[ 79.055699][ T27] audit: type=1800 audit(1583861591.573:25): pid=9789 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 80.000640][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 80.000650][ T27] audit: type=1800 audit(1583861592.523:29): pid=9789 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 80.044329][ T27] audit: type=1800 audit(1583861592.523:30): pid=9789 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.151' (ECDSA) to the list of known hosts. 2020/03/10 17:48:50 parsed 1 programs 2020/03/10 17:48:52 executed programs: 0 syzkaller login: [ 1019.723888][ T9958] IPVS: ftp: loaded support on port[0] = 21 [ 1019.791512][ T9958] chnl_net:caif_netlink_parms(): no params data found [ 1019.834860][ T9958] bridge0: port 1(bridge_slave_0) entered blocking state [ 1019.843176][ T9958] bridge0: port 1(bridge_slave_0) entered disabled state [ 1019.851782][ T9958] device bridge_slave_0 entered promiscuous mode [ 1019.860933][ T9958] bridge0: port 2(bridge_slave_1) entered blocking state [ 1019.868144][ T9958] bridge0: port 2(bridge_slave_1) entered disabled state [ 1019.875956][ T9958] device bridge_slave_1 entered promiscuous mode [ 1019.895605][ T9958] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1019.907119][ T9958] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1019.927750][ T9958] team0: Port device team_slave_0 added [ 1019.935191][ T9958] team0: Port device team_slave_1 added [ 1019.951769][ T9958] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1019.959374][ T9958] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1019.986132][ T9958] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1019.999355][ T9958] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1020.006331][ T9958] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1020.032578][ T9958] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1020.110462][ T9958] device hsr_slave_0 entered promiscuous mode [ 1020.177188][ T9958] device hsr_slave_1 entered promiscuous mode [ 1020.315340][ T9958] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1020.370311][ T9958] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1020.430839][ T9958] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1020.490816][ T9958] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1020.577130][ T9958] bridge0: port 2(bridge_slave_1) entered blocking state [ 1020.584572][ T9958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1020.592770][ T9958] bridge0: port 1(bridge_slave_0) entered blocking state [ 1020.599903][ T9958] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1020.651636][ T9958] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1020.665683][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1020.688334][ T2820] bridge0: port 1(bridge_slave_0) entered disabled state [ 1020.708136][ T2820] bridge0: port 2(bridge_slave_1) entered disabled state [ 1020.716556][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1020.730435][ T9958] 8021q: adding VLAN 0 to HW filter on device team0 [ 1020.741893][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1020.751266][ T2823] bridge0: port 1(bridge_slave_0) entered blocking state [ 1020.758406][ T2823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1020.777532][ T9965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1020.787497][ T9965] bridge0: port 2(bridge_slave_1) entered blocking state [ 1020.794883][ T9965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1020.818579][ T2839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1020.829143][ T2839] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1020.837905][ T2839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1020.846444][ T2839] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1020.855137][ T2839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1020.865081][ T2839] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1020.873874][ T2839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1020.883312][ T2839] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1020.893703][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1020.909190][ T2839] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1020.926326][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1020.934688][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1020.953064][ T9958] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1020.973717][ T2839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1020.982966][ T2839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1021.003362][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1021.013594][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1021.024391][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1021.032482][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1021.043328][ T9958] device veth0_vlan entered promiscuous mode [ 1021.056708][ T9958] device veth1_vlan entered promiscuous mode [ 1021.079432][ T2839] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1021.088900][ T2839] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1021.097601][ T2839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1021.106273][ T2839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1021.117196][ T9958] device veth0_macvtap entered promiscuous mode [ 1021.130968][ T9958] device veth1_macvtap entered promiscuous mode [ 1021.149675][ T9958] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1021.158897][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1021.168131][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1021.176312][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1021.185418][ T2837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1021.198832][ T9958] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1021.206299][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1021.216313][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1023.848945][T10292] ================================================================== [ 1023.857481][T10292] BUG: KASAN: use-after-free in __list_add_valid+0x93/0xa0 [ 1023.864962][T10292] Read of size 8 at addr ffff88808fcbd1e0 by task syz-executor.0/10292 [ 1023.873199][T10292] [ 1023.875660][T10292] CPU: 0 PID: 10292 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 1023.885540][T10292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1023.895588][T10292] Call Trace: [ 1023.898956][T10292] dump_stack+0x188/0x20d [ 1023.903302][T10292] ? __list_add_valid+0x93/0xa0 [ 1023.908139][T10292] ? __list_add_valid+0x93/0xa0 [ 1023.913206][T10292] print_address_description.constprop.0.cold+0xd3/0x315 [ 1023.920404][T10292] ? __list_add_valid+0x93/0xa0 [ 1023.925258][T10292] ? __list_add_valid+0x93/0xa0 [ 1023.930113][T10292] __kasan_report.cold+0x1a/0x32 [ 1023.935115][T10292] ? __list_add_valid+0x93/0xa0 [ 1023.940193][T10292] kasan_report+0xe/0x20 [ 1023.944783][T10292] __list_add_valid+0x93/0xa0 [ 1023.949542][T10292] rdma_listen+0x681/0x910 [ 1023.953977][T10292] ucma_listen+0x14d/0x1c0 [ 1023.958631][T10292] ? ucma_notify+0x190/0x190 [ 1023.963317][T10292] ? __might_fault+0x190/0x1d0 [ 1023.968460][T10292] ? _copy_from_user+0x123/0x190 [ 1023.973586][T10292] ? ucma_notify+0x190/0x190 [ 1023.978276][T10292] ucma_write+0x285/0x350 [ 1023.982725][T10292] ? ucma_open+0x270/0x270 [ 1023.987322][T10292] ? security_file_permission+0x8a/0x370 [ 1023.993034][T10292] ? ucma_open+0x270/0x270 [ 1023.997658][T10292] __vfs_write+0x76/0x100 [ 1024.002115][T10292] vfs_write+0x262/0x5c0 [ 1024.006509][T10292] ksys_write+0x1e8/0x250 [ 1024.010871][T10292] ? __ia32_sys_read+0xb0/0xb0 [ 1024.015714][T10292] ? __ia32_sys_clock_settime+0x260/0x260 [ 1024.021502][T10292] ? trace_hardirqs_off_caller+0x55/0x230 [ 1024.027293][T10292] do_syscall_64+0xf6/0x790 [ 1024.032069][T10292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1024.037982][T10292] RIP: 0033:0x45c4a9 [ 1024.042019][T10292] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1024.061690][T10292] RSP: 002b:00007f63cfd5fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1024.070264][T10292] RAX: ffffffffffffffda RBX: 00007f63cfd606d4 RCX: 000000000045c4a9 [ 1024.078272][T10292] RDX: 0000000000000010 RSI: 0000000020000140 RDI: 0000000000000004 [ 1024.086547][T10292] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 1024.094588][T10292] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1024.102776][T10292] R13: 0000000000000cbe R14: 00000000004cea80 R15: 000000000076bfcc [ 1024.110908][T10292] [ 1024.113286][T10292] Allocated by task 10271: [ 1024.117727][T10292] save_stack+0x1b/0x40 [ 1024.121910][T10292] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1024.127571][T10292] kmem_cache_alloc_trace+0x153/0x7d0 [ 1024.133373][T10292] __rdma_create_id+0x5b/0x850 [ 1024.138161][T10292] ucma_create_id+0x1cb/0x580 [ 1024.142840][T10292] ucma_write+0x285/0x350 [ 1024.147199][T10292] __vfs_write+0x76/0x100 [ 1024.151528][T10292] vfs_write+0x262/0x5c0 [ 1024.155764][T10292] ksys_write+0x1e8/0x250 [ 1024.160093][T10292] do_syscall_64+0xf6/0x790 [ 1024.164698][T10292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1024.170593][T10292] [ 1024.172911][T10292] Freed by task 10270: [ 1024.176967][T10292] save_stack+0x1b/0x40 [ 1024.181122][T10292] __kasan_slab_free+0xf7/0x140 [ 1024.185966][T10292] kfree+0x109/0x2b0 [ 1024.189865][T10292] ucma_close+0x10b/0x300 [ 1024.194191][T10292] __fput+0x2da/0x850 [ 1024.198237][T10292] task_work_run+0x13f/0x1b0 [ 1024.202833][T10292] exit_to_usermode_loop+0x2fa/0x360 [ 1024.208203][T10292] do_syscall_64+0x672/0x790 [ 1024.212782][T10292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1024.218667][T10292] [ 1024.221012][T10292] The buggy address belongs to the object at ffff88808fcbd000 [ 1024.221012][T10292] which belongs to the cache kmalloc-2k of size 2048 [ 1024.235058][T10292] The buggy address is located 480 bytes inside of [ 1024.235058][T10292] 2048-byte region [ffff88808fcbd000, ffff88808fcbd800) [ 1024.248415][T10292] The buggy address belongs to the page: [ 1024.254055][T10292] page:ffffea00023f2f40 refcount:1 mapcount:0 mapping:00000000283f4d26 index:0x0 [ 1024.263144][T10292] flags: 0xfffe0000000200(slab) [ 1024.267994][T10292] raw: 00fffe0000000200 ffffea0002988248 ffffea00023f2f88 ffff8880aa000e00 [ 1024.276576][T10292] raw: 0000000000000000 ffff88808fcbd000 0000000100000001 0000000000000000 [ 1024.285148][T10292] page dumped because: kasan: bad access detected [ 1024.291545][T10292] [ 1024.293927][T10292] Memory state around the buggy address: [ 1024.299557][T10292] ffff88808fcbd080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1024.307611][T10292] ffff88808fcbd100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1024.315673][T10292] >ffff88808fcbd180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1024.323823][T10292] ^ [ 1024.331004][T10292] ffff88808fcbd200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1024.339160][T10292] ffff88808fcbd280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1024.347324][T10292] ================================================================== [ 1024.355401][T10292] Disabling lock debugging due to kernel taint [ 1024.363578][T10292] Kernel panic - not syncing: panic_on_warn set ... [ 1024.370421][T10292] CPU: 0 PID: 10292 Comm: syz-executor.0 Tainted: G B 5.6.0-rc3-next-20200228-syzkaller #0 [ 1024.381734][T10292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1024.391869][T10292] Call Trace: [ 1024.395166][T10292] dump_stack+0x188/0x20d [ 1024.399895][T10292] panic+0x2e3/0x75c [ 1024.403782][T10292] ? add_taint.cold+0x16/0x16 [ 1024.408483][T10292] ? preempt_schedule_common+0x5e/0xc0 [ 1024.414028][T10292] ? __list_add_valid+0x93/0xa0 [ 1024.418886][T10292] ? ___preempt_schedule+0x16/0x18 [ 1024.423980][T10292] ? trace_hardirqs_on+0x55/0x220 [ 1024.428990][T10292] ? __list_add_valid+0x93/0xa0 [ 1024.433832][T10292] end_report+0x43/0x49 [ 1024.437966][T10292] ? __list_add_valid+0x93/0xa0 [ 1024.442793][T10292] __kasan_report.cold+0xd/0x32 [ 1024.447642][T10292] ? __list_add_valid+0x93/0xa0 [ 1024.452512][T10292] kasan_report+0xe/0x20 [ 1024.456759][T10292] __list_add_valid+0x93/0xa0 [ 1024.461428][T10292] rdma_listen+0x681/0x910 [ 1024.465913][T10292] ucma_listen+0x14d/0x1c0 [ 1024.470314][T10292] ? ucma_notify+0x190/0x190 [ 1024.474923][T10292] ? __might_fault+0x190/0x1d0 [ 1024.479677][T10292] ? _copy_from_user+0x123/0x190 [ 1024.484616][T10292] ? ucma_notify+0x190/0x190 [ 1024.489195][T10292] ucma_write+0x285/0x350 [ 1024.493531][T10292] ? ucma_open+0x270/0x270 [ 1024.497942][T10292] ? security_file_permission+0x8a/0x370 [ 1024.503566][T10292] ? ucma_open+0x270/0x270 [ 1024.507979][T10292] __vfs_write+0x76/0x100 [ 1024.512292][T10292] vfs_write+0x262/0x5c0 [ 1024.516606][T10292] ksys_write+0x1e8/0x250 [ 1024.520915][T10292] ? __ia32_sys_read+0xb0/0xb0 [ 1024.526435][T10292] ? __ia32_sys_clock_settime+0x260/0x260 [ 1024.532165][T10292] ? trace_hardirqs_off_caller+0x55/0x230 [ 1024.538151][T10292] do_syscall_64+0xf6/0x790 [ 1024.542666][T10292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1024.548558][T10292] RIP: 0033:0x45c4a9 [ 1024.552443][T10292] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1024.572423][T10292] RSP: 002b:00007f63cfd5fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1024.580979][T10292] RAX: ffffffffffffffda RBX: 00007f63cfd606d4 RCX: 000000000045c4a9 [ 1024.589031][T10292] RDX: 0000000000000010 RSI: 0000000020000140 RDI: 0000000000000004 [ 1024.596987][T10292] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 1024.604938][T10292] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1024.612907][T10292] R13: 0000000000000cbe R14: 00000000004cea80 R15: 000000000076bfcc [ 1024.622407][T10292] Kernel Offset: disabled [ 1024.627531][T10292] Rebooting in 86400 seconds..