[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.140' (ECDSA) to the list of known hosts. 2021/03/05 12:59:38 parsed 1 programs 2021/03/05 12:59:38 executed programs: 0 syzkaller login: [ 30.826911] IPVS: ftp: loaded support on port[0] = 21 [ 30.912181] chnl_net:caif_netlink_parms(): no params data found [ 30.982719] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.989261] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.996868] device bridge_slave_0 entered promiscuous mode [ 31.003672] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.010593] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.017427] device bridge_slave_1 entered promiscuous mode [ 31.033609] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 31.043107] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 31.060442] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 31.067840] team0: Port device team_slave_0 added [ 31.073571] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 31.081088] team0: Port device team_slave_1 added [ 31.095917] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.102194] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.128006] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.139509] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.146146] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.172316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.183364] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 31.191285] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 31.210032] device hsr_slave_0 entered promiscuous mode [ 31.215589] device hsr_slave_1 entered promiscuous mode [ 31.222001] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 31.228903] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 31.290798] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.297324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.304154] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.310552] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.339341] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 31.345721] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.354542] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 31.363104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.382635] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.390135] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.399219] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 31.405649] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.414104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.422833] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.429203] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.438769] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.446432] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.452945] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.470512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 31.478242] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 31.486065] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.494077] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 31.502999] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.514036] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 31.520378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 31.527254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.541220] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 31.548311] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 31.555616] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 31.565584] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.613805] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 31.623933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.654491] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 31.662097] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 31.668518] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 31.679024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.686976] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.694146] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.703081] device veth0_vlan entered promiscuous mode [ 31.711643] device veth1_vlan entered promiscuous mode [ 31.717395] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 31.726496] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 31.737369] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 31.747217] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 31.754874] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 31.762584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.772045] device veth0_macvtap entered promiscuous mode [ 31.778634] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 31.787086] device veth1_macvtap entered promiscuous mode [ 31.795194] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 31.804609] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 31.814577] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.821503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.829766] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 31.838873] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.845708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.900422] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 32.849609] Bluetooth: hci0 command 0x0409 tx timeout [ 34.575155] ================================================================== [ 34.582723] BUG: KASAN: use-after-free in __list_add_valid+0x93/0xa0 [ 34.589207] Read of size 8 at addr ffff8880a96e93d8 by task syz-executor.0/8924 [ 34.596641] [ 34.598256] CPU: 0 PID: 8924 Comm: syz-executor.0 Not tainted 4.14.223-syzkaller #0 [ 34.606022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 34.615365] Call Trace: [ 34.617953] dump_stack+0x1b2/0x281 [ 34.621578] print_address_description.cold+0x54/0x1d3 [ 34.626901] kasan_report_error.cold+0x8a/0x191 [ 34.631591] ? __list_add_valid+0x93/0xa0 [ 34.635768] __asan_report_load8_noabort+0x68/0x70 [ 34.640873] ? __list_add_valid+0x93/0xa0 [ 34.645002] __list_add_valid+0x93/0xa0 [ 34.648973] rdma_listen+0x656/0x9b0 [ 34.652690] ucma_listen+0x10b/0x170 [ 34.656398] ? ucma_bind_ip+0x150/0x150 [ 34.660366] ? _copy_from_user+0x96/0x100 [ 34.664512] ? ucma_bind_ip+0x150/0x150 [ 34.668467] ucma_write+0x206/0x2c0 [ 34.672073] ? ucma_set_ib_path+0x510/0x510 [ 34.676376] __vfs_write+0xe4/0x630 [ 34.679986] ? ucma_set_ib_path+0x510/0x510 [ 34.684310] ? debug_check_no_obj_freed+0x2c0/0x680 [ 34.689309] ? kernel_read+0x110/0x110 [ 34.693198] ? common_file_perm+0x3ee/0x580 [ 34.697524] ? security_file_permission+0x82/0x1e0 [ 34.702447] ? rw_verify_area+0xe1/0x2a0 [ 34.706501] vfs_write+0x17f/0x4d0 [ 34.710036] SyS_write+0xf2/0x210 [ 34.713467] ? SyS_read+0x210/0x210 [ 34.717085] ? __do_page_fault+0x159/0xad0 [ 34.721313] ? do_syscall_64+0x4c/0x640 [ 34.725281] ? SyS_read+0x210/0x210 [ 34.728893] do_syscall_64+0x1d5/0x640 [ 34.732890] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 34.738074] RIP: 0033:0x465f69 [ 34.741240] RSP: 002b:00007fa273825188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 34.748934] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465f69 [ 34.756402] RDX: 0000000000000010 RSI: 0000000020000000 RDI: 0000000000000003 [ 34.763653] RBP: 00000000004bfa67 R08: 0000000000000000 R09: 0000000000000000 [ 34.771053] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 34.778403] R13: 00007ffea5fccf8f R14: 00007fa273825300 R15: 0000000000022000 [ 34.785678] [ 34.787287] Allocated by task 8917: [ 34.790909] kasan_kmalloc+0xeb/0x160 [ 34.794687] kmem_cache_alloc_trace+0x131/0x3d0 [ 34.799344] rdma_create_id+0x57/0x4c0 [ 34.803219] ucma_create_id+0x18b/0x500 [ 34.807184] ucma_write+0x206/0x2c0 [ 34.810962] __vfs_write+0xe4/0x630 [ 34.814576] vfs_write+0x17f/0x4d0 [ 34.818097] SyS_write+0xf2/0x210 [ 34.821547] do_syscall_64+0x1d5/0x640 [ 34.825413] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 34.830595] [ 34.832214] Freed by task 8916: [ 34.835523] kasan_slab_free+0xc3/0x1a0 [ 34.839481] kfree+0xc9/0x250 [ 34.842584] ucma_close+0x11a/0x340 [ 34.846191] __fput+0x25f/0x7a0 [ 34.849453] task_work_run+0x11f/0x190 [ 34.853347] exit_to_usermode_loop+0x1ad/0x200 [ 34.857907] do_syscall_64+0x4a3/0x640 [ 34.861772] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 34.866956] [ 34.868560] The buggy address belongs to the object at ffff8880a96e9200 [ 34.868560] which belongs to the cache kmalloc-1024 of size 1024 [ 34.881404] The buggy address is located 472 bytes inside of [ 34.881404] 1024-byte region [ffff8880a96e9200, ffff8880a96e9600) [ 34.894385] The buggy address belongs to the page: [ 34.899327] page:ffffea0002a5ba00 count:1 mapcount:0 mapping:ffff8880a96e8000 index:0x0 compound_mapcount: 0 [ 34.909277] flags: 0xfff00000008100(slab|head) [ 34.913838] raw: 00fff00000008100 ffff8880a96e8000 0000000000000000 0000000100000007 [ 34.921742] raw: ffffea0002aa9d20 ffffea0002a451a0 ffff88813fe80ac0 0000000000000000 [ 34.929598] page dumped because: kasan: bad access detected [ 34.935293] [ 34.936942] Memory state around the buggy address: [ 34.941880] ffff8880a96e9280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.949218] ffff8880a96e9300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.956558] >ffff8880a96e9380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.963901] ^ [ 34.970115] ffff8880a96e9400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.977730] ffff8880a96e9480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.985066] ================================================================== [ 34.992412] Disabling lock debugging due to kernel taint [ 35.000565] Kernel panic - not syncing: panic_on_warn set ... [ 35.000565] [ 35.007940] CPU: 1 PID: 8924 Comm: syz-executor.0 Tainted: G B 4.14.223-syzkaller #0 [ 35.016941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 35.026326] Call Trace: [ 35.028894] dump_stack+0x1b2/0x281 [ 35.032504] panic+0x1f9/0x42d [ 35.035675] ? add_taint.cold+0x16/0x16 [ 35.039713] ? ___preempt_schedule+0x16/0x18 [ 35.044113] kasan_end_report+0x43/0x49 [ 35.048066] kasan_report_error.cold+0xa7/0x191 [ 35.052726] ? __list_add_valid+0x93/0xa0 [ 35.056864] __asan_report_load8_noabort+0x68/0x70 [ 35.061793] ? __list_add_valid+0x93/0xa0 [ 35.065931] __list_add_valid+0x93/0xa0 [ 35.069882] rdma_listen+0x656/0x9b0 [ 35.073573] ucma_listen+0x10b/0x170 [ 35.077276] ? ucma_bind_ip+0x150/0x150 [ 35.081239] ? _copy_from_user+0x96/0x100 [ 35.085359] ? ucma_bind_ip+0x150/0x150 [ 35.089314] ucma_write+0x206/0x2c0 [ 35.092933] ? ucma_set_ib_path+0x510/0x510 [ 35.097233] __vfs_write+0xe4/0x630 [ 35.100839] ? ucma_set_ib_path+0x510/0x510 [ 35.105135] ? debug_check_no_obj_freed+0x2c0/0x680 [ 35.110158] ? kernel_read+0x110/0x110 [ 35.114022] ? common_file_perm+0x3ee/0x580 [ 35.118321] ? security_file_permission+0x82/0x1e0 [ 35.123225] ? rw_verify_area+0xe1/0x2a0 [ 35.127259] vfs_write+0x17f/0x4d0 [ 35.130792] SyS_write+0xf2/0x210 [ 35.134234] ? SyS_read+0x210/0x210 [ 35.137951] ? __do_page_fault+0x159/0xad0 [ 35.142188] ? do_syscall_64+0x4c/0x640 [ 35.146136] ? SyS_read+0x210/0x210 [ 35.149737] do_syscall_64+0x1d5/0x640 [ 35.153618] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 35.158783] RIP: 0033:0x465f69 [ 35.161947] RSP: 002b:00007fa273825188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 35.169631] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465f69 [ 35.177008] RDX: 0000000000000010 RSI: 0000000020000000 RDI: 0000000000000003 [ 35.184260] RBP: 00000000004bfa67 R08: 0000000000000000 R09: 0000000000000000 [ 35.191510] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 35.198764] R13: 00007ffea5fccf8f R14: 00007fa273825300 R15: 0000000000022000 [ 35.206588] Kernel Offset: disabled [ 35.210211] Rebooting in 86400 seconds..