[....] Starting file context mai[ 31.420075] kauditd_printk_skb: 9 callbacks suppressed [ 31.420085] audit: type=1800 audit(1545079788.933:33): pid=5957 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 ntaining daemon: restorecond[?25l[?1c7[[[ 31.450788] audit: type=1800 audit(1545079788.933:34): pid=5957 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 32m ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 35.491729] audit: type=1400 audit(1545079793.003:35): avc: denied { map } for pid=6136 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 35.528912] sshd (6134) used greatest stack depth: 15744 bytes left Warning: Permanently added '10.128.0.97' (ECDSA) to the list of known hosts. [ 78.350366] audit: type=1400 audit(1545079835.863:36): avc: denied { map } for pid=6150 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/12/17 20:50:36 parsed 1 programs [ 78.990583] audit: type=1400 audit(1545079836.503:37): avc: denied { map } for pid=6150 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=65 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2018/12/17 20:50:37 executed programs: 0 [ 80.452469] IPVS: ftp: loaded support on port[0] = 21 [ 80.704091] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.711863] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.719742] device bridge_slave_0 entered promiscuous mode [ 80.738596] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.746269] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.753394] device bridge_slave_1 entered promiscuous mode [ 80.771249] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 80.790912] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 80.840808] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 80.862073] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 80.938917] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 80.948798] team0: Port device team_slave_0 added [ 80.966882] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 80.974249] team0: Port device team_slave_1 added [ 80.992642] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 81.013497] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 81.034199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 81.056079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 81.204298] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.210878] bridge0: port 2(bridge_slave_1) entered forwarding state [ 81.218097] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.224447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 81.759921] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.814106] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 81.869363] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 81.875622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 81.883659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 81.930851] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.229284] audit: type=1400 audit(1545079839.743:38): avc: denied { associate } for pid=6163 comm="syz-executor0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 82.623687] ================================================================== [ 82.632022] BUG: KASAN: use-after-free in __list_add_valid+0x8f/0xac [ 82.641420] Read of size 8 at addr ffff8881ccb9ad20 by task syz-executor0/6493 [ 82.648761] [ 82.650376] CPU: 1 PID: 6493 Comm: syz-executor0 Not tainted 4.20.0-rc7+ #155 [ 82.657632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 82.666979] Call Trace: [ 82.669563] dump_stack+0x244/0x39d [ 82.673190] ? dump_stack_print_info.cold.1+0x20/0x20 [ 82.678365] ? printk+0xa7/0xcf [ 82.681711] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 82.686461] ? kasan_check_read+0x11/0x20 [ 82.690600] print_address_description.cold.7+0x9/0x1ff [ 82.695950] kasan_report.cold.8+0x242/0x309 [ 82.700347] ? __list_add_valid+0x8f/0xac [ 82.704488] __asan_report_load8_noabort+0x14/0x20 [ 82.709406] __list_add_valid+0x8f/0xac [ 82.713464] rdma_listen+0x6dc/0x990 [ 82.717817] ? rdma_resolve_addr+0x2870/0x2870 [ 82.722450] ucma_listen+0x1a4/0x260 [ 82.726163] ? ucma_notify+0x210/0x210 [ 82.730043] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 82.735647] ? _copy_from_user+0xdf/0x150 [ 82.739812] ? ucma_notify+0x210/0x210 [ 82.743700] ucma_write+0x365/0x460 [ 82.747318] ? ucma_open+0x3f0/0x3f0 [ 82.751027] __vfs_write+0x119/0x9f0 [ 82.754729] ? __fget_light+0x2e9/0x430 [ 82.758691] ? ucma_open+0x3f0/0x3f0 [ 82.762396] ? kernel_read+0x120/0x120 [ 82.766269] ? __might_sleep+0x95/0x190 [ 82.770229] ? perf_trace_sched_process_exec+0x860/0x860 [ 82.775678] ? posix_ktime_get_ts+0x15/0x20 [ 82.779995] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 82.785520] ? __inode_security_revalidate+0xd9/0x120 [ 82.790699] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 82.795711] ? selinux_file_permission+0x90/0x540 [ 82.800546] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 82.806072] ? security_file_permission+0x1c2/0x220 [ 82.811074] ? rw_verify_area+0x118/0x360 [ 82.815208] vfs_write+0x1fc/0x560 [ 82.818903] ksys_write+0x101/0x260 [ 82.822530] ? __ia32_sys_read+0xb0/0xb0 [ 82.826587] ? trace_hardirqs_off_caller+0x310/0x310 [ 82.831695] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 82.837226] __x64_sys_write+0x73/0xb0 [ 82.841121] do_syscall_64+0x1b9/0x820 [ 82.845001] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 82.850371] ? syscall_return_slowpath+0x5e0/0x5e0 [ 82.855286] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 82.860122] ? trace_hardirqs_on_caller+0x310/0x310 [ 82.865124] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 82.870127] ? prepare_exit_to_usermode+0x291/0x3b0 [ 82.875131] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 82.879964] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 82.885139] RIP: 0033:0x457669 [ 82.888321] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 82.907209] RSP: 002b:00007f65f9d4bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 82.914911] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 82.922203] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000003 [ 82.929460] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 82.936746] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f65f9d4c6d4 [ 82.944037] R13: 00000000004c5f10 R14: 00000000004da9d0 R15: 00000000ffffffff [ 82.951311] [ 82.952927] Allocated by task 6489: [ 82.956548] save_stack+0x43/0xd0 [ 82.959987] kasan_kmalloc+0xc7/0xe0 [ 82.963688] kmem_cache_alloc_trace+0x152/0x750 [ 82.968382] __rdma_create_id+0xdf/0x650 [ 82.972425] ucma_create_id+0x39b/0x990 [ 82.976386] ucma_write+0x365/0x460 [ 82.980025] __vfs_write+0x119/0x9f0 [ 82.983738] vfs_write+0x1fc/0x560 [ 82.987263] ksys_write+0x101/0x260 [ 82.990871] __x64_sys_write+0x73/0xb0 [ 82.994744] do_syscall_64+0x1b9/0x820 [ 82.998624] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 83.003808] [ 83.005420] Freed by task 6485: [ 83.008684] save_stack+0x43/0xd0 [ 83.012121] __kasan_slab_free+0x102/0x150 [ 83.016341] kasan_slab_free+0xe/0x10 [ 83.020160] kfree+0xcf/0x230 [ 83.023257] rdma_destroy_id+0x835/0xcc0 [ 83.027308] ucma_close+0x114/0x310 [ 83.030931] __fput+0x385/0xa30 [ 83.034197] ____fput+0x15/0x20 [ 83.037461] task_work_run+0x1e8/0x2a0 [ 83.041335] exit_to_usermode_loop+0x318/0x380 [ 83.045901] do_syscall_64+0x6be/0x820 [ 83.049787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 83.054977] [ 83.056608] The buggy address belongs to the object at ffff8881ccb9ab40 [ 83.056608] which belongs to the cache kmalloc-2k of size 2048 [ 83.069264] The buggy address is located 480 bytes inside of [ 83.069264] 2048-byte region [ffff8881ccb9ab40, ffff8881ccb9b340) [ 83.081216] The buggy address belongs to the page: [ 83.086133] page:ffffea000732e680 count:1 mapcount:0 mapping:ffff8881da800c40 index:0x0 compound_mapcount: 0 [ 83.096112] flags: 0x2fffc0000010200(slab|head) [ 83.100772] raw: 02fffc0000010200 ffffea00070f2888 ffffea00070ff988 ffff8881da800c40 [ 83.108650] raw: 0000000000000000 ffff8881ccb9a2c0 0000000100000003 0000000000000000 [ 83.116518] page dumped because: kasan: bad access detected [ 83.122216] [ 83.123826] Memory state around the buggy address: [ 83.128738] ffff8881ccb9ac00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 83.136084] ffff8881ccb9ac80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 83.143427] >ffff8881ccb9ad00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 83.150769] ^ [ 83.155365] ffff8881ccb9ad80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 83.162711] ffff8881ccb9ae00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 83.170070] ================================================================== [ 83.177407] Disabling lock debugging due to kernel taint [ 83.186085] Kernel panic - not syncing: panic_on_warn set ... [ 83.191991] CPU: 1 PID: 6493 Comm: syz-executor0 Tainted: G B 4.20.0-rc7+ #155 [ 83.200655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.209993] Call Trace: [ 83.212570] dump_stack+0x244/0x39d [ 83.216184] ? dump_stack_print_info.cold.1+0x20/0x20 [ 83.221366] panic+0x2ad/0x55c [ 83.224550] ? add_taint.cold.5+0x16/0x16 [ 83.228689] ? preempt_schedule+0x4d/0x60 [ 83.232826] ? ___preempt_schedule+0x16/0x18 [ 83.237220] ? trace_hardirqs_on+0xb4/0x310 [ 83.241531] kasan_end_report+0x47/0x4f [ 83.245489] kasan_report.cold.8+0x76/0x309 [ 83.249800] ? __list_add_valid+0x8f/0xac [ 83.253935] __asan_report_load8_noabort+0x14/0x20 [ 83.258850] __list_add_valid+0x8f/0xac [ 83.262817] rdma_listen+0x6dc/0x990 [ 83.266517] ? rdma_resolve_addr+0x2870/0x2870 [ 83.271092] ucma_listen+0x1a4/0x260 [ 83.274793] ? ucma_notify+0x210/0x210 [ 83.278669] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 83.284195] ? _copy_from_user+0xdf/0x150 [ 83.288331] ? ucma_notify+0x210/0x210 [ 83.292203] ucma_write+0x365/0x460 [ 83.295818] ? ucma_open+0x3f0/0x3f0 [ 83.299525] __vfs_write+0x119/0x9f0 [ 83.303226] ? __fget_light+0x2e9/0x430 [ 83.307187] ? ucma_open+0x3f0/0x3f0 [ 83.310888] ? kernel_read+0x120/0x120 [ 83.314760] ? __might_sleep+0x95/0x190 [ 83.318739] ? perf_trace_sched_process_exec+0x860/0x860 [ 83.324174] ? posix_ktime_get_ts+0x15/0x20 [ 83.328540] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 83.334067] ? __inode_security_revalidate+0xd9/0x120 [ 83.339244] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 83.344251] ? selinux_file_permission+0x90/0x540 [ 83.349080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 83.354608] ? security_file_permission+0x1c2/0x220 [ 83.359629] ? rw_verify_area+0x118/0x360 [ 83.363762] vfs_write+0x1fc/0x560 [ 83.367289] ksys_write+0x101/0x260 [ 83.370904] ? __ia32_sys_read+0xb0/0xb0 [ 83.374950] ? trace_hardirqs_off_caller+0x310/0x310 [ 83.380039] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 83.385562] __x64_sys_write+0x73/0xb0 [ 83.389437] do_syscall_64+0x1b9/0x820 [ 83.393317] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 83.398696] ? syscall_return_slowpath+0x5e0/0x5e0 [ 83.403617] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 83.408469] ? trace_hardirqs_on_caller+0x310/0x310 [ 83.413478] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 83.418487] ? prepare_exit_to_usermode+0x291/0x3b0 [ 83.423494] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 83.428325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 83.433502] RIP: 0033:0x457669 [ 83.436684] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 83.455682] RSP: 002b:00007f65f9d4bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 83.463379] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 83.470639] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000003 [ 83.477895] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 83.485153] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f65f9d4c6d4 [ 83.492409] R13: 00000000004c5f10 R14: 00000000004da9d0 R15: 00000000ffffffff [ 83.501001] Kernel Offset: disabled [ 83.504638] Rebooting in 86400 seconds..