_syscall_64+0xfd/0x620 [ 63.153372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 63.158643] RIP: 0033:0x7f4492d25a3e [ 63.162458] Code: 90 90 90 90 90 90 90 90 90 90 90 90 48 83 ec 28 8b 05 c2 eb 2d 00 85 c0 75 1d 45 31 d2 48 63 d2 48 63 ff b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 48 83 c4 28 c3 89 54 24 08 48 89 74 24 10 [ 63.181480] RSP: 002b:00007fff9874e070 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 63.189598] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4492d25a3e [ 63.196868] RDX: 0000000000000001 RSI: 00007fff9874e0ac RDI: ffffffffffffffff [ 63.204155] RBP: 000055b207f2bc88 R08: 00007fff9874e170 R09: 0101010101010101 [ 63.211507] R10: 0000000000000000 R11: 0000000000000246 R12: 000055b208ce8c00 [ 63.218862] R13: 000055b207f29fb4 R14: 0000000000000028 R15: 000055b207f2bca0 [ 63.226404] [ 63.228029] Allocated by task 7579: [ 63.231662] save_stack+0x45/0xd0 [ 63.235116] kasan_kmalloc+0xce/0xf0 [ 63.238938] kasan_slab_alloc+0xf/0x20 [ 63.242822] kmem_cache_alloc_node+0x144/0x710 [ 63.247397] copy_process.part.0+0x1ce0/0x7a30 [ 63.251969] _do_fork+0x257/0xfd0 [ 63.255411] __x64_sys_clone+0xbf/0x150 [ 63.259376] do_syscall_64+0xfd/0x620 [ 63.265178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 63.270355] [ 63.272058] Freed by task 0: [ 63.275200] save_stack+0x45/0xd0 [ 63.278645] __kasan_slab_free+0x102/0x150 [ 63.282867] kasan_slab_free+0xe/0x10 [ 63.286753] kmem_cache_free+0x86/0x260 [ 63.290731] free_task+0xdd/0x120 [ 63.294288] __put_task_struct+0x20f/0x4c0 [ 63.298540] finish_task_switch+0x52b/0x780 [ 63.302869] __schedule+0x86e/0x1dc0 [ 63.306575] schedule_idle+0x58/0x80 [ 63.310311] do_idle+0x192/0x560 [ 63.313665] cpu_startup_entry+0xc8/0xe0 [ 63.317718] rest_init+0x219/0x222 [ 63.321475] start_kernel+0x88c/0x8c5 [ 63.325277] x86_64_start_reservations+0x29/0x2b [ 63.330371] x86_64_start_kernel+0x77/0x7b [ 63.334603] secondary_startup_64+0xa4/0xb0 [ 63.339131] [ 63.340755] The buggy address belongs to the object at ffff88809a3e64c0 [ 63.340755] which belongs to the cache task_struct of size 6080 [ 63.354091] The buggy address is located 1132 bytes inside of [ 63.354091] 6080-byte region [ffff88809a3e64c0, ffff88809a3e7c80) [ 63.366155] The buggy address belongs to the page: [ 63.371088] page:ffffea000268f980 count:1 mapcount:0 mapping:ffff88812c26d800 index:0x0 compound_mapcount: 0 [ 63.381064] flags: 0x1fffc0000008100(slab|head) [ 63.385726] raw: 01fffc0000008100 ffffea000262b608 ffffea0002150588 ffff88812c26d800 [ 63.393609] raw: 0000000000000000 ffff88809a3e64c0 0000000100000001 0000000000000000 [ 63.401649] page dumped because: kasan: bad access detected [ 63.407382] [ 63.408999] Memory state around the buggy address: [ 63.414296] ffff88809a3e6800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.421652] ffff88809a3e6880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.429088] >ffff88809a3e6900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.436527] ^ [ 63.441183] ffff88809a3e6980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.448563] ffff88809a3e6a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.455987] ================================================================== [ 63.463340] Disabling lock debugging due to kernel taint [ 63.468917] Kernel panic - not syncing: panic_on_warn set ... [ 63.468917] [ 63.476325] CPU: 1 PID: 7579 Comm: sshd Tainted: G B 4.19.75 #0 [ 63.483777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.493206] Call Trace: [ 63.495798] dump_stack+0x172/0x1f0 [ 63.499578] ? wait_consider_task+0x1b51/0x3910 [ 63.504455] panic+0x263/0x507 [ 63.507644] ? __warn_printk+0xf3/0xf3 [ 63.511519] ? retint_kernel+0x2d/0x2d [ 63.515507] ? trace_hardirqs_on+0x5e/0x220 [ 63.519916] ? wait_consider_task+0x1b51/0x3910 [ 63.524597] kasan_end_report+0x47/0x4f [ 63.528573] kasan_report.cold+0xa9/0x2ba [ 63.532732] __asan_report_load4_noabort+0x14/0x20 [ 63.537654] wait_consider_task+0x1b51/0x3910 [ 63.542386] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 63.547673] ? add_wait_queue+0x112/0x170 [ 63.551835] ? release_task+0x1630/0x1630 [ 63.555981] ? lock_acquire+0x16f/0x3f0 [ 63.559953] ? do_wait+0x3aa/0x9d0 [ 63.563602] ? kasan_check_write+0x14/0x20 [ 63.567825] do_wait+0x439/0x9d0 [ 63.571195] ? wait_consider_task+0x3910/0x3910 [ 63.575947] ? mark_held_locks+0x100/0x100 [ 63.580291] kernel_wait4+0x171/0x290 [ 63.584104] ? __ia32_sys_waitid+0x140/0x140 [ 63.588574] ? task_stopped_code+0x180/0x180 [ 63.593021] __do_sys_wait4+0x147/0x160 [ 63.597033] ? kernel_wait4+0x290/0x290 [ 63.601024] ? kasan_check_read+0x11/0x20 [ 63.605181] ? _copy_to_user+0xc9/0x120 [ 63.609146] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 63.614681] ? __x64_sys_rt_sigprocmask+0x21d/0x2e0 [ 63.619691] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 63.624757] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 63.629692] ? do_syscall_64+0x26/0x620 [ 63.633652] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 63.639743] ? do_syscall_64+0x26/0x620 [ 63.643719] __x64_sys_wait4+0x97/0xf0 [ 63.647601] do_syscall_64+0xfd/0x620 [ 63.651567] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 63.656865] RIP: 0033:0x7f4492d25a3e [ 63.660661] Code: 90 90 90 90 90 90 90 90 90 90 90 90 48 83 ec 28 8b 05 c2 eb 2d 00 85 c0 75 1d 45 31 d2 48 63 d2 48 63 ff b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 48 83 c4 28 c3 89 54 24 08 48 89 74 24 10 [ 63.680283] RSP: 002b:00007fff9874e070 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 63.688080] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4492d25a3e [ 63.695465] RDX: 0000000000000001 RSI: 00007fff9874e0ac RDI: ffffffffffffffff [ 63.702739] RBP: 000055b207f2bc88 R08: 00007fff9874e170 R09: 0101010101010101 [ 63.710279] R10: 0000000000000000 R11: 0000000000000246 R12: 000055b208ce8c00 [ 63.717669] R13: 000055b207f29fb4 R14: 0000000000000028 R15: 000055b207f2bca0 [ 63.727113] Kernel Offset: disabled [ 63.730750] Rebooting in 86400 seconds..