[ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Reached target Login Prompts. [ OK ] Started OpenBSD Secure Shell server. [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.95' (ECDSA) to the list of known hosts. syzkaller login: [ 33.687067] IPVS: ftp: loaded support on port[0] = 21 [ 33.786301] chnl_net:caif_netlink_parms(): no params data found [ 33.928338] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.935163] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.943151] device bridge_slave_0 entered promiscuous mode [ 33.951185] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.957574] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.965170] device bridge_slave_1 entered promiscuous mode [ 33.981674] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 33.990889] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 34.008782] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 34.016892] team0: Port device team_slave_0 added [ 34.023172] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 34.031234] team0: Port device team_slave_1 added [ 34.046838] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.053141] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.078979] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.091258] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.097606] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.123698] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.134701] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 34.142548] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 34.161248] device hsr_slave_0 entered promiscuous mode [ 34.166924] device hsr_slave_1 entered promiscuous mode [ 34.173263] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 34.180485] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 34.243548] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.250032] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.256776] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.263185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.293555] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 34.300427] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.308176] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 34.317294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.326287] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.333690] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.340955] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 34.351628] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 34.357687] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.366879] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.375321] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.381714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.391749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.399418] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.405743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.420825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 34.429881] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 34.441127] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 34.453845] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.461338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.469923] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 34.475940] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 34.490180] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 34.497431] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 34.505071] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 34.515173] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.527568] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 34.537424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 34.566540] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 34.573924] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 34.581020] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 34.590643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.598022] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.605090] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 34.613694] device veth0_vlan entered promiscuous mode [ 34.622829] device veth1_vlan entered promiscuous mode [ 34.628906] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 34.637186] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 34.649353] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 34.658448] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 34.666561] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 34.674200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 34.683680] device veth0_macvtap entered promiscuous mode [ 34.690461] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 34.698201] device veth1_macvtap entered promiscuous mode [ 34.706933] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 34.716035] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 34.725753] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.733408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.742603] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 34.752849] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.759908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.865050] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 34.872062] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 34.880398] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 34.896214] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 34.906147] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready executing program [ 34.913235] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 34.921881] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 34.929817] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 34.943943] ================================================================== [ 34.951401] BUG: KASAN: use-after-free in __isofs_iget+0x1b13/0x2010 [ 34.957899] Read of size 1 at addr ffff88808d03f015 by task syz-executor435/8090 [ 34.965425] [ 34.967167] CPU: 1 PID: 8090 Comm: syz-executor435 Not tainted 4.19.195-syzkaller #0 [ 34.975044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 34.984390] Call Trace: [ 34.986963] dump_stack+0x1fc/0x2ef [ 34.990579] print_address_description.cold+0x54/0x219 [ 34.995854] kasan_report_error.cold+0x8a/0x1b9 [ 35.000539] ? __isofs_iget+0x1b13/0x2010 [ 35.004689] __asan_report_load1_noabort+0x88/0x90 [ 35.009599] ? __isofs_iget+0x1b13/0x2010 [ 35.013727] __isofs_iget+0x1b13/0x2010 [ 35.017685] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 35.022246] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 35.027328] ? isofs_dentry_cmp_ms+0x210/0x210 [ 35.031948] isofs_fh_to_dentry+0x117/0x1f0 [ 35.036293] exportfs_decode_fh+0x126/0x7e0 [ 35.040600] ? drop_caches_sysctl_handler+0x110/0x110 [ 35.045768] ? isofs_fh_to_parent+0x230/0x230 [ 35.050240] ? reconnect_path+0x7e0/0x7e0 [ 35.054364] ? debug_object_active_state+0x104/0x330 [ 35.059467] ? locks_remove_posix+0x2ad/0x5a0 [ 35.064002] ? do_lock_file_wait+0x4c0/0x4c0 [ 35.068397] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 35.072966] ? __might_fault+0x11f/0x1d0 [ 35.077009] ? lock_downgrade+0x720/0x720 [ 35.081133] ? lock_acquire+0x170/0x3c0 [ 35.085086] ? __might_fault+0xef/0x1d0 [ 35.089050] ? __might_fault+0x192/0x1d0 [ 35.093095] do_handle_open+0x2f4/0x650 [ 35.097048] ? do_sys_name_to_handle+0x480/0x480 [ 35.101813] ? fput+0x2b/0x190 [ 35.104990] ? trace_hardirqs_off_caller+0x6e/0x210 [ 35.110016] ? do_syscall_64+0x21/0x620 [ 35.113969] do_syscall_64+0xf9/0x620 [ 35.117751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 35.122924] RIP: 0033:0x455d29 [ 35.126095] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 35.144987] RSP: 002b:00007ffc96732f38 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 35.152699] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000455d29 [ 35.159953] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 35.167476] RBP: 0000000000000040 R08: 0000000000000000 R09: 000000000000000a [ 35.174730] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc96732f92 [ 35.181979] R13: 00000000004d14e0 R14: 00007ffc96732ff0 R15: 00007ffc96732fd0 [ 35.189245] [ 35.190850] The buggy address belongs to the page: [ 35.195759] page:ffffea0002340fc0 count:0 mapcount:0 mapping:0000000000000000 index:0x1 [ 35.203879] flags: 0xfff00000000000() [ 35.207677] raw: 00fff00000000000 ffffea0002410e08 ffffea00023c1f48 0000000000000000 [ 35.215544] raw: 0000000000000001 0000000000000000 00000000ffffffff 0000000000000000 [ 35.223401] page dumped because: kasan: bad access detected [ 35.229087] [ 35.230688] Memory state around the buggy address: [ 35.235616] ffff88808d03ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.242952] ffff88808d03ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.250289] >ffff88808d03f000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.257622] ^ [ 35.261491] ffff88808d03f080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.268856] ffff88808d03f100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.276201] ================================================================== [ 35.283542] Disabling lock debugging due to kernel taint [ 35.293319] Kernel panic - not syncing: panic_on_warn set ... [ 35.293319] [ 35.300695] CPU: 1 PID: 8090 Comm: syz-executor435 Tainted: G B 4.19.195-syzkaller #0 [ 35.309956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 35.319300] Call Trace: [ 35.321872] dump_stack+0x1fc/0x2ef [ 35.325477] panic+0x26a/0x50e [ 35.328669] ? __warn_printk+0xf3/0xf3 [ 35.332559] ? preempt_schedule_common+0x45/0xc0 [ 35.337292] ? ___preempt_schedule+0x16/0x18 [ 35.341677] ? trace_hardirqs_on+0x55/0x210 [ 35.345980] kasan_end_report+0x43/0x49 [ 35.349929] kasan_report_error.cold+0xa7/0x1b9 [ 35.354572] ? __isofs_iget+0x1b13/0x2010 [ 35.358699] __asan_report_load1_noabort+0x88/0x90 [ 35.363604] ? __isofs_iget+0x1b13/0x2010 [ 35.367746] __isofs_iget+0x1b13/0x2010 [ 35.371704] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 35.376266] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 35.381366] ? isofs_dentry_cmp_ms+0x210/0x210 [ 35.385946] isofs_fh_to_dentry+0x117/0x1f0 [ 35.390248] exportfs_decode_fh+0x126/0x7e0 [ 35.394553] ? drop_caches_sysctl_handler+0x110/0x110 [ 35.399721] ? isofs_fh_to_parent+0x230/0x230 [ 35.404190] ? reconnect_path+0x7e0/0x7e0 [ 35.408431] ? debug_object_active_state+0x104/0x330 [ 35.413515] ? locks_remove_posix+0x2ad/0x5a0 [ 35.417991] ? do_lock_file_wait+0x4c0/0x4c0 [ 35.422393] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 35.426968] ? __might_fault+0x11f/0x1d0 [ 35.431005] ? lock_downgrade+0x720/0x720 [ 35.435129] ? lock_acquire+0x170/0x3c0 [ 35.439078] ? __might_fault+0xef/0x1d0 [ 35.443031] ? __might_fault+0x192/0x1d0 [ 35.447071] do_handle_open+0x2f4/0x650 [ 35.451023] ? do_sys_name_to_handle+0x480/0x480 [ 35.455767] ? fput+0x2b/0x190 [ 35.458966] ? trace_hardirqs_off_caller+0x6e/0x210 [ 35.463962] ? do_syscall_64+0x21/0x620 [ 35.467916] do_syscall_64+0xf9/0x620 [ 35.471702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 35.476872] RIP: 0033:0x455d29 [ 35.480103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 35.498991] RSP: 002b:00007ffc96732f38 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 35.506677] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000455d29 [ 35.513923] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 35.521215] RBP: 0000000000000040 R08: 0000000000000000 R09: 000000000000000a [ 35.528475] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc96732f92 [ 35.535724] R13: 00000000004d14e0 R14: 00007ffc96732ff0 R15: 00007ffc96732fd0 [ 35.543838] Kernel Offset: disabled [ 35.547451] Rebooting in 86400 seconds..