[ OK ] Started OpenBSD Secure Shell server. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.15' (ECDSA) to the list of known hosts. 2020/05/29 16:09:00 parsed 1 programs 2020/05/29 16:09:00 executed programs: 0 syzkaller login: [ 34.275847] audit: type=1400 audit(1590768540.891:8): avc: denied { execmem } for pid=6334 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 34.519793] IPVS: ftp: loaded support on port[0] = 21 [ 35.334598] chnl_net:caif_netlink_parms(): no params data found [ 35.477260] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.484204] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.493205] device bridge_slave_0 entered promiscuous mode [ 35.500833] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.507295] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.514967] device bridge_slave_1 entered promiscuous mode [ 35.531937] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 35.540851] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 35.558912] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 35.566283] team0: Port device team_slave_0 added [ 35.572387] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 35.579952] team0: Port device team_slave_1 added [ 35.595531] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.601920] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.628753] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.640117] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.646425] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.672502] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.683919] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 35.691691] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 35.740555] device hsr_slave_0 entered promiscuous mode [ 35.768275] device hsr_slave_1 entered promiscuous mode [ 35.828565] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 35.835573] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 35.897157] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.903813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.910752] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.917099] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.946195] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 35.953113] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.961585] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 35.971177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.989571] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.996579] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.006633] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 36.013115] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.021428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.029565] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.035899] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.048880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.056434] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.062815] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.073691] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 36.081351] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 36.094328] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 36.104425] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 36.114888] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 36.121652] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 36.129824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.137313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.145380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 36.159275] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 36.166398] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 36.173751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 36.183681] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.231601] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 36.241635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.271252] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 36.279088] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 36.285501] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 36.294761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.302677] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.309798] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.316709] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 36.326320] device veth0_vlan entered promiscuous mode [ 36.335537] device veth1_vlan entered promiscuous mode [ 36.348307] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 36.356775] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 36.363848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 36.372332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.382040] device veth0_macvtap entered promiscuous mode [ 36.388830] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 36.396563] device veth1_macvtap entered promiscuous mode [ 36.403729] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 36.412531] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 36.422250] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 36.431256] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 36.438483] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.445182] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 36.452587] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 36.459711] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 36.467261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.477739] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 36.484579] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.491616] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 36.499480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.528373] ================================================================== [ 37.535942] BUG: KASAN: use-after-free in __list_add_valid+0x93/0xa0 [ 37.542412] Read of size 8 at addr ffff888094f48698 by task syz-executor.0/6585 [ 37.549829] [ 37.551433] CPU: 0 PID: 6585 Comm: syz-executor.0 Not tainted 4.14.182-syzkaller #0 [ 37.559199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.568534] Call Trace: [ 37.571174] dump_stack+0x1b2/0x283 [ 37.574778] ? __list_add_valid+0x93/0xa0 [ 37.578904] print_address_description.cold+0x54/0x1dc [ 37.584157] ? __list_add_valid+0x93/0xa0 [ 37.588282] kasan_report.cold+0xa9/0x2b9 [ 37.592424] __list_add_valid+0x93/0xa0 [ 37.596376] rdma_listen+0x54b/0x7d0 [ 37.600066] ucma_listen+0x10b/0x160 [ 37.603768] ? ucma_accept+0x2a0/0x2a0 [ 37.607633] ? _copy_from_user+0x94/0x100 [ 37.611756] ? ucma_accept+0x2a0/0x2a0 [ 37.615633] ucma_write+0x206/0x2c0 [ 37.619247] ? ucma_destroy_id+0x400/0x400 [ 37.623545] ? lock_downgrade+0x6e0/0x6e0 [ 37.627670] __vfs_write+0xe4/0x630 [ 37.631269] ? ucma_destroy_id+0x400/0x400 [ 37.635483] ? kernel_read+0x110/0x110 [ 37.639367] ? __inode_security_revalidate+0xcf/0x120 [ 37.644553] ? avc_policy_seqno+0x5/0x10 [ 37.648598] ? selinux_file_permission+0x7a/0x440 [ 37.653422] ? security_file_permission+0x82/0x1e0 [ 37.658330] ? rw_verify_area+0xe1/0x290 [ 37.662386] vfs_write+0x17f/0x4d0 [ 37.665905] SyS_write+0xf2/0x210 [ 37.669334] ? SyS_read+0x210/0x210 [ 37.672935] ? SyS_clock_settime+0x1a0/0x1a0 [ 37.677341] ? do_syscall_64+0x4c/0x640 [ 37.681308] ? SyS_read+0x210/0x210 [ 37.684911] do_syscall_64+0x1d5/0x640 [ 37.688779] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 37.693943] RIP: 0033:0x45ca69 [ 37.697108] RSP: 002b:00007fecf0c17c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 37.704804] RAX: ffffffffffffffda RBX: 000000000050c200 RCX: 000000000045ca69 [ 37.712056] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 [ 37.719356] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 37.727023] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 37.734330] R13: 0000000000000cce R14: 00000000004cf1fb R15: 00007fecf0c186d4 [ 37.741587] [ 37.743191] Allocated by task 6577: [ 37.746805] kasan_kmalloc.part.0+0x4f/0xd0 [ 37.751112] kmem_cache_alloc_trace+0x14d/0x3f0 [ 37.755764] rdma_create_id+0x57/0x4c0 [ 37.759652] ucma_create_id+0x18b/0x500 [ 37.763692] ucma_write+0x206/0x2c0 [ 37.767297] __vfs_write+0xe4/0x630 [ 37.770921] vfs_write+0x17f/0x4d0 [ 37.774435] SyS_write+0xf2/0x210 [ 37.777866] do_syscall_64+0x1d5/0x640 [ 37.781734] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 37.786902] [ 37.788531] Freed by task 6576: [ 37.791795] kasan_slab_free+0xaf/0x190 [ 37.795762] kfree+0xcb/0x260 [ 37.798844] ucma_close+0x105/0x300 [ 37.803070] __fput+0x25f/0x7a0 [ 37.806327] task_work_run+0x113/0x190 [ 37.810202] exit_to_usermode_loop+0x1ad/0x200 [ 37.814762] do_syscall_64+0x4a3/0x640 [ 37.818627] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 37.823808] [ 37.825431] The buggy address belongs to the object at ffff888094f484c0 [ 37.825431] which belongs to the cache kmalloc-1024 of size 1024 [ 37.838260] The buggy address is located 472 bytes inside of [ 37.838260] 1024-byte region [ffff888094f484c0, ffff888094f488c0) [ 37.850282] The buggy address belongs to the page: [ 37.855190] page:ffffea000253d200 count:1 mapcount:0 mapping:ffff888094f48040 index:0x0 compound_mapcount: 0 [ 37.865223] flags: 0xfffe0000008100(slab|head) [ 37.869936] raw: 00fffe0000008100 ffff888094f48040 0000000000000000 0000000100000007 [ 37.877795] raw: ffffea00027a64a0 ffffea000254f320 ffff8880aa800ac0 0000000000000000 [ 37.885665] page dumped because: kasan: bad access detected [ 37.891468] [ 37.893074] Memory state around the buggy address: [ 37.897979] ffff888094f48580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.905332] ffff888094f48600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.912670] >ffff888094f48680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.920022] ^ [ 37.924145] ffff888094f48700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.931480] ffff888094f48780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.938821] ================================================================== [ 37.946173] Disabling lock debugging due to kernel taint [ 37.955746] Kernel panic - not syncing: panic_on_warn set ... [ 37.955746] [ 37.963116] CPU: 0 PID: 6585 Comm: syz-executor.0 Tainted: G B 4.14.182-syzkaller #0 [ 37.972112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.981508] Call Trace: [ 37.984077] dump_stack+0x1b2/0x283 [ 37.987773] panic+0x1f9/0x42d [ 37.990941] ? add_taint.cold+0x16/0x16 [ 37.994894] ? preempt_schedule_common+0x4a/0xc0 [ 37.999645] ? __list_add_valid+0x93/0xa0 [ 38.003789] ? ___preempt_schedule+0x16/0x18 [ 38.008172] ? __list_add_valid+0x93/0xa0 [ 38.012316] kasan_end_report+0x43/0x49 [ 38.016265] kasan_report.cold+0x12f/0x2b9 [ 38.020478] __list_add_valid+0x93/0xa0 [ 38.024427] rdma_listen+0x54b/0x7d0 [ 38.028135] ucma_listen+0x10b/0x160 [ 38.031911] ? ucma_accept+0x2a0/0x2a0 [ 38.035785] ? _copy_from_user+0x94/0x100 [ 38.040190] ? ucma_accept+0x2a0/0x2a0 [ 38.044070] ucma_write+0x206/0x2c0 [ 38.047715] ? ucma_destroy_id+0x400/0x400 [ 38.051964] ? lock_downgrade+0x6e0/0x6e0 [ 38.056110] __vfs_write+0xe4/0x630 [ 38.060762] ? ucma_destroy_id+0x400/0x400 [ 38.064974] ? kernel_read+0x110/0x110 [ 38.068857] ? __inode_security_revalidate+0xcf/0x120 [ 38.074022] ? avc_policy_seqno+0x5/0x10 [ 38.078060] ? selinux_file_permission+0x7a/0x440 [ 38.082896] ? security_file_permission+0x82/0x1e0 [ 38.087807] ? rw_verify_area+0xe1/0x290 [ 38.092193] vfs_write+0x17f/0x4d0 [ 38.095969] SyS_write+0xf2/0x210 [ 38.099399] ? SyS_read+0x210/0x210 [ 38.103000] ? SyS_clock_settime+0x1a0/0x1a0 [ 38.107385] ? do_syscall_64+0x4c/0x640 [ 38.111350] ? SyS_read+0x210/0x210 [ 38.114951] do_syscall_64+0x1d5/0x640 [ 38.118841] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 38.124005] RIP: 0033:0x45ca69 [ 38.127191] RSP: 002b:00007fecf0c17c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 38.134889] RAX: ffffffffffffffda RBX: 000000000050c200 RCX: 000000000045ca69 [ 38.142228] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 [ 38.149492] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 38.156741] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 38.164010] R13: 0000000000000cce R14: 00000000004cf1fb R15: 00007fecf0c186d4 [ 38.172590] Kernel Offset: disabled [ 38.176210] Rebooting in 86400 seconds..