[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.169' (ECDSA) to the list of known hosts. 2020/03/26 00:16:27 parsed 1 programs 2020/03/26 00:16:29 executed programs: 0 syzkaller login: [ 54.490174][ T7151] IPVS: ftp: loaded support on port[0] = 21 [ 54.568818][ T7151] chnl_net:caif_netlink_parms(): no params data found [ 54.614745][ T7151] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.622350][ T7151] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.630566][ T7151] device bridge_slave_0 entered promiscuous mode [ 54.638940][ T7151] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.646022][ T7151] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.654941][ T7151] device bridge_slave_1 entered promiscuous mode [ 54.674112][ T7151] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.684685][ T7151] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.705884][ T7151] team0: Port device team_slave_0 added [ 54.713183][ T7151] team0: Port device team_slave_1 added [ 54.728922][ T7151] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 54.735917][ T7151] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 54.762260][ T7151] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 54.774633][ T7151] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 54.781688][ T7151] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 54.807646][ T7151] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 54.880838][ T7151] device hsr_slave_0 entered promiscuous mode [ 54.929100][ T7151] device hsr_slave_1 entered promiscuous mode [ 55.042786][ T7151] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 55.111164][ T7151] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 55.140997][ T7151] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 55.190807][ T7151] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 55.262412][ T7151] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.269605][ T7151] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.277234][ T7151] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.284491][ T7151] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.322606][ T7151] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.337107][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.348107][ T2930] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.356548][ T2930] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.364991][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 55.378288][ T7151] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.388266][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.396606][ T2966] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.403688][ T2966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.414683][ T2930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.423692][ T2930] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.430795][ T2930] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.450298][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.459359][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.470273][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.487244][ T7151] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 55.498073][ T7151] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 55.510239][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.519666][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.528073][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.546494][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 55.554346][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 55.567122][ T7151] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 55.584245][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 55.593144][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 55.612502][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 55.621272][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 55.634773][ T7151] device veth0_vlan entered promiscuous mode [ 55.642006][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 55.649756][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.662743][ T7151] device veth1_vlan entered promiscuous mode [ 55.682242][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 55.690279][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 55.698471][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 55.706818][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 55.717930][ T7151] device veth0_macvtap entered promiscuous mode [ 55.728007][ T7151] device veth1_macvtap entered promiscuous mode [ 55.745616][ T7151] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 55.753384][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 55.761564][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 55.769844][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 55.779002][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 55.791019][ T7151] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 55.798506][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 55.806952][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 56.140058][ T7378] ================================================================== [ 56.148332][ T7378] BUG: KASAN: use-after-free in __list_add_valid+0x93/0xa0 [ 56.155526][ T7378] Read of size 8 at addr ffff88809dd8a1e0 by task syz-executor.0/7378 [ 56.163667][ T7378] [ 56.165995][ T7378] CPU: 1 PID: 7378 Comm: syz-executor.0 Not tainted 5.6.0-rc7-syzkaller #0 [ 56.174555][ T7378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.184631][ T7378] Call Trace: [ 56.187902][ T7378] dump_stack+0x188/0x20d [ 56.192213][ T7378] ? __list_add_valid+0x93/0xa0 [ 56.197056][ T7378] ? __list_add_valid+0x93/0xa0 [ 56.201891][ T7378] print_address_description.constprop.0.cold+0xd3/0x315 [ 56.208900][ T7378] ? __list_add_valid+0x93/0xa0 [ 56.213775][ T7378] ? __list_add_valid+0x93/0xa0 [ 56.218608][ T7378] __kasan_report.cold+0x1a/0x32 [ 56.223566][ T7378] ? __list_add_valid+0x93/0xa0 [ 56.228408][ T7378] kasan_report+0xe/0x20 [ 56.232630][ T7378] __list_add_valid+0x93/0xa0 [ 56.237301][ T7378] rdma_listen+0x681/0x910 [ 56.241750][ T7378] ucma_listen+0x14d/0x1c0 [ 56.246178][ T7378] ? ucma_notify+0x190/0x190 [ 56.250748][ T7378] ? __might_fault+0x190/0x1d0 [ 56.255492][ T7378] ? _copy_from_user+0x123/0x190 [ 56.260412][ T7378] ? ucma_notify+0x190/0x190 [ 56.264983][ T7378] ucma_write+0x285/0x350 [ 56.269295][ T7378] ? ucma_open+0x270/0x270 [ 56.273697][ T7378] ? security_file_permission+0x8a/0x370 [ 56.279310][ T7378] ? ucma_open+0x270/0x270 [ 56.283706][ T7378] __vfs_write+0x76/0x100 [ 56.288027][ T7378] vfs_write+0x262/0x5c0 [ 56.292256][ T7378] ksys_write+0x1e8/0x250 [ 56.296564][ T7378] ? __ia32_sys_read+0xb0/0xb0 [ 56.301302][ T7378] ? __x64_sys_clock_gettime32+0x240/0x240 [ 56.307084][ T7378] ? trace_hardirqs_off_caller+0x55/0x230 [ 56.312826][ T7378] do_fast_syscall_32+0x270/0xe8f [ 56.317832][ T7378] entry_SYSENTER_compat+0x70/0x7f [ 56.322927][ T7378] [ 56.325230][ T7378] Allocated by task 7373: [ 56.329548][ T7378] save_stack+0x1b/0x80 [ 56.333684][ T7378] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 56.339341][ T7378] kmem_cache_alloc_trace+0x153/0x7d0 [ 56.344700][ T7378] __rdma_create_id+0x5b/0x850 [ 56.349447][ T7378] ucma_create_id+0x1cb/0x580 [ 56.354099][ T7378] ucma_write+0x285/0x350 [ 56.358406][ T7378] __vfs_write+0x76/0x100 [ 56.362716][ T7378] vfs_write+0x262/0x5c0 [ 56.366935][ T7378] ksys_write+0x1e8/0x250 [ 56.371242][ T7378] do_fast_syscall_32+0x270/0xe8f [ 56.376242][ T7378] entry_SYSENTER_compat+0x70/0x7f [ 56.381340][ T7378] [ 56.383645][ T7378] Freed by task 7373: [ 56.387603][ T7378] save_stack+0x1b/0x80 [ 56.391735][ T7378] __kasan_slab_free+0xf7/0x140 [ 56.396605][ T7378] kfree+0x109/0x2b0 [ 56.400480][ T7378] ucma_close+0x10b/0x300 [ 56.404797][ T7378] __fput+0x2da/0x850 [ 56.408797][ T7378] task_work_run+0x13f/0x1b0 [ 56.413383][ T7378] exit_to_usermode_loop+0x2fa/0x360 [ 56.418663][ T7378] do_fast_syscall_32+0xbef/0xe8f [ 56.423669][ T7378] entry_SYSENTER_compat+0x70/0x7f [ 56.428754][ T7378] [ 56.431079][ T7378] The buggy address belongs to the object at ffff88809dd8a000 [ 56.431079][ T7378] which belongs to the cache kmalloc-2k of size 2048 [ 56.445107][ T7378] The buggy address is located 480 bytes inside of [ 56.445107][ T7378] 2048-byte region [ffff88809dd8a000, ffff88809dd8a800) [ 56.458438][ T7378] The buggy address belongs to the page: [ 56.464047][ T7378] page:ffffea0002776280 refcount:1 mapcount:0 mapping:ffff8880aa000e00 index:0x0 [ 56.473134][ T7378] flags: 0xfffe0000000200(slab) [ 56.477964][ T7378] raw: 00fffe0000000200 ffffea000244b5c8 ffffea000268c9c8 ffff8880aa000e00 [ 56.486533][ T7378] raw: 0000000000000000 ffff88809dd8a000 0000000100000001 0000000000000000 [ 56.495088][ T7378] page dumped because: kasan: bad access detected [ 56.501473][ T7378] [ 56.503779][ T7378] Memory state around the buggy address: [ 56.509400][ T7378] ffff88809dd8a080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.517453][ T7378] ffff88809dd8a100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.525489][ T7378] >ffff88809dd8a180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.533524][ T7378] ^ [ 56.540707][ T7378] ffff88809dd8a200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.548795][ T7378] ffff88809dd8a280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.556833][ T7378] ================================================================== [ 56.564910][ T7378] Disabling lock debugging due to kernel taint [ 56.579151][ T7378] Kernel panic - not syncing: panic_on_warn set ... [ 56.585763][ T7378] CPU: 1 PID: 7378 Comm: syz-executor.0 Tainted: G B 5.6.0-rc7-syzkaller #0 [ 56.595834][ T7378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.605892][ T7378] Call Trace: [ 56.609184][ T7378] dump_stack+0x188/0x20d [ 56.613520][ T7378] panic+0x2e3/0x75c [ 56.617417][ T7378] ? add_taint.cold+0x16/0x16 [ 56.622098][ T7378] ? preempt_schedule_common+0x5e/0xc0 [ 56.627554][ T7378] ? __list_add_valid+0x93/0xa0 [ 56.632397][ T7378] ? ___preempt_schedule+0x16/0x18 [ 56.637494][ T7378] ? trace_hardirqs_on+0x55/0x220 [ 56.642499][ T7378] ? __list_add_valid+0x93/0xa0 [ 56.647329][ T7378] end_report+0x43/0x49 [ 56.651460][ T7378] ? __list_add_valid+0x93/0xa0 [ 56.656286][ T7378] __kasan_report.cold+0xd/0x32 [ 56.661116][ T7378] ? __list_add_valid+0x93/0xa0 [ 56.665990][ T7378] kasan_report+0xe/0x20 [ 56.670207][ T7378] __list_add_valid+0x93/0xa0 [ 56.674875][ T7378] rdma_listen+0x681/0x910 [ 56.679291][ T7378] ucma_listen+0x14d/0x1c0 [ 56.683696][ T7378] ? ucma_notify+0x190/0x190 [ 56.688279][ T7378] ? __might_fault+0x190/0x1d0 [ 56.693020][ T7378] ? _copy_from_user+0x123/0x190 [ 56.697937][ T7378] ? ucma_notify+0x190/0x190 [ 56.702518][ T7378] ucma_write+0x285/0x350 [ 56.706841][ T7378] ? ucma_open+0x270/0x270 [ 56.711263][ T7378] ? security_file_permission+0x8a/0x370 [ 56.717003][ T7378] ? ucma_open+0x270/0x270 [ 56.721448][ T7378] __vfs_write+0x76/0x100 [ 56.725766][ T7378] vfs_write+0x262/0x5c0 [ 56.729986][ T7378] ksys_write+0x1e8/0x250 [ 56.734292][ T7378] ? __ia32_sys_read+0xb0/0xb0 [ 56.739072][ T7378] ? __x64_sys_clock_gettime32+0x240/0x240 [ 56.744858][ T7378] ? trace_hardirqs_off_caller+0x55/0x230 [ 56.750557][ T7378] do_fast_syscall_32+0x270/0xe8f [ 56.755574][ T7378] entry_SYSENTER_compat+0x70/0x7f [ 56.762054][ T7378] Kernel Offset: disabled [ 56.766373][ T7378] Rebooting in 86400 seconds..