[info] Using makefile-style concurrent boot in runlevel 2. [ 26.195095] audit: type=1800 audit(1543148634.412:21): pid=5851 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.3' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 44.512095] ================================================================== [ 44.519607] BUG: KASAN: slab-out-of-bounds in queue_stack_map_push_elem+0x185/0x290 [ 44.527404] Write of size 262146 at addr ffff8881beb8f6c8 by task syz-executor447/6007 [ 44.535874] [ 44.537504] CPU: 0 PID: 6007 Comm: syz-executor447 Not tainted 4.20.0-rc3+ #127 [ 44.544930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 44.554273] Call Trace: [ 44.556865] dump_stack+0x244/0x39d [ 44.560490] ? dump_stack_print_info.cold.1+0x20/0x20 [ 44.565672] ? printk+0xa7/0xcf [ 44.568940] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 44.573687] print_address_description.cold.7+0x9/0x1ff [ 44.579154] kasan_report.cold.8+0x242/0x309 [ 44.583552] ? queue_stack_map_push_elem+0x185/0x290 [ 44.588650] check_memory_region+0x13e/0x1b0 [ 44.593059] memcpy+0x37/0x50 [ 44.596210] queue_stack_map_push_elem+0x185/0x290 [ 44.601255] ? queue_map_pop_elem+0x30/0x30 [ 44.605561] map_update_elem+0x605/0xf60 [ 44.609621] __x64_sys_bpf+0x32d/0x520 [ 44.613508] ? bpf_prog_get+0x20/0x20 [ 44.617301] do_syscall_64+0x1b9/0x820 [ 44.621266] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 44.626613] ? syscall_return_slowpath+0x5e0/0x5e0 [ 44.631520] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 44.636377] ? trace_hardirqs_on_caller+0x310/0x310 [ 44.641519] ? prepare_exit_to_usermode+0x291/0x3b0 [ 44.646532] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 44.651413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 44.656669] RIP: 0033:0x4400e9 [ 44.659854] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 44.678746] RSP: 002b:00007ffe96930f38 EFLAGS: 00000213 ORIG_RAX: 0000000000000141 [ 44.686585] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 00000000004400e9 [ 44.693844] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000002 [ 44.701096] RBP: 00000000006ca018 R08: 0000000000000000 R09: 00000000004002c8 [ 44.708511] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000401970 [ 44.715783] R13: 0000000000401a00 R14: 0000000000000000 R15: 0000000000000000 [ 44.723176] [ 44.724805] Allocated by task 6007: [ 44.728423] save_stack+0x43/0xd0 [ 44.731865] kasan_kmalloc+0xc7/0xe0 [ 44.735687] __kmalloc_node+0x50/0x70 [ 44.739494] bpf_map_area_alloc+0x3f/0x90 [ 44.743625] queue_stack_map_alloc+0x192/0x290 [ 44.748199] map_create+0x3bd/0x1110 [ 44.751910] __x64_sys_bpf+0x303/0x520 [ 44.755785] do_syscall_64+0x1b9/0x820 [ 44.759712] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 44.764879] [ 44.766489] Freed by task 3716: [ 44.769762] save_stack+0x43/0xd0 [ 44.773203] __kasan_slab_free+0x102/0x150 [ 44.777532] kasan_slab_free+0xe/0x10 [ 44.781320] kfree+0xcf/0x230 [ 44.784419] kernfs_fop_release+0x12b/0x1a0 [ 44.788724] __fput+0x385/0xa30 [ 44.791987] ____fput+0x15/0x20 [ 44.795251] task_work_run+0x1e8/0x2a0 [ 44.799122] exit_to_usermode_loop+0x318/0x380 [ 44.803899] do_syscall_64+0x6be/0x820 [ 44.807786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 44.812953] [ 44.814567] The buggy address belongs to the object at ffff8881beb8f580 [ 44.814567] which belongs to the cache kmalloc-512 of size 512 [ 44.827311] The buggy address is located 328 bytes inside of [ 44.827311] 512-byte region [ffff8881beb8f580, ffff8881beb8f780) [ 44.839167] The buggy address belongs to the page: [ 44.844084] page:ffffea0006fae3c0 count:1 mapcount:0 mapping:ffff8881da800940 index:0x0 [ 44.852210] flags: 0x2fffc0000000200(slab) [ 44.856551] raw: 02fffc0000000200 ffffea0006fa8288 ffffea0006fae908 ffff8881da800940 [ 44.864438] raw: 0000000000000000 ffff8881beb8f080 0000000100000006 0000000000000000 [ 44.872306] page dumped because: kasan: bad access detected [ 44.877993] [ 44.879599] Memory state around the buggy address: [ 44.884510] ffff8881beb8f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 44.891862] ffff8881beb8f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 44.899208] >ffff8881beb8f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.906602] ^ [ 44.909968] ffff8881beb8f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.917320] ffff8881beb8f800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.924665] ================================================================== [ 44.932005] Disabling lock debugging due to kernel taint [ 44.937435] Kernel panic - not syncing: panic_on_warn set ... [ 44.943313] CPU: 0 PID: 6007 Comm: syz-executor447 Tainted: G B 4.20.0-rc3+ #127 [ 44.952130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 44.961476] Call Trace: [ 44.964117] dump_stack+0x244/0x39d [ 44.967737] ? dump_stack_print_info.cold.1+0x20/0x20 [ 44.973064] panic+0x2ad/0x55c [ 44.976243] ? add_taint.cold.5+0x16/0x16 [ 44.980613] ? add_taint.cold.5+0x5/0x16 [ 44.984658] ? trace_hardirqs_off+0xaf/0x310 [ 44.989054] kasan_end_report+0x47/0x4f [ 44.993007] kasan_report.cold.8+0x76/0x309 [ 44.997362] ? queue_stack_map_push_elem+0x185/0x290 [ 45.002587] check_memory_region+0x13e/0x1b0 [ 45.006981] memcpy+0x37/0x50 [ 45.010072] queue_stack_map_push_elem+0x185/0x290 [ 45.014995] ? queue_map_pop_elem+0x30/0x30 [ 45.019299] map_update_elem+0x605/0xf60 [ 45.023415] __x64_sys_bpf+0x32d/0x520 [ 45.027296] ? bpf_prog_get+0x20/0x20 [ 45.031090] do_syscall_64+0x1b9/0x820 [ 45.034968] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 45.040318] ? syscall_return_slowpath+0x5e0/0x5e0 [ 45.045235] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 45.050079] ? trace_hardirqs_on_caller+0x310/0x310 [ 45.055087] ? prepare_exit_to_usermode+0x291/0x3b0 [ 45.060091] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 45.064918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 45.070092] RIP: 0033:0x4400e9 [ 45.073271] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 45.092206] RSP: 002b:00007ffe96930f38 EFLAGS: 00000213 ORIG_RAX: 0000000000000141 [ 45.099901] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 00000000004400e9 [ 45.107154] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000002 [ 45.114424] RBP: 00000000006ca018 R08: 0000000000000000 R09: 00000000004002c8 [ 45.121685] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000401970 [ 45.128935] R13: 0000000000401a00 R14: 0000000000000000 R15: 0000000000000000 [ 45.137622] Kernel Offset: disabled [ 45.141242] Rebooting in 86400 seconds..