[ 39.216668] audit: type=1800 audit(1569120992.208:32): pid=7482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 40.030825] audit: type=1800 audit(1569120993.128:33): pid=7482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.121' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 48.388819] kauditd_printk_skb: 2 callbacks suppressed [ 48.388835] audit: type=1400 audit(1569121001.488:36): avc: denied { map } for pid=7667 comm="syz-executor448" path="/root/syz-executor448094420" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 48.425306] FAULT_INJECTION: forcing a failure. [ 48.425306] name failslab, interval 1, probability 0, space 0, times 1 [ 48.437206] CPU: 0 PID: 7667 Comm: syz-executor448 Not tainted 4.19.75 #0 [ 48.444234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 48.453604] Call Trace: [ 48.456201] dump_stack+0x172/0x1f0 [ 48.459856] should_fail.cold+0xa/0x1b [ 48.463755] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 48.468886] ? lock_downgrade+0x810/0x810 [ 48.473120] __should_failslab+0x121/0x190 [ 48.477564] should_failslab+0x9/0x14 [ 48.481478] kmem_cache_alloc_trace+0x2cc/0x760 [ 48.486310] ? kasan_check_read+0x11/0x20 [ 48.490588] cma_alloc_port+0x4d/0x190 [ 48.494651] rdma_bind_addr+0x165a/0x1f80 [ 48.498807] ? ucma_get_ctx+0x82/0x160 [ 48.502707] ? cma_ndev_work_handler+0x1b0/0x1b0 [ 48.508727] ? lock_downgrade+0x810/0x810 [ 48.513013] rdma_resolve_addr+0x438/0x2140 [ 48.517514] ? kasan_check_write+0x14/0x20 [ 48.522625] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 48.527964] ? lock_downgrade+0x810/0x810 [ 48.532147] ? __radix_tree_lookup+0x219/0x380 [ 48.537388] ? rdma_bind_addr+0x1f80/0x1f80 [ 48.541855] ucma_resolve_ip+0x153/0x210 [ 48.545916] ? ucma_query+0x820/0x820 [ 48.549750] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 48.555320] ? _copy_from_user+0xdd/0x150 [ 48.559624] ucma_write+0x2d7/0x3c0 [ 48.563293] ? ucma_query+0x820/0x820 [ 48.567555] ? ucma_open+0x290/0x290 [ 48.571726] __vfs_write+0x114/0x810 [ 48.576038] ? ucma_open+0x290/0x290 [ 48.580554] ? kernel_read+0x120/0x120 [ 48.584584] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 48.590137] ? __inode_security_revalidate+0xda/0x120 [ 48.596663] ? avc_policy_seqno+0xd/0x70 [ 48.600723] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 48.605872] ? selinux_file_permission+0x92/0x550 [ 48.610870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 48.616534] ? security_file_permission+0x89/0x230 [ 48.621473] ? rw_verify_area+0x118/0x360 [ 48.625798] vfs_write+0x20c/0x560 [ 48.629339] ksys_write+0x14f/0x2d0 [ 48.632966] ? __ia32_sys_read+0xb0/0xb0 [ 48.637108] ? do_syscall_64+0x26/0x620 [ 48.641078] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 48.646462] ? do_syscall_64+0x26/0x620 [ 48.650476] __x64_sys_write+0x73/0xb0 [ 48.654462] do_syscall_64+0xfd/0x620 [ 48.658399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 48.663617] RIP: 0033:0x440719 [ 48.667045] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b 14 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 48.687365] RSP: 002b:00007ffdd0ae4608 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 48.695120] RAX: ffffffffffffffda RBX: 00007ffdd0ae4610 RCX: 0000000000440719 [ 48.702580] RDX: 0000000000000048 RSI: 00000000200000c0 RDI: 0000000000000003 [ 48.709871] RBP: 0000000000000004 R08: 0000000000000001 R09: 00007ffdd0ae0031 [ 48.717499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000402000 [ 48.725173] R13: 0000000000402090 R14: 0000000000000000 R15: 0000000000000000 [ 48.737221] ================================================================== [ 48.746118] BUG: KASAN: use-after-free in wait_consider_task+0x1b51/0x3910 [ 48.753539] Read of size 4 at addr ffff8880858da46c by task sshd/7665 [ 48.761523] [ 48.763825] CPU: 0 PID: 7665 Comm: sshd Not tainted 4.19.75 #0 [ 48.770190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 48.780467] Call Trace: [ 48.783206] dump_stack+0x172/0x1f0 [ 48.786847] ? wait_consider_task+0x1b51/0x3910 [ 48.791547] print_address_description.cold+0x7c/0x20d [ 48.796949] ? wait_consider_task+0x1b51/0x3910 [ 48.801869] kasan_report.cold+0x8c/0x2ba [ 48.806571] __asan_report_load4_noabort+0x14/0x20 [ 48.811719] wait_consider_task+0x1b51/0x3910 [ 48.816235] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 48.822044] ? add_wait_queue+0x112/0x170 [ 48.826859] ? release_task+0x1630/0x1630 [ 48.831205] ? lock_acquire+0x16f/0x3f0 [ 48.836114] ? do_wait+0x3aa/0x9d0 [ 48.839850] ? kasan_check_write+0x14/0x20 [ 48.844234] do_wait+0x439/0x9d0 [ 48.847792] ? wait_consider_task+0x3910/0x3910 [ 48.852473] ? mark_held_locks+0x100/0x100 [ 48.857344] kernel_wait4+0x171/0x290 [ 48.861142] ? __ia32_sys_waitid+0x140/0x140 [ 48.866039] ? task_stopped_code+0x180/0x180 [ 48.870507] __do_sys_wait4+0x147/0x160 [ 48.874476] ? kernel_wait4+0x290/0x290 [ 48.878624] ? kasan_check_read+0x11/0x20 [ 48.883914] ? _copy_to_user+0xc9/0x120 [ 48.887898] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 48.893452] ? __x64_sys_rt_sigprocmask+0x21d/0x2e0 [ 48.898981] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 48.904375] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 48.909648] ? do_syscall_64+0x26/0x620 [ 48.913772] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 48.919390] ? do_syscall_64+0x26/0x620 [ 48.923826] __x64_sys_wait4+0x97/0xf0 [ 48.928373] do_syscall_64+0xfd/0x620 [ 48.932175] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 48.937351] RIP: 0033:0x7f75b81a2a3e [ 48.941055] Code: 90 90 90 90 90 90 90 90 90 90 90 90 48 83 ec 28 8b 05 c2 eb 2d 00 85 c0 75 1d 45 31 d2 48 63 d2 48 63 ff b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 48 83 c4 28 c3 89 54 24 08 48 89 74 24 10 [ 48.960411] RSP: 002b:00007fff6d134370 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 48.968137] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f75b81a2a3e [ 48.975572] RDX: 0000000000000001 RSI: 00007fff6d1343ac RDI: ffffffffffffffff [ 48.983927] RBP: 000055683bbdfc88 R08: 00007fff6d134470 R09: 0101010101010101 [ 48.991464] R10: 0000000000000000 R11: 0000000000000246 R12: 000055683d2a6af0 [ 48.998813] R13: 000055683bbddfb4 R14: 0000000000000028 R15: 000055683bbdfca0 [ 49.006638] [ 49.008342] Allocated by task 7665: [ 49.011996] save_stack+0x45/0xd0 [ 49.015552] kasan_kmalloc+0xce/0xf0 [ 49.020230] kasan_slab_alloc+0xf/0x20 [ 49.024555] kmem_cache_alloc_node+0x144/0x710 [ 49.029256] copy_process.part.0+0x1ce0/0x7a30 [ 49.033833] _do_fork+0x257/0xfd0 [ 49.037331] __x64_sys_clone+0xbf/0x150 [ 49.041358] do_syscall_64+0xfd/0x620 [ 49.045184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 49.050384] [ 49.052016] Freed by task 0: [ 49.055055] save_stack+0x45/0xd0 [ 49.058647] __kasan_slab_free+0x102/0x150 [ 49.062903] kasan_slab_free+0xe/0x10 [ 49.066703] kmem_cache_free+0x86/0x260 [ 49.070672] free_task+0xdd/0x120 [ 49.074180] __put_task_struct+0x20f/0x4c0 [ 49.078438] finish_task_switch+0x52b/0x780 [ 49.082757] __schedule+0x86e/0x1dc0 [ 49.086465] schedule_idle+0x58/0x80 [ 49.090199] do_idle+0x192/0x560 [ 49.093840] cpu_startup_entry+0xc8/0xe0 [ 49.098027] start_secondary+0x3e8/0x5b0 [ 49.102231] secondary_startup_64+0xa4/0xb0 [ 49.106781] [ 49.108423] The buggy address belongs to the object at ffff8880858da000 [ 49.108423] which belongs to the cache task_struct of size 6080 [ 49.121235] The buggy address is located 1132 bytes inside of [ 49.121235] 6080-byte region [ffff8880858da000, ffff8880858db7c0) [ 49.133531] The buggy address belongs to the page: [ 49.138586] page:ffffea0002163680 count:1 mapcount:0 mapping:ffff88812c26d800 index:0x0 compound_mapcount: 0 [ 49.148812] flags: 0x1fffc0000008100(slab|head) [ 49.153494] raw: 01fffc0000008100 ffffea0002049608 ffffea0002729188 ffff88812c26d800 [ 49.161397] raw: 0000000000000000 ffff8880858da000 0000000100000001 0000000000000000 [ 49.169833] page dumped because: kasan: bad access detected [ 49.175684] [ 49.177411] Memory state around the buggy address: [ 49.182467] ffff8880858da300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.189994] ffff8880858da380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.197366] >ffff8880858da400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.204876] ^ [ 49.211752] ffff8880858da480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.219238] ffff8880858da500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.226807] ================================================================== [ 49.234517] Disabling lock debugging due to kernel taint [ 49.240108] Kernel panic - not syncing: panic_on_warn set ... [ 49.240108] [ 49.247643] CPU: 0 PID: 7665 Comm: sshd Tainted: G B 4.19.75 #0 [ 49.255110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 49.264823] Call Trace: [ 49.267479] dump_stack+0x172/0x1f0 [ 49.271199] ? wait_consider_task+0x1b51/0x3910 [ 49.275888] panic+0x263/0x507 [ 49.279438] ? __warn_printk+0xf3/0xf3 [ 49.283448] ? retint_kernel+0x2d/0x2d [ 49.287347] ? trace_hardirqs_on+0x5e/0x220 [ 49.291697] ? wait_consider_task+0x1b51/0x3910 [ 49.296454] kasan_end_report+0x47/0x4f [ 49.300461] kasan_report.cold+0xa9/0x2ba [ 49.304638] __asan_report_load4_noabort+0x14/0x20 [ 49.309592] wait_consider_task+0x1b51/0x3910 [ 49.314107] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 49.319344] ? add_wait_queue+0x112/0x170 [ 49.323725] ? release_task+0x1630/0x1630 [ 49.327890] ? lock_acquire+0x16f/0x3f0 [ 49.331990] ? do_wait+0x3aa/0x9d0 [ 49.335551] ? kasan_check_write+0x14/0x20 [ 49.339890] do_wait+0x439/0x9d0 [ 49.343254] ? wait_consider_task+0x3910/0x3910 [ 49.347963] ? mark_held_locks+0x100/0x100 [ 49.352227] kernel_wait4+0x171/0x290 [ 49.356068] ? __ia32_sys_waitid+0x140/0x140 [ 49.361019] ? task_stopped_code+0x180/0x180 [ 49.365455] __do_sys_wait4+0x147/0x160 [ 49.369444] ? kernel_wait4+0x290/0x290 [ 49.373420] ? kasan_check_read+0x11/0x20 [ 49.377581] ? _copy_to_user+0xc9/0x120 [ 49.381700] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 49.387246] ? __x64_sys_rt_sigprocmask+0x21d/0x2e0 [ 49.392257] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 49.397022] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 49.401800] ? do_syscall_64+0x26/0x620 [ 49.405792] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 49.411179] ? do_syscall_64+0x26/0x620 [ 49.415179] __x64_sys_wait4+0x97/0xf0 [ 49.419077] do_syscall_64+0xfd/0x620 [ 49.423026] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 49.428229] RIP: 0033:0x7f75b81a2a3e [ 49.431944] Code: 90 90 90 90 90 90 90 90 90 90 90 90 48 83 ec 28 8b 05 c2 eb 2d 00 85 c0 75 1d 45 31 d2 48 63 d2 48 63 ff b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 48 83 c4 28 c3 89 54 24 08 48 89 74 24 10 [ 49.451583] RSP: 002b:00007fff6d134370 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 49.459308] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f75b81a2a3e [ 49.466581] RDX: 0000000000000001 RSI: 00007fff6d1343ac RDI: ffffffffffffffff [ 49.474076] RBP: 000055683bbdfc88 R08: 00007fff6d134470 R09: 0101010101010101 [ 49.481466] R10: 0000000000000000 R11: 0000000000000246 R12: 000055683d2a6af0 [ 49.488729] R13: 000055683bbddfb4 R14: 0000000000000028 R15: 000055683bbdfca0 [ 49.497456] Kernel Offset: disabled [ 49.501105] Rebooting in 86400 seconds..