[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 28.793373] kauditd_printk_skb: 7 callbacks suppressed [ 28.793386] audit: type=1800 audit(1545595460.120:29): pid=5893 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 28.826911] audit: type=1800 audit(1545595460.120:30): pid=5893 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.161' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 36.851762] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 36.869816] ================================================================== [ 36.877263] BUG: KASAN: slab-out-of-bounds in fpstate_init+0x50/0x160 [ 36.883825] Write of size 832 at addr ffff8881c2d68bc0 by task syz-executor211/6046 [ 36.891594] [ 36.893211] CPU: 0 PID: 6046 Comm: syz-executor211 Not tainted 4.20.0-rc6-next-20181217+ #172 [ 36.901873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.911322] Call Trace: [ 36.913916] dump_stack+0x244/0x39d [ 36.917536] ? dump_stack_print_info.cold.1+0x20/0x20 [ 36.922723] ? printk+0xa7/0xcf [ 36.925988] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 36.930747] print_address_description.cold.4+0x9/0x1ff [ 36.936112] ? fpstate_init+0x50/0x160 [ 36.939985] kasan_report.cold.5+0x1b/0x39 [ 36.944199] ? fpstate_init+0x50/0x160 [ 36.948072] ? fpstate_init+0x50/0x160 [ 36.951944] check_memory_region+0x13e/0x1b0 [ 36.956336] memset+0x23/0x40 [ 36.959453] fpstate_init+0x50/0x160 [ 36.963167] kvm_arch_vcpu_init+0x3e9/0x870 [ 36.967495] kvm_vcpu_init+0x2fa/0x420 [ 36.971378] ? vcpu_stat_get+0x300/0x300 [ 36.975457] ? kmem_cache_alloc+0x33f/0x730 [ 36.979772] vmx_create_vcpu+0x1b7/0x2695 [ 36.983921] ? lock_downgrade+0x900/0x900 [ 36.988071] ? vmx_exec_control+0x210/0x210 [ 36.992415] ? trace_hardirqs_on+0x310/0x310 [ 36.996827] ? kasan_check_write+0x14/0x20 [ 37.001045] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 37.005961] ? wait_for_completion+0x8a0/0x8a0 [ 37.010534] kvm_arch_vcpu_create+0xe5/0x220 [ 37.014961] ? kvm_arch_vcpu_free+0x90/0x90 [ 37.019267] ? kasan_check_read+0x11/0x20 [ 37.023403] kvm_vm_ioctl+0x526/0x2030 [ 37.027297] ? kvm_unregister_device_ops+0x70/0x70 [ 37.032216] ? get_unused_fd_flags+0x1a0/0x1a0 [ 37.036810] ? kfree+0x11e/0x230 [ 37.040165] ? kfree+0x11e/0x230 [ 37.043535] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 37.048106] ? trace_hardirqs_on+0xbd/0x310 [ 37.052420] ? kvm_uevent_notify_change.part.32+0x300/0x450 [ 37.058117] ? trace_hardirqs_off_caller+0x310/0x310 [ 37.063207] ? __kasan_slab_free+0x119/0x150 [ 37.067605] ? kvm_uevent_notify_change.part.32+0x300/0x450 [ 37.073318] ? fd_install+0x4d/0x60 [ 37.076934] ? kvm_dev_ioctl+0x18a/0x1ae0 [ 37.081064] ? is_bpf_text_address+0xac/0x170 [ 37.085547] ? kvm_debugfs_release+0x90/0x90 [ 37.089950] ? kasan_check_read+0x11/0x20 [ 37.094102] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 37.099376] ? rcu_read_unlock_special+0x370/0x370 [ 37.104292] ? rcu_softirq_qs+0x20/0x20 [ 37.108253] ? unwind_dump+0x190/0x190 [ 37.112128] ? is_bpf_text_address+0xd3/0x170 [ 37.116612] ? kernel_text_address+0x79/0xf0 [ 37.121005] ? __kernel_text_address+0xd/0x40 [ 37.125487] ? unwind_get_return_address+0x61/0xa0 [ 37.130404] ? __save_stack_trace+0x8d/0xf0 [ 37.134717] ? save_stack+0xa9/0xd0 [ 37.138329] ? save_stack+0x43/0xd0 [ 37.141968] ? __kasan_slab_free+0x102/0x150 [ 37.146362] ? kasan_slab_free+0xe/0x10 [ 37.150342] ? putname+0xf2/0x130 [ 37.153790] ? do_sys_open+0x54d/0x780 [ 37.157668] ? __x64_sys_openat+0x9d/0x100 [ 37.161901] ? do_syscall_64+0x1b9/0x820 [ 37.165948] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.171299] ? trace_hardirqs_off+0xb8/0x310 [ 37.175695] ? kasan_check_read+0x11/0x20 [ 37.179847] ? do_raw_spin_unlock+0xa7/0x330 [ 37.184260] ? trace_hardirqs_on+0x310/0x310 [ 37.188690] ? trace_hardirqs_off+0xb8/0x310 [ 37.193087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 37.198625] ? kvm_unregister_device_ops+0x70/0x70 [ 37.203555] do_vfs_ioctl+0x1de/0x1790 [ 37.207444] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 37.212984] ? ioctl_preallocate+0x300/0x300 [ 37.217401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 37.222923] ? __fget_light+0x2e9/0x430 [ 37.226887] ? fget_raw+0x20/0x20 [ 37.230326] ? putname+0xf2/0x130 [ 37.233777] ? rcu_read_lock_sched_held+0x14f/0x180 [ 37.238778] ? kmem_cache_free+0x24f/0x290 [ 37.243000] ? putname+0xf7/0x130 [ 37.246441] ? do_syscall_64+0x9a/0x820 [ 37.250401] ? do_syscall_64+0x9a/0x820 [ 37.254380] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 37.258997] ? security_file_ioctl+0x94/0xc0 [ 37.263396] ksys_ioctl+0xa9/0xd0 [ 37.266850] __x64_sys_ioctl+0x73/0xb0 [ 37.270766] do_syscall_64+0x1b9/0x820 [ 37.274654] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 37.280008] ? syscall_return_slowpath+0x5e0/0x5e0 [ 37.284922] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 37.289747] ? trace_hardirqs_on_caller+0x310/0x310 [ 37.294747] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 37.299748] ? prepare_exit_to_usermode+0x291/0x3b0 [ 37.304750] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 37.309597] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.314771] RIP: 0033:0x440039 [ 37.317965] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 37.336866] RSP: 002b:00007ffd277e8778 EFLAGS: 00000217 ORIG_RAX: 0000000000000010 [ 37.344576] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 0000000000440039 [ 37.351826] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 37.359078] RBP: 00000000006ca018 R08: 00000000004002c8 R09: 00000000004002c8 [ 37.366332] R10: 0000000000000000 R11: 0000000000000217 R12: 00000000004018c0 [ 37.373590] R13: 0000000000401950 R14: 0000000000000000 R15: 0000000000000000 [ 37.380862] [ 37.382495] Allocated by task 6046: [ 37.386134] save_stack+0x43/0xd0 [ 37.389571] kasan_kmalloc+0xcb/0xd0 [ 37.393265] kasan_slab_alloc+0x12/0x20 [ 37.397224] kmem_cache_alloc+0x130/0x730 [ 37.401379] vmx_create_vcpu+0x110/0x2695 [ 37.405509] kvm_arch_vcpu_create+0xe5/0x220 [ 37.409915] kvm_vm_ioctl+0x526/0x2030 [ 37.413781] do_vfs_ioctl+0x1de/0x1790 [ 37.417678] ksys_ioctl+0xa9/0xd0 [ 37.421114] __x64_sys_ioctl+0x73/0xb0 [ 37.424987] do_syscall_64+0x1b9/0x820 [ 37.428873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.434037] [ 37.435645] Freed by task 0: [ 37.438656] (stack is not available) [ 37.442379] [ 37.443995] The buggy address belongs to the object at ffff8881c2d68b80 [ 37.443995] which belongs to the cache x86_fpu of size 832 [ 37.456285] The buggy address is located 64 bytes inside of [ 37.456285] 832-byte region [ffff8881c2d68b80, ffff8881c2d68ec0) [ 37.468068] The buggy address belongs to the page: [ 37.472981] page:ffffea00070b5a00 count:1 mapcount:0 mapping:ffff8881d7ae9380 index:0x0 [ 37.481136] flags: 0x2fffc0000000200(slab) [ 37.485364] raw: 02fffc0000000200 ffff8881d5054648 ffff8881d5054648 ffff8881d7ae9380 [ 37.493233] raw: 0000000000000000 ffff8881c2d68040 0000000100000004 0000000000000000 [ 37.501093] page dumped because: kasan: bad access detected [ 37.506782] [ 37.508392] Memory state around the buggy address: [ 37.513302] ffff8881c2d68d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.520647] ffff8881c2d68e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.527991] >ffff8881c2d68e80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.535328] ^ [ 37.540771] ffff8881c2d68f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.548115] ffff8881c2d68f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.555455] ================================================================== [ 37.562790] Disabling lock debugging due to kernel taint [ 37.568399] Kernel panic - not syncing: panic_on_warn set ... [ 37.574480] CPU: 0 PID: 6046 Comm: syz-executor211 Tainted: G B 4.20.0-rc6-next-20181217+ #172 [ 37.584536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.593875] Call Trace: [ 37.596445] dump_stack+0x244/0x39d [ 37.600070] ? dump_stack_print_info.cold.1+0x20/0x20 [ 37.605243] ? fpstate_init+0x30/0x160 [ 37.609116] panic+0x2ad/0x632 [ 37.612291] ? add_taint.cold.5+0x16/0x16 [ 37.616426] ? preempt_schedule+0x4d/0x60 [ 37.620559] ? ___preempt_schedule+0x16/0x18 [ 37.625039] ? trace_hardirqs_on+0xb4/0x310 [ 37.629386] ? fpstate_init+0x50/0x160 [ 37.633259] end_report+0x47/0x4f [ 37.636697] kasan_report.cold.5+0xe/0x39 [ 37.640825] ? fpstate_init+0x50/0x160 [ 37.644711] ? fpstate_init+0x50/0x160 [ 37.648594] check_memory_region+0x13e/0x1b0 [ 37.652986] memset+0x23/0x40 [ 37.656078] fpstate_init+0x50/0x160 [ 37.659775] kvm_arch_vcpu_init+0x3e9/0x870 [ 37.664085] kvm_vcpu_init+0x2fa/0x420 [ 37.667959] ? vcpu_stat_get+0x300/0x300 [ 37.672006] ? kmem_cache_alloc+0x33f/0x730 [ 37.676315] vmx_create_vcpu+0x1b7/0x2695 [ 37.680490] ? lock_downgrade+0x900/0x900 [ 37.684625] ? vmx_exec_control+0x210/0x210 [ 37.688961] ? trace_hardirqs_on+0x310/0x310 [ 37.693358] ? kasan_check_write+0x14/0x20 [ 37.697579] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 37.702492] ? wait_for_completion+0x8a0/0x8a0 [ 37.707063] kvm_arch_vcpu_create+0xe5/0x220 [ 37.711453] ? kvm_arch_vcpu_free+0x90/0x90 [ 37.715754] ? kasan_check_read+0x11/0x20 [ 37.719886] kvm_vm_ioctl+0x526/0x2030 [ 37.723759] ? kvm_unregister_device_ops+0x70/0x70 [ 37.728690] ? get_unused_fd_flags+0x1a0/0x1a0 [ 37.733252] ? kfree+0x11e/0x230 [ 37.736598] ? kfree+0x11e/0x230 [ 37.739947] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 37.744513] ? trace_hardirqs_on+0xbd/0x310 [ 37.748872] ? kvm_uevent_notify_change.part.32+0x300/0x450 [ 37.754584] ? trace_hardirqs_off_caller+0x310/0x310 [ 37.759692] ? __kasan_slab_free+0x119/0x150 [ 37.764084] ? kvm_uevent_notify_change.part.32+0x300/0x450 [ 37.769794] ? fd_install+0x4d/0x60 [ 37.773407] ? kvm_dev_ioctl+0x18a/0x1ae0 [ 37.777536] ? is_bpf_text_address+0xac/0x170 [ 37.782019] ? kvm_debugfs_release+0x90/0x90 [ 37.786424] ? kasan_check_read+0x11/0x20 [ 37.790570] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 37.795831] ? rcu_read_unlock_special+0x370/0x370 [ 37.800743] ? rcu_softirq_qs+0x20/0x20 [ 37.804700] ? unwind_dump+0x190/0x190 [ 37.808573] ? is_bpf_text_address+0xd3/0x170 [ 37.813063] ? kernel_text_address+0x79/0xf0 [ 37.815267] kobject: 'regulatory.0' (000000005b17054b): kobject_uevent_env [ 37.817480] ? __kernel_text_address+0xd/0x40 [ 37.824593] kobject: 'regulatory.0' (000000005b17054b): fill_kobj_path: path = '/devices/platform/regulatory.0' [ 37.829009] ? unwind_get_return_address+0x61/0xa0 [ 37.844140] ? __save_stack_trace+0x8d/0xf0 [ 37.848475] ? save_stack+0xa9/0xd0 [ 37.852121] ? save_stack+0x43/0xd0 [ 37.855748] ? __kasan_slab_free+0x102/0x150 [ 37.860138] ? kasan_slab_free+0xe/0x10 [ 37.864093] ? putname+0xf2/0x130 [ 37.867533] ? do_sys_open+0x54d/0x780 [ 37.871404] ? __x64_sys_openat+0x9d/0x100 [ 37.875635] ? do_syscall_64+0x1b9/0x820 [ 37.879709] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.885075] ? trace_hardirqs_off+0xb8/0x310 [ 37.889466] ? kasan_check_read+0x11/0x20 [ 37.893594] ? do_raw_spin_unlock+0xa7/0x330 [ 37.897989] ? trace_hardirqs_on+0x310/0x310 [ 37.902447] ? trace_hardirqs_off+0xb8/0x310 [ 37.906843] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 37.912385] ? kvm_unregister_device_ops+0x70/0x70 [ 37.917298] do_vfs_ioctl+0x1de/0x1790 [ 37.921169] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 37.926693] ? ioctl_preallocate+0x300/0x300 [ 37.931098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 37.936621] ? __fget_light+0x2e9/0x430 [ 37.940593] ? fget_raw+0x20/0x20 [ 37.944065] ? putname+0xf2/0x130 [ 37.947507] ? rcu_read_lock_sched_held+0x14f/0x180 [ 37.952507] ? kmem_cache_free+0x24f/0x290 [ 37.956740] ? putname+0xf7/0x130 [ 37.960175] ? do_syscall_64+0x9a/0x820 [ 37.964134] ? do_syscall_64+0x9a/0x820 [ 37.968104] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 37.972674] ? security_file_ioctl+0x94/0xc0 [ 37.977108] ksys_ioctl+0xa9/0xd0 [ 37.980547] __x64_sys_ioctl+0x73/0xb0 [ 37.984431] do_syscall_64+0x1b9/0x820 [ 37.988307] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 37.993654] ? syscall_return_slowpath+0x5e0/0x5e0 [ 37.998568] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 38.003409] ? trace_hardirqs_on_caller+0x310/0x310 [ 38.008411] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 38.013423] ? prepare_exit_to_usermode+0x291/0x3b0 [ 38.018427] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 38.023268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 38.028440] RIP: 0033:0x440039 [ 38.031612] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 38.050496] RSP: 002b:00007ffd277e8778 EFLAGS: 00000217 ORIG_RAX: 0000000000000010 [ 38.058186] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 0000000000440039 [ 38.065454] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 38.072704] RBP: 00000000006ca018 R08: 00000000004002c8 R09: 00000000004002c8 [ 38.079956] R10: 0000000000000000 R11: 0000000000000217 R12: 00000000004018c0 [ 38.087207] R13: 0000000000401950 R14: 0000000000000000 R15: 0000000000000000 [ 38.095439] Kernel Offset: disabled [ 38.099062] Rebooting in 86400 seconds..