[ 34.559206] audit: type=1800 audit(1551630509.912:27): pid=7440 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 34.559230] audit: type=1800 audit(1551630509.912:28): pid=7440 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 35.455425] audit: type=1800 audit(1551630510.842:29): pid=7440 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 35.476231] audit: type=1800 audit(1551630510.852:30): pid=7440 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.180' (ECDSA) to the list of known hosts. 2019/03/03 16:28:38 parsed 1 programs 2019/03/03 16:28:41 executed programs: 0 syzkaller login: [ 46.158345] IPVS: ftp: loaded support on port[0] = 21 [ 46.212372] chnl_net:caif_netlink_parms(): no params data found [ 46.240979] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.247747] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.254606] device bridge_slave_0 entered promiscuous mode [ 46.261762] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.268205] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.275006] device bridge_slave_1 entered promiscuous mode [ 46.289771] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 46.298710] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 46.314762] team0: Port device team_slave_0 added [ 46.321217] team0: Port device team_slave_1 added [ 46.398411] device hsr_slave_0 entered promiscuous mode [ 46.447366] device hsr_slave_1 entered promiscuous mode [ 46.493696] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.500114] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.506815] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.513205] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.542589] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.553363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.572643] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.580026] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.587896] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 46.598504] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.609396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.617090] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.623439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.630387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.638277] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.644597] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.658868] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 46.667623] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 46.676304] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 46.688857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.699400] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 46.710281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 46.717978] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.734193] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 47.880834] ================================================================== [ 47.888343] BUG: KASAN: use-after-free in __list_add_valid+0x9a/0xa0 [ 47.894820] Read of size 8 at addr ffff8880a88db6e0 by task syz-executor.0/7865 [ 47.902255] [ 47.903879] CPU: 0 PID: 7865 Comm: syz-executor.0 Not tainted 5.0.0-rc8+ #3 [ 47.910966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 47.920311] Call Trace: [ 47.922884] dump_stack+0x172/0x1f0 [ 47.926512] ? __list_add_valid+0x9a/0xa0 [ 47.930679] print_address_description.cold+0x7c/0x20d [ 47.935940] ? __list_add_valid+0x9a/0xa0 [ 47.940075] ? __list_add_valid+0x9a/0xa0 [ 47.944208] kasan_report.cold+0x1b/0x40 [ 47.948254] ? __list_add_valid+0x9a/0xa0 [ 47.952391] __asan_report_load8_noabort+0x14/0x20 [ 47.957315] __list_add_valid+0x9a/0xa0 [ 47.961283] rdma_listen+0x63b/0x8e0 [ 47.964984] ucma_listen+0x14d/0x1c0 [ 47.968692] ? ucma_notify+0x190/0x190 [ 47.972586] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 47.978108] ? _copy_from_user+0xdd/0x150 [ 47.982242] ucma_write+0x2da/0x3c0 [ 47.985862] ? ucma_notify+0x190/0x190 [ 47.989778] ? ucma_open+0x290/0x290 [ 47.993486] ? __fget+0x340/0x540 [ 47.996956] __vfs_write+0x116/0x8e0 [ 48.000669] ? lock_downgrade+0x810/0x810 [ 48.004805] ? ucma_open+0x290/0x290 [ 48.008504] ? kernel_read+0x120/0x120 [ 48.012388] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 48.017323] ? common_file_perm+0x1d6/0x6f0 [ 48.021648] ? apparmor_file_permission+0x25/0x30 [ 48.026476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 48.032011] ? security_file_permission+0x94/0x320 [ 48.036939] ? rw_verify_area+0x118/0x360 [ 48.041097] vfs_write+0x20c/0x580 [ 48.044645] ksys_write+0xea/0x1f0 [ 48.048180] ? __ia32_sys_read+0xb0/0xb0 [ 48.052227] ? do_fast_syscall_32+0xd1/0xc98 [ 48.056621] ? entry_SYSENTER_compat+0x70/0x7f [ 48.061196] ? do_fast_syscall_32+0xd1/0xc98 [ 48.065606] __ia32_sys_write+0x71/0xb0 [ 48.069579] do_fast_syscall_32+0x281/0xc98 [ 48.073889] entry_SYSENTER_compat+0x70/0x7f [ 48.078284] RIP: 0023:0xf7faa869 [ 48.081638] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 48.100525] RSP: 002b:00000000f7fa60cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 48.108234] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200001c0 [ 48.115495] RDX: 00000000ffffff3a RSI: 0000000000000000 RDI: 0000000000000000 [ 48.122747] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 48.129999] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 48.137263] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 48.144550] [ 48.146180] Allocated by task 7862: [ 48.149803] save_stack+0x45/0xd0 [ 48.153240] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 48.158153] kasan_kmalloc+0x9/0x10 [ 48.161764] kmem_cache_alloc_trace+0x151/0x760 [ 48.166417] __rdma_create_id+0x5f/0x4e0 [ 48.170473] ucma_create_id+0x1de/0x640 [ 48.174429] ucma_write+0x2da/0x3c0 [ 48.178047] __vfs_write+0x116/0x8e0 [ 48.181762] vfs_write+0x20c/0x580 [ 48.185283] ksys_write+0xea/0x1f0 [ 48.188808] __ia32_sys_write+0x71/0xb0 [ 48.192765] do_fast_syscall_32+0x281/0xc98 [ 48.197089] entry_SYSENTER_compat+0x70/0x7f [ 48.201488] [ 48.203109] Freed by task 7858: [ 48.206369] save_stack+0x45/0xd0 [ 48.209814] __kasan_slab_free+0x102/0x150 [ 48.214030] kasan_slab_free+0xe/0x10 [ 48.217821] kfree+0xcf/0x230 [ 48.220926] rdma_destroy_id+0x723/0xab0 [ 48.224968] ucma_close+0x115/0x320 [ 48.228578] __fput+0x2df/0x8d0 [ 48.231844] ____fput+0x16/0x20 [ 48.235105] task_work_run+0x14a/0x1c0 [ 48.238982] exit_to_usermode_loop+0x273/0x2c0 [ 48.243597] do_fast_syscall_32+0xa9d/0xc98 [ 48.247930] entry_SYSENTER_compat+0x70/0x7f [ 48.252332] [ 48.253981] The buggy address belongs to the object at ffff8880a88db500 [ 48.253981] which belongs to the cache kmalloc-2k of size 2048 [ 48.266617] The buggy address is located 480 bytes inside of [ 48.266617] 2048-byte region [ffff8880a88db500, ffff8880a88dbd00) [ 48.278576] The buggy address belongs to the page: [ 48.283497] page:ffffea0002a23680 count:1 mapcount:0 mapping:ffff88812c3f0c40 index:0x0 compound_mapcount: 0 [ 48.293489] flags: 0x1fffc0000010200(slab|head) [ 48.298157] raw: 01fffc0000010200 ffffea0002383608 ffffea000233a688 ffff88812c3f0c40 [ 48.306033] raw: 0000000000000000 ffff8880a88da400 0000000100000003 0000000000000000 [ 48.313901] page dumped because: kasan: bad access detected [ 48.319606] [ 48.321219] Memory state around the buggy address: [ 48.326145] ffff8880a88db580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.333504] ffff8880a88db600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.340874] >ffff8880a88db680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.348215] ^ [ 48.354691] ffff8880a88db700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.362033] ffff8880a88db780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.369373] ================================================================== [ 48.376717] Disabling lock debugging due to kernel taint [ 48.384927] Kernel panic - not syncing: panic_on_warn set ... [ 48.390840] CPU: 1 PID: 7865 Comm: syz-executor.0 Tainted: G B 5.0.0-rc8+ #3 [ 48.399309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 48.408642] Call Trace: [ 48.411215] dump_stack+0x172/0x1f0 [ 48.414827] panic+0x2cb/0x65c [ 48.418006] ? __warn_printk+0xf3/0xf3 [ 48.421878] ? __list_add_valid+0x9a/0xa0 [ 48.426009] ? preempt_schedule+0x4b/0x60 [ 48.430140] ? ___preempt_schedule+0x16/0x18 [ 48.434541] ? trace_hardirqs_on+0x5e/0x230 [ 48.438849] ? __list_add_valid+0x9a/0xa0 [ 48.442989] end_report+0x47/0x4f [ 48.446422] ? __list_add_valid+0x9a/0xa0 [ 48.450558] kasan_report.cold+0xe/0x40 [ 48.454514] ? __list_add_valid+0x9a/0xa0 [ 48.458651] __asan_report_load8_noabort+0x14/0x20 [ 48.463577] __list_add_valid+0x9a/0xa0 [ 48.467545] rdma_listen+0x63b/0x8e0 [ 48.471245] ucma_listen+0x14d/0x1c0 [ 48.474938] ? ucma_notify+0x190/0x190 [ 48.478805] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 48.484335] ? _copy_from_user+0xdd/0x150 [ 48.488466] ucma_write+0x2da/0x3c0 [ 48.492080] ? ucma_notify+0x190/0x190 [ 48.495951] ? ucma_open+0x290/0x290 [ 48.499658] ? __fget+0x340/0x540 [ 48.503111] __vfs_write+0x116/0x8e0 [ 48.506802] ? lock_downgrade+0x810/0x810 [ 48.510945] ? ucma_open+0x290/0x290 [ 48.514652] ? kernel_read+0x120/0x120 [ 48.518558] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 48.523486] ? common_file_perm+0x1d6/0x6f0 [ 48.527803] ? apparmor_file_permission+0x25/0x30 [ 48.532628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 48.538148] ? security_file_permission+0x94/0x320 [ 48.543063] ? rw_verify_area+0x118/0x360 [ 48.547195] vfs_write+0x20c/0x580 [ 48.550718] ksys_write+0xea/0x1f0 [ 48.554241] ? __ia32_sys_read+0xb0/0xb0 [ 48.558286] ? do_fast_syscall_32+0xd1/0xc98 [ 48.562679] ? entry_SYSENTER_compat+0x70/0x7f [ 48.567241] ? do_fast_syscall_32+0xd1/0xc98 [ 48.571636] __ia32_sys_write+0x71/0xb0 [ 48.575595] do_fast_syscall_32+0x281/0xc98 [ 48.579910] entry_SYSENTER_compat+0x70/0x7f [ 48.584299] RIP: 0023:0xf7faa869 [ 48.587650] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 48.606538] RSP: 002b:00000000f7fa60cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 48.614228] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200001c0 [ 48.621476] RDX: 00000000ffffff3a RSI: 0000000000000000 RDI: 0000000000000000 [ 48.628730] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 48.635979] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 48.643230] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 48.651341] Kernel Offset: disabled [ 48.654959] Rebooting in 86400 seconds..