[ 37.086193][ T26] audit: type=1800 audit(1553856702.506:26): pid=7558 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 37.170916][ T26] audit: type=1800 audit(1553856702.606:27): pid=7558 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 37.205232][ T26] audit: type=1800 audit(1553856702.646:28): pid=7558 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 38.249914][ T26] audit: type=1800 audit(1553856703.686:29): pid=7558 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.53' (ECDSA) to the list of known hosts. 2019/03/29 10:51:51 parsed 1 programs 2019/03/29 10:51:54 executed programs: 0 syzkaller login: [ 48.918269][ T7723] IPVS: ftp: loaded support on port[0] = 21 [ 48.970396][ T7723] chnl_net:caif_netlink_parms(): no params data found [ 48.999887][ T7723] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.007761][ T7723] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.015409][ T7723] device bridge_slave_0 entered promiscuous mode [ 49.023420][ T7723] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.030483][ T7723] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.038176][ T7723] device bridge_slave_1 entered promiscuous mode [ 49.052306][ T7723] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 49.061537][ T7723] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 49.077902][ T7723] team0: Port device team_slave_0 added [ 49.085942][ T7723] team0: Port device team_slave_1 added [ 49.163763][ T7723] device hsr_slave_0 entered promiscuous mode [ 49.232653][ T7723] device hsr_slave_1 entered promiscuous mode [ 49.298646][ T7723] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.305785][ T7723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.313345][ T7723] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.320379][ T7723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.349170][ T7723] 8021q: adding VLAN 0 to HW filter on device bond0 [ 49.361305][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.381684][ T7725] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.389913][ T7725] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.398820][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 49.409746][ T7723] 8021q: adding VLAN 0 to HW filter on device team0 [ 49.419446][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.427848][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.434915][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.452984][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.461306][ T7725] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.468431][ T7725] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.476926][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 49.486626][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 49.495841][ T7726] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 49.505508][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.516607][ T7723] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 49.528473][ T7723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 49.536293][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.551415][ T7723] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 49.881257][ T7797] ================================================================== [ 49.889448][ T7797] BUG: KASAN: use-after-free in __list_add_valid+0x9a/0xa0 [ 49.896634][ T7797] Read of size 8 at addr ffff8880a5d2b3e0 by task syz-executor.0/7797 [ 49.904755][ T7797] [ 49.907080][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc2+ #43 [ 49.914943][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 49.924965][ T7797] Call Trace: [ 49.928227][ T7797] dump_stack+0x172/0x1f0 [ 49.932529][ T7797] ? __list_add_valid+0x9a/0xa0 [ 49.937387][ T7797] print_address_description.cold+0x7c/0x20d [ 49.943396][ T7797] ? __list_add_valid+0x9a/0xa0 [ 49.948226][ T7797] ? __list_add_valid+0x9a/0xa0 [ 49.953047][ T7797] kasan_report.cold+0x1b/0x40 [ 49.957802][ T7797] ? __list_add_valid+0x9a/0xa0 [ 49.962633][ T7797] __asan_report_load8_noabort+0x14/0x20 [ 49.968239][ T7797] __list_add_valid+0x9a/0xa0 [ 49.972900][ T7797] rdma_listen+0x6b7/0x970 [ 49.977343][ T7797] ucma_listen+0x14d/0x1c0 [ 49.981794][ T7797] ? ucma_notify+0x190/0x190 [ 49.986375][ T7797] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 49.992588][ T7797] ? _copy_from_user+0xdd/0x150 [ 49.997410][ T7797] ucma_write+0x2da/0x3c0 [ 50.001712][ T7797] ? ucma_notify+0x190/0x190 [ 50.006317][ T7797] ? ucma_open+0x290/0x290 [ 50.010728][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 50.016968][ T7797] ? security_file_permission+0x94/0x380 [ 50.022575][ T7797] __vfs_write+0x8d/0x110 [ 50.026903][ T7797] ? ucma_open+0x290/0x290 [ 50.031297][ T7797] vfs_write+0x20c/0x580 [ 50.035518][ T7797] ksys_write+0xea/0x1f0 [ 50.039773][ T7797] ? __ia32_sys_read+0xb0/0xb0 [ 50.044548][ T7797] ? do_syscall_64+0x26/0x610 [ 50.049217][ T7797] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 50.055263][ T7797] ? do_syscall_64+0x26/0x610 [ 50.059939][ T7797] __x64_sys_write+0x73/0xb0 [ 50.064514][ T7797] do_syscall_64+0x103/0x610 [ 50.069102][ T7797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 50.074993][ T7797] RIP: 0033:0x458209 [ 50.078865][ T7797] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 50.098460][ T7797] RSP: 002b:00007fb9c2080c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 50.106853][ T7797] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458209 [ 50.114802][ T7797] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000003 [ 50.122764][ T7797] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 50.130722][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb9c20816d4 [ 50.138668][ T7797] R13: 00000000004c77c2 R14: 00000000004dd780 R15: 00000000ffffffff [ 50.146635][ T7797] [ 50.148945][ T7797] Allocated by task 7794: [ 50.153260][ T7797] save_stack+0x45/0xd0 [ 50.157389][ T7797] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 50.162995][ T7797] kasan_kmalloc+0x9/0x10 [ 50.167299][ T7797] kmem_cache_alloc_trace+0x151/0x760 [ 50.172667][ T7797] __rdma_create_id+0x5f/0x4e0 [ 50.177407][ T7797] ucma_create_id+0x1de/0x640 [ 50.182059][ T7797] ucma_write+0x2da/0x3c0 [ 50.186361][ T7797] __vfs_write+0x8d/0x110 [ 50.190699][ T7797] vfs_write+0x20c/0x580 [ 50.194921][ T7797] ksys_write+0xea/0x1f0 [ 50.199149][ T7797] __x64_sys_write+0x73/0xb0 [ 50.203714][ T7797] do_syscall_64+0x103/0x610 [ 50.208274][ T7797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 50.214149][ T7797] [ 50.216468][ T7797] Freed by task 7789: [ 50.220432][ T7797] save_stack+0x45/0xd0 [ 50.224579][ T7797] __kasan_slab_free+0x102/0x150 [ 50.229492][ T7797] kasan_slab_free+0xe/0x10 [ 50.233969][ T7797] kfree+0xcf/0x230 [ 50.237750][ T7797] rdma_destroy_id+0x719/0xaa0 [ 50.242482][ T7797] ucma_close+0x115/0x320 [ 50.246801][ T7797] __fput+0x2e5/0x8d0 [ 50.250762][ T7797] ____fput+0x16/0x20 [ 50.254729][ T7797] task_work_run+0x14a/0x1c0 [ 50.259289][ T7797] exit_to_usermode_loop+0x273/0x2c0 [ 50.264571][ T7797] do_syscall_64+0x52d/0x610 [ 50.269157][ T7797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 50.275025][ T7797] [ 50.277334][ T7797] The buggy address belongs to the object at ffff8880a5d2b200 [ 50.277334][ T7797] which belongs to the cache kmalloc-2k of size 2048 [ 50.291358][ T7797] The buggy address is located 480 bytes inside of [ 50.291358][ T7797] 2048-byte region [ffff8880a5d2b200, ffff8880a5d2ba00) [ 50.304682][ T7797] The buggy address belongs to the page: [ 50.310288][ T7797] page:ffffea0002974a80 count:1 mapcount:0 mapping:ffff88812c3f0c40 index:0x0 compound_mapcount: 0 [ 50.320942][ T7797] flags: 0x1fffc0000010200(slab|head) [ 50.326290][ T7797] raw: 01fffc0000010200 ffffea000231da88 ffff88812c3f1948 ffff88812c3f0c40 [ 50.334846][ T7797] raw: 0000000000000000 ffff8880a5d2a100 0000000100000003 0000000000000000 [ 50.343408][ T7797] page dumped because: kasan: bad access detected [ 50.349806][ T7797] [ 50.352107][ T7797] Memory state around the buggy address: [ 50.357717][ T7797] ffff8880a5d2b280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.365758][ T7797] ffff8880a5d2b300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.373794][ T7797] >ffff8880a5d2b380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.381824][ T7797] ^ [ 50.389004][ T7797] ffff8880a5d2b400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.397055][ T7797] ffff8880a5d2b480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.405084][ T7797] ================================================================== [ 50.413124][ T7797] Disabling lock debugging due to kernel taint [ 50.424734][ T7797] Kernel panic - not syncing: panic_on_warn set ... [ 50.431318][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Tainted: G B 5.1.0-rc2+ #43 [ 50.440580][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.450621][ T7797] Call Trace: [ 50.453899][ T7797] dump_stack+0x172/0x1f0 [ 50.458224][ T7797] panic+0x2cb/0x65c [ 50.462112][ T7797] ? __warn_printk+0xf3/0xf3 [ 50.466684][ T7797] ? __list_add_valid+0x9a/0xa0 [ 50.471528][ T7797] ? preempt_schedule+0x4b/0x60 [ 50.476355][ T7797] ? ___preempt_schedule+0x16/0x18 [ 50.481444][ T7797] ? trace_hardirqs_on+0x5e/0x230 [ 50.486745][ T7797] ? __list_add_valid+0x9a/0xa0 [ 50.491582][ T7797] end_report+0x47/0x4f [ 50.495736][ T7797] ? __list_add_valid+0x9a/0xa0 [ 50.500565][ T7797] kasan_report.cold+0xe/0x40 [ 50.505219][ T7797] ? __list_add_valid+0x9a/0xa0 [ 50.510053][ T7797] __asan_report_load8_noabort+0x14/0x20 [ 50.515690][ T7797] __list_add_valid+0x9a/0xa0 [ 50.520374][ T7797] rdma_listen+0x6b7/0x970 [ 50.524781][ T7797] ucma_listen+0x14d/0x1c0 [ 50.529188][ T7797] ? ucma_notify+0x190/0x190 [ 50.533772][ T7797] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 50.539990][ T7797] ? _copy_from_user+0xdd/0x150 [ 50.544827][ T7797] ucma_write+0x2da/0x3c0 [ 50.549127][ T7797] ? ucma_notify+0x190/0x190 [ 50.553740][ T7797] ? ucma_open+0x290/0x290 [ 50.558129][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 50.564354][ T7797] ? security_file_permission+0x94/0x380 [ 50.569969][ T7797] __vfs_write+0x8d/0x110 [ 50.574271][ T7797] ? ucma_open+0x290/0x290 [ 50.578660][ T7797] vfs_write+0x20c/0x580 [ 50.582874][ T7797] ksys_write+0xea/0x1f0 [ 50.587091][ T7797] ? __ia32_sys_read+0xb0/0xb0 [ 50.591827][ T7797] ? do_syscall_64+0x26/0x610 [ 50.596475][ T7797] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 50.602511][ T7797] ? do_syscall_64+0x26/0x610 [ 50.607174][ T7797] __x64_sys_write+0x73/0xb0 [ 50.611751][ T7797] do_syscall_64+0x103/0x610 [ 50.616316][ T7797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 50.622187][ T7797] RIP: 0033:0x458209 [ 50.626078][ T7797] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 50.645750][ T7797] RSP: 002b:00007fb9c2080c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 50.654130][ T7797] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458209 [ 50.662096][ T7797] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000003 [ 50.670051][ T7797] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 50.678062][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb9c20816d4 [ 50.686012][ T7797] R13: 00000000004c77c2 R14: 00000000004dd780 R15: 00000000ffffffff [ 50.694577][ T7797] Kernel Offset: disabled [ 50.698889][ T7797] Rebooting in 86400 seconds..