Warning: Permanently added '10.128.15.202' (ECDSA) to the list of known hosts. 2020/03/23 10:13:06 parsed 1 programs 2020/03/23 10:13:08 executed programs: 0 syzkaller login: [ 75.241766][ T9427] IPVS: ftp: loaded support on port[0] = 21 [ 75.301142][ T9427] chnl_net:caif_netlink_parms(): no params data found [ 75.340654][ T9427] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.347931][ T9427] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.355844][ T9427] device bridge_slave_0 entered promiscuous mode [ 75.364047][ T9427] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.371188][ T9427] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.379061][ T9427] device bridge_slave_1 entered promiscuous mode [ 75.397387][ T9427] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.408367][ T9427] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.427626][ T9427] team0: Port device team_slave_0 added [ 75.434839][ T9427] team0: Port device team_slave_1 added [ 75.449904][ T9427] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 75.456833][ T9427] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.482857][ T9427] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 75.494994][ T9427] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 75.502363][ T9427] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.528314][ T9427] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 75.600612][ T9427] device hsr_slave_0 entered promiscuous mode [ 75.638501][ T9427] device hsr_slave_1 entered promiscuous mode [ 75.745135][ T9427] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 75.810856][ T9427] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 75.861162][ T9427] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 75.900358][ T9427] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 75.964090][ T9427] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.971254][ T9427] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.978916][ T9427] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.985976][ T9427] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.027599][ T9427] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.043121][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.053598][ T36] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.061486][ T36] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.069760][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 76.082119][ T9427] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.092756][ T3996] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.101397][ T3996] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.108567][ T3996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.120903][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.129610][ T36] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.136636][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.160140][ T3996] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.170066][ T3996] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.179237][ T3996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.187449][ T3996] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 76.200083][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.210644][ T9427] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 76.228679][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 76.236053][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 76.249769][ T9427] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 76.267768][ T3996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 76.287472][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 76.296211][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 76.304030][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 76.314345][ T9427] device veth0_vlan entered promiscuous mode [ 76.326487][ T9427] device veth1_vlan entered promiscuous mode [ 76.349102][ T3996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 76.357528][ T3996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 76.369697][ T9427] device veth0_macvtap entered promiscuous mode [ 76.379407][ T9427] device veth1_macvtap entered promiscuous mode [ 76.400001][ T9427] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 76.407308][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 76.415800][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 76.423871][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 76.432372][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 76.444043][ T9427] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 76.451982][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 76.460790][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 76.943227][ T9470] ================================================================== [ 76.951482][ T9470] BUG: KASAN: use-after-free in __list_add_valid+0x93/0xa0 [ 76.958653][ T9470] Read of size 8 at addr ffff888091a301e0 by task syz-executor.0/9470 [ 76.966772][ T9470] [ 76.969082][ T9470] CPU: 1 PID: 9470 Comm: syz-executor.0 Not tainted 5.6.0-rc6-syzkaller #0 [ 76.977636][ T9470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.987668][ T9470] Call Trace: [ 76.990940][ T9470] dump_stack+0x188/0x20d [ 76.995243][ T9470] ? __list_add_valid+0x93/0xa0 [ 77.000070][ T9470] ? __list_add_valid+0x93/0xa0 [ 77.004897][ T9470] print_address_description.constprop.0.cold+0xd3/0x315 [ 77.011892][ T9470] ? __list_add_valid+0x93/0xa0 [ 77.016719][ T9470] ? __list_add_valid+0x93/0xa0 [ 77.021550][ T9470] __kasan_report.cold+0x1a/0x32 [ 77.026469][ T9470] ? __list_add_valid+0x93/0xa0 [ 77.031297][ T9470] kasan_report+0xe/0x20 [ 77.035514][ T9470] __list_add_valid+0x93/0xa0 [ 77.040169][ T9470] rdma_listen+0x681/0x910 [ 77.044607][ T9470] ucma_listen+0x14d/0x1c0 [ 77.049017][ T9470] ? ucma_notify+0x190/0x190 [ 77.053589][ T9470] ? __might_fault+0x190/0x1d0 [ 77.058336][ T9470] ? _copy_from_user+0x123/0x190 [ 77.063253][ T9470] ? ucma_notify+0x190/0x190 [ 77.067821][ T9470] ucma_write+0x285/0x350 [ 77.072176][ T9470] ? ucma_open+0x270/0x270 [ 77.076579][ T9470] ? security_file_permission+0x8a/0x370 [ 77.082191][ T9470] ? ucma_open+0x270/0x270 [ 77.086585][ T9470] __vfs_write+0x76/0x100 [ 77.090896][ T9470] vfs_write+0x262/0x5c0 [ 77.095124][ T9470] ksys_write+0x1e8/0x250 [ 77.099438][ T9470] ? __ia32_sys_read+0xb0/0xb0 [ 77.104176][ T9470] ? __ia32_sys_clock_settime+0x260/0x260 [ 77.109873][ T9470] ? trace_hardirqs_off_caller+0x55/0x230 [ 77.115682][ T9470] do_syscall_64+0xf6/0x7d0 [ 77.120168][ T9470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 77.126034][ T9470] RIP: 0033:0x45c849 [ 77.129907][ T9470] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 77.149483][ T9470] RSP: 002b:00007f5fbbb45c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 77.157868][ T9470] RAX: ffffffffffffffda RBX: 00007f5fbbb466d4 RCX: 000000000045c849 [ 77.165813][ T9470] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 [ 77.173763][ T9470] RBP: 000000000076bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 77.181717][ T9470] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 77.189663][ T9470] R13: 0000000000000cc0 R14: 00000000004cee66 R15: 000000000076bfac [ 77.197625][ T9470] [ 77.199932][ T9470] Allocated by task 9441: [ 77.204237][ T9470] save_stack+0x1b/0x80 [ 77.208368][ T9470] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 77.213973][ T9470] kmem_cache_alloc_trace+0x153/0x7d0 [ 77.219321][ T9470] __rdma_create_id+0x5b/0x850 [ 77.224058][ T9470] ucma_create_id+0x1cb/0x580 [ 77.228711][ T9470] ucma_write+0x285/0x350 [ 77.233018][ T9470] __vfs_write+0x76/0x100 [ 77.237318][ T9470] vfs_write+0x262/0x5c0 [ 77.241536][ T9470] ksys_write+0x1e8/0x250 [ 77.245838][ T9470] do_syscall_64+0xf6/0x7d0 [ 77.250316][ T9470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 77.256177][ T9470] [ 77.258487][ T9470] Freed by task 9439: [ 77.262455][ T9470] save_stack+0x1b/0x80 [ 77.266589][ T9470] __kasan_slab_free+0xf7/0x140 [ 77.271411][ T9470] kfree+0x109/0x2b0 [ 77.275281][ T9470] ucma_close+0x10b/0x300 [ 77.279586][ T9470] __fput+0x2da/0x850 [ 77.283544][ T9470] task_work_run+0x13f/0x1b0 [ 77.288108][ T9470] exit_to_usermode_loop+0x2fa/0x360 [ 77.293371][ T9470] do_syscall_64+0x6b1/0x7d0 [ 77.297937][ T9470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 77.303797][ T9470] [ 77.306105][ T9470] The buggy address belongs to the object at ffff888091a30000 [ 77.306105][ T9470] which belongs to the cache kmalloc-2k of size 2048 [ 77.320130][ T9470] The buggy address is located 480 bytes inside of [ 77.320130][ T9470] 2048-byte region [ffff888091a30000, ffff888091a30800) [ 77.333457][ T9470] The buggy address belongs to the page: [ 77.339074][ T9470] page:ffffea0002468c00 refcount:1 mapcount:0 mapping:ffff8880aa000e00 index:0x0 [ 77.348167][ T9470] flags: 0xfffe0000000200(slab) [ 77.353011][ T9470] raw: 00fffe0000000200 ffffea00028abe88 ffffea00028b6148 ffff8880aa000e00 [ 77.361570][ T9470] raw: 0000000000000000 ffff888091a30000 0000000100000001 0000000000000000 [ 77.370126][ T9470] page dumped because: kasan: bad access detected [ 77.376511][ T9470] [ 77.378814][ T9470] Memory state around the buggy address: [ 77.384419][ T9470] ffff888091a30080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.392455][ T9470] ffff888091a30100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.400492][ T9470] >ffff888091a30180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.408528][ T9470] ^ [ 77.415693][ T9470] ffff888091a30200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.423731][ T9470] ffff888091a30280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.431769][ T9470] ================================================================== [ 77.439802][ T9470] Disabling lock debugging due to kernel taint [ 77.452749][ T9470] Kernel panic - not syncing: panic_on_warn set ... [ 77.459332][ T9470] CPU: 1 PID: 9470 Comm: syz-executor.0 Tainted: G B 5.6.0-rc6-syzkaller #0 [ 77.469275][ T9470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.479301][ T9470] Call Trace: [ 77.482568][ T9470] dump_stack+0x188/0x20d [ 77.486875][ T9470] panic+0x2e3/0x75c [ 77.490747][ T9470] ? add_taint.cold+0x16/0x16 [ 77.495401][ T9470] ? preempt_schedule_common+0x5e/0xc0 [ 77.500840][ T9470] ? __list_add_valid+0x93/0xa0 [ 77.505667][ T9470] ? ___preempt_schedule+0x16/0x18 [ 77.510754][ T9470] ? trace_hardirqs_on+0x55/0x220 [ 77.515755][ T9470] ? __list_add_valid+0x93/0xa0 [ 77.520603][ T9470] end_report+0x43/0x49 [ 77.524746][ T9470] ? __list_add_valid+0x93/0xa0 [ 77.529576][ T9470] __kasan_report.cold+0xd/0x32 [ 77.534407][ T9470] ? __list_add_valid+0x93/0xa0 [ 77.539292][ T9470] kasan_report+0xe/0x20 [ 77.543513][ T9470] __list_add_valid+0x93/0xa0 [ 77.548173][ T9470] rdma_listen+0x681/0x910 [ 77.552623][ T9470] ucma_listen+0x14d/0x1c0 [ 77.557051][ T9470] ? ucma_notify+0x190/0x190 [ 77.561639][ T9470] ? __might_fault+0x190/0x1d0 [ 77.566439][ T9470] ? _copy_from_user+0x123/0x190 [ 77.571358][ T9470] ? ucma_notify+0x190/0x190 [ 77.575946][ T9470] ucma_write+0x285/0x350 [ 77.580268][ T9470] ? ucma_open+0x270/0x270 [ 77.584671][ T9470] ? security_file_permission+0x8a/0x370 [ 77.590282][ T9470] ? ucma_open+0x270/0x270 [ 77.594711][ T9470] __vfs_write+0x76/0x100 [ 77.599076][ T9470] vfs_write+0x262/0x5c0 [ 77.603337][ T9470] ksys_write+0x1e8/0x250 [ 77.607652][ T9470] ? __ia32_sys_read+0xb0/0xb0 [ 77.612435][ T9470] ? __ia32_sys_clock_settime+0x260/0x260 [ 77.618149][ T9470] ? trace_hardirqs_off_caller+0x55/0x230 [ 77.623860][ T9470] do_syscall_64+0xf6/0x7d0 [ 77.628356][ T9470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 77.634230][ T9470] RIP: 0033:0x45c849 [ 77.638104][ T9470] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 77.657689][ T9470] RSP: 002b:00007f5fbbb45c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 77.666081][ T9470] RAX: ffffffffffffffda RBX: 00007f5fbbb466d4 RCX: 000000000045c849 [ 77.674039][ T9470] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 [ 77.681996][ T9470] RBP: 000000000076bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 77.689947][ T9470] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 77.697901][ T9470] R13: 0000000000000cc0 R14: 00000000004cee66 R15: 000000000076bfac [ 77.707007][ T9470] Kernel Offset: disabled [ 77.711325][ T9470] Rebooting in 86400 seconds..