[ 35.484887] audit: type=1800 audit(1551630393.425:27): pid=7507 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 35.510740] audit: type=1800 audit(1551630393.425:28): pid=7507 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 36.248526] audit: type=1800 audit(1551630394.235:29): pid=7507 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 36.272367] audit: type=1800 audit(1551630394.235:30): pid=7507 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.240' (ECDSA) to the list of known hosts. 2019/03/03 16:26:46 parsed 1 programs 2019/03/03 16:26:48 executed programs: 0 syzkaller login: [ 50.451538] IPVS: ftp: loaded support on port[0] = 21 [ 50.504047] chnl_net:caif_netlink_parms(): no params data found [ 50.533458] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.540178] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.547097] device bridge_slave_0 entered promiscuous mode [ 50.554060] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.560557] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.567516] device bridge_slave_1 entered promiscuous mode [ 50.582110] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 50.591257] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 50.608167] team0: Port device team_slave_0 added [ 50.613957] team0: Port device team_slave_1 added [ 50.667170] device hsr_slave_0 entered promiscuous mode [ 50.705313] device hsr_slave_1 entered promiscuous mode [ 50.751545] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.757978] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.764672] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.771326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.799949] 8021q: adding VLAN 0 to HW filter on device bond0 [ 50.811045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.820279] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.828095] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.835550] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 50.845957] 8021q: adding VLAN 0 to HW filter on device team0 [ 50.856710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.864376] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.870791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.877602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.885392] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.891752] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.906996] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 50.914585] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 50.922425] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 50.933576] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 50.943830] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 50.955135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.962869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.970591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 50.987097] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 51.081448] ================================================================== [ 51.088860] BUG: KASAN: use-after-free in __list_add_valid+0x9a/0xa0 [ 51.095334] Read of size 8 at addr ffff888087c7a420 by task syz-executor.0/7687 [ 51.102757] [ 51.104371] CPU: 1 PID: 7687 Comm: syz-executor.0 Not tainted 5.0.0-rc8+ #3 [ 51.111447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.120788] Call Trace: [ 51.123390] dump_stack+0x172/0x1f0 [ 51.127020] ? __list_add_valid+0x9a/0xa0 [ 51.131169] print_address_description.cold+0x7c/0x20d [ 51.136458] ? __list_add_valid+0x9a/0xa0 [ 51.140588] ? __list_add_valid+0x9a/0xa0 [ 51.144729] kasan_report.cold+0x1b/0x40 [ 51.148795] ? __list_add_valid+0x9a/0xa0 [ 51.152948] __asan_report_load8_noabort+0x14/0x20 [ 51.157873] __list_add_valid+0x9a/0xa0 [ 51.161841] rdma_listen+0x63b/0x8e0 [ 51.165539] ucma_listen+0x14d/0x1c0 [ 51.169238] ? ucma_notify+0x190/0x190 [ 51.173125] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 51.178674] ? _copy_from_user+0xdd/0x150 [ 51.182821] ucma_write+0x2da/0x3c0 [ 51.186448] ? ucma_notify+0x190/0x190 [ 51.190325] ? ucma_open+0x290/0x290 [ 51.194023] ? __fget+0x340/0x540 [ 51.197464] __vfs_write+0x116/0x8e0 [ 51.201168] ? lock_downgrade+0x810/0x810 [ 51.205323] ? ucma_open+0x290/0x290 [ 51.209036] ? kernel_read+0x120/0x120 [ 51.212908] ? __fget+0x367/0x540 [ 51.216350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 51.221874] ? security_file_permission+0x94/0x320 [ 51.226830] ? rw_verify_area+0x118/0x360 [ 51.230962] vfs_write+0x20c/0x580 [ 51.234499] ksys_write+0xea/0x1f0 [ 51.238029] ? __ia32_sys_read+0xb0/0xb0 [ 51.242077] ? do_syscall_64+0x26/0x610 [ 51.246036] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.251383] ? do_syscall_64+0x26/0x610 [ 51.255342] __x64_sys_write+0x73/0xb0 [ 51.259217] do_syscall_64+0x103/0x610 [ 51.263089] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.268322] RIP: 0033:0x457e29 [ 51.271496] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 51.290382] RSP: 002b:00007f341d437c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 51.298092] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 51.305358] RDX: 00000000ffffff3a RSI: 00000000200001c0 RDI: 0000000000000003 [ 51.312608] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 51.319860] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f341d4386d4 [ 51.327111] R13: 00000000004c70d9 R14: 00000000004dcb90 R15: 00000000ffffffff [ 51.334369] [ 51.335979] Allocated by task 7684: [ 51.339588] save_stack+0x45/0xd0 [ 51.343064] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 51.347980] kasan_kmalloc+0x9/0x10 [ 51.351588] kmem_cache_alloc_trace+0x151/0x760 [ 51.356260] __rdma_create_id+0x5f/0x4e0 [ 51.360314] ucma_create_id+0x1de/0x640 [ 51.364268] ucma_write+0x2da/0x3c0 [ 51.367879] __vfs_write+0x116/0x8e0 [ 51.371573] vfs_write+0x20c/0x580 [ 51.375099] ksys_write+0xea/0x1f0 [ 51.378689] __x64_sys_write+0x73/0xb0 [ 51.382571] do_syscall_64+0x103/0x610 [ 51.386437] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.391613] [ 51.393221] Freed by task 7680: [ 51.396489] save_stack+0x45/0xd0 [ 51.399931] __kasan_slab_free+0x102/0x150 [ 51.404163] kasan_slab_free+0xe/0x10 [ 51.407948] kfree+0xcf/0x230 [ 51.411034] rdma_destroy_id+0x723/0xab0 [ 51.415094] ucma_close+0x115/0x320 [ 51.418705] __fput+0x2df/0x8d0 [ 51.421966] ____fput+0x16/0x20 [ 51.425229] task_work_run+0x14a/0x1c0 [ 51.429120] exit_to_usermode_loop+0x273/0x2c0 [ 51.433696] do_syscall_64+0x52d/0x610 [ 51.437569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.442735] [ 51.444346] The buggy address belongs to the object at ffff888087c7a240 [ 51.444346] which belongs to the cache kmalloc-2k of size 2048 [ 51.457000] The buggy address is located 480 bytes inside of [ 51.457000] 2048-byte region [ffff888087c7a240, ffff888087c7aa40) [ 51.468958] The buggy address belongs to the page: [ 51.473879] page:ffffea00021f1e80 count:1 mapcount:0 mapping:ffff88812c3f0c40 index:0x0 compound_mapcount: 0 [ 51.483843] flags: 0x1fffc0000010200(slab|head) [ 51.488494] raw: 01fffc0000010200 ffffea0002644e88 ffffea00025cb308 ffff88812c3f0c40 [ 51.496354] raw: 0000000000000000 ffff888087c7a240 0000000100000003 0000000000000000 [ 51.504213] page dumped because: kasan: bad access detected [ 51.509903] [ 51.511516] Memory state around the buggy address: [ 51.516428] ffff888087c7a300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.523772] ffff888087c7a380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.531116] >ffff888087c7a400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.538453] ^ [ 51.542843] ffff888087c7a480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.550185] ffff888087c7a500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.557526] ================================================================== [ 51.564872] Disabling lock debugging due to kernel taint [ 51.572535] Kernel panic - not syncing: panic_on_warn set ... [ 51.578433] CPU: 1 PID: 7687 Comm: syz-executor.0 Tainted: G B 5.0.0-rc8+ #3 [ 51.586903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.596239] Call Trace: [ 51.598817] dump_stack+0x172/0x1f0 [ 51.602441] panic+0x2cb/0x65c [ 51.605616] ? __warn_printk+0xf3/0xf3 [ 51.609487] ? __list_add_valid+0x9a/0xa0 [ 51.613616] ? preempt_schedule+0x4b/0x60 [ 51.617749] ? ___preempt_schedule+0x16/0x18 [ 51.622143] ? trace_hardirqs_on+0x5e/0x230 [ 51.626457] ? __list_add_valid+0x9a/0xa0 [ 51.630591] end_report+0x47/0x4f [ 51.634213] ? __list_add_valid+0x9a/0xa0 [ 51.638348] kasan_report.cold+0xe/0x40 [ 51.642319] ? __list_add_valid+0x9a/0xa0 [ 51.646454] __asan_report_load8_noabort+0x14/0x20 [ 51.651364] __list_add_valid+0x9a/0xa0 [ 51.655336] rdma_listen+0x63b/0x8e0 [ 51.659050] ucma_listen+0x14d/0x1c0 [ 51.662773] ? ucma_notify+0x190/0x190 [ 51.666667] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 51.672189] ? _copy_from_user+0xdd/0x150 [ 51.676320] ucma_write+0x2da/0x3c0 [ 51.679930] ? ucma_notify+0x190/0x190 [ 51.683808] ? ucma_open+0x290/0x290 [ 51.687508] ? __fget+0x340/0x540 [ 51.690944] __vfs_write+0x116/0x8e0 [ 51.694637] ? lock_downgrade+0x810/0x810 [ 51.698773] ? ucma_open+0x290/0x290 [ 51.702469] ? kernel_read+0x120/0x120 [ 51.706366] ? __fget+0x367/0x540 [ 51.709802] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 51.715324] ? security_file_permission+0x94/0x320 [ 51.720238] ? rw_verify_area+0x118/0x360 [ 51.724367] vfs_write+0x20c/0x580 [ 51.727899] ksys_write+0xea/0x1f0 [ 51.731434] ? __ia32_sys_read+0xb0/0xb0 [ 51.735478] ? do_syscall_64+0x26/0x610 [ 51.739433] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.744782] ? do_syscall_64+0x26/0x610 [ 51.748776] __x64_sys_write+0x73/0xb0 [ 51.752679] do_syscall_64+0x103/0x610 [ 51.756553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.761720] RIP: 0033:0x457e29 [ 51.764894] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 51.783775] RSP: 002b:00007f341d437c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 51.791464] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 51.798718] RDX: 00000000ffffff3a RSI: 00000000200001c0 RDI: 0000000000000003 [ 51.806001] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 51.813261] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f341d4386d4 [ 51.820529] R13: 00000000004c70d9 R14: 00000000004dcb90 R15: 00000000ffffffff [ 51.828739] Kernel Offset: disabled [ 51.832357] Rebooting in 86400 seconds..