[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 67.180387][ T27] audit: type=1800 audit(1583724995.267:25): pid=9416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 67.202126][ T27] audit: type=1800 audit(1583724995.267:26): pid=9416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 67.223009][ T27] audit: type=1800 audit(1583724995.277:27): pid=9416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.218' (ECDSA) to the list of known hosts. 2020/03/09 03:52:25 parsed 1 programs 2020/03/09 03:52:27 executed programs: 0 syzkaller login: [ 1019.325806][ T9585] IPVS: ftp: loaded support on port[0] = 21 [ 1019.391068][ T9585] chnl_net:caif_netlink_parms(): no params data found [ 1019.432350][ T9585] bridge0: port 1(bridge_slave_0) entered blocking state [ 1019.440293][ T9585] bridge0: port 1(bridge_slave_0) entered disabled state [ 1019.448225][ T9585] device bridge_slave_0 entered promiscuous mode [ 1019.457940][ T9585] bridge0: port 2(bridge_slave_1) entered blocking state [ 1019.465299][ T9585] bridge0: port 2(bridge_slave_1) entered disabled state [ 1019.473353][ T9585] device bridge_slave_1 entered promiscuous mode [ 1019.491488][ T9585] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1019.502251][ T9585] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1019.522687][ T9585] team0: Port device team_slave_0 added [ 1019.531004][ T9585] team0: Port device team_slave_1 added [ 1019.546517][ T9585] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1019.553590][ T9585] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1019.580712][ T9585] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1019.593427][ T9585] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1019.600588][ T9585] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1019.626512][ T9585] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1019.681893][ T9585] device hsr_slave_0 entered promiscuous mode [ 1019.719681][ T9585] device hsr_slave_1 entered promiscuous mode [ 1019.848354][ T9585] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1019.912764][ T9585] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1019.992048][ T9585] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1020.032380][ T9585] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1020.085847][ T9585] bridge0: port 2(bridge_slave_1) entered blocking state [ 1020.093165][ T9585] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1020.101007][ T9585] bridge0: port 1(bridge_slave_0) entered blocking state [ 1020.108060][ T9585] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1020.154333][ T9585] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1020.167512][ T3455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1020.178855][ T3455] bridge0: port 1(bridge_slave_0) entered disabled state [ 1020.187705][ T3455] bridge0: port 2(bridge_slave_1) entered disabled state [ 1020.196227][ T3455] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1020.209269][ T9585] 8021q: adding VLAN 0 to HW filter on device team0 [ 1020.231469][ T2848] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1020.240223][ T2848] bridge0: port 1(bridge_slave_0) entered blocking state [ 1020.247302][ T2848] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1020.260465][ T9592] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1020.268819][ T9592] bridge0: port 2(bridge_slave_1) entered blocking state [ 1020.275920][ T9592] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1020.302069][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1020.310662][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1020.319974][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1020.328212][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1020.340709][ T2848] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1020.352273][ T9585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1020.373722][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1020.381684][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1020.395963][ T9585] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1020.416341][ T2848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1020.425890][ T2848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1020.446493][ T9585] device veth0_vlan entered promiscuous mode [ 1020.453406][ T2848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1020.462656][ T2848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1020.471506][ T2848] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1020.480574][ T2848] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1020.495761][ T9585] device veth1_vlan entered promiscuous mode [ 1020.517767][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1020.526075][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1020.535466][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1020.544405][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1020.555857][ T9585] device veth0_macvtap entered promiscuous mode [ 1020.565900][ T9585] device veth1_macvtap entered promiscuous mode [ 1020.582999][ T9585] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1020.590862][ T2848] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1020.598966][ T2848] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1020.607211][ T2848] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1020.616088][ T2848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1020.628545][ T9585] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1020.636566][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1020.646216][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2020/03/09 03:52:32 executed programs: 52 2020/03/09 03:52:37 executed programs: 130 [ 1032.186929][T11388] ================================================================== [ 1032.195393][T11388] BUG: KASAN: use-after-free in __list_add_valid+0x93/0xa0 [ 1032.202586][T11388] Read of size 8 at addr ffff8880a46981e0 by task syz-executor.0/11388 [ 1032.210797][T11388] [ 1032.213112][T11388] CPU: 1 PID: 11388 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 1032.222971][T11388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1032.233012][T11388] Call Trace: [ 1032.236408][T11388] dump_stack+0x188/0x20d [ 1032.240778][T11388] ? __list_add_valid+0x93/0xa0 [ 1032.245614][T11388] ? __list_add_valid+0x93/0xa0 [ 1032.250534][T11388] print_address_description.constprop.0.cold+0xd3/0x315 [ 1032.257537][T11388] ? __list_add_valid+0x93/0xa0 [ 1032.262370][T11388] ? __list_add_valid+0x93/0xa0 [ 1032.267310][T11388] __kasan_report.cold+0x1a/0x32 [ 1032.272242][T11388] ? __list_add_valid+0x93/0xa0 [ 1032.277142][T11388] kasan_report+0xe/0x20 [ 1032.281427][T11388] __list_add_valid+0x93/0xa0 [ 1032.286197][T11388] rdma_listen+0x681/0x910 [ 1032.290642][T11388] ucma_listen+0x14d/0x1c0 [ 1032.295041][T11388] ? ucma_notify+0x190/0x190 [ 1032.299654][T11388] ? __might_fault+0x190/0x1d0 [ 1032.304400][T11388] ? _copy_from_user+0x123/0x190 [ 1032.309326][T11388] ? ucma_notify+0x190/0x190 [ 1032.313917][T11388] ucma_write+0x285/0x350 [ 1032.318229][T11388] ? ucma_open+0x270/0x270 [ 1032.322700][T11388] ? security_file_permission+0x8a/0x370 [ 1032.328319][T11388] ? ucma_open+0x270/0x270 [ 1032.332804][T11388] __vfs_write+0x76/0x100 [ 1032.337142][T11388] vfs_write+0x262/0x5c0 [ 1032.341397][T11388] ksys_write+0x1e8/0x250 [ 1032.345745][T11388] ? __ia32_sys_read+0xb0/0xb0 [ 1032.350578][T11388] ? __ia32_sys_clock_settime+0x260/0x260 [ 1032.356345][T11388] ? trace_hardirqs_off_caller+0x55/0x230 [ 1032.362079][T11388] do_syscall_64+0xf6/0x790 [ 1032.366641][T11388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1032.372582][T11388] RIP: 0033:0x45c4a9 [ 1032.376478][T11388] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1032.396077][T11388] RSP: 002b:00007f2528f7ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1032.404488][T11388] RAX: ffffffffffffffda RBX: 00007f2528f7f6d4 RCX: 000000000045c4a9 [ 1032.412442][T11388] RDX: 0000000000000010 RSI: 0000000020000140 RDI: 0000000000000006 [ 1032.420425][T11388] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1032.428381][T11388] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1032.436335][T11388] R13: 0000000000000cbe R14: 00000000004cea80 R15: 000000000076bf2c [ 1032.444311][T11388] [ 1032.446619][T11388] Allocated by task 11382: [ 1032.451021][T11388] save_stack+0x1b/0x40 [ 1032.455169][T11388] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1032.460840][T11388] kmem_cache_alloc_trace+0x153/0x7d0 [ 1032.466202][T11388] __rdma_create_id+0x5b/0x850 [ 1032.470951][T11388] ucma_create_id+0x1cb/0x580 [ 1032.475613][T11388] ucma_write+0x285/0x350 [ 1032.479947][T11388] __vfs_write+0x76/0x100 [ 1032.484253][T11388] vfs_write+0x262/0x5c0 [ 1032.488477][T11388] ksys_write+0x1e8/0x250 [ 1032.492789][T11388] do_syscall_64+0xf6/0x790 [ 1032.497286][T11388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1032.503164][T11388] [ 1032.505485][T11388] Freed by task 11377: [ 1032.509546][T11388] save_stack+0x1b/0x40 [ 1032.513697][T11388] __kasan_slab_free+0xf7/0x140 [ 1032.518530][T11388] kfree+0x109/0x2b0 [ 1032.522409][T11388] ucma_close+0x10b/0x300 [ 1032.526724][T11388] __fput+0x2da/0x850 [ 1032.530796][T11388] task_work_run+0x13f/0x1b0 [ 1032.535374][T11388] exit_to_usermode_loop+0x2fa/0x360 [ 1032.540641][T11388] do_syscall_64+0x672/0x790 [ 1032.545213][T11388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1032.551086][T11388] [ 1032.553404][T11388] The buggy address belongs to the object at ffff8880a4698000 [ 1032.553404][T11388] which belongs to the cache kmalloc-2k of size 2048 [ 1032.567449][T11388] The buggy address is located 480 bytes inside of [ 1032.567449][T11388] 2048-byte region [ffff8880a4698000, ffff8880a4698800) [ 1032.580832][T11388] The buggy address belongs to the page: [ 1032.586491][T11388] page:ffffea000291a600 refcount:1 mapcount:0 mapping:0000000006c24f11 index:0x0 [ 1032.595586][T11388] flags: 0xfffe0000000200(slab) [ 1032.600422][T11388] raw: 00fffe0000000200 ffffea0002887e08 ffffea0002492d08 ffff8880aa000e00 [ 1032.608997][T11388] raw: 0000000000000000 ffff8880a4698000 0000000100000001 0000000000000000 [ 1032.617570][T11388] page dumped because: kasan: bad access detected [ 1032.623961][T11388] [ 1032.626319][T11388] Memory state around the buggy address: [ 1032.631931][T11388] ffff8880a4698080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1032.639972][T11388] ffff8880a4698100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1032.648021][T11388] >ffff8880a4698180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1032.656077][T11388] ^ [ 1032.663280][T11388] ffff8880a4698200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1032.671372][T11388] ffff8880a4698280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1032.679416][T11388] ================================================================== [ 1032.687460][T11388] Disabling lock debugging due to kernel taint [ 1032.695244][T11388] Kernel panic - not syncing: panic_on_warn set ... [ 1032.701842][T11388] CPU: 1 PID: 11388 Comm: syz-executor.0 Tainted: G B 5.6.0-rc3-next-20200228-syzkaller #0 [ 1032.713121][T11388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1032.723166][T11388] Call Trace: [ 1032.726438][T11388] dump_stack+0x188/0x20d [ 1032.730889][T11388] panic+0x2e3/0x75c [ 1032.734767][T11388] ? add_taint.cold+0x16/0x16 [ 1032.739447][T11388] ? preempt_schedule_common+0x5e/0xc0 [ 1032.744898][T11388] ? __list_add_valid+0x93/0xa0 [ 1032.749734][T11388] ? ___preempt_schedule+0x16/0x18 [ 1032.754828][T11388] ? trace_hardirqs_on+0x55/0x220 [ 1032.759860][T11388] ? __list_add_valid+0x93/0xa0 [ 1032.764699][T11388] end_report+0x43/0x49 [ 1032.768831][T11388] ? __list_add_valid+0x93/0xa0 [ 1032.773670][T11388] __kasan_report.cold+0xd/0x32 [ 1032.778502][T11388] ? __list_add_valid+0x93/0xa0 [ 1032.783330][T11388] kasan_report+0xe/0x20 [ 1032.787565][T11388] __list_add_valid+0x93/0xa0 [ 1032.792236][T11388] rdma_listen+0x681/0x910 [ 1032.796642][T11388] ucma_listen+0x14d/0x1c0 [ 1032.801047][T11388] ? ucma_notify+0x190/0x190 [ 1032.805616][T11388] ? __might_fault+0x190/0x1d0 [ 1032.810356][T11388] ? _copy_from_user+0x123/0x190 [ 1032.815267][T11388] ? ucma_notify+0x190/0x190 [ 1032.819830][T11388] ucma_write+0x285/0x350 [ 1032.824137][T11388] ? ucma_open+0x270/0x270 [ 1032.828535][T11388] ? security_file_permission+0x8a/0x370 [ 1032.834157][T11388] ? ucma_open+0x270/0x270 [ 1032.838548][T11388] __vfs_write+0x76/0x100 [ 1032.842859][T11388] vfs_write+0x262/0x5c0 [ 1032.847087][T11388] ksys_write+0x1e8/0x250 [ 1032.851411][T11388] ? __ia32_sys_read+0xb0/0xb0 [ 1032.856218][T11388] ? __ia32_sys_clock_settime+0x260/0x260 [ 1032.861916][T11388] ? trace_hardirqs_off_caller+0x55/0x230 [ 1032.867612][T11388] do_syscall_64+0xf6/0x790 [ 1032.872118][T11388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1032.877985][T11388] RIP: 0033:0x45c4a9 [ 1032.881859][T11388] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1032.901439][T11388] RSP: 002b:00007f2528f7ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1032.909840][T11388] RAX: ffffffffffffffda RBX: 00007f2528f7f6d4 RCX: 000000000045c4a9 [ 1032.917789][T11388] RDX: 0000000000000010 RSI: 0000000020000140 RDI: 0000000000000006 [ 1032.925739][T11388] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1032.933689][T11388] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1032.941649][T11388] R13: 0000000000000cbe R14: 00000000004cea80 R15: 000000000076bf2c [ 1032.950871][T11388] Kernel Offset: disabled [ 1032.955191][T11388] Rebooting in 86400 seconds..