[ 35.669743] audit: type=1800 audit(1551630427.169:27): pid=7497 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 35.700010] audit: type=1800 audit(1551630427.179:28): pid=7497 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 36.492797] audit: type=1800 audit(1551630428.059:29): pid=7497 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 36.516471] audit: type=1800 audit(1551630428.059:30): pid=7497 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.132' (ECDSA) to the list of known hosts. 2019/03/03 16:27:20 parsed 1 programs 2019/03/03 16:27:22 executed programs: 0 syzkaller login: [ 51.058250] IPVS: ftp: loaded support on port[0] = 21 [ 51.112641] chnl_net:caif_netlink_parms(): no params data found [ 51.142593] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.149526] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.157639] device bridge_slave_0 entered promiscuous mode [ 51.164736] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.171292] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.178599] device bridge_slave_1 entered promiscuous mode [ 51.192741] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 51.201800] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 51.217758] team0: Port device team_slave_0 added [ 51.223884] team0: Port device team_slave_1 added [ 51.288509] device hsr_slave_0 entered promiscuous mode [ 51.326266] device hsr_slave_1 entered promiscuous mode [ 51.402576] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.409034] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.415764] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.422165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.450867] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.461813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.481283] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.488610] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.495582] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 51.508450] 8021q: adding VLAN 0 to HW filter on device team0 [ 51.517457] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.525108] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.531504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.540502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.548484] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.554814] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.570214] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 51.578120] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 51.588955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 51.600358] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 51.611358] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 51.622339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.630392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.638033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 51.652866] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 52.339037] ================================================================== [ 52.346540] BUG: KASAN: use-after-free in __list_add_valid+0x9a/0xa0 [ 52.353020] Read of size 8 at addr ffff8880a80ed6a0 by task syz-executor.0/7817 [ 52.360460] [ 52.362076] CPU: 0 PID: 7817 Comm: syz-executor.0 Not tainted 5.0.0-rc8+ #3 [ 52.369169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 52.378529] Call Trace: [ 52.381106] dump_stack+0x172/0x1f0 [ 52.384718] ? __list_add_valid+0x9a/0xa0 [ 52.388857] print_address_description.cold+0x7c/0x20d [ 52.394125] ? __list_add_valid+0x9a/0xa0 [ 52.398271] ? __list_add_valid+0x9a/0xa0 [ 52.402405] kasan_report.cold+0x1b/0x40 [ 52.406465] ? __list_add_valid+0x9a/0xa0 [ 52.410615] __asan_report_load8_noabort+0x14/0x20 [ 52.415539] __list_add_valid+0x9a/0xa0 [ 52.419504] rdma_listen+0x63b/0x8e0 [ 52.423218] ucma_listen+0x14d/0x1c0 [ 52.426924] ? ucma_notify+0x190/0x190 [ 52.430809] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 52.436367] ? _copy_from_user+0xdd/0x150 [ 52.440505] ucma_write+0x2da/0x3c0 [ 52.444150] ? ucma_notify+0x190/0x190 [ 52.448057] ? ucma_open+0x290/0x290 [ 52.451766] ? __fget+0x340/0x540 [ 52.455221] __vfs_write+0x116/0x8e0 [ 52.458936] ? lock_downgrade+0x810/0x810 [ 52.463069] ? ucma_open+0x290/0x290 [ 52.466801] ? kernel_read+0x120/0x120 [ 52.470695] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 52.476070] ? common_file_perm+0x1d6/0x6f0 [ 52.480382] ? apparmor_file_permission+0x25/0x30 [ 52.485210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 52.490731] ? security_file_permission+0x94/0x320 [ 52.495646] ? rw_verify_area+0x118/0x360 [ 52.499781] vfs_write+0x20c/0x580 [ 52.503320] ksys_write+0xea/0x1f0 [ 52.506853] ? __ia32_sys_read+0xb0/0xb0 [ 52.510900] ? do_syscall_64+0x26/0x610 [ 52.514857] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 52.520221] ? do_syscall_64+0x26/0x610 [ 52.524191] __x64_sys_write+0x73/0xb0 [ 52.528273] do_syscall_64+0x103/0x610 [ 52.532162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 52.537341] RIP: 0033:0x457e29 [ 52.540523] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 52.559435] RSP: 002b:00007fc145d31c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 52.567127] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 52.574385] RDX: 00000000ffffff3a RSI: 00000000200001c0 RDI: 0000000000000003 [ 52.581661] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 52.588917] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc145d326d4 [ 52.596180] R13: 00000000004c70d9 R14: 00000000004dcb90 R15: 00000000ffffffff [ 52.603475] [ 52.605100] Allocated by task 7814: [ 52.608714] save_stack+0x45/0xd0 [ 52.612153] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 52.617121] kasan_kmalloc+0x9/0x10 [ 52.620749] kmem_cache_alloc_trace+0x151/0x760 [ 52.625406] __rdma_create_id+0x5f/0x4e0 [ 52.629463] ucma_create_id+0x1de/0x640 [ 52.633423] ucma_write+0x2da/0x3c0 [ 52.637036] __vfs_write+0x116/0x8e0 [ 52.640753] vfs_write+0x20c/0x580 [ 52.644281] ksys_write+0xea/0x1f0 [ 52.647834] __x64_sys_write+0x73/0xb0 [ 52.651721] do_syscall_64+0x103/0x610 [ 52.655617] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 52.660812] [ 52.662426] Freed by task 7809: [ 52.665687] save_stack+0x45/0xd0 [ 52.669124] __kasan_slab_free+0x102/0x150 [ 52.673363] kasan_slab_free+0xe/0x10 [ 52.677157] kfree+0xcf/0x230 [ 52.680257] rdma_destroy_id+0x723/0xab0 [ 52.684306] ucma_close+0x115/0x320 [ 52.687921] __fput+0x2df/0x8d0 [ 52.691183] ____fput+0x16/0x20 [ 52.694444] task_work_run+0x14a/0x1c0 [ 52.698317] exit_to_usermode_loop+0x273/0x2c0 [ 52.702896] do_syscall_64+0x52d/0x610 [ 52.706784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 52.711952] [ 52.713563] The buggy address belongs to the object at ffff8880a80ed4c0 [ 52.713563] which belongs to the cache kmalloc-2k of size 2048 [ 52.726207] The buggy address is located 480 bytes inside of [ 52.726207] 2048-byte region [ffff8880a80ed4c0, ffff8880a80edcc0) [ 52.738168] The buggy address belongs to the page: [ 52.743082] page:ffffea0002a03b00 count:1 mapcount:0 mapping:ffff88812c3f0c40 index:0x0 compound_mapcount: 0 [ 52.753032] flags: 0x1fffc0000010200(slab|head) [ 52.757685] raw: 01fffc0000010200 ffffea0002a19d88 ffffea0002a2ca88 ffff88812c3f0c40 [ 52.765552] raw: 0000000000000000 ffff8880a80ec3c0 0000000100000003 0000000000000000 [ 52.773414] page dumped because: kasan: bad access detected [ 52.779112] [ 52.780732] Memory state around the buggy address: [ 52.785654] ffff8880a80ed580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.793025] ffff8880a80ed600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.800374] >ffff8880a80ed680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.807736] ^ [ 52.812147] ffff8880a80ed700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.819490] ffff8880a80ed780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.826852] ================================================================== [ 52.834189] Disabling lock debugging due to kernel taint [ 52.843362] Kernel panic - not syncing: panic_on_warn set ... [ 52.849272] CPU: 0 PID: 7817 Comm: syz-executor.0 Tainted: G B 5.0.0-rc8+ #3 [ 52.857758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 52.867114] Call Trace: [ 52.869700] dump_stack+0x172/0x1f0 [ 52.873317] panic+0x2cb/0x65c [ 52.876502] ? __warn_printk+0xf3/0xf3 [ 52.880374] ? __list_add_valid+0x9a/0xa0 [ 52.884507] ? preempt_schedule+0x4b/0x60 [ 52.888664] ? ___preempt_schedule+0x16/0x18 [ 52.893069] ? trace_hardirqs_on+0x5e/0x230 [ 52.897378] ? __list_add_valid+0x9a/0xa0 [ 52.901525] end_report+0x47/0x4f [ 52.904963] ? __list_add_valid+0x9a/0xa0 [ 52.909095] kasan_report.cold+0xe/0x40 [ 52.913057] ? __list_add_valid+0x9a/0xa0 [ 52.917190] __asan_report_load8_noabort+0x14/0x20 [ 52.922100] __list_add_valid+0x9a/0xa0 [ 52.926073] rdma_listen+0x63b/0x8e0 [ 52.929775] ucma_listen+0x14d/0x1c0 [ 52.933473] ? ucma_notify+0x190/0x190 [ 52.937351] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 52.942880] ? _copy_from_user+0xdd/0x150 [ 52.947020] ucma_write+0x2da/0x3c0 [ 52.950631] ? ucma_notify+0x190/0x190 [ 52.954502] ? ucma_open+0x290/0x290 [ 52.958199] ? __fget+0x340/0x540 [ 52.961640] __vfs_write+0x116/0x8e0 [ 52.965348] ? lock_downgrade+0x810/0x810 [ 52.969481] ? ucma_open+0x290/0x290 [ 52.973195] ? kernel_read+0x120/0x120 [ 52.977066] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 52.982004] ? common_file_perm+0x1d6/0x6f0 [ 52.986344] ? apparmor_file_permission+0x25/0x30 [ 52.991199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 52.996733] ? security_file_permission+0x94/0x320 [ 53.001675] ? rw_verify_area+0x118/0x360 [ 53.005819] vfs_write+0x20c/0x580 [ 53.009355] ksys_write+0xea/0x1f0 [ 53.012880] ? __ia32_sys_read+0xb0/0xb0 [ 53.016927] ? do_syscall_64+0x26/0x610 [ 53.020886] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 53.026254] ? do_syscall_64+0x26/0x610 [ 53.030260] __x64_sys_write+0x73/0xb0 [ 53.034146] do_syscall_64+0x103/0x610 [ 53.038018] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 53.043189] RIP: 0033:0x457e29 [ 53.046390] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 53.065313] RSP: 002b:00007fc145d31c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 53.073013] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 53.080376] RDX: 00000000ffffff3a RSI: 00000000200001c0 RDI: 0000000000000003 [ 53.087635] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 53.094925] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc145d326d4 [ 53.102190] R13: 00000000004c70d9 R14: 00000000004dcb90 R15: 00000000ffffffff [ 53.110424] Kernel Offset: disabled [ 53.114047] Rebooting in 86400 seconds..