[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 29.743587] kauditd_printk_skb: 7 callbacks suppressed [ 29.743601] audit: type=1800 audit(1543145024.959:29): pid=5936 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 29.769657] audit: type=1800 audit(1543145024.969:30): pid=5936 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.28' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 37.396096] ================================================================== [ 37.403553] BUG: KASAN: slab-out-of-bounds in queue_stack_map_push_elem+0x185/0x290 [ 37.411335] Write of size 262146 at addr ffff8881b9e176c8 by task syz-executor661/6090 [ 37.419367] [ 37.421000] CPU: 1 PID: 6090 Comm: syz-executor661 Not tainted 4.20.0-rc3+ #127 [ 37.428427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.437764] Call Trace: [ 37.440359] dump_stack+0x244/0x39d [ 37.443987] ? dump_stack_print_info.cold.1+0x20/0x20 [ 37.449166] ? printk+0xa7/0xcf [ 37.452429] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 37.457205] print_address_description.cold.7+0x9/0x1ff [ 37.462569] kasan_report.cold.8+0x242/0x309 [ 37.466963] ? queue_stack_map_push_elem+0x185/0x290 [ 37.472060] check_memory_region+0x13e/0x1b0 [ 37.476457] memcpy+0x37/0x50 [ 37.479549] queue_stack_map_push_elem+0x185/0x290 [ 37.484462] ? queue_map_pop_elem+0x30/0x30 [ 37.488785] map_update_elem+0x605/0xf60 [ 37.492834] __x64_sys_bpf+0x32d/0x520 [ 37.496707] ? bpf_prog_get+0x20/0x20 [ 37.500511] do_syscall_64+0x1b9/0x820 [ 37.504385] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 37.509734] ? syscall_return_slowpath+0x5e0/0x5e0 [ 37.514652] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 37.519503] ? trace_hardirqs_on_caller+0x310/0x310 [ 37.524503] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 37.529506] ? prepare_exit_to_usermode+0x291/0x3b0 [ 37.534505] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 37.539342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.544515] RIP: 0033:0x4400e9 [ 37.547689] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 37.566568] RSP: 002b:00007ffdfc8a1e48 EFLAGS: 00000213 ORIG_RAX: 0000000000000141 [ 37.574253] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 00000000004400e9 [ 37.581521] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000002 [ 37.588811] RBP: 00000000006ca018 R08: 0000000000000000 R09: 00000000004002c8 [ 37.596075] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000401970 [ 37.603325] R13: 0000000000401a00 R14: 0000000000000000 R15: 0000000000000000 [ 37.610605] [ 37.612234] Allocated by task 6090: [ 37.615846] save_stack+0x43/0xd0 [ 37.619285] kasan_kmalloc+0xc7/0xe0 [ 37.622981] __kmalloc_node+0x50/0x70 [ 37.626764] bpf_map_area_alloc+0x3f/0x90 [ 37.630898] queue_stack_map_alloc+0x192/0x290 [ 37.635464] map_create+0x3bd/0x1110 [ 37.639179] __x64_sys_bpf+0x303/0x520 [ 37.643049] do_syscall_64+0x1b9/0x820 [ 37.646920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.652084] [ 37.653694] Freed by task 4293: [ 37.656971] save_stack+0x43/0xd0 [ 37.660438] __kasan_slab_free+0x102/0x150 [ 37.664660] kasan_slab_free+0xe/0x10 [ 37.668444] kfree+0xcf/0x230 [ 37.671532] load_elf_binary+0x25a8/0x5620 [ 37.675759] search_binary_handler+0x17d/0x570 [ 37.680326] __do_execve_file.isra.33+0x1661/0x25d0 [ 37.685348] __x64_sys_execve+0x8f/0xc0 [ 37.689322] do_syscall_64+0x1b9/0x820 [ 37.693186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.698346] [ 37.699953] The buggy address belongs to the object at ffff8881b9e17580 [ 37.699953] which belongs to the cache kmalloc-512 of size 512 [ 37.712597] The buggy address is located 328 bytes inside of [ 37.712597] 512-byte region [ffff8881b9e17580, ffff8881b9e17780) [ 37.724448] The buggy address belongs to the page: [ 37.729715] page:ffffea0006e785c0 count:1 mapcount:0 mapping:ffff8881da800940 index:0x0 [ 37.737837] flags: 0x2fffc0000000200(slab) [ 37.742054] raw: 02fffc0000000200 ffffea0006e868c8 ffffea0006e87fc8 ffff8881da800940 [ 37.749913] raw: 0000000000000000 ffff8881b9e17080 0000000100000006 0000000000000000 [ 37.757777] page dumped because: kasan: bad access detected [ 37.763462] [ 37.765075] Memory state around the buggy address: [ 37.769979] ffff8881b9e17600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.777316] ffff8881b9e17680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.784662] >ffff8881b9e17700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.792008] ^ [ 37.795348] ffff8881b9e17780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.802697] ffff8881b9e17800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.810031] ================================================================== [ 37.817376] Disabling lock debugging due to kernel taint [ 37.822799] Kernel panic - not syncing: panic_on_warn set ... [ 37.828695] CPU: 1 PID: 6090 Comm: syz-executor661 Tainted: G B 4.20.0-rc3+ #127 [ 37.837523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.846874] Call Trace: [ 37.849461] dump_stack+0x244/0x39d [ 37.853067] ? dump_stack_print_info.cold.1+0x20/0x20 [ 37.858259] panic+0x2ad/0x55c [ 37.861434] ? add_taint.cold.5+0x16/0x16 [ 37.865564] ? add_taint.cold.5+0x5/0x16 [ 37.869610] ? trace_hardirqs_off+0xaf/0x310 [ 37.874002] kasan_end_report+0x47/0x4f [ 37.877974] kasan_report.cold.8+0x76/0x309 [ 37.882281] ? queue_stack_map_push_elem+0x185/0x290 [ 37.887383] check_memory_region+0x13e/0x1b0 [ 37.891787] memcpy+0x37/0x50 [ 37.894893] queue_stack_map_push_elem+0x185/0x290 [ 37.899804] ? queue_map_pop_elem+0x30/0x30 [ 37.904107] map_update_elem+0x605/0xf60 [ 37.908159] __x64_sys_bpf+0x32d/0x520 [ 37.912031] ? bpf_prog_get+0x20/0x20 [ 37.915821] do_syscall_64+0x1b9/0x820 [ 37.919688] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 37.925033] ? syscall_return_slowpath+0x5e0/0x5e0 [ 37.929942] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 37.934779] ? trace_hardirqs_on_caller+0x310/0x310 [ 37.939780] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 37.944790] ? prepare_exit_to_usermode+0x291/0x3b0 [ 37.949793] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 37.954616] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.959798] RIP: 0033:0x4400e9 [ 37.962986] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 37.981883] RSP: 002b:00007ffdfc8a1e48 EFLAGS: 00000213 ORIG_RAX: 0000000000000141 [ 37.989589] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 00000000004400e9 [ 37.996837] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000002 [ 38.004086] RBP: 00000000006ca018 R08: 0000000000000000 R09: 00000000004002c8 [ 38.011334] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000401970 [ 38.018615] R13: 0000000000401a00 R14: 0000000000000000 R15: 0000000000000000 [ 38.026824] Kernel Offset: disabled [ 38.030447] Rebooting in 86400 seconds..