[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.137' (ECDSA) to the list of known hosts. 2020/04/01 22:51:18 parsed 1 programs 2020/04/01 22:51:20 executed programs: 0 syzkaller login: [ 57.935696][ T7055] IPVS: ftp: loaded support on port[0] = 21 [ 58.038436][ T7055] chnl_net:caif_netlink_parms(): no params data found [ 58.090738][ T7055] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.098131][ T7055] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.105855][ T7055] device bridge_slave_0 entered promiscuous mode [ 58.116670][ T7055] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.124682][ T7055] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.133019][ T7055] device bridge_slave_1 entered promiscuous mode [ 58.152682][ T7055] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.163681][ T7055] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.186211][ T7055] team0: Port device team_slave_0 added [ 58.193762][ T7055] team0: Port device team_slave_1 added [ 58.211640][ T7055] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 58.219308][ T7055] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 58.246213][ T7055] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 58.259619][ T7055] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 58.266555][ T7055] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 58.293249][ T7055] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 58.372568][ T7055] device hsr_slave_0 entered promiscuous mode [ 58.418293][ T7055] device hsr_slave_1 entered promiscuous mode [ 58.602285][ T7055] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 58.650636][ T7055] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 58.700917][ T7055] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 58.740255][ T7055] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 58.794897][ T7055] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.802083][ T7055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.809930][ T7055] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.816995][ T7055] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.863007][ T7055] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.875550][ T4068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.885759][ T4068] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.894545][ T4068] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.904327][ T4068] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 58.917504][ T7055] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.929014][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.937332][ T2761] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.944493][ T2761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.969384][ T4068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.979039][ T4068] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.986103][ T4068] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.994656][ T4068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.003775][ T4068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.014734][ T4068] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 59.029702][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 59.039171][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.047655][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 59.057089][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.068777][ T7055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 59.086641][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 59.094473][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 59.106790][ T7055] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 59.131153][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 59.140641][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 59.160341][ T2771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 59.169326][ T2771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.182406][ T7055] device veth0_vlan entered promiscuous mode [ 59.189240][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.196901][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.210639][ T7055] device veth1_vlan entered promiscuous mode [ 59.231483][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 59.239672][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 59.247556][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 59.256435][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 59.268825][ T7055] device veth0_macvtap entered promiscuous mode [ 59.281418][ T7055] device veth1_macvtap entered promiscuous mode [ 59.299096][ T7055] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 59.306530][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 59.316032][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 59.324752][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 59.333782][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 59.346144][ T7055] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 59.354756][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 59.364523][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 60.430308][ T7392] ================================================================== [ 60.438474][ T7392] BUG: KASAN: use-after-free in __list_add_valid+0x93/0xa0 [ 60.445693][ T7392] Read of size 8 at addr ffff88809ae791e0 by task syz-executor.0/7392 [ 60.453821][ T7392] [ 60.456131][ T7392] CPU: 1 PID: 7392 Comm: syz-executor.0 Not tainted 5.6.0-syzkaller #0 [ 60.464341][ T7392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.474374][ T7392] Call Trace: [ 60.477661][ T7392] dump_stack+0x188/0x20d [ 60.481972][ T7392] ? __list_add_valid+0x93/0xa0 [ 60.486804][ T7392] ? __list_add_valid+0x93/0xa0 [ 60.491725][ T7392] print_address_description.constprop.0.cold+0xd3/0x315 [ 60.498733][ T7392] ? __list_add_valid+0x93/0xa0 [ 60.503571][ T7392] ? __list_add_valid+0x93/0xa0 [ 60.508402][ T7392] __kasan_report.cold+0x1a/0x32 [ 60.513334][ T7392] ? __list_add_valid+0x93/0xa0 [ 60.518174][ T7392] kasan_report+0xe/0x20 [ 60.522400][ T7392] __list_add_valid+0x93/0xa0 [ 60.527062][ T7392] rdma_listen+0x681/0x910 [ 60.531464][ T7392] ucma_listen+0x14d/0x1c0 [ 60.535865][ T7392] ? ucma_notify+0x190/0x190 [ 60.540443][ T7392] ? __might_fault+0x190/0x1d0 [ 60.545193][ T7392] ? _copy_from_user+0x13c/0x1a0 [ 60.550122][ T7392] ? ucma_notify+0x190/0x190 [ 60.554705][ T7392] ucma_write+0x285/0x350 [ 60.559039][ T7392] ? ucma_open+0x270/0x270 [ 60.563455][ T7392] ? security_file_permission+0x8a/0x380 [ 60.569075][ T7392] ? ucma_open+0x270/0x270 [ 60.573471][ T7392] __vfs_write+0x76/0x100 [ 60.577785][ T7392] vfs_write+0x268/0x5d0 [ 60.582044][ T7392] ksys_write+0x1ee/0x250 [ 60.586357][ T7392] ? __ia32_sys_read+0xb0/0xb0 [ 60.591105][ T7392] ? __ia32_sys_clock_settime+0x260/0x260 [ 60.596804][ T7392] ? trace_hardirqs_off_caller+0x55/0x230 [ 60.602510][ T7392] do_syscall_64+0xf6/0x7d0 [ 60.607013][ T7392] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 60.612891][ T7392] RIP: 0033:0x45c849 [ 60.616764][ T7392] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 60.636351][ T7392] RSP: 002b:00007f852813ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 60.644748][ T7392] RAX: ffffffffffffffda RBX: 00007f852813f6d4 RCX: 000000000045c849 [ 60.652700][ T7392] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 60.660654][ T7392] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 60.668606][ T7392] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 60.676559][ T7392] R13: 0000000000000cc0 R14: 00000000004cee4e R15: 000000000076bf0c [ 60.684618][ T7392] [ 60.686929][ T7392] Allocated by task 7385: [ 60.691247][ T7392] save_stack+0x1b/0x80 [ 60.695397][ T7392] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 60.701011][ T7392] kmem_cache_alloc_trace+0x153/0x7d0 [ 60.706897][ T7392] __rdma_create_id+0x5b/0x850 [ 60.711654][ T7392] ucma_create_id+0x1d1/0x590 [ 60.716480][ T7392] ucma_write+0x285/0x350 [ 60.720809][ T7392] __vfs_write+0x76/0x100 [ 60.725129][ T7392] vfs_write+0x268/0x5d0 [ 60.729353][ T7392] ksys_write+0x1ee/0x250 [ 60.733673][ T7392] do_syscall_64+0xf6/0x7d0 [ 60.738160][ T7392] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 60.744025][ T7392] [ 60.746367][ T7392] Freed by task 7384: [ 60.750334][ T7392] save_stack+0x1b/0x80 [ 60.754485][ T7392] __kasan_slab_free+0xf7/0x140 [ 60.759317][ T7392] kfree+0x109/0x2b0 [ 60.763218][ T7392] ucma_close+0x111/0x300 [ 60.767538][ T7392] __fput+0x2e9/0x860 [ 60.771502][ T7392] task_work_run+0xf4/0x1b0 [ 60.775984][ T7392] exit_to_usermode_loop+0x2fa/0x360 [ 60.781252][ T7392] do_syscall_64+0x6b1/0x7d0 [ 60.785835][ T7392] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 60.791698][ T7392] [ 60.794016][ T7392] The buggy address belongs to the object at ffff88809ae79000 [ 60.794016][ T7392] which belongs to the cache kmalloc-2k of size 2048 [ 60.808051][ T7392] The buggy address is located 480 bytes inside of [ 60.808051][ T7392] 2048-byte region [ffff88809ae79000, ffff88809ae79800) [ 60.821389][ T7392] The buggy address belongs to the page: [ 60.827017][ T7392] page:ffffea00026b9e40 refcount:1 mapcount:0 mapping:ffff8880aa000e00 index:0x0 [ 60.836100][ T7392] flags: 0xfffe0000000200(slab) [ 60.840938][ T7392] raw: 00fffe0000000200 ffffea00029c2148 ffffea000247df88 ffff8880aa000e00 [ 60.849590][ T7392] raw: 0000000000000000 ffff88809ae79000 0000000100000001 0000000000000000 [ 60.858148][ T7392] page dumped because: kasan: bad access detected [ 60.864538][ T7392] [ 60.866842][ T7392] Memory state around the buggy address: [ 60.872451][ T7392] ffff88809ae79080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.880493][ T7392] ffff88809ae79100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.888534][ T7392] >ffff88809ae79180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.896597][ T7392] ^ [ 60.903792][ T7392] ffff88809ae79200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.911837][ T7392] ffff88809ae79280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.919874][ T7392] ================================================================== [ 60.927911][ T7392] Disabling lock debugging due to kernel taint [ 60.942938][ T7392] Kernel panic - not syncing: panic_on_warn set ... [ 60.949540][ T7392] CPU: 1 PID: 7392 Comm: syz-executor.0 Tainted: G B 5.6.0-syzkaller #0 [ 60.959181][ T7392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.969227][ T7392] Call Trace: [ 60.972561][ T7392] dump_stack+0x188/0x20d [ 60.976869][ T7392] panic+0x2e3/0x75c [ 60.980742][ T7392] ? add_taint.cold+0x16/0x16 [ 60.985408][ T7392] ? preempt_schedule_common+0x5e/0xc0 [ 60.990861][ T7392] ? __list_add_valid+0x93/0xa0 [ 60.995693][ T7392] ? preempt_schedule_thunk+0x16/0x18 [ 61.001042][ T7392] ? trace_hardirqs_on+0x55/0x220 [ 61.006044][ T7392] ? __list_add_valid+0x93/0xa0 [ 61.010872][ T7392] end_report+0x43/0x49 [ 61.015005][ T7392] ? __list_add_valid+0x93/0xa0 [ 61.019829][ T7392] __kasan_report.cold+0xd/0x32 [ 61.024669][ T7392] ? __list_add_valid+0x93/0xa0 [ 61.029507][ T7392] kasan_report+0xe/0x20 [ 61.033730][ T7392] __list_add_valid+0x93/0xa0 [ 61.038385][ T7392] rdma_listen+0x681/0x910 [ 61.042799][ T7392] ucma_listen+0x14d/0x1c0 [ 61.047198][ T7392] ? ucma_notify+0x190/0x190 [ 61.051802][ T7392] ? __might_fault+0x190/0x1d0 [ 61.056542][ T7392] ? _copy_from_user+0x13c/0x1a0 [ 61.061494][ T7392] ? ucma_notify+0x190/0x190 [ 61.066155][ T7392] ucma_write+0x285/0x350 [ 61.070462][ T7392] ? ucma_open+0x270/0x270 [ 61.074858][ T7392] ? security_file_permission+0x8a/0x380 [ 61.080467][ T7392] ? ucma_open+0x270/0x270 [ 61.084962][ T7392] __vfs_write+0x76/0x100 [ 61.089304][ T7392] vfs_write+0x268/0x5d0 [ 61.093526][ T7392] ksys_write+0x1ee/0x250 [ 61.097832][ T7392] ? __ia32_sys_read+0xb0/0xb0 [ 61.102572][ T7392] ? __ia32_sys_clock_settime+0x260/0x260 [ 61.108270][ T7392] ? trace_hardirqs_off_caller+0x55/0x230 [ 61.113977][ T7392] do_syscall_64+0xf6/0x7d0 [ 61.118467][ T7392] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 61.124384][ T7392] RIP: 0033:0x45c849 [ 61.128253][ T7392] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 61.147841][ T7392] RSP: 002b:00007f852813ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 61.156243][ T7392] RAX: ffffffffffffffda RBX: 00007f852813f6d4 RCX: 000000000045c849 [ 61.164195][ T7392] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000004 [ 61.172146][ T7392] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 61.180098][ T7392] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 61.188217][ T7392] R13: 0000000000000cc0 R14: 00000000004cee4e R15: 000000000076bf0c [ 61.197496][ T7392] Kernel Offset: disabled [ 61.201816][ T7392] Rebooting in 86400 seconds..