[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.205' (ECDSA) to the list of known hosts. 2020/04/01 08:14:16 parsed 1 programs 2020/04/01 08:14:18 executed programs: 0 syzkaller login: [ 60.148475][ T7042] IPVS: ftp: loaded support on port[0] = 21 [ 60.238977][ T7042] chnl_net:caif_netlink_parms(): no params data found [ 60.286571][ T7042] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.297922][ T7042] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.305684][ T7042] device bridge_slave_0 entered promiscuous mode [ 60.316016][ T7042] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.323682][ T7042] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.331842][ T7042] device bridge_slave_1 entered promiscuous mode [ 60.351508][ T7042] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.362850][ T7042] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.384880][ T7042] team0: Port device team_slave_0 added [ 60.392197][ T7042] team0: Port device team_slave_1 added [ 60.409449][ T7042] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 60.416417][ T7042] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.444082][ T7042] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 60.457742][ T7042] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 60.464690][ T7042] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.491331][ T7042] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 60.570445][ T7042] device hsr_slave_0 entered promiscuous mode [ 60.637214][ T7042] device hsr_slave_1 entered promiscuous mode [ 60.755246][ T7042] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 60.789275][ T7042] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 60.839391][ T7042] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 60.899433][ T7042] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 60.951417][ T7042] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.958647][ T7042] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.966697][ T7042] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.973793][ T7042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.016081][ T7042] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.032212][ T3734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.044117][ T3734] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.052515][ T3734] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.061245][ T3734] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 61.074573][ T7042] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.085441][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.094396][ T2933] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.101593][ T2933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.114048][ T3734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.123414][ T3734] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.130569][ T3734] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.150928][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.160904][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.172134][ T3734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.187840][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.196064][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.208899][ T7042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 61.226653][ T3734] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 61.234127][ T3734] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 61.247841][ T7042] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.266119][ T3734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 61.275707][ T3734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 61.293918][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 61.303209][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 61.313906][ T7042] device veth0_vlan entered promiscuous mode [ 61.320844][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 61.330212][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 61.344803][ T7042] device veth1_vlan entered promiscuous mode [ 61.366560][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 61.374557][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 61.384069][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 61.392752][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 61.404661][ T7042] device veth0_macvtap entered promiscuous mode [ 61.414669][ T7042] device veth1_macvtap entered promiscuous mode [ 61.432731][ T7042] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 61.441010][ T3734] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 61.449556][ T3734] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 61.457765][ T3734] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 61.466306][ T3734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 61.479396][ T7042] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 61.487368][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 61.495896][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 62.048048][ T7299] ================================================================== [ 62.056326][ T7299] BUG: KASAN: use-after-free in __list_add_valid+0x93/0xa0 [ 62.063528][ T7299] Read of size 8 at addr ffff8880a7d771e0 by task syz-executor.0/7299 [ 62.071673][ T7299] [ 62.074014][ T7299] CPU: 0 PID: 7299 Comm: syz-executor.0 Not tainted 5.6.0-syzkaller #0 [ 62.082254][ T7299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.092326][ T7299] Call Trace: [ 62.095624][ T7299] dump_stack+0x188/0x20d [ 62.099969][ T7299] ? __list_add_valid+0x93/0xa0 [ 62.104858][ T7299] ? __list_add_valid+0x93/0xa0 [ 62.109728][ T7299] print_address_description.constprop.0.cold+0xd3/0x315 [ 62.116778][ T7299] ? __list_add_valid+0x93/0xa0 [ 62.121692][ T7299] ? __list_add_valid+0x93/0xa0 [ 62.126539][ T7299] __kasan_report.cold+0x1a/0x32 [ 62.131484][ T7299] ? __list_add_valid+0x93/0xa0 [ 62.136339][ T7299] kasan_report+0xe/0x20 [ 62.140581][ T7299] __list_add_valid+0x93/0xa0 [ 62.145283][ T7299] rdma_listen+0x681/0x910 [ 62.149695][ T7299] ucma_listen+0x14d/0x1c0 [ 62.154106][ T7299] ? ucma_notify+0x190/0x190 [ 62.158684][ T7299] ? __might_fault+0x190/0x1d0 [ 62.163435][ T7299] ? _copy_from_user+0x13c/0x1a0 [ 62.168361][ T7299] ? ucma_notify+0x190/0x190 [ 62.172942][ T7299] ucma_write+0x285/0x350 [ 62.177272][ T7299] ? ucma_open+0x270/0x270 [ 62.181712][ T7299] ? security_file_permission+0x8a/0x380 [ 62.187341][ T7299] ? ucma_open+0x270/0x270 [ 62.191767][ T7299] __vfs_write+0x76/0x100 [ 62.196096][ T7299] vfs_write+0x268/0x5d0 [ 62.200326][ T7299] ksys_write+0x1ee/0x250 [ 62.204638][ T7299] ? __ia32_sys_read+0xb0/0xb0 [ 62.209391][ T7299] ? __x64_sys_clock_gettime32+0x240/0x240 [ 62.215195][ T7299] ? trace_hardirqs_off_caller+0x55/0x230 [ 62.220911][ T7299] do_fast_syscall_32+0x270/0xe90 [ 62.225943][ T7299] entry_SYSENTER_compat+0x70/0x7f [ 62.231052][ T7299] [ 62.233402][ T7299] Allocated by task 7294: [ 62.237718][ T7299] save_stack+0x1b/0x80 [ 62.242808][ T7299] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 62.248425][ T7299] kmem_cache_alloc_trace+0x153/0x7d0 [ 62.253784][ T7299] __rdma_create_id+0x5b/0x850 [ 62.258534][ T7299] ucma_create_id+0x1d1/0x590 [ 62.263233][ T7299] ucma_write+0x285/0x350 [ 62.267548][ T7299] __vfs_write+0x76/0x100 [ 62.271859][ T7299] vfs_write+0x268/0x5d0 [ 62.276076][ T7299] ksys_write+0x1ee/0x250 [ 62.280434][ T7299] do_fast_syscall_32+0x270/0xe90 [ 62.285467][ T7299] entry_SYSENTER_compat+0x70/0x7f [ 62.290557][ T7299] [ 62.292922][ T7299] Freed by task 7293: [ 62.296890][ T7299] save_stack+0x1b/0x80 [ 62.301035][ T7299] __kasan_slab_free+0xf7/0x140 [ 62.306047][ T7299] kfree+0x109/0x2b0 [ 62.309924][ T7299] ucma_close+0x111/0x300 [ 62.314241][ T7299] __fput+0x2e9/0x860 [ 62.318232][ T7299] task_work_run+0xf4/0x1b0 [ 62.322726][ T7299] exit_to_usermode_loop+0x2fa/0x360 [ 62.328015][ T7299] do_fast_syscall_32+0xbef/0xe90 [ 62.333029][ T7299] entry_SYSENTER_compat+0x70/0x7f [ 62.338157][ T7299] [ 62.340484][ T7299] The buggy address belongs to the object at ffff8880a7d77000 [ 62.340484][ T7299] which belongs to the cache kmalloc-2k of size 2048 [ 62.354535][ T7299] The buggy address is located 480 bytes inside of [ 62.354535][ T7299] 2048-byte region [ffff8880a7d77000, ffff8880a7d77800) [ 62.367966][ T7299] The buggy address belongs to the page: [ 62.373597][ T7299] page:ffffea00029f5dc0 refcount:1 mapcount:0 mapping:ffff8880aa000e00 index:0x0 [ 62.382693][ T7299] flags: 0xfffe0000000200(slab) [ 62.387532][ T7299] raw: 00fffe0000000200 ffffea00029e2308 ffffea000249f6c8 ffff8880aa000e00 [ 62.396109][ T7299] raw: 0000000000000000 ffff8880a7d77000 0000000100000001 0000000000000000 [ 62.404685][ T7299] page dumped because: kasan: bad access detected [ 62.411081][ T7299] [ 62.413415][ T7299] Memory state around the buggy address: [ 62.419031][ T7299] ffff8880a7d77080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.427120][ T7299] ffff8880a7d77100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.435164][ T7299] >ffff8880a7d77180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.443211][ T7299] ^ [ 62.450394][ T7299] ffff8880a7d77200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.458440][ T7299] ffff8880a7d77280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.466643][ T7299] ================================================================== [ 62.474689][ T7299] Disabling lock debugging due to kernel taint [ 62.487774][ T7299] Kernel panic - not syncing: panic_on_warn set ... [ 62.494390][ T7299] CPU: 0 PID: 7299 Comm: syz-executor.0 Tainted: G B 5.6.0-syzkaller #0 [ 62.504011][ T7299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.514112][ T7299] Call Trace: [ 62.517388][ T7299] dump_stack+0x188/0x20d [ 62.521743][ T7299] panic+0x2e3/0x75c [ 62.525617][ T7299] ? add_taint.cold+0x16/0x16 [ 62.530284][ T7299] ? preempt_schedule_common+0x5e/0xc0 [ 62.535721][ T7299] ? __list_add_valid+0x93/0xa0 [ 62.540677][ T7299] ? preempt_schedule_thunk+0x16/0x18 [ 62.546063][ T7299] ? trace_hardirqs_on+0x55/0x220 [ 62.551079][ T7299] ? __list_add_valid+0x93/0xa0 [ 62.558792][ T7299] end_report+0x43/0x49 [ 62.562975][ T7299] ? __list_add_valid+0x93/0xa0 [ 62.567845][ T7299] __kasan_report.cold+0xd/0x32 [ 62.572692][ T7299] ? __list_add_valid+0x93/0xa0 [ 62.577537][ T7299] kasan_report+0xe/0x20 [ 62.581771][ T7299] __list_add_valid+0x93/0xa0 [ 62.586435][ T7299] rdma_listen+0x681/0x910 [ 62.590844][ T7299] ucma_listen+0x14d/0x1c0 [ 62.595236][ T7299] ? ucma_notify+0x190/0x190 [ 62.599817][ T7299] ? __might_fault+0x190/0x1d0 [ 62.604559][ T7299] ? _copy_from_user+0x13c/0x1a0 [ 62.609483][ T7299] ? ucma_notify+0x190/0x190 [ 62.614260][ T7299] ucma_write+0x285/0x350 [ 62.618574][ T7299] ? ucma_open+0x270/0x270 [ 62.622973][ T7299] ? security_file_permission+0x8a/0x380 [ 62.628590][ T7299] ? ucma_open+0x270/0x270 [ 62.632980][ T7299] __vfs_write+0x76/0x100 [ 62.637287][ T7299] vfs_write+0x268/0x5d0 [ 62.641516][ T7299] ksys_write+0x1ee/0x250 [ 62.645826][ T7299] ? __ia32_sys_read+0xb0/0xb0 [ 62.650619][ T7299] ? __x64_sys_clock_gettime32+0x240/0x240 [ 62.656403][ T7299] ? trace_hardirqs_off_caller+0x55/0x230 [ 62.662106][ T7299] do_fast_syscall_32+0x270/0xe90 [ 62.667128][ T7299] entry_SYSENTER_compat+0x70/0x7f [ 62.673460][ T7299] Kernel Offset: disabled [ 62.677779][ T7299] Rebooting in 86400 seconds..