[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 30.136386] kauditd_printk_skb: 7 callbacks suppressed [ 30.136399] audit: type=1800 audit(1545062335.445:29): pid=5918 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 30.160957] audit: type=1800 audit(1545062335.455:30): pid=5918 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.119' (ECDSA) to the list of known hosts. 2018/12/17 15:59:43 parsed 1 programs syzkaller login: [ 79.024035] as (6081) used greatest stack depth: 15296 bytes left 2018/12/17 15:59:44 executed programs: 0 [ 79.585476] IPVS: ftp: loaded support on port[0] = 21 [ 79.846340] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.853719] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.861108] device bridge_slave_0 entered promiscuous mode [ 79.880360] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.887026] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.894080] device bridge_slave_1 entered promiscuous mode [ 79.913586] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 79.934462] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 79.987513] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 80.008285] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 80.087928] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 80.095426] team0: Port device team_slave_0 added [ 80.112533] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 80.119914] team0: Port device team_slave_1 added [ 80.137361] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 80.158556] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 80.177432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 80.197798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 80.353888] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.360544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 80.367559] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.373973] bridge0: port 1(bridge_slave_0) entered forwarding state [ 80.914898] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.968713] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 81.023594] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 81.029761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 81.040090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 81.085287] 8021q: adding VLAN 0 to HW filter on device team0 2018/12/17 15:59:49 executed programs: 124 2018/12/17 15:59:54 executed programs: 317 2018/12/17 15:59:59 executed programs: 510 2018/12/17 16:00:04 executed programs: 700 [ 100.415998] ================================================================== [ 100.423496] BUG: KASAN: use-after-free in __list_add_valid+0x8f/0xac [ 100.429972] Read of size 8 at addr ffff8881b9610c60 by task syz-executor0/10890 [ 100.437407] [ 100.439039] CPU: 1 PID: 10890 Comm: syz-executor0 Not tainted 4.20.0-rc7+ #154 [ 100.446375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.455709] Call Trace: [ 100.458281] dump_stack+0x244/0x39d [ 100.461911] ? dump_stack_print_info.cold.1+0x20/0x20 [ 100.467109] ? printk+0xa7/0xcf [ 100.470393] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 100.475133] ? kasan_check_read+0x11/0x20 [ 100.479269] print_address_description.cold.7+0x9/0x1ff [ 100.484620] kasan_report.cold.8+0x242/0x309 [ 100.489015] ? __list_add_valid+0x8f/0xac [ 100.493155] __asan_report_load8_noabort+0x14/0x20 [ 100.498083] __list_add_valid+0x8f/0xac [ 100.502049] rdma_listen+0x6dc/0x990 [ 100.505749] ? rdma_resolve_addr+0x2870/0x2870 [ 100.510322] ucma_listen+0x1a4/0x260 [ 100.514037] ? ucma_notify+0x210/0x210 [ 100.517928] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 100.523454] ? _copy_from_user+0xdf/0x150 [ 100.527600] ? ucma_notify+0x210/0x210 [ 100.531480] ucma_write+0x365/0x460 [ 100.535095] ? ucma_open+0x3f0/0x3f0 [ 100.538814] __vfs_write+0x119/0x9f0 [ 100.542513] ? __fget_light+0x2e9/0x430 [ 100.546472] ? ucma_open+0x3f0/0x3f0 [ 100.550201] ? kernel_read+0x120/0x120 [ 100.554086] ? lock_release+0xa00/0xa00 [ 100.558095] ? perf_trace_sched_process_exec+0x860/0x860 [ 100.563551] ? posix_ktime_get_ts+0x15/0x20 [ 100.567864] ? trace_hardirqs_off_caller+0x310/0x310 [ 100.572962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 100.578489] ? security_file_permission+0x1c2/0x220 [ 100.583524] ? rw_verify_area+0x118/0x360 [ 100.587696] vfs_write+0x1fc/0x560 [ 100.591225] ksys_write+0x101/0x260 [ 100.594838] ? __ia32_sys_read+0xb0/0xb0 [ 100.598896] ? trace_hardirqs_off_caller+0x310/0x310 [ 100.604005] __x64_sys_write+0x73/0xb0 [ 100.607883] do_syscall_64+0x1b9/0x820 [ 100.611762] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 100.617131] ? syscall_return_slowpath+0x5e0/0x5e0 [ 100.622046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 100.626874] ? trace_hardirqs_on_caller+0x310/0x310 [ 100.631874] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 100.636876] ? prepare_exit_to_usermode+0x291/0x3b0 [ 100.641880] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 100.646711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 100.651900] RIP: 0033:0x457669 [ 100.655078] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 100.673981] RSP: 002b:00007fbfdd53fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 100.681673] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 100.688925] RDX: 0000000000000010 RSI: 00000000200003c0 RDI: 0000000000000003 [ 100.696178] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 100.703429] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbfdd5406d4 [ 100.710683] R13: 00000000004c5f10 R14: 00000000004da9d0 R15: 00000000ffffffff [ 100.717939] [ 100.719548] Allocated by task 10884: [ 100.723245] save_stack+0x43/0xd0 [ 100.726682] kasan_kmalloc+0xc7/0xe0 [ 100.730376] kmem_cache_alloc_trace+0x152/0x750 [ 100.735041] __rdma_create_id+0xdf/0x650 [ 100.739091] ucma_create_id+0x39b/0x990 [ 100.743081] ucma_write+0x365/0x460 [ 100.746691] __vfs_write+0x119/0x9f0 [ 100.750386] vfs_write+0x1fc/0x560 [ 100.753932] ksys_write+0x101/0x260 [ 100.757551] __x64_sys_write+0x73/0xb0 [ 100.761423] do_syscall_64+0x1b9/0x820 [ 100.765293] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 100.770461] [ 100.772072] Freed by task 10883: [ 100.775423] save_stack+0x43/0xd0 [ 100.778867] __kasan_slab_free+0x102/0x150 [ 100.783085] kasan_slab_free+0xe/0x10 [ 100.786871] kfree+0xcf/0x230 [ 100.789963] rdma_destroy_id+0x835/0xcc0 [ 100.794007] ucma_close+0x114/0x310 [ 100.797623] __fput+0x385/0xa30 [ 100.800903] ____fput+0x15/0x20 [ 100.804526] task_work_run+0x1e8/0x2a0 [ 100.808409] exit_to_usermode_loop+0x318/0x380 [ 100.812982] do_syscall_64+0x6be/0x820 [ 100.816858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 100.822024] [ 100.823637] The buggy address belongs to the object at ffff8881b9610a80 [ 100.823637] which belongs to the cache kmalloc-2k of size 2048 [ 100.836290] The buggy address is located 480 bytes inside of [ 100.836290] 2048-byte region [ffff8881b9610a80, ffff8881b9611280) [ 100.848234] The buggy address belongs to the page: [ 100.853173] page:ffffea0006e58400 count:1 mapcount:0 mapping:ffff8881da800c40 index:0x0 compound_mapcount: 0 [ 100.863153] flags: 0x2fffc0000010200(slab|head) [ 100.867806] raw: 02fffc0000010200 ffffea0006e81f08 ffffea0006e52788 ffff8881da800c40 [ 100.875688] raw: 0000000000000000 ffff8881b9610200 0000000100000003 0000000000000000 [ 100.883546] page dumped because: kasan: bad access detected [ 100.889237] [ 100.890850] Memory state around the buggy address: [ 100.895765] ffff8881b9610b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 100.903107] ffff8881b9610b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 100.910463] >ffff8881b9610c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 100.917801] ^ [ 100.924279] ffff8881b9610c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 100.931633] ffff8881b9610d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 100.938986] ================================================================== [ 100.946322] Disabling lock debugging due to kernel taint [ 100.952665] Kernel panic - not syncing: panic_on_warn set ... [ 100.958580] CPU: 1 PID: 10890 Comm: syz-executor0 Tainted: G B 4.20.0-rc7+ #154 [ 100.967342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.976710] Call Trace: [ 100.979310] dump_stack+0x244/0x39d [ 100.982935] ? dump_stack_print_info.cold.1+0x20/0x20 [ 100.988112] panic+0x2ad/0x55c [ 100.991290] ? add_taint.cold.5+0x16/0x16 [ 100.995434] ? preempt_schedule+0x4d/0x60 [ 100.999575] ? ___preempt_schedule+0x16/0x18 [ 101.003970] ? trace_hardirqs_on+0xb4/0x310 [ 101.008275] kasan_end_report+0x47/0x4f [ 101.012232] kasan_report.cold.8+0x76/0x309 [ 101.016558] ? __list_add_valid+0x8f/0xac [ 101.020691] __asan_report_load8_noabort+0x14/0x20 [ 101.025604] __list_add_valid+0x8f/0xac [ 101.029567] rdma_listen+0x6dc/0x990 [ 101.033265] ? rdma_resolve_addr+0x2870/0x2870 [ 101.037832] ucma_listen+0x1a4/0x260 [ 101.041537] ? ucma_notify+0x210/0x210 [ 101.045410] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 101.050934] ? _copy_from_user+0xdf/0x150 [ 101.055063] ? ucma_notify+0x210/0x210 [ 101.058952] ucma_write+0x365/0x460 [ 101.062576] ? ucma_open+0x3f0/0x3f0 [ 101.066287] __vfs_write+0x119/0x9f0 [ 101.069991] ? __fget_light+0x2e9/0x430 [ 101.073949] ? ucma_open+0x3f0/0x3f0 [ 101.077645] ? kernel_read+0x120/0x120 [ 101.081517] ? lock_release+0xa00/0xa00 [ 101.085503] ? perf_trace_sched_process_exec+0x860/0x860 [ 101.090937] ? posix_ktime_get_ts+0x15/0x20 [ 101.095240] ? trace_hardirqs_off_caller+0x310/0x310 [ 101.100330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 101.105885] ? security_file_permission+0x1c2/0x220 [ 101.110889] ? rw_verify_area+0x118/0x360 [ 101.115032] vfs_write+0x1fc/0x560 [ 101.118561] ksys_write+0x101/0x260 [ 101.122172] ? __ia32_sys_read+0xb0/0xb0 [ 101.126218] ? trace_hardirqs_off_caller+0x310/0x310 [ 101.131310] __x64_sys_write+0x73/0xb0 [ 101.135180] do_syscall_64+0x1b9/0x820 [ 101.139049] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 101.144400] ? syscall_return_slowpath+0x5e0/0x5e0 [ 101.149313] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 101.154139] ? trace_hardirqs_on_caller+0x310/0x310 [ 101.159137] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 101.164138] ? prepare_exit_to_usermode+0x291/0x3b0 [ 101.169143] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 101.173970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 101.179138] RIP: 0033:0x457669 [ 101.182317] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 101.201202] RSP: 002b:00007fbfdd53fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 101.208901] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 101.216227] RDX: 0000000000000010 RSI: 00000000200003c0 RDI: 0000000000000003 [ 101.223526] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 101.230788] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbfdd5406d4 [ 101.238051] R13: 00000000004c5f10 R14: 00000000004da9d0 R15: 00000000ffffffff [ 101.246228] Kernel Offset: disabled [ 101.249857] Rebooting in 86400 seconds..