[info] Using makefile-style concurrent boot in runlevel 2. [ 27.383008] audit: type=1800 audit(1545079791.378:21): pid=5869 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 33.023721] sshd (6007) used greatest stack depth: 15744 bytes left Warning: Permanently added '10.128.0.120' (ECDSA) to the list of known hosts. 2018/12/17 20:50:37 parsed 1 programs 2018/12/17 20:50:38 executed programs: 0 [ 74.775550] IPVS: ftp: loaded support on port[0] = 21 [ 75.036718] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.043895] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.051019] device bridge_slave_0 entered promiscuous mode [ 75.070869] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.077298] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.084448] device bridge_slave_1 entered promiscuous mode [ 75.102050] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 75.119841] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 75.171132] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 75.191288] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 75.269846] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 75.278041] team0: Port device team_slave_0 added [ 75.295263] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 75.302383] team0: Port device team_slave_1 added [ 75.319662] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.345423] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.365216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.384958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.532515] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.538970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.546037] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.552392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.079015] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.131874] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.184513] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.190746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.199665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.248929] 8021q: adding VLAN 0 to HW filter on device team0 2018/12/17 20:50:43 executed programs: 117 2018/12/17 20:50:48 executed programs: 301 [ 84.823962] ================================================================== [ 84.831501] BUG: KASAN: use-after-free in __list_add_valid+0x8f/0xac [ 84.837982] Read of size 8 at addr ffff8881bcff77e0 by task syz-executor0/8114 [ 84.845344] [ 84.846989] CPU: 1 PID: 8114 Comm: syz-executor0 Not tainted 4.20.0-rc7+ #375 [ 84.854256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 84.863590] Call Trace: [ 84.866174] dump_stack+0x244/0x39d [ 84.869796] ? dump_stack_print_info.cold.1+0x20/0x20 [ 84.874974] ? printk+0xa7/0xcf [ 84.878273] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 84.883043] ? kasan_check_read+0x11/0x20 [ 84.887186] print_address_description.cold.7+0x9/0x1ff [ 84.892558] kasan_report.cold.8+0x242/0x309 [ 84.896978] ? __list_add_valid+0x8f/0xac [ 84.901129] __asan_report_load8_noabort+0x14/0x20 [ 84.906047] __list_add_valid+0x8f/0xac [ 84.910011] rdma_listen+0x6dc/0x990 [ 84.913723] ? rdma_resolve_addr+0x2870/0x2870 [ 84.918300] ucma_listen+0x1a4/0x260 [ 84.922020] ? ucma_notify+0x210/0x210 [ 84.925912] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 84.931454] ? _copy_from_user+0xdf/0x150 [ 84.935624] ? ucma_notify+0x210/0x210 [ 84.939497] ucma_write+0x365/0x460 [ 84.943127] ? ucma_open+0x3f0/0x3f0 [ 84.946834] __vfs_write+0x119/0x9f0 [ 84.950552] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 84.955465] ? ucma_open+0x3f0/0x3f0 [ 84.959191] ? kernel_read+0x120/0x120 [ 84.963078] ? apparmor_path_rmdir+0x30/0x30 [ 84.967473] ? trace_hardirqs_off_caller+0x310/0x310 [ 84.972618] ? apparmor_file_permission+0x24/0x30 [ 84.977468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 84.983023] ? security_file_permission+0x1c2/0x220 [ 84.988028] ? rw_verify_area+0x118/0x360 [ 84.992164] vfs_write+0x1fc/0x560 [ 84.995693] ksys_write+0x101/0x260 [ 84.999309] ? __ia32_sys_read+0xb0/0xb0 [ 85.003360] ? trace_hardirqs_off_caller+0x310/0x310 [ 85.008447] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 85.013987] __x64_sys_write+0x73/0xb0 [ 85.017866] do_syscall_64+0x1b9/0x820 [ 85.021740] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 85.027090] ? syscall_return_slowpath+0x5e0/0x5e0 [ 85.032006] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 85.036850] ? trace_hardirqs_on_caller+0x310/0x310 [ 85.041867] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 85.046870] ? prepare_exit_to_usermode+0x291/0x3b0 [ 85.051888] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 85.056740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 85.061917] RIP: 0033:0x457669 [ 85.065102] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 85.083986] RSP: 002b:00007f8bd3cf1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 85.091678] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 85.098933] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000003 [ 85.106187] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 85.113438] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8bd3cf26d4 [ 85.120694] R13: 00000000004c5f10 R14: 00000000004da9d0 R15: 00000000ffffffff [ 85.127971] [ 85.129579] Allocated by task 8110: [ 85.133193] save_stack+0x43/0xd0 [ 85.136647] kasan_kmalloc+0xc7/0xe0 [ 85.140357] kmem_cache_alloc_trace+0x152/0x750 [ 85.145030] __rdma_create_id+0xdf/0x650 [ 85.149075] ucma_create_id+0x39b/0x990 [ 85.153032] ucma_write+0x365/0x460 [ 85.156640] __vfs_write+0x119/0x9f0 [ 85.160369] vfs_write+0x1fc/0x560 [ 85.163926] ksys_write+0x101/0x260 [ 85.167535] __x64_sys_write+0x73/0xb0 [ 85.171413] do_syscall_64+0x1b9/0x820 [ 85.175311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 85.180499] [ 85.182107] Freed by task 8106: [ 85.185370] save_stack+0x43/0xd0 [ 85.188818] __kasan_slab_free+0x102/0x150 [ 85.193038] kasan_slab_free+0xe/0x10 [ 85.196836] kfree+0xcf/0x230 [ 85.199931] rdma_destroy_id+0x835/0xcc0 [ 85.203977] ucma_close+0x114/0x310 [ 85.207615] __fput+0x385/0xa30 [ 85.210881] ____fput+0x15/0x20 [ 85.214171] task_work_run+0x1e8/0x2a0 [ 85.218041] exit_to_usermode_loop+0x318/0x380 [ 85.222614] do_syscall_64+0x6be/0x820 [ 85.226489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 85.231653] [ 85.233268] The buggy address belongs to the object at ffff8881bcff7600 [ 85.233268] which belongs to the cache kmalloc-2k of size 2048 [ 85.245916] The buggy address is located 480 bytes inside of [ 85.245916] 2048-byte region [ffff8881bcff7600, ffff8881bcff7e00) [ 85.257859] The buggy address belongs to the page: [ 85.262772] page:ffffea0006f3fd80 count:1 mapcount:0 mapping:ffff8881da800c40 index:0x0 compound_mapcount: 0 [ 85.272745] flags: 0x2fffc0000010200(slab|head) [ 85.277413] raw: 02fffc0000010200 ffffea0006f36408 ffffea0006f3d508 ffff8881da800c40 [ 85.285278] raw: 0000000000000000 ffff8881bcff6500 0000000100000003 0000000000000000 [ 85.293138] page dumped because: kasan: bad access detected [ 85.298827] [ 85.300436] Memory state around the buggy address: [ 85.305351] ffff8881bcff7680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 85.312696] ffff8881bcff7700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 85.320038] >ffff8881bcff7780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 85.327377] ^ [ 85.333853] ffff8881bcff7800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 85.341192] ffff8881bcff7880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 85.348546] ================================================================== [ 85.355888] Disabling lock debugging due to kernel taint [ 85.361903] Kernel panic - not syncing: panic_on_warn set ... [ 85.367824] CPU: 1 PID: 8114 Comm: syz-executor0 Tainted: G B 4.20.0-rc7+ #375 [ 85.376476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 85.385812] Call Trace: [ 85.388389] dump_stack+0x244/0x39d [ 85.392024] ? dump_stack_print_info.cold.1+0x20/0x20 [ 85.397205] panic+0x2ad/0x55c [ 85.400384] ? add_taint.cold.5+0x16/0x16 [ 85.404519] ? preempt_schedule+0x4d/0x60 [ 85.408668] ? ___preempt_schedule+0x16/0x18 [ 85.413076] ? trace_hardirqs_on+0xb4/0x310 [ 85.417400] kasan_end_report+0x47/0x4f [ 85.421358] kasan_report.cold.8+0x76/0x309 [ 85.425678] ? __list_add_valid+0x8f/0xac [ 85.429823] __asan_report_load8_noabort+0x14/0x20 [ 85.434752] __list_add_valid+0x8f/0xac [ 85.438722] rdma_listen+0x6dc/0x990 [ 85.442435] ? rdma_resolve_addr+0x2870/0x2870 [ 85.447004] ucma_listen+0x1a4/0x260 [ 85.450703] ? ucma_notify+0x210/0x210 [ 85.454576] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 85.460096] ? _copy_from_user+0xdf/0x150 [ 85.464236] ? ucma_notify+0x210/0x210 [ 85.468123] ucma_write+0x365/0x460 [ 85.471735] ? ucma_open+0x3f0/0x3f0 [ 85.475436] __vfs_write+0x119/0x9f0 [ 85.479136] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 85.484067] ? ucma_open+0x3f0/0x3f0 [ 85.487765] ? kernel_read+0x120/0x120 [ 85.491645] ? apparmor_path_rmdir+0x30/0x30 [ 85.496038] ? trace_hardirqs_off_caller+0x310/0x310 [ 85.501128] ? apparmor_file_permission+0x24/0x30 [ 85.505954] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 85.511510] ? security_file_permission+0x1c2/0x220 [ 85.516518] ? rw_verify_area+0x118/0x360 [ 85.520650] vfs_write+0x1fc/0x560 [ 85.524184] ksys_write+0x101/0x260 [ 85.527806] ? __ia32_sys_read+0xb0/0xb0 [ 85.531866] ? trace_hardirqs_off_caller+0x310/0x310 [ 85.536969] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 85.542507] __x64_sys_write+0x73/0xb0 [ 85.546384] do_syscall_64+0x1b9/0x820 [ 85.550255] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 85.555603] ? syscall_return_slowpath+0x5e0/0x5e0 [ 85.560517] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 85.565346] ? trace_hardirqs_on_caller+0x310/0x310 [ 85.570347] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 85.575350] ? prepare_exit_to_usermode+0x291/0x3b0 [ 85.580354] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 85.585208] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 85.590381] RIP: 0033:0x457669 [ 85.593555] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 85.612443] RSP: 002b:00007f8bd3cf1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 85.620147] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 85.627414] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000003 [ 85.634685] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 85.642038] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8bd3cf26d4 [ 85.649304] R13: 00000000004c5f10 R14: 00000000004da9d0 R15: 00000000ffffffff [ 85.657596] Kernel Offset: disabled [ 85.661220] Rebooting in 86400 seconds..