[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 86.241972][ T27] audit: type=1800 audit(1583283961.074:25): pid=9667 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 86.262439][ T27] audit: type=1800 audit(1583283961.074:26): pid=9667 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 86.285176][ T27] audit: type=1800 audit(1583283961.074:27): pid=9667 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.50' (ECDSA) to the list of known hosts. 2020/03/04 01:06:12 parsed 1 programs 2020/03/04 01:06:13 executed programs: 0 syzkaller login: [ 99.241965][ T9838] IPVS: ftp: loaded support on port[0] = 21 [ 99.305229][ T9838] chnl_net:caif_netlink_parms(): no params data found [ 99.357866][ T9838] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.366987][ T9838] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.375231][ T9838] device bridge_slave_0 entered promiscuous mode [ 99.384382][ T9838] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.392116][ T9838] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.400354][ T9838] device bridge_slave_1 entered promiscuous mode [ 99.418461][ T9838] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 99.431732][ T9838] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 99.452445][ T9838] team0: Port device team_slave_0 added [ 99.460424][ T9838] team0: Port device team_slave_1 added [ 99.476127][ T9838] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 99.484061][ T9838] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 99.511861][ T9838] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 99.525369][ T9838] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 99.533569][ T9838] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 99.561179][ T9838] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 99.629985][ T9838] device hsr_slave_0 entered promiscuous mode [ 99.688919][ T9838] device hsr_slave_1 entered promiscuous mode [ 99.796849][ T9838] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 99.861339][ T9838] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 99.920542][ T9838] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 99.961516][ T9838] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 100.033870][ T9838] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.041708][ T9838] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.051439][ T9838] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.058718][ T9838] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.104074][ T9838] 8021q: adding VLAN 0 to HW filter on device bond0 [ 100.118970][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.131057][ T3032] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.140118][ T3032] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.150178][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 100.163877][ T9838] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.175735][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.185369][ T2774] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.193019][ T2774] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.206365][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.215497][ T3032] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.222936][ T3032] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.251166][ T3026] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 100.261149][ T3026] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 100.272435][ T3026] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.286062][ T9838] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 100.300553][ T9838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 100.311709][ T3026] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 100.321472][ T3026] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.346957][ T9838] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 100.354578][ T3026] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 100.362928][ T3026] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 100.384332][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 100.393835][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 100.416470][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 100.426427][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.437519][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.446609][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.458102][ T9838] device veth0_vlan entered promiscuous mode [ 100.471710][ T9838] device veth1_vlan entered promiscuous mode [ 100.496987][ T3026] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 100.506717][ T3026] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 100.515694][ T3026] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 100.526474][ T3026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 100.541035][ T9838] device veth0_macvtap entered promiscuous mode [ 100.553444][ T9838] device veth1_macvtap entered promiscuous mode [ 100.574267][ T9838] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 100.584009][ T3026] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 100.593169][ T3026] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 100.605462][ T3026] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 100.615233][ T3026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 100.628350][ T9838] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 100.636261][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 100.647588][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 100.961549][ T9856] ================================================================== [ 100.970197][ T9856] BUG: KASAN: use-after-free in __list_add_valid+0x9a/0xa0 [ 100.977494][ T9856] Read of size 8 at addr ffff88808e1491e0 by task syz-executor.0/9856 [ 100.985681][ T9856] [ 100.988015][ T9856] CPU: 1 PID: 9856 Comm: syz-executor.0 Not tainted 5.6.0-rc3-syzkaller #0 [ 100.996597][ T9856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.006658][ T9856] Call Trace: [ 101.009969][ T9856] dump_stack+0x197/0x210 [ 101.014286][ T9856] ? __list_add_valid+0x9a/0xa0 [ 101.019147][ T9856] print_address_description.constprop.0.cold+0xd4/0x30b [ 101.026170][ T9856] ? __list_add_valid+0x9a/0xa0 [ 101.031064][ T9856] ? __list_add_valid+0x9a/0xa0 [ 101.035921][ T9856] __kasan_report.cold+0x1b/0x32 [ 101.040859][ T9856] ? __list_add_valid+0x9a/0xa0 [ 101.045876][ T9856] kasan_report+0x12/0x20 [ 101.050212][ T9856] __asan_report_load8_noabort+0x14/0x20 [ 101.055877][ T9856] __list_add_valid+0x9a/0xa0 [ 101.060589][ T9856] rdma_listen+0x6b7/0x970 [ 101.065057][ T9856] ? _raw_spin_unlock+0x28/0x40 [ 101.069915][ T9856] ucma_listen+0x14d/0x1c0 [ 101.074330][ T9856] ? ucma_notify+0x190/0x190 [ 101.078947][ T9856] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 101.085306][ T9856] ? _copy_from_user+0x12c/0x1a0 [ 101.090500][ T9856] ucma_write+0x2d7/0x3c0 [ 101.094838][ T9856] ? ucma_notify+0x190/0x190 [ 101.099430][ T9856] ? ucma_open+0x290/0x290 [ 101.103839][ T9856] ? apparmor_file_permission+0x27/0x30 [ 101.109387][ T9856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 101.115668][ T9856] ? security_file_permission+0x8f/0x380 [ 101.121403][ T9856] __vfs_write+0x8a/0x110 [ 101.125725][ T9856] ? ucma_open+0x290/0x290 [ 101.130173][ T9856] vfs_write+0x268/0x5d0 [ 101.134506][ T9856] ksys_write+0x220/0x290 [ 101.138890][ T9856] ? __ia32_sys_read+0xb0/0xb0 [ 101.143782][ T9856] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 101.149301][ T9856] ? do_syscall_64+0x26/0x790 [ 101.154086][ T9856] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 101.160143][ T9856] ? do_syscall_64+0x26/0x790 [ 101.164832][ T9856] __x64_sys_write+0x73/0xb0 [ 101.169416][ T9856] do_syscall_64+0xfa/0x790 [ 101.173909][ T9856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 101.179786][ T9856] RIP: 0033:0x45c479 [ 101.183676][ T9856] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 101.203880][ T9856] RSP: 002b:00007f826ca08c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 101.212310][ T9856] RAX: ffffffffffffffda RBX: 00007f826ca096d4 RCX: 000000000045c479 [ 101.220276][ T9856] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 [ 101.228279][ T9856] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 101.236333][ T9856] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 101.244324][ T9856] R13: 0000000000000cbe R14: 00000000004cea34 R15: 000000000076bf2c [ 101.252351][ T9856] [ 101.254669][ T9856] Allocated by task 9850: [ 101.259031][ T9856] save_stack+0x23/0x90 [ 101.263275][ T9856] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 101.268903][ T9856] kasan_kmalloc+0x9/0x10 [ 101.273215][ T9856] kmem_cache_alloc_trace+0x158/0x790 [ 101.278584][ T9856] __rdma_create_id+0x5e/0x870 [ 101.283348][ T9856] ucma_create_id+0x1de/0x620 [ 101.288138][ T9856] ucma_write+0x2d7/0x3c0 [ 101.292454][ T9856] __vfs_write+0x8a/0x110 [ 101.296828][ T9856] vfs_write+0x268/0x5d0 [ 101.301057][ T9856] ksys_write+0x220/0x290 [ 101.305369][ T9856] __x64_sys_write+0x73/0xb0 [ 101.309954][ T9856] do_syscall_64+0xfa/0x790 [ 101.314444][ T9856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 101.320346][ T9856] [ 101.322660][ T9856] Freed by task 9850: [ 101.326671][ T9856] save_stack+0x23/0x90 [ 101.330922][ T9856] __kasan_slab_free+0x102/0x150 [ 101.335842][ T9856] kasan_slab_free+0xe/0x10 [ 101.340341][ T9856] kfree+0x10a/0x2c0 [ 101.344226][ T9856] rdma_destroy_id+0x7c6/0xdd0 [ 101.348975][ T9856] ucma_close+0x115/0x310 [ 101.353300][ T9856] __fput+0x2ff/0x890 [ 101.357266][ T9856] ____fput+0x16/0x20 [ 101.361244][ T9856] task_work_run+0x145/0x1c0 [ 101.365819][ T9856] exit_to_usermode_loop+0x316/0x380 [ 101.371130][ T9856] do_syscall_64+0x676/0x790 [ 101.375702][ T9856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 101.381656][ T9856] [ 101.383978][ T9856] The buggy address belongs to the object at ffff88808e149000 [ 101.383978][ T9856] which belongs to the cache kmalloc-2k of size 2048 [ 101.398024][ T9856] The buggy address is located 480 bytes inside of [ 101.398024][ T9856] 2048-byte region [ffff88808e149000, ffff88808e149800) [ 101.411996][ T9856] The buggy address belongs to the page: [ 101.417641][ T9856] page:ffffea0002385240 refcount:1 mapcount:0 mapping:ffff8880aa400e00 index:0x0 [ 101.426742][ T9856] flags: 0xfffe0000000200(slab) [ 101.431591][ T9856] raw: 00fffe0000000200 ffffea00027e9408 ffffea00028da3c8 ffff8880aa400e00 [ 101.440293][ T9856] raw: 0000000000000000 ffff88808e149000 0000000100000001 0000000000000000 [ 101.448862][ T9856] page dumped because: kasan: bad access detected [ 101.455255][ T9856] [ 101.457571][ T9856] Memory state around the buggy address: [ 101.463239][ T9856] ffff88808e149080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 101.471289][ T9856] ffff88808e149100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 101.479819][ T9856] >ffff88808e149180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 101.487973][ T9856] ^ [ 101.495387][ T9856] ffff88808e149200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 101.503566][ T9856] ffff88808e149280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 101.511697][ T9856] ================================================================== [ 101.519757][ T9856] Disabling lock debugging due to kernel taint [ 101.537518][ T9856] Kernel panic - not syncing: panic_on_warn set ... [ 101.544288][ T9856] CPU: 1 PID: 9856 Comm: syz-executor.0 Tainted: G B 5.6.0-rc3-syzkaller #0 [ 101.554301][ T9856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.564547][ T9856] Call Trace: [ 101.567877][ T9856] dump_stack+0x197/0x210 [ 101.572209][ T9856] panic+0x2e3/0x75c [ 101.576111][ T9856] ? add_taint.cold+0x16/0x16 [ 101.580796][ T9856] ? __list_add_valid+0x9a/0xa0 [ 101.585641][ T9856] ? preempt_schedule+0x4b/0x60 [ 101.590497][ T9856] ? ___preempt_schedule+0x16/0x18 [ 101.595605][ T9856] ? trace_hardirqs_on+0x5e/0x240 [ 101.600632][ T9856] ? __list_add_valid+0x9a/0xa0 [ 101.605530][ T9856] end_report+0x47/0x4f [ 101.609679][ T9856] ? __list_add_valid+0x9a/0xa0 [ 101.614529][ T9856] __kasan_report.cold+0xe/0x32 [ 101.619386][ T9856] ? __list_add_valid+0x9a/0xa0 [ 101.624240][ T9856] kasan_report+0x12/0x20 [ 101.628632][ T9856] __asan_report_load8_noabort+0x14/0x20 [ 101.634356][ T9856] __list_add_valid+0x9a/0xa0 [ 101.639046][ T9856] rdma_listen+0x6b7/0x970 [ 101.643450][ T9856] ? _raw_spin_unlock+0x28/0x40 [ 101.648369][ T9856] ucma_listen+0x14d/0x1c0 [ 101.652783][ T9856] ? ucma_notify+0x190/0x190 [ 101.657378][ T9856] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 101.663629][ T9856] ? _copy_from_user+0x12c/0x1a0 [ 101.668596][ T9856] ucma_write+0x2d7/0x3c0 [ 101.672914][ T9856] ? ucma_notify+0x190/0x190 [ 101.677504][ T9856] ? ucma_open+0x290/0x290 [ 101.681920][ T9856] ? apparmor_file_permission+0x27/0x30 [ 101.687456][ T9856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 101.693744][ T9856] ? security_file_permission+0x8f/0x380 [ 101.699397][ T9856] __vfs_write+0x8a/0x110 [ 101.703738][ T9856] ? ucma_open+0x290/0x290 [ 101.708139][ T9856] vfs_write+0x268/0x5d0 [ 101.712399][ T9856] ksys_write+0x220/0x290 [ 101.717062][ T9856] ? __ia32_sys_read+0xb0/0xb0 [ 101.721810][ T9856] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 101.727296][ T9856] ? do_syscall_64+0x26/0x790 [ 101.731999][ T9856] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 101.738065][ T9856] ? do_syscall_64+0x26/0x790 [ 101.742752][ T9856] __x64_sys_write+0x73/0xb0 [ 101.747471][ T9856] do_syscall_64+0xfa/0x790 [ 101.752131][ T9856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 101.758161][ T9856] RIP: 0033:0x45c479 [ 101.762062][ T9856] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 101.781674][ T9856] RSP: 002b:00007f826ca08c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 101.790119][ T9856] RAX: ffffffffffffffda RBX: 00007f826ca096d4 RCX: 000000000045c479 [ 101.798111][ T9856] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 [ 101.806197][ T9856] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 101.814178][ T9856] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 101.822151][ T9856] R13: 0000000000000cbe R14: 00000000004cea34 R15: 000000000076bf2c [ 101.831651][ T9856] Kernel Offset: disabled [ 101.835996][ T9856] Rebooting in 86400 seconds..