[info] Using makefile-style concurrent boot in runlevel 2. [ 26.175932] audit: type=1800 audit(1545077344.609:21): pid=5849 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 32.206511] sshd (5987) used greatest stack depth: 15744 bytes left Warning: Permanently added '10.128.0.87' (ECDSA) to the list of known hosts. 2018/12/17 20:09:35 parsed 1 programs 2018/12/17 20:09:37 executed programs: 0 [ 58.924015] IPVS: ftp: loaded support on port[0] = 21 [ 59.171724] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.178443] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.185873] device bridge_slave_0 entered promiscuous mode [ 59.203702] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.210313] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.217353] device bridge_slave_1 entered promiscuous mode [ 59.235541] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.253421] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.302244] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.321859] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.396906] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.404514] team0: Port device team_slave_0 added [ 59.422608] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.429758] team0: Port device team_slave_1 added [ 59.446435] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.467824] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.486873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.506529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.651558] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.657971] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.664892] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.671264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.186453] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.238958] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.292604] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.298715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.307439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.356980] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.140895] ================================================================== [ 61.148338] BUG: KASAN: use-after-free in __list_add_valid+0x8f/0xac [ 61.154816] Read of size 8 at addr ffff8881baa54fe0 by task syz-executor0/6377 [ 61.162152] [ 61.163768] CPU: 1 PID: 6377 Comm: syz-executor0 Not tainted 4.20.0-rc7+ #375 [ 61.171023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.180359] Call Trace: [ 61.182934] dump_stack+0x244/0x39d [ 61.186562] ? dump_stack_print_info.cold.1+0x20/0x20 [ 61.191745] ? printk+0xa7/0xcf [ 61.195006] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 61.199748] ? kasan_check_read+0x11/0x20 [ 61.203886] print_address_description.cold.7+0x9/0x1ff [ 61.209238] kasan_report.cold.8+0x242/0x309 [ 61.213642] ? __list_add_valid+0x8f/0xac [ 61.217777] __asan_report_load8_noabort+0x14/0x20 [ 61.222709] __list_add_valid+0x8f/0xac [ 61.226691] rdma_listen+0x6dc/0x990 [ 61.230394] ? rdma_resolve_addr+0x2870/0x2870 [ 61.234983] ucma_listen+0x1a4/0x260 [ 61.238680] ? ucma_notify+0x210/0x210 [ 61.242550] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 61.248063] ? _copy_from_user+0xdf/0x150 [ 61.252189] ? ucma_notify+0x210/0x210 [ 61.256076] ucma_write+0x365/0x460 [ 61.259718] ? ucma_open+0x3f0/0x3f0 [ 61.263422] __vfs_write+0x119/0x9f0 [ 61.267122] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 61.272036] ? ucma_open+0x3f0/0x3f0 [ 61.275743] ? kernel_read+0x120/0x120 [ 61.279615] ? apparmor_path_rmdir+0x30/0x30 [ 61.284043] ? trace_hardirqs_off_caller+0x310/0x310 [ 61.289131] ? apparmor_file_permission+0x24/0x30 [ 61.294000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 61.299542] ? security_file_permission+0x1c2/0x220 [ 61.304575] ? rw_verify_area+0x118/0x360 [ 61.308711] vfs_write+0x1fc/0x560 [ 61.312240] ksys_write+0x101/0x260 [ 61.315872] ? __ia32_sys_read+0xb0/0xb0 [ 61.319924] ? trace_hardirqs_off_caller+0x310/0x310 [ 61.325011] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 61.330560] __x64_sys_write+0x73/0xb0 [ 61.334436] do_syscall_64+0x1b9/0x820 [ 61.338310] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 61.343677] ? syscall_return_slowpath+0x5e0/0x5e0 [ 61.348605] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 61.353433] ? trace_hardirqs_on_caller+0x310/0x310 [ 61.358436] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 61.363441] ? prepare_exit_to_usermode+0x291/0x3b0 [ 61.368446] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 61.373282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 61.378489] RIP: 0033:0x457669 [ 61.381682] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 61.400583] RSP: 002b:00007f47d32e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 61.408278] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 61.415533] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000003 [ 61.422788] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 61.430056] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f47d32e26d4 [ 61.437323] R13: 00000000004c5f10 R14: 00000000004da9d0 R15: 00000000ffffffff [ 61.444583] [ 61.446194] Allocated by task 6373: [ 61.449808] save_stack+0x43/0xd0 [ 61.453255] kasan_kmalloc+0xc7/0xe0 [ 61.456953] kmem_cache_alloc_trace+0x152/0x750 [ 61.461607] __rdma_create_id+0xdf/0x650 [ 61.465652] ucma_create_id+0x39b/0x990 [ 61.469621] ucma_write+0x365/0x460 [ 61.473253] __vfs_write+0x119/0x9f0 [ 61.476952] vfs_write+0x1fc/0x560 [ 61.480478] ksys_write+0x101/0x260 [ 61.484088] __x64_sys_write+0x73/0xb0 [ 61.487961] do_syscall_64+0x1b9/0x820 [ 61.491832] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 61.497009] [ 61.498655] Freed by task 6370: [ 61.501919] save_stack+0x43/0xd0 [ 61.505367] __kasan_slab_free+0x102/0x150 [ 61.509589] kasan_slab_free+0xe/0x10 [ 61.513376] kfree+0xcf/0x230 [ 61.516468] rdma_destroy_id+0x835/0xcc0 [ 61.520516] ucma_close+0x114/0x310 [ 61.524160] __fput+0x385/0xa30 [ 61.527437] ____fput+0x15/0x20 [ 61.530701] task_work_run+0x1e8/0x2a0 [ 61.534573] exit_to_usermode_loop+0x318/0x380 [ 61.539141] do_syscall_64+0x6be/0x820 [ 61.543015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 61.548186] [ 61.549801] The buggy address belongs to the object at ffff8881baa54e00 [ 61.549801] which belongs to the cache kmalloc-2k of size 2048 [ 61.562446] The buggy address is located 480 bytes inside of [ 61.562446] 2048-byte region [ffff8881baa54e00, ffff8881baa55600) [ 61.574394] The buggy address belongs to the page: [ 61.579305] page:ffffea0006ea9500 count:1 mapcount:0 mapping:ffff8881da800c40 index:0x0 compound_mapcount: 0 [ 61.589264] flags: 0x2fffc0000010200(slab|head) [ 61.593922] raw: 02fffc0000010200 ffffea0006eaac88 ffffea0006e80708 ffff8881da800c40 [ 61.601806] raw: 0000000000000000 ffff8881baa54580 0000000100000003 0000000000000000 [ 61.609669] page dumped because: kasan: bad access detected [ 61.615360] [ 61.616968] Memory state around the buggy address: [ 61.621918] ffff8881baa54e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.629265] ffff8881baa54f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.636610] >ffff8881baa54f80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.643953] ^ [ 61.650458] ffff8881baa55000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.657800] ffff8881baa55080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.665157] ================================================================== [ 61.672495] Disabling lock debugging due to kernel taint [ 61.680522] Kernel panic - not syncing: panic_on_warn set ... [ 61.686419] CPU: 1 PID: 6377 Comm: syz-executor0 Tainted: G B 4.20.0-rc7+ #375 [ 61.695078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.704421] Call Trace: [ 61.706998] dump_stack+0x244/0x39d [ 61.710616] ? dump_stack_print_info.cold.1+0x20/0x20 [ 61.715795] panic+0x2ad/0x55c [ 61.718970] ? add_taint.cold.5+0x16/0x16 [ 61.723164] ? preempt_schedule+0x4d/0x60 [ 61.727315] ? ___preempt_schedule+0x16/0x18 [ 61.731711] ? trace_hardirqs_on+0xb4/0x310 [ 61.736042] kasan_end_report+0x47/0x4f [ 61.740012] kasan_report.cold.8+0x76/0x309 [ 61.744328] ? __list_add_valid+0x8f/0xac [ 61.748463] __asan_report_load8_noabort+0x14/0x20 [ 61.753384] __list_add_valid+0x8f/0xac [ 61.757351] rdma_listen+0x6dc/0x990 [ 61.761060] ? rdma_resolve_addr+0x2870/0x2870 [ 61.765643] ucma_listen+0x1a4/0x260 [ 61.769377] ? ucma_notify+0x210/0x210 [ 61.773280] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 61.778822] ? _copy_from_user+0xdf/0x150 [ 61.782968] ? ucma_notify+0x210/0x210 [ 61.786843] ucma_write+0x365/0x460 [ 61.790457] ? ucma_open+0x3f0/0x3f0 [ 61.794158] __vfs_write+0x119/0x9f0 [ 61.797868] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 61.802788] ? ucma_open+0x3f0/0x3f0 [ 61.806487] ? kernel_read+0x120/0x120 [ 61.810365] ? apparmor_path_rmdir+0x30/0x30 [ 61.814760] ? trace_hardirqs_off_caller+0x310/0x310 [ 61.819849] ? apparmor_file_permission+0x24/0x30 [ 61.824679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 61.830208] ? security_file_permission+0x1c2/0x220 [ 61.835210] ? rw_verify_area+0x118/0x360 [ 61.839345] vfs_write+0x1fc/0x560 [ 61.842881] ksys_write+0x101/0x260 [ 61.846492] ? __ia32_sys_read+0xb0/0xb0 [ 61.850541] ? trace_hardirqs_off_caller+0x310/0x310 [ 61.855641] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 61.861214] __x64_sys_write+0x73/0xb0 [ 61.865108] do_syscall_64+0x1b9/0x820 [ 61.868978] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 61.874353] ? syscall_return_slowpath+0x5e0/0x5e0 [ 61.879274] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 61.884102] ? trace_hardirqs_on_caller+0x310/0x310 [ 61.889129] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 61.894133] ? prepare_exit_to_usermode+0x291/0x3b0 [ 61.899146] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 61.903982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 61.909214] RIP: 0033:0x457669 [ 61.912397] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 61.931298] RSP: 002b:00007f47d32e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 61.939008] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 61.946283] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000003 [ 61.953548] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 61.960813] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f47d32e26d4 [ 61.968076] R13: 00000000004c5f10 R14: 00000000004da9d0 R15: 00000000ffffffff [ 61.976292] Kernel Offset: disabled [ 61.979914] Rebooting in 86400 seconds..