Warning: Permanently added '10.128.0.200' (ECDSA) to the list of known hosts. 2020/03/31 00:02:45 parsed 1 programs 2020/03/31 00:02:47 executed programs: 0 syzkaller login: [ 59.875618][ T7061] IPVS: ftp: loaded support on port[0] = 21 [ 59.957314][ T7061] chnl_net:caif_netlink_parms(): no params data found [ 60.001924][ T7061] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.009544][ T7061] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.017889][ T7061] device bridge_slave_0 entered promiscuous mode [ 60.027018][ T7061] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.034123][ T7061] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.042121][ T7061] device bridge_slave_1 entered promiscuous mode [ 60.061345][ T7061] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.072655][ T7061] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.093372][ T7061] team0: Port device team_slave_0 added [ 60.100627][ T7061] team0: Port device team_slave_1 added [ 60.116808][ T7061] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 60.123750][ T7061] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.149787][ T7061] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 60.161899][ T7061] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 60.168934][ T7061] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.195357][ T7061] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 60.248941][ T7061] device hsr_slave_0 entered promiscuous mode [ 60.286202][ T7061] device hsr_slave_1 entered promiscuous mode [ 60.404993][ T7061] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 60.449127][ T7061] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 60.518549][ T7061] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 60.558337][ T7061] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 60.611035][ T7061] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.618231][ T7061] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.625989][ T7061] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.633169][ T7061] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.674565][ T7061] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.690328][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.702501][ T2788] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.711297][ T2788] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.720070][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 60.733271][ T7061] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.743863][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.752614][ T2773] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.759738][ T2773] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.771213][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.780081][ T2788] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.787239][ T2788] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.808212][ T2787] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.817308][ T2787] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.825960][ T2787] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 60.837661][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.849715][ T2787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.860966][ T7061] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.878975][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 60.886441][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 60.900710][ T7061] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.919025][ T2787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 60.939096][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 60.947732][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 60.955329][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 60.968273][ T7061] device veth0_vlan entered promiscuous mode [ 60.980230][ T7061] device veth1_vlan entered promiscuous mode [ 61.006135][ T2787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 61.014618][ T2787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 61.026625][ T7061] device veth0_macvtap entered promiscuous mode [ 61.036465][ T7061] device veth1_macvtap entered promiscuous mode [ 61.054106][ T7061] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 61.061605][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 61.070829][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 61.079160][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 61.088383][ T2773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 61.100377][ T7061] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 61.108979][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 61.117907][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 61.531271][ T7289] ================================================================== [ 61.539634][ T7289] BUG: KASAN: use-after-free in __list_add_valid+0x93/0xa0 [ 61.546838][ T7289] Read of size 8 at addr ffff8880a1eaf1e0 by task syz-executor.0/7289 [ 61.554980][ T7289] [ 61.557320][ T7289] CPU: 1 PID: 7289 Comm: syz-executor.0 Not tainted 5.6.0-syzkaller #0 [ 61.565556][ T7289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.575608][ T7289] Call Trace: [ 61.578898][ T7289] dump_stack+0x188/0x20d [ 61.583220][ T7289] ? __list_add_valid+0x93/0xa0 [ 61.588101][ T7289] ? __list_add_valid+0x93/0xa0 [ 61.592938][ T7289] print_address_description.constprop.0.cold+0xd3/0x315 [ 61.600896][ T7289] ? __list_add_valid+0x93/0xa0 [ 61.605727][ T7289] ? __list_add_valid+0x93/0xa0 [ 61.610557][ T7289] __kasan_report.cold+0x1a/0x32 [ 61.615484][ T7289] ? __list_add_valid+0x93/0xa0 [ 61.620368][ T7289] kasan_report+0xe/0x20 [ 61.624592][ T7289] __list_add_valid+0x93/0xa0 [ 61.629262][ T7289] rdma_listen+0x681/0x910 [ 61.633666][ T7289] ucma_listen+0x14d/0x1c0 [ 61.638065][ T7289] ? ucma_notify+0x190/0x190 [ 61.642637][ T7289] ? __might_fault+0x190/0x1d0 [ 61.647382][ T7289] ? _copy_from_user+0x123/0x190 [ 61.652300][ T7289] ? ucma_notify+0x190/0x190 [ 61.656869][ T7289] ucma_write+0x285/0x350 [ 61.661195][ T7289] ? ucma_open+0x270/0x270 [ 61.665611][ T7289] ? security_file_permission+0x8a/0x370 [ 61.671231][ T7289] ? ucma_open+0x270/0x270 [ 61.675635][ T7289] __vfs_write+0x76/0x100 [ 61.679950][ T7289] vfs_write+0x262/0x5c0 [ 61.684220][ T7289] ksys_write+0x1e8/0x250 [ 61.688549][ T7289] ? __ia32_sys_read+0xb0/0xb0 [ 61.693299][ T7289] ? __x64_sys_clock_gettime32+0x240/0x240 [ 61.699102][ T7289] ? trace_hardirqs_off_caller+0x55/0x230 [ 61.704826][ T7289] do_fast_syscall_32+0x270/0xe8f [ 61.709842][ T7289] entry_SYSENTER_compat+0x70/0x7f [ 61.714954][ T7289] [ 61.717268][ T7289] Allocated by task 7283: [ 61.721581][ T7289] save_stack+0x1b/0x80 [ 61.725728][ T7289] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 61.731338][ T7289] kmem_cache_alloc_trace+0x153/0x7d0 [ 61.736692][ T7289] __rdma_create_id+0x5b/0x850 [ 61.741436][ T7289] ucma_create_id+0x1cb/0x580 [ 61.746092][ T7289] ucma_write+0x285/0x350 [ 61.750401][ T7289] __vfs_write+0x76/0x100 [ 61.754709][ T7289] vfs_write+0x262/0x5c0 [ 61.758931][ T7289] ksys_write+0x1e8/0x250 [ 61.763242][ T7289] do_fast_syscall_32+0x270/0xe8f [ 61.768255][ T7289] entry_SYSENTER_compat+0x70/0x7f [ 61.773341][ T7289] [ 61.775647][ T7289] Freed by task 7282: [ 61.779619][ T7289] save_stack+0x1b/0x80 [ 61.783752][ T7289] __kasan_slab_free+0xf7/0x140 [ 61.788577][ T7289] kfree+0x109/0x2b0 [ 61.792450][ T7289] ucma_close+0x10b/0x300 [ 61.796773][ T7289] __fput+0x2da/0x850 [ 61.800735][ T7289] task_work_run+0x13f/0x1b0 [ 61.805323][ T7289] exit_to_usermode_loop+0x2fa/0x360 [ 61.810585][ T7289] do_fast_syscall_32+0xbef/0xe8f [ 61.815589][ T7289] entry_SYSENTER_compat+0x70/0x7f [ 61.820676][ T7289] [ 61.823014][ T7289] The buggy address belongs to the object at ffff8880a1eaf000 [ 61.823014][ T7289] which belongs to the cache kmalloc-2k of size 2048 [ 61.837066][ T7289] The buggy address is located 480 bytes inside of [ 61.837066][ T7289] 2048-byte region [ffff8880a1eaf000, ffff8880a1eaf800) [ 61.850401][ T7289] The buggy address belongs to the page: [ 61.856015][ T7289] page:ffffea000287abc0 refcount:1 mapcount:0 mapping:ffff8880aa000e00 index:0x0 [ 61.865103][ T7289] flags: 0xfffe0000000200(slab) [ 61.869943][ T7289] raw: 00fffe0000000200 ffffea0002877708 ffffea000287a8c8 ffff8880aa000e00 [ 61.878526][ T7289] raw: 0000000000000000 ffff8880a1eaf000 0000000100000001 0000000000000000 [ 61.887102][ T7289] page dumped because: kasan: bad access detected [ 61.893489][ T7289] [ 61.895796][ T7289] Memory state around the buggy address: [ 61.901431][ T7289] ffff8880a1eaf080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.909485][ T7289] ffff8880a1eaf100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.917544][ T7289] >ffff8880a1eaf180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.925596][ T7289] ^ [ 61.932770][ T7289] ffff8880a1eaf200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.940831][ T7289] ffff8880a1eaf280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.948873][ T7289] ================================================================== [ 61.956920][ T7289] Disabling lock debugging due to kernel taint [ 61.967979][ T7289] Kernel panic - not syncing: panic_on_warn set ... [ 61.974605][ T7289] CPU: 1 PID: 7289 Comm: syz-executor.0 Tainted: G B 5.6.0-syzkaller #0 [ 61.984223][ T7289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.994279][ T7289] Call Trace: [ 61.997595][ T7289] dump_stack+0x188/0x20d [ 62.001940][ T7289] panic+0x2e3/0x75c [ 62.005826][ T7289] ? add_taint.cold+0x16/0x16 [ 62.010498][ T7289] ? preempt_schedule_common+0x5e/0xc0 [ 62.015943][ T7289] ? __list_add_valid+0x93/0xa0 [ 62.020775][ T7289] ? ___preempt_schedule+0x16/0x18 [ 62.025868][ T7289] ? trace_hardirqs_on+0x55/0x220 [ 62.030876][ T7289] ? __list_add_valid+0x93/0xa0 [ 62.035712][ T7289] end_report+0x43/0x49 [ 62.039849][ T7289] ? __list_add_valid+0x93/0xa0 [ 62.044675][ T7289] __kasan_report.cold+0xd/0x32 [ 62.049518][ T7289] ? __list_add_valid+0x93/0xa0 [ 62.054348][ T7289] kasan_report+0xe/0x20 [ 62.058567][ T7289] __list_add_valid+0x93/0xa0 [ 62.063221][ T7289] rdma_listen+0x681/0x910 [ 62.067645][ T7289] ucma_listen+0x14d/0x1c0 [ 62.072058][ T7289] ? ucma_notify+0x190/0x190 [ 62.076639][ T7289] ? __might_fault+0x190/0x1d0 [ 62.081381][ T7289] ? _copy_from_user+0x123/0x190 [ 62.086311][ T7289] ? ucma_notify+0x190/0x190 [ 62.090880][ T7289] ucma_write+0x285/0x350 [ 62.095188][ T7289] ? ucma_open+0x270/0x270 [ 62.099590][ T7289] ? security_file_permission+0x8a/0x370 [ 62.105204][ T7289] ? ucma_open+0x270/0x270 [ 62.109599][ T7289] __vfs_write+0x76/0x100 [ 62.113911][ T7289] vfs_write+0x262/0x5c0 [ 62.118133][ T7289] ksys_write+0x1e8/0x250 [ 62.122450][ T7289] ? __ia32_sys_read+0xb0/0xb0 [ 62.127190][ T7289] ? __x64_sys_clock_gettime32+0x240/0x240 [ 62.132974][ T7289] ? trace_hardirqs_off_caller+0x55/0x230 [ 62.138677][ T7289] do_fast_syscall_32+0x270/0xe8f [ 62.143682][ T7289] entry_SYSENTER_compat+0x70/0x7f [ 62.149777][ T7289] Kernel Offset: disabled [ 62.154099][ T7289] Rebooting in 86400 seconds..