Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.19' (ECDSA) to the list of known hosts. 2021/04/14 13:05:21 parsed 1 programs 2021/04/14 13:05:21 executed programs: 0 syzkaller login: [ 31.473527] IPVS: ftp: loaded support on port[0] = 21 [ 31.558058] chnl_net:caif_netlink_parms(): no params data found [ 31.629483] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.636816] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.644924] device bridge_slave_0 entered promiscuous mode [ 31.653790] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.661888] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.669457] device bridge_slave_1 entered promiscuous mode [ 31.687784] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 31.697200] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 31.716574] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 31.723786] team0: Port device team_slave_0 added [ 31.729139] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 31.737407] team0: Port device team_slave_1 added [ 31.753959] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.760768] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.787751] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.801313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.807653] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.836032] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.848767] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 31.857872] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 31.878498] device hsr_slave_0 entered promiscuous mode [ 31.884210] device hsr_slave_1 entered promiscuous mode [ 31.891502] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 31.898593] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 31.963795] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.970654] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.977555] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.983984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.011938] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 32.018017] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.027196] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 32.036687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 32.045580] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.064424] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.075353] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 32.081897] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.090167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 32.098259] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.105620] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.126358] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 32.137486] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 32.149081] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 32.156662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.165439] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.172021] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.179738] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 32.188195] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 32.197395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 32.205349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 32.213871] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 32.221073] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 32.234330] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 32.241497] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 32.248580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 32.258976] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.312383] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 32.323412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 32.353761] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 32.360981] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 32.367499] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 32.377744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.386253] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.393401] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.402193] device veth0_vlan entered promiscuous mode [ 32.412138] device veth1_vlan entered promiscuous mode [ 32.417980] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 32.427242] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 32.438559] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 32.448527] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 32.456143] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 32.463798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.473684] device veth0_macvtap entered promiscuous mode [ 32.479661] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 32.488141] device veth1_macvtap entered promiscuous mode [ 32.496417] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 32.505740] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 32.515805] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.523270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.531324] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 32.538672] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 32.548202] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 32.555706] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.563005] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.571534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.489491] Bluetooth: hci0 command 0x0409 tx timeout [ 34.390139] ================================================================== [ 34.397709] BUG: KASAN: use-after-free in __list_add_valid+0x93/0xa0 [ 34.404192] Read of size 8 at addr ffff8880a9fadcd8 by task syz-executor.0/8685 [ 34.411625] [ 34.413265] CPU: 1 PID: 8685 Comm: syz-executor.0 Not tainted 4.14.230-syzkaller #0 [ 34.421038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 34.430387] Call Trace: [ 34.432977] dump_stack+0x1b2/0x281 [ 34.436607] print_address_description.cold+0x54/0x1d3 [ 34.442021] kasan_report_error.cold+0x8a/0x191 [ 34.447129] ? __list_add_valid+0x93/0xa0 [ 34.451262] __asan_report_load8_noabort+0x68/0x70 [ 34.456531] ? __list_add_valid+0x93/0xa0 [ 34.460684] __list_add_valid+0x93/0xa0 [ 34.464679] rdma_listen+0x656/0x9b0 [ 34.468380] ucma_listen+0x10b/0x170 [ 34.472094] ? ucma_bind_ip+0x150/0x150 [ 34.476503] ? _copy_from_user+0x96/0x100 [ 34.480646] ? ucma_bind_ip+0x150/0x150 [ 34.484707] ucma_write+0x206/0x2c0 [ 34.488327] ? ucma_set_ib_path+0x510/0x510 [ 34.492946] __vfs_write+0xe4/0x630 [ 34.496760] ? ucma_set_ib_path+0x510/0x510 [ 34.501172] ? debug_check_no_obj_freed+0x2c0/0x680 [ 34.507175] ? kernel_read+0x110/0x110 [ 34.511135] ? common_file_perm+0x3ee/0x580 [ 34.515713] ? security_file_permission+0x82/0x1e0 [ 34.520733] ? rw_verify_area+0xe1/0x2a0 [ 34.524778] vfs_write+0x17f/0x4d0 [ 34.528394] SyS_write+0xf2/0x210 [ 34.531835] ? SyS_read+0x210/0x210 [ 34.535445] ? __do_page_fault+0x159/0xad0 [ 34.539661] ? do_syscall_64+0x4c/0x640 [ 34.543612] ? SyS_read+0x210/0x210 [ 34.547224] do_syscall_64+0x1d5/0x640 [ 34.551096] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 34.556271] RIP: 0033:0x466459 [ 34.559448] RSP: 002b:00007f8a0e26b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 34.567149] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 34.574413] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 [ 34.581676] RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000 [ 34.588931] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 34.596280] R13: 00007ffe40edd25f R14: 00007f8a0e26b300 R15: 0000000000022000 [ 34.603553] [ 34.605178] Allocated by task 8677: [ 34.608973] kasan_kmalloc+0xeb/0x160 [ 34.613024] kmem_cache_alloc_trace+0x131/0x3d0 [ 34.617684] rdma_create_id+0x57/0x4c0 [ 34.621564] ucma_create_id+0x18b/0x500 [ 34.625759] ucma_write+0x206/0x2c0 [ 34.629379] __vfs_write+0xe4/0x630 [ 34.633111] vfs_write+0x17f/0x4d0 [ 34.636807] SyS_write+0xf2/0x210 [ 34.640250] do_syscall_64+0x1d5/0x640 [ 34.644118] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 34.649307] [ 34.650919] Freed by task 8681: [ 34.654186] kasan_slab_free+0xc3/0x1a0 [ 34.658228] kfree+0xc9/0x250 [ 34.661318] ucma_close+0x11a/0x340 [ 34.664922] __fput+0x25f/0x7a0 [ 34.668193] task_work_run+0x11f/0x190 [ 34.672148] get_signal+0x18a3/0x1ca0 [ 34.675946] do_signal+0x7c/0x1550 [ 34.679464] exit_to_usermode_loop+0x160/0x200 [ 34.684027] do_syscall_64+0x4a3/0x640 [ 34.687895] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 34.693073] [ 34.694682] The buggy address belongs to the object at ffff8880a9fadb00 [ 34.694682] which belongs to the cache kmalloc-1024 of size 1024 [ 34.707491] The buggy address is located 472 bytes inside of [ 34.707491] 1024-byte region [ffff8880a9fadb00, ffff8880a9fadf00) [ 34.719710] The buggy address belongs to the page: [ 34.724720] page:ffffea0002a7eb00 count:1 mapcount:0 mapping:ffff8880a9fac000 index:0x0 compound_mapcount: 0 [ 34.734690] flags: 0xfff00000008100(slab|head) [ 34.739278] raw: 00fff00000008100 ffff8880a9fac000 0000000000000000 0000000100000007 [ 34.747407] raw: ffffea000287fba0 ffffea000285d7a0 ffff88813fe80ac0 0000000000000000 [ 34.755569] page dumped because: kasan: bad access detected [ 34.761277] [ 34.762913] Memory state around the buggy address: [ 34.767826] ffff8880a9fadb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.775161] ffff8880a9fadc00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.782501] >ffff8880a9fadc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.790464] ^ [ 34.796684] ffff8880a9fadd00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.804028] ffff8880a9fadd80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.811871] ================================================================== [ 34.819302] Disabling lock debugging due to kernel taint [ 34.837802] Kernel panic - not syncing: panic_on_warn set ... [ 34.837802] [ 34.837812] CPU: 0 PID: 8685 Comm: syz-executor.0 Tainted: G B 4.14.230-syzkaller #0 [ 34.837816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 34.837825] Call Trace: [ 34.868539] dump_stack+0x1b2/0x281 [ 34.872416] panic+0x1f9/0x42d [ 34.875680] ? add_taint.cold+0x16/0x16 [ 34.879709] ? ___preempt_schedule+0x16/0x18 [ 34.885187] kasan_end_report+0x43/0x49 [ 34.889206] kasan_report_error.cold+0xa7/0x191 [ 34.893948] ? __list_add_valid+0x93/0xa0 [ 34.898088] __asan_report_load8_noabort+0x68/0x70 [ 34.903002] ? __list_add_valid+0x93/0xa0 [ 34.907233] __list_add_valid+0x93/0xa0 [ 34.911307] rdma_listen+0x656/0x9b0 [ 34.915194] ucma_listen+0x10b/0x170 [ 34.918924] ? ucma_bind_ip+0x150/0x150 [ 34.923406] ? _copy_from_user+0x96/0x100 [ 34.927541] ? ucma_bind_ip+0x150/0x150 [ 34.931677] ucma_write+0x206/0x2c0 [ 34.935283] ? ucma_set_ib_path+0x510/0x510 [ 34.940125] __vfs_write+0xe4/0x630 [ 34.943821] ? ucma_set_ib_path+0x510/0x510 [ 34.948819] ? debug_check_no_obj_freed+0x2c0/0x680 [ 34.953818] ? kernel_read+0x110/0x110 [ 34.957893] ? common_file_perm+0x3ee/0x580 [ 34.962863] ? security_file_permission+0x82/0x1e0 [ 34.967956] ? rw_verify_area+0xe1/0x2a0 [ 34.971995] vfs_write+0x17f/0x4d0 [ 34.975517] SyS_write+0xf2/0x210 [ 34.978948] ? SyS_read+0x210/0x210 [ 34.982645] ? __do_page_fault+0x159/0xad0 [ 34.986870] ? do_syscall_64+0x4c/0x640 [ 34.990833] ? SyS_read+0x210/0x210 [ 34.994446] do_syscall_64+0x1d5/0x640 [ 34.998314] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 35.003477] RIP: 0033:0x466459 [ 35.006654] RSP: 002b:00007f8a0e26b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 35.014370] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 35.021622] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 [ 35.028974] RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000 [ 35.036227] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 35.043593] R13: 00007ffe40edd25f R14: 00007f8a0e26b300 R15: 0000000000022000 [ 35.051405] Kernel Offset: disabled [ 35.055037] Rebooting in 86400 seconds..