[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 40.612133] audit: type=1800 audit(1546345171.724:25): pid=7952 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 40.647950] audit: type=1800 audit(1546345171.724:26): pid=7952 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 40.682603] audit: type=1800 audit(1546345171.734:27): pid=7952 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.61' (ECDSA) to the list of known hosts. 2019/01/01 12:19:44 parsed 1 programs 2019/01/01 12:19:46 executed programs: 0 syzkaller login: [ 55.354410] IPVS: ftp: loaded support on port[0] = 21 [ 55.420835] chnl_net:caif_netlink_parms(): no params data found [ 55.454145] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.461339] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.468799] device bridge_slave_0 entered promiscuous mode [ 55.476111] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.482594] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.489622] device bridge_slave_1 entered promiscuous mode [ 55.506065] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 55.515671] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 55.533786] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 55.541569] team0: Port device team_slave_0 added [ 55.547049] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 55.554195] team0: Port device team_slave_1 added [ 55.559609] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 55.566869] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 55.639844] device hsr_slave_0 entered promiscuous mode [ 55.697429] device hsr_slave_1 entered promiscuous mode [ 55.737518] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 55.744410] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 55.758572] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.765061] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.772117] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.778506] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.813990] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 55.820521] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.829285] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.838832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.858503] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.865983] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.874142] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 55.884760] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 55.891627] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.900633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.908796] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.915136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.936848] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 55.947447] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 55.958432] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 55.965573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.974033] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.980450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.988683] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.996352] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 56.004076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.011929] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.020920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 56.027925] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 56.043130] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 56.054845] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.102006] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 56.127463] ================================================================== [ 56.135028] BUG: KASAN: slab-out-of-bounds in kvm_clear_dirty_log_protect+0x8cf/0x970 [ 56.142988] Read of size 8 at addr ffff88809f9a8610 by task syz-executor0/8121 [ 56.150329] [ 56.151947] CPU: 1 PID: 8121 Comm: syz-executor0 Not tainted 4.20.0-rc7-next-20181224 #1 [ 56.160159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.169541] Call Trace: [ 56.172166] dump_stack+0x1db/0x2d0 [ 56.175805] ? dump_stack_print_info.cold+0x20/0x20 [ 56.180814] ? kvm_clear_dirty_log_protect+0x8cf/0x970 [ 56.186082] print_address_description.cold+0x7c/0x20d [ 56.191351] ? kvm_clear_dirty_log_protect+0x8cf/0x970 [ 56.196616] ? kvm_clear_dirty_log_protect+0x8cf/0x970 [ 56.201889] kasan_report.cold+0x1b/0x40 [ 56.205940] ? kvm_clear_dirty_log_protect+0x8cf/0x970 [ 56.211210] __asan_report_load8_noabort+0x14/0x20 [ 56.216128] kvm_clear_dirty_log_protect+0x8cf/0x970 [ 56.221226] ? vcpu_stat_get_per_vm_open+0x40/0x40 [ 56.226142] ? lock_downgrade+0x910/0x910 [ 56.230283] ? lock_release+0xc40/0xc40 [ 56.234259] kvm_vm_ioctl_clear_dirty_log+0xff/0x260 [ 56.239353] ? kvm_vm_ioctl_get_dirty_log+0x260/0x260 [ 56.244534] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 56.250060] ? _copy_from_user+0xdd/0x150 [ 56.254197] kvm_vm_ioctl+0xc19/0x1fe0 [ 56.258080] ? kasan_check_read+0x11/0x20 [ 56.262217] ? do_raw_spin_unlock+0xa0/0x330 [ 56.266610] ? kvm_unregister_device_ops+0x70/0x70 [ 56.271525] ? print_usage_bug+0xd0/0xd0 [ 56.275572] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 56.280758] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 56.285768] ? get_futex_key+0x2070/0x2070 [ 56.289997] ? mark_held_locks+0x100/0x100 [ 56.294228] ? do_futex+0x1b0/0x2910 [ 56.297956] ? do_raw_spin_trylock+0x270/0x270 [ 56.302558] ? add_mm_counter_fast.part.0+0x40/0x40 [ 56.307607] ? add_lock_to_list.isra.0+0x450/0x450 [ 56.312528] ? add_lock_to_list.isra.0+0x450/0x450 [ 56.317459] ? exit_robust_list+0x290/0x290 [ 56.321814] ? __might_fault+0x12b/0x1e0 [ 56.325860] ? find_held_lock+0x35/0x120 [ 56.329909] ? __might_fault+0x12b/0x1e0 [ 56.333958] ? lock_acquire+0x1db/0x570 [ 56.337930] ? lock_downgrade+0x910/0x910 [ 56.342073] ? lock_release+0xc40/0xc40 [ 56.346035] ? kvm_unregister_device_ops+0x70/0x70 [ 56.350970] do_vfs_ioctl+0x107b/0x17d0 [ 56.354934] ? ioctl_preallocate+0x2f0/0x2f0 [ 56.359330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 56.364855] ? __fget_light+0x2db/0x420 [ 56.368815] ? fget_raw+0x20/0x20 [ 56.372253] ? put_timespec64+0x115/0x1b0 [ 56.376385] ? nsecs_to_jiffies+0x30/0x30 [ 56.380545] ? do_syscall_64+0x8c/0x800 [ 56.384519] ? do_syscall_64+0x8c/0x800 [ 56.388478] ? lockdep_hardirqs_on+0x415/0x5d0 [ 56.393068] ? security_file_ioctl+0x93/0xc0 [ 56.397476] ksys_ioctl+0xab/0xd0 [ 56.400936] __x64_sys_ioctl+0x73/0xb0 [ 56.404815] do_syscall_64+0x1a3/0x800 [ 56.408710] ? syscall_return_slowpath+0x5f0/0x5f0 [ 56.413706] ? prepare_exit_to_usermode+0x232/0x3b0 [ 56.418710] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 56.423566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 56.428761] RIP: 0033:0x457ec9 [ 56.431940] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 56.450850] RSP: 002b:00007ffdd03e5918 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 56.458557] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457ec9 [ 56.465825] RDX: 0000000020000080 RSI: 00000000c018aec0 RDI: 0000000000000004 [ 56.473084] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 56.480339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000d9a914 [ 56.487610] R13: 00000000004c9ef0 R14: 00000000004d2a10 R15: 00000000ffffffff [ 56.494872] [ 56.496487] Allocated by task 8121: [ 56.500105] save_stack+0x45/0xd0 [ 56.503541] kasan_kmalloc+0xcf/0xe0 [ 56.507236] __kmalloc_node+0x4e/0x70 [ 56.511023] kvmalloc_node+0x68/0x100 [ 56.514856] __kvm_set_memory_region+0x1da1/0x2c40 [ 56.519784] kvm_set_memory_region+0x2f/0x60 [ 56.524176] kvm_vm_ioctl+0xafa/0x1fe0 [ 56.528045] do_vfs_ioctl+0x107b/0x17d0 [ 56.532004] ksys_ioctl+0xab/0xd0 [ 56.535437] __x64_sys_ioctl+0x73/0xb0 [ 56.539310] do_syscall_64+0x1a3/0x800 [ 56.543181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 56.548348] [ 56.549953] Freed by task 4415: [ 56.553219] save_stack+0x45/0xd0 [ 56.556651] __kasan_slab_free+0x102/0x150 [ 56.560869] kasan_slab_free+0xe/0x10 [ 56.564651] kfree+0xcf/0x230 [ 56.567759] single_release+0x95/0xc0 [ 56.571554] __fput+0x3cd/0xaa0 [ 56.574818] ____fput+0x16/0x20 [ 56.578092] task_work_run+0x1f4/0x2b0 [ 56.582003] exit_to_usermode_loop+0x32a/0x3b0 [ 56.586567] do_syscall_64+0x696/0x800 [ 56.590449] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 56.595611] [ 56.597230] The buggy address belongs to the object at ffff88809f9a8600 [ 56.597230] which belongs to the cache kmalloc-32 of size 32 [ 56.609703] The buggy address is located 16 bytes inside of [ 56.609703] 32-byte region [ffff88809f9a8600, ffff88809f9a8620) [ 56.621386] The buggy address belongs to the page: [ 56.626307] page:ffffea00027e6a00 count:1 mapcount:0 mapping:ffff88812c3f01c0 index:0xffff88809f9a8fc1 [ 56.635754] flags: 0x1fffc0000000200(slab) [ 56.639990] raw: 01fffc0000000200 ffffea00026dd0c8 ffffea00027eb688 ffff88812c3f01c0 [ 56.647859] raw: ffff88809f9a8fc1 ffff88809f9a8000 000000010000003f 0000000000000000 [ 56.655715] page dumped because: kasan: bad access detected [ 56.661416] [ 56.663047] Memory state around the buggy address: [ 56.667956] ffff88809f9a8500: 00 00 fc fc fc fc fc fc fb fb fb fb fc fc fc fc [ 56.675310] ffff88809f9a8580: fb fb fb fb fc fc fc fc 00 00 fc fc fc fc fc fc [ 56.682759] >ffff88809f9a8600: 00 00 fc fc fc fc fc fc 00 00 fc fc fc fc fc fc [ 56.690125] ^ [ 56.693995] ffff88809f9a8680: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 56.701365] ffff88809f9a8700: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 56.708704] ================================================================== [ 56.716054] Disabling lock debugging due to kernel taint [ 56.722192] Kernel panic - not syncing: panic_on_warn set ... [ 56.728085] CPU: 1 PID: 8121 Comm: syz-executor0 Tainted: G B 4.20.0-rc7-next-20181224 #1 [ 56.737698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.747031] Call Trace: [ 56.749600] dump_stack+0x1db/0x2d0 [ 56.753223] ? dump_stack_print_info.cold+0x20/0x20 [ 56.758238] panic+0x2cb/0x65c [ 56.761415] ? add_taint.cold+0x16/0x16 [ 56.765378] ? trace_hardirqs_on+0xb4/0x310 [ 56.769688] ? trace_hardirqs_on+0xb4/0x310 [ 56.774028] ? kvm_clear_dirty_log_protect+0x8cf/0x970 [ 56.779289] end_report+0x47/0x4f [ 56.782745] ? kvm_clear_dirty_log_protect+0x8cf/0x970 [ 56.788008] kasan_report.cold+0xe/0x40 [ 56.792003] ? kvm_clear_dirty_log_protect+0x8cf/0x970 [ 56.797279] __asan_report_load8_noabort+0x14/0x20 [ 56.802213] kvm_clear_dirty_log_protect+0x8cf/0x970 [ 56.807307] ? vcpu_stat_get_per_vm_open+0x40/0x40 [ 56.812220] ? lock_downgrade+0x910/0x910 [ 56.816366] ? lock_release+0xc40/0xc40 [ 56.820338] kvm_vm_ioctl_clear_dirty_log+0xff/0x260 [ 56.825445] ? kvm_vm_ioctl_get_dirty_log+0x260/0x260 [ 56.830638] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 56.836163] ? _copy_from_user+0xdd/0x150 [ 56.840295] kvm_vm_ioctl+0xc19/0x1fe0 [ 56.844169] ? kasan_check_read+0x11/0x20 [ 56.848300] ? do_raw_spin_unlock+0xa0/0x330 [ 56.852708] ? kvm_unregister_device_ops+0x70/0x70 [ 56.857627] ? print_usage_bug+0xd0/0xd0 [ 56.861670] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 56.866861] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 56.871864] ? get_futex_key+0x2070/0x2070 [ 56.876086] ? mark_held_locks+0x100/0x100 [ 56.880309] ? do_futex+0x1b0/0x2910 [ 56.884011] ? do_raw_spin_trylock+0x270/0x270 [ 56.888579] ? add_mm_counter_fast.part.0+0x40/0x40 [ 56.893583] ? add_lock_to_list.isra.0+0x450/0x450 [ 56.898501] ? add_lock_to_list.isra.0+0x450/0x450 [ 56.903433] ? exit_robust_list+0x290/0x290 [ 56.907749] ? __might_fault+0x12b/0x1e0 [ 56.911819] ? find_held_lock+0x35/0x120 [ 56.915863] ? __might_fault+0x12b/0x1e0 [ 56.919907] ? lock_acquire+0x1db/0x570 [ 56.923866] ? lock_downgrade+0x910/0x910 [ 56.928002] ? lock_release+0xc40/0xc40 [ 56.931960] ? kvm_unregister_device_ops+0x70/0x70 [ 56.936873] do_vfs_ioctl+0x107b/0x17d0 [ 56.940833] ? ioctl_preallocate+0x2f0/0x2f0 [ 56.945230] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 56.950756] ? __fget_light+0x2db/0x420 [ 56.954713] ? fget_raw+0x20/0x20 [ 56.958158] ? put_timespec64+0x115/0x1b0 [ 56.962290] ? nsecs_to_jiffies+0x30/0x30 [ 56.966422] ? do_syscall_64+0x8c/0x800 [ 56.970379] ? do_syscall_64+0x8c/0x800 [ 56.974342] ? lockdep_hardirqs_on+0x415/0x5d0 [ 56.978917] ? security_file_ioctl+0x93/0xc0 [ 56.983309] ksys_ioctl+0xab/0xd0 [ 56.986753] __x64_sys_ioctl+0x73/0xb0 [ 56.990655] do_syscall_64+0x1a3/0x800 [ 56.994525] ? syscall_return_slowpath+0x5f0/0x5f0 [ 56.999440] ? prepare_exit_to_usermode+0x232/0x3b0 [ 57.004440] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 57.009270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 57.014439] RIP: 0033:0x457ec9 [ 57.017616] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 57.036522] RSP: 002b:00007ffdd03e5918 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 57.044230] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457ec9 [ 57.051503] RDX: 0000000020000080 RSI: 00000000c018aec0 RDI: 0000000000000004 [ 57.058757] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 57.066013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000d9a914 [ 57.073296] R13: 00000000004c9ef0 R14: 00000000004d2a10 R15: 00000000ffffffff [ 57.081429] Kernel Offset: disabled [ 57.085064] Rebooting in 86400 seconds..