[ 36.863919] audit: type=1800 audit(1551630512.132:27): pid=7530 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 36.900729] audit: type=1800 audit(1551630512.132:28): pid=7530 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 37.585889] audit: type=1800 audit(1551630512.912:29): pid=7530 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 37.605761] audit: type=1800 audit(1551630512.912:30): pid=7530 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.252' (ECDSA) to the list of known hosts. 2019/03/03 16:28:48 parsed 1 programs 2019/03/03 16:28:50 executed programs: 0 syzkaller login: [ 55.443901] IPVS: ftp: loaded support on port[0] = 21 [ 55.505883] chnl_net:caif_netlink_parms(): no params data found [ 55.537844] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.545120] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.553616] device bridge_slave_0 entered promiscuous mode [ 55.561320] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.568063] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.575703] device bridge_slave_1 entered promiscuous mode [ 55.590446] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 55.599456] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 55.618442] team0: Port device team_slave_0 added [ 55.625456] team0: Port device team_slave_1 added [ 55.711112] device hsr_slave_0 entered promiscuous mode [ 55.759771] device hsr_slave_1 entered promiscuous mode [ 55.826140] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.832783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.840036] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.846970] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.884968] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.897963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.918155] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.928039] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.936580] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 55.951077] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.961306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.969691] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.976938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.991511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.999713] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.006746] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.021221] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 56.034982] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 56.045401] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 56.056570] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 56.064013] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 56.072683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.081076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.100476] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.107187] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 56.302441] ================================================================== [ 56.312309] BUG: KASAN: use-after-free in __list_add_valid+0x9a/0xa0 [ 56.319074] Read of size 8 at addr ffff888092c05460 by task syz-executor.0/7733 [ 56.326519] [ 56.328156] CPU: 1 PID: 7733 Comm: syz-executor.0 Not tainted 5.0.0-rc8+ #3 [ 56.335254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.345469] Call Trace: [ 56.348062] dump_stack+0x172/0x1f0 [ 56.351683] ? __list_add_valid+0x9a/0xa0 [ 56.356163] print_address_description.cold+0x7c/0x20d [ 56.361816] ? __list_add_valid+0x9a/0xa0 [ 56.365956] ? __list_add_valid+0x9a/0xa0 [ 56.370223] kasan_report.cold+0x1b/0x40 [ 56.374304] ? __list_add_valid+0x9a/0xa0 [ 56.378451] __asan_report_load8_noabort+0x14/0x20 [ 56.383373] __list_add_valid+0x9a/0xa0 [ 56.387344] rdma_listen+0x63b/0x8e0 [ 56.391053] ucma_listen+0x14d/0x1c0 [ 56.394757] ? ucma_notify+0x190/0x190 [ 56.398639] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 56.404164] ? _copy_from_user+0xdd/0x150 [ 56.408323] ucma_write+0x2da/0x3c0 [ 56.411938] ? ucma_notify+0x190/0x190 [ 56.415813] ? ucma_open+0x290/0x290 [ 56.419519] ? __fget+0x340/0x540 [ 56.422969] __vfs_write+0x116/0x8e0 [ 56.426679] ? lock_downgrade+0x810/0x810 [ 56.430816] ? ucma_open+0x290/0x290 [ 56.434519] ? kernel_read+0x120/0x120 [ 56.438396] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 56.443338] ? common_file_perm+0x1d6/0x6f0 [ 56.447653] ? apparmor_file_permission+0x25/0x30 [ 56.452616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 56.458277] ? security_file_permission+0x94/0x320 [ 56.463220] ? rw_verify_area+0x118/0x360 [ 56.467463] vfs_write+0x20c/0x580 [ 56.471005] ksys_write+0xea/0x1f0 [ 56.474537] ? __ia32_sys_read+0xb0/0xb0 [ 56.478595] ? do_syscall_64+0x26/0x610 [ 56.482851] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 56.488203] ? do_syscall_64+0x26/0x610 [ 56.492177] __x64_sys_write+0x73/0xb0 [ 56.496209] do_syscall_64+0x103/0x610 [ 56.500190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 56.505376] RIP: 0033:0x457e29 [ 56.508564] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 56.527698] RSP: 002b:00007fb3bb431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 56.535774] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 56.543036] RDX: 00000000ffffff3a RSI: 00000000200001c0 RDI: 0000000000000003 [ 56.550311] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 56.557572] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3bb4326d4 [ 56.564956] R13: 00000000004c70d9 R14: 00000000004dcb90 R15: 00000000ffffffff [ 56.572226] [ 56.573848] Allocated by task 7730: [ 56.577493] save_stack+0x45/0xd0 [ 56.580951] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 56.586051] kasan_kmalloc+0x9/0x10 [ 56.589804] kmem_cache_alloc_trace+0x151/0x760 [ 56.594470] __rdma_create_id+0x5f/0x4e0 [ 56.598527] ucma_create_id+0x1de/0x640 [ 56.602493] ucma_write+0x2da/0x3c0 [ 56.606117] __vfs_write+0x116/0x8e0 [ 56.609916] vfs_write+0x20c/0x580 [ 56.613565] ksys_write+0xea/0x1f0 [ 56.617194] __x64_sys_write+0x73/0xb0 [ 56.621081] do_syscall_64+0x103/0x610 [ 56.624967] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 56.630252] [ 56.631870] Freed by task 7726: [ 56.635138] save_stack+0x45/0xd0 [ 56.638578] __kasan_slab_free+0x102/0x150 [ 56.643106] kasan_slab_free+0xe/0x10 [ 56.647113] kfree+0xcf/0x230 [ 56.650214] rdma_destroy_id+0x723/0xab0 [ 56.654266] ucma_close+0x115/0x320 [ 56.657902] __fput+0x2df/0x8d0 [ 56.661168] ____fput+0x16/0x20 [ 56.664438] task_work_run+0x14a/0x1c0 [ 56.668326] exit_to_usermode_loop+0x273/0x2c0 [ 56.672899] do_syscall_64+0x52d/0x610 [ 56.676901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 56.682079] [ 56.683702] The buggy address belongs to the object at ffff888092c05280 [ 56.683702] which belongs to the cache kmalloc-2k of size 2048 [ 56.696536] The buggy address is located 480 bytes inside of [ 56.696536] 2048-byte region [ffff888092c05280, ffff888092c05a80) [ 56.708485] The buggy address belongs to the page: [ 56.713521] page:ffffea00024b0100 count:1 mapcount:0 mapping:ffff88812c3f0c40 index:0x0 compound_mapcount: 0 [ 56.723481] flags: 0x1fffc0000010200(slab|head) [ 56.728147] raw: 01fffc0000010200 ffffea00024c6f08 ffffea00024c0608 ffff88812c3f0c40 [ 56.736018] raw: 0000000000000000 ffff888092c04180 0000000100000003 0000000000000000 [ 56.744227] page dumped because: kasan: bad access detected [ 56.749916] [ 56.751525] Memory state around the buggy address: [ 56.756655] ffff888092c05300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.764169] ffff888092c05380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.771535] >ffff888092c05400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.778887] ^ [ 56.785488] ffff888092c05480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.792844] ffff888092c05500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.800186] ================================================================== [ 56.807531] Disabling lock debugging due to kernel taint [ 56.815929] Kernel panic - not syncing: panic_on_warn set ... [ 56.822203] CPU: 0 PID: 7733 Comm: syz-executor.0 Tainted: G B 5.0.0-rc8+ #3 [ 56.831661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.841999] Call Trace: [ 56.844587] dump_stack+0x172/0x1f0 [ 56.848214] panic+0x2cb/0x65c [ 56.851537] ? __warn_printk+0xf3/0xf3 [ 56.855422] ? __list_add_valid+0x9a/0xa0 [ 56.860389] ? preempt_schedule+0x4b/0x60 [ 56.864546] ? ___preempt_schedule+0x16/0x18 [ 56.870156] ? trace_hardirqs_on+0x5e/0x230 [ 56.875275] ? __list_add_valid+0x9a/0xa0 [ 56.880403] end_report+0x47/0x4f [ 56.884460] ? __list_add_valid+0x9a/0xa0 [ 56.888759] kasan_report.cold+0xe/0x40 [ 56.893673] ? __list_add_valid+0x9a/0xa0 [ 56.898927] __asan_report_load8_noabort+0x14/0x20 [ 56.904052] __list_add_valid+0x9a/0xa0 [ 56.908160] rdma_listen+0x63b/0x8e0 [ 56.911870] ucma_listen+0x14d/0x1c0 [ 56.915579] ? ucma_notify+0x190/0x190 [ 56.920141] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 56.925826] ? _copy_from_user+0xdd/0x150 [ 56.929971] ucma_write+0x2da/0x3c0 [ 56.933597] ? ucma_notify+0x190/0x190 [ 56.937841] ? ucma_open+0x290/0x290 [ 56.941671] ? __fget+0x340/0x540 [ 56.945126] __vfs_write+0x116/0x8e0 [ 56.948837] ? lock_downgrade+0x810/0x810 [ 56.952985] ? ucma_open+0x290/0x290 [ 56.956699] ? kernel_read+0x120/0x120 [ 56.960720] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 56.967110] ? common_file_perm+0x1d6/0x6f0 [ 56.971901] ? apparmor_file_permission+0x25/0x30 [ 56.976741] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 56.982276] ? security_file_permission+0x94/0x320 [ 56.987353] ? rw_verify_area+0x118/0x360 [ 56.991513] vfs_write+0x20c/0x580 [ 56.995185] ksys_write+0xea/0x1f0 [ 56.998876] ? __ia32_sys_read+0xb0/0xb0 [ 57.005662] ? do_syscall_64+0x26/0x610 [ 57.009716] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 57.015096] ? do_syscall_64+0x26/0x610 [ 57.019071] __x64_sys_write+0x73/0xb0 [ 57.022954] do_syscall_64+0x103/0x610 [ 57.026836] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 57.032365] RIP: 0033:0x457e29 [ 57.036339] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 57.056958] RSP: 002b:00007fb3bb431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 57.064990] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 57.072733] RDX: 00000000ffffff3a RSI: 00000000200001c0 RDI: 0000000000000003 [ 57.080108] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 57.087733] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3bb4326d4 [ 57.095003] R13: 00000000004c70d9 R14: 00000000004dcb90 R15: 00000000ffffffff [ 57.104069] Kernel Offset: disabled [ 57.107818] Rebooting in 86400 seconds..