[info] Using makefile-style concurrent boot in runlevel 2. [ 27.769486] audit: type=1800 audit(1543146188.216:21): pid=5885 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.21' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 39.167172] ================================================================== [ 39.174635] BUG: KASAN: slab-out-of-bounds in queue_stack_map_push_elem+0x185/0x290 [ 39.182424] Write of size 262146 at addr ffff8881bc12ee48 by task syz-executor009/6041 [ 39.190465] [ 39.192085] CPU: 1 PID: 6041 Comm: syz-executor009 Not tainted 4.20.0-rc3+ #127 [ 39.199516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 39.208857] Call Trace: [ 39.211440] dump_stack+0x244/0x39d [ 39.215059] ? dump_stack_print_info.cold.1+0x20/0x20 [ 39.220254] ? printk+0xa7/0xcf [ 39.223526] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 39.228278] print_address_description.cold.7+0x9/0x1ff [ 39.233674] kasan_report.cold.8+0x242/0x309 [ 39.238072] ? queue_stack_map_push_elem+0x185/0x290 [ 39.243173] check_memory_region+0x13e/0x1b0 [ 39.247574] memcpy+0x37/0x50 [ 39.250675] queue_stack_map_push_elem+0x185/0x290 [ 39.255595] ? queue_map_pop_elem+0x30/0x30 [ 39.259908] map_update_elem+0x605/0xf60 [ 39.263964] __x64_sys_bpf+0x32d/0x520 [ 39.267842] ? bpf_prog_get+0x20/0x20 [ 39.271645] do_syscall_64+0x1b9/0x820 [ 39.275522] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 39.280881] ? syscall_return_slowpath+0x5e0/0x5e0 [ 39.285803] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 39.290638] ? trace_hardirqs_on_caller+0x310/0x310 [ 39.295644] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 39.300654] ? prepare_exit_to_usermode+0x291/0x3b0 [ 39.305663] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 39.310504] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 39.315684] RIP: 0033:0x4400e9 [ 39.318882] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 39.337773] RSP: 002b:00007fffa3b64458 EFLAGS: 00000213 ORIG_RAX: 0000000000000141 [ 39.345474] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 00000000004400e9 [ 39.352737] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000002 [ 39.360108] RBP: 00000000006ca018 R08: 0000000000000000 R09: 00000000004002c8 [ 39.367494] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000401970 [ 39.374755] R13: 0000000000401a00 R14: 0000000000000000 R15: 0000000000000000 [ 39.382020] [ 39.383639] Allocated by task 6041: [ 39.387269] save_stack+0x43/0xd0 [ 39.390714] kasan_kmalloc+0xc7/0xe0 [ 39.394417] __kmalloc_node+0x50/0x70 [ 39.398203] bpf_map_area_alloc+0x3f/0x90 [ 39.402354] queue_stack_map_alloc+0x192/0x290 [ 39.406929] map_create+0x3bd/0x1110 [ 39.410630] __x64_sys_bpf+0x303/0x520 [ 39.414509] do_syscall_64+0x1b9/0x820 [ 39.418388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 39.423563] [ 39.425177] Freed by task 3716: [ 39.428448] save_stack+0x43/0xd0 [ 39.431892] __kasan_slab_free+0x102/0x150 [ 39.436117] kasan_slab_free+0xe/0x10 [ 39.439906] kfree+0xcf/0x230 [ 39.443003] skb_free_head+0x99/0xc0 [ 39.446740] skb_release_data+0x70c/0x9a0 [ 39.450878] skb_release_all+0x4a/0x60 [ 39.454755] consume_skb+0x1ae/0x570 [ 39.458570] skb_free_datagram+0x1a/0xf0 [ 39.462625] unix_dgram_recvmsg+0xd6d/0x1b10 [ 39.467024] sock_recvmsg+0xd0/0x110 [ 39.470731] __sys_recvfrom+0x311/0x5d0 [ 39.474693] __x64_sys_recvfrom+0xe1/0x1a0 [ 39.478915] do_syscall_64+0x1b9/0x820 [ 39.482793] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 39.487966] [ 39.489590] The buggy address belongs to the object at ffff8881bc12ed00 [ 39.489590] which belongs to the cache kmalloc-512 of size 512 [ 39.502249] The buggy address is located 328 bytes inside of [ 39.502249] 512-byte region [ffff8881bc12ed00, ffff8881bc12ef00) [ 39.514112] The buggy address belongs to the page: [ 39.519033] page:ffffea0006f04b80 count:1 mapcount:0 mapping:ffff8881da800940 index:0x0 [ 39.527162] flags: 0x2fffc0000000200(slab) [ 39.531389] raw: 02fffc0000000200 ffffea0006f1cd08 ffffea0006f067c8 ffff8881da800940 [ 39.539288] raw: 0000000000000000 ffff8881bc12e080 0000000100000006 0000000000000000 [ 39.547165] page dumped because: kasan: bad access detected [ 39.552860] [ 39.554476] Memory state around the buggy address: [ 39.559404] ffff8881bc12ed80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.566761] ffff8881bc12ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.574111] >ffff8881bc12ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.581455] ^ [ 39.584810] ffff8881bc12ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.592159] ffff8881bc12ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.599503] ================================================================== [ 39.606850] Disabling lock debugging due to kernel taint [ 39.612287] Kernel panic - not syncing: panic_on_warn set ... [ 39.618160] CPU: 1 PID: 6041 Comm: syz-executor009 Tainted: G B 4.20.0-rc3+ #127 [ 39.627156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 39.636497] Call Trace: [ 39.639184] dump_stack+0x244/0x39d [ 39.642804] ? dump_stack_print_info.cold.1+0x20/0x20 [ 39.647984] panic+0x2ad/0x55c [ 39.651173] ? add_taint.cold.5+0x16/0x16 [ 39.655311] ? add_taint.cold.5+0x5/0x16 [ 39.659365] ? trace_hardirqs_off+0xaf/0x310 [ 39.663767] kasan_end_report+0x47/0x4f [ 39.667728] kasan_report.cold.8+0x76/0x309 [ 39.672038] ? queue_stack_map_push_elem+0x185/0x290 [ 39.677130] check_memory_region+0x13e/0x1b0 [ 39.681530] memcpy+0x37/0x50 [ 39.684624] queue_stack_map_push_elem+0x185/0x290 [ 39.689540] ? queue_map_pop_elem+0x30/0x30 [ 39.693852] map_update_elem+0x605/0xf60 [ 39.697901] __x64_sys_bpf+0x32d/0x520 [ 39.701776] ? bpf_prog_get+0x20/0x20 [ 39.705608] do_syscall_64+0x1b9/0x820 [ 39.709485] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 39.714839] ? syscall_return_slowpath+0x5e0/0x5e0 [ 39.719757] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 39.724590] ? trace_hardirqs_on_caller+0x310/0x310 [ 39.729594] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 39.734598] ? prepare_exit_to_usermode+0x291/0x3b0 [ 39.739605] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 39.744437] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 39.749626] RIP: 0033:0x4400e9 [ 39.752822] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 39.771713] RSP: 002b:00007fffa3b64458 EFLAGS: 00000213 ORIG_RAX: 0000000000000141 [ 39.779405] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 00000000004400e9 [ 39.786662] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000002 [ 39.793917] RBP: 00000000006ca018 R08: 0000000000000000 R09: 00000000004002c8 [ 39.801176] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000401970 [ 39.808432] R13: 0000000000401a00 R14: 0000000000000000 R15: 0000000000000000 [ 39.816827] Kernel Offset: disabled [ 39.820458] Rebooting in 86400 seconds..