[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.227' (ECDSA) to the list of known hosts. 2020/04/02 01:13:46 parsed 1 programs 2020/04/02 01:13:48 executed programs: 0 syzkaller login: [ 60.538781][ T7037] IPVS: ftp: loaded support on port[0] = 21 [ 60.634492][ T7037] chnl_net:caif_netlink_parms(): no params data found [ 60.681343][ T7037] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.690351][ T7037] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.699581][ T7037] device bridge_slave_0 entered promiscuous mode [ 60.708129][ T7037] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.716390][ T7037] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.724387][ T7037] device bridge_slave_1 entered promiscuous mode [ 60.743892][ T7037] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.755205][ T7037] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.776902][ T7037] team0: Port device team_slave_0 added [ 60.784413][ T7037] team0: Port device team_slave_1 added [ 60.801303][ T7037] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 60.808338][ T7037] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.834318][ T7037] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 60.847114][ T7037] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 60.854190][ T7037] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.880290][ T7037] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 60.945818][ T7037] device hsr_slave_0 entered promiscuous mode [ 60.982865][ T7037] device hsr_slave_1 entered promiscuous mode [ 61.105544][ T7037] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 61.156034][ T7037] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 61.214818][ T7037] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 61.295282][ T7037] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 61.387633][ T7037] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.394924][ T7037] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.402573][ T7037] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.409631][ T7037] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.454832][ T7037] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.468300][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.479347][ T2852] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.487789][ T2852] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.496709][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 61.509861][ T7037] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.521194][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.530058][ T2793] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.537177][ T2793] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.548469][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.557755][ T2852] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.565016][ T2852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.584169][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.593031][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.605460][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.621153][ T7037] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 61.633471][ T7037] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 61.645824][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.655246][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.664052][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.672279][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.680895][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 61.702798][ T7037] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.709807][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 61.718745][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 61.743213][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 61.751903][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 61.769338][ T7037] device veth0_vlan entered promiscuous mode [ 61.775831][ T2702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 61.785212][ T2702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 61.798651][ T7037] device veth1_vlan entered promiscuous mode [ 61.806279][ T2702] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 61.814550][ T2702] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 61.822231][ T2702] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 61.844372][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 61.853534][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 61.861900][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 61.873606][ T7037] device veth0_macvtap entered promiscuous mode [ 61.884362][ T7037] device veth1_macvtap entered promiscuous mode [ 61.900808][ T7037] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 61.912238][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 61.922722][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 61.930574][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 61.939864][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 61.951630][ T7037] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 61.960478][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 61.969033][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 62.314902][ T7269] ================================================================== [ 62.323119][ T7269] BUG: KASAN: use-after-free in __list_add_valid+0x93/0xa0 [ 62.330318][ T7269] Read of size 8 at addr ffff8880a88081e0 by task syz-executor.0/7269 [ 62.338458][ T7269] [ 62.340805][ T7269] CPU: 0 PID: 7269 Comm: syz-executor.0 Not tainted 5.6.0-syzkaller #0 [ 62.349039][ T7269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.359096][ T7269] Call Trace: [ 62.362396][ T7269] dump_stack+0x188/0x20d [ 62.366737][ T7269] ? __list_add_valid+0x93/0xa0 [ 62.371603][ T7269] ? __list_add_valid+0x93/0xa0 [ 62.376468][ T7269] print_address_description.constprop.0.cold+0xd3/0x315 [ 62.383486][ T7269] ? __list_add_valid+0x93/0xa0 [ 62.388366][ T7269] ? __list_add_valid+0x93/0xa0 [ 62.393205][ T7269] __kasan_report.cold+0x1a/0x32 [ 62.398134][ T7269] ? __list_add_valid+0x93/0xa0 [ 62.402971][ T7269] kasan_report+0xe/0x20 [ 62.407195][ T7269] __list_add_valid+0x93/0xa0 [ 62.411867][ T7269] rdma_listen+0x681/0x910 [ 62.416313][ T7269] ucma_listen+0x14d/0x1c0 [ 62.420718][ T7269] ? ucma_notify+0x190/0x190 [ 62.425296][ T7269] ? __might_fault+0x190/0x1d0 [ 62.430046][ T7269] ? _copy_from_user+0x13c/0x1a0 [ 62.434969][ T7269] ? ucma_notify+0x190/0x190 [ 62.439578][ T7269] ucma_write+0x285/0x350 [ 62.443896][ T7269] ? ucma_open+0x270/0x270 [ 62.448315][ T7269] ? security_file_permission+0x8a/0x380 [ 62.453962][ T7269] ? ucma_open+0x270/0x270 [ 62.458361][ T7269] __vfs_write+0x76/0x100 [ 62.462677][ T7269] vfs_write+0x268/0x5d0 [ 62.466913][ T7269] ksys_write+0x1ee/0x250 [ 62.471274][ T7269] ? __ia32_sys_read+0xb0/0xb0 [ 62.476025][ T7269] ? __x64_sys_clock_gettime32+0x240/0x240 [ 62.481819][ T7269] ? trace_hardirqs_off_caller+0x55/0x230 [ 62.487532][ T7269] do_fast_syscall_32+0x270/0xe90 [ 62.492549][ T7269] entry_SYSENTER_compat+0x70/0x7f [ 62.497653][ T7269] [ 62.500009][ T7269] Allocated by task 7264: [ 62.504327][ T7269] save_stack+0x1b/0x80 [ 62.508459][ T7269] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 62.514069][ T7269] kmem_cache_alloc_trace+0x153/0x7d0 [ 62.519419][ T7269] __rdma_create_id+0x5b/0x850 [ 62.524164][ T7269] ucma_create_id+0x1d1/0x590 [ 62.528819][ T7269] ucma_write+0x285/0x350 [ 62.533156][ T7269] __vfs_write+0x76/0x100 [ 62.537464][ T7269] vfs_write+0x268/0x5d0 [ 62.541686][ T7269] ksys_write+0x1ee/0x250 [ 62.545995][ T7269] do_fast_syscall_32+0x270/0xe90 [ 62.551008][ T7269] entry_SYSENTER_compat+0x70/0x7f [ 62.556092][ T7269] [ 62.558426][ T7269] Freed by task 7263: [ 62.562394][ T7269] save_stack+0x1b/0x80 [ 62.566530][ T7269] __kasan_slab_free+0xf7/0x140 [ 62.571356][ T7269] kfree+0x109/0x2b0 [ 62.575315][ T7269] ucma_close+0x111/0x300 [ 62.579722][ T7269] __fput+0x2e9/0x860 [ 62.583703][ T7269] task_work_run+0xf4/0x1b0 [ 62.588196][ T7269] exit_to_usermode_loop+0x2fa/0x360 [ 62.593473][ T7269] do_fast_syscall_32+0xbef/0xe90 [ 62.598501][ T7269] entry_SYSENTER_compat+0x70/0x7f [ 62.603594][ T7269] [ 62.605924][ T7269] The buggy address belongs to the object at ffff8880a8808000 [ 62.605924][ T7269] which belongs to the cache kmalloc-2k of size 2048 [ 62.619957][ T7269] The buggy address is located 480 bytes inside of [ 62.619957][ T7269] 2048-byte region [ffff8880a8808000, ffff8880a8808800) [ 62.633321][ T7269] The buggy address belongs to the page: [ 62.638970][ T7269] page:ffffea0002a20200 refcount:1 mapcount:0 mapping:ffff8880aa000e00 index:0x0 [ 62.648057][ T7269] flags: 0xfffe0000000200(slab) [ 62.652907][ T7269] raw: 00fffe0000000200 ffffea0002598508 ffffea0002a00b48 ffff8880aa000e00 [ 62.661484][ T7269] raw: 0000000000000000 ffff8880a8808000 0000000100000001 0000000000000000 [ 62.670046][ T7269] page dumped because: kasan: bad access detected [ 62.676437][ T7269] [ 62.678748][ T7269] Memory state around the buggy address: [ 62.684416][ T7269] ffff8880a8808080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.692467][ T7269] ffff8880a8808100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.700506][ T7269] >ffff8880a8808180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.708556][ T7269] ^ [ 62.715822][ T7269] ffff8880a8808200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.723862][ T7269] ffff8880a8808280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.731932][ T7269] ================================================================== [ 62.739967][ T7269] Disabling lock debugging due to kernel taint [ 62.763720][ T7269] Kernel panic - not syncing: panic_on_warn set ... [ 62.770329][ T7269] CPU: 0 PID: 7269 Comm: syz-executor.0 Tainted: G B 5.6.0-syzkaller #0 [ 62.779941][ T7269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.789992][ T7269] Call Trace: [ 62.793264][ T7269] dump_stack+0x188/0x20d [ 62.797575][ T7269] panic+0x2e3/0x75c [ 62.801448][ T7269] ? add_taint.cold+0x16/0x16 [ 62.806109][ T7269] ? preempt_schedule_common+0x5e/0xc0 [ 62.811547][ T7269] ? __list_add_valid+0x93/0xa0 [ 62.816376][ T7269] ? preempt_schedule_thunk+0x16/0x18 [ 62.821724][ T7269] ? trace_hardirqs_on+0x55/0x220 [ 62.826728][ T7269] ? __list_add_valid+0x93/0xa0 [ 62.831556][ T7269] end_report+0x43/0x49 [ 62.835702][ T7269] ? __list_add_valid+0x93/0xa0 [ 62.840549][ T7269] __kasan_report.cold+0xd/0x32 [ 62.845380][ T7269] ? __list_add_valid+0x93/0xa0 [ 62.850207][ T7269] kasan_report+0xe/0x20 [ 62.854435][ T7269] __list_add_valid+0x93/0xa0 [ 62.859198][ T7269] rdma_listen+0x681/0x910 [ 62.863595][ T7269] ucma_listen+0x14d/0x1c0 [ 62.867989][ T7269] ? ucma_notify+0x190/0x190 [ 62.872556][ T7269] ? __might_fault+0x190/0x1d0 [ 62.877295][ T7269] ? _copy_from_user+0x13c/0x1a0 [ 62.882209][ T7269] ? ucma_notify+0x190/0x190 [ 62.886794][ T7269] ucma_write+0x285/0x350 [ 62.891104][ T7269] ? ucma_open+0x270/0x270 [ 62.895507][ T7269] ? security_file_permission+0x8a/0x380 [ 62.901122][ T7269] ? ucma_open+0x270/0x270 [ 62.905525][ T7269] __vfs_write+0x76/0x100 [ 62.910031][ T7269] vfs_write+0x268/0x5d0 [ 62.914263][ T7269] ksys_write+0x1ee/0x250 [ 62.918624][ T7269] ? __ia32_sys_read+0xb0/0xb0 [ 62.923373][ T7269] ? __x64_sys_clock_gettime32+0x240/0x240 [ 62.929158][ T7269] ? trace_hardirqs_off_caller+0x55/0x230 [ 62.934858][ T7269] do_fast_syscall_32+0x270/0xe90 [ 62.939888][ T7269] entry_SYSENTER_compat+0x70/0x7f [ 62.946125][ T7269] Kernel Offset: disabled [ 62.950445][ T7269] Rebooting in 86400 seconds..