[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.139' (ECDSA) to the list of known hosts. 2020/03/30 23:38:51 parsed 1 programs 2020/03/30 23:38:53 executed programs: 0 syzkaller login: [ 61.908545][ T7022] IPVS: ftp: loaded support on port[0] = 21 [ 61.988684][ T7022] chnl_net:caif_netlink_parms(): no params data found [ 62.036842][ T7022] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.045546][ T7022] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.054099][ T7022] device bridge_slave_0 entered promiscuous mode [ 62.062609][ T7022] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.069710][ T7022] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.078229][ T7022] device bridge_slave_1 entered promiscuous mode [ 62.097865][ T7022] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.108836][ T7022] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.130021][ T7022] team0: Port device team_slave_0 added [ 62.137206][ T7022] team0: Port device team_slave_1 added [ 62.153573][ T7022] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 62.160529][ T7022] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 62.186566][ T7022] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 62.198965][ T7022] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 62.206166][ T7022] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 62.232172][ T7022] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 62.325293][ T7022] device hsr_slave_0 entered promiscuous mode [ 62.373116][ T7022] device hsr_slave_1 entered promiscuous mode [ 62.491942][ T7022] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 62.565059][ T7022] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 62.615232][ T7022] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 62.674491][ T7022] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 62.726603][ T7022] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.733839][ T7022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.741577][ T7022] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.748705][ T7022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.791997][ T7022] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.805467][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.816244][ T4694] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.824664][ T4694] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.834462][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 62.847711][ T7022] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.858787][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.867861][ T3200] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.874992][ T3200] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.886842][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.896102][ T4694] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.903232][ T4694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.923885][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.934003][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.943494][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.955768][ T2725] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.969182][ T2725] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.980778][ T7022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 62.999728][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 63.007375][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 63.021118][ T7022] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.039732][ T2725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 63.049176][ T2725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 63.068936][ T7022] device veth0_vlan entered promiscuous mode [ 63.080280][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 63.089511][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 63.100057][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 63.108662][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 63.121288][ T7022] device veth1_vlan entered promiscuous mode [ 63.140100][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 63.149513][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 63.158323][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 63.167250][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 63.179791][ T7022] device veth0_macvtap entered promiscuous mode [ 63.190645][ T7022] device veth1_macvtap entered promiscuous mode [ 63.207772][ T7022] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 63.215717][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 63.224486][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 63.233305][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 63.241815][ T4694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 63.255881][ T7022] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 63.263683][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 63.273623][ T3199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 63.596563][ T7244] ================================================================== [ 63.604857][ T7244] BUG: KASAN: use-after-free in __list_add_valid+0x93/0xa0 [ 63.612067][ T7244] Read of size 8 at addr ffff88809ed521e0 by task syz-executor.0/7244 [ 63.620212][ T7244] [ 63.622548][ T7244] CPU: 0 PID: 7244 Comm: syz-executor.0 Not tainted 5.6.0-syzkaller #0 [ 63.630786][ T7244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.640910][ T7244] Call Trace: [ 63.644202][ T7244] dump_stack+0x188/0x20d [ 63.648521][ T7244] ? __list_add_valid+0x93/0xa0 [ 63.653352][ T7244] ? __list_add_valid+0x93/0xa0 [ 63.658192][ T7244] print_address_description.constprop.0.cold+0xd3/0x315 [ 63.665254][ T7244] ? __list_add_valid+0x93/0xa0 [ 63.670123][ T7244] ? __list_add_valid+0x93/0xa0 [ 63.674993][ T7244] __kasan_report.cold+0x1a/0x32 [ 63.679913][ T7244] ? __list_add_valid+0x93/0xa0 [ 63.684854][ T7244] kasan_report+0xe/0x20 [ 63.689085][ T7244] __list_add_valid+0x93/0xa0 [ 63.693749][ T7244] rdma_listen+0x681/0x910 [ 63.698152][ T7244] ucma_listen+0x14d/0x1c0 [ 63.702550][ T7244] ? ucma_notify+0x190/0x190 [ 63.707120][ T7244] ? __might_fault+0x190/0x1d0 [ 63.711876][ T7244] ? _copy_from_user+0x123/0x190 [ 63.716806][ T7244] ? ucma_notify+0x190/0x190 [ 63.721373][ T7244] ucma_write+0x285/0x350 [ 63.725695][ T7244] ? ucma_open+0x270/0x270 [ 63.730096][ T7244] ? security_file_permission+0x8a/0x370 [ 63.735710][ T7244] ? ucma_open+0x270/0x270 [ 63.740113][ T7244] __vfs_write+0x76/0x100 [ 63.744458][ T7244] vfs_write+0x262/0x5c0 [ 63.748682][ T7244] ksys_write+0x1e8/0x250 [ 63.752989][ T7244] ? __ia32_sys_read+0xb0/0xb0 [ 63.757727][ T7244] ? __x64_sys_clock_gettime32+0x240/0x240 [ 63.763564][ T7244] ? trace_hardirqs_off_caller+0x55/0x230 [ 63.769287][ T7244] do_fast_syscall_32+0x270/0xe8f [ 63.774418][ T7244] entry_SYSENTER_compat+0x70/0x7f [ 63.779521][ T7244] [ 63.781833][ T7244] Allocated by task 7231: [ 63.786156][ T7244] save_stack+0x1b/0x80 [ 63.790296][ T7244] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 63.795906][ T7244] kmem_cache_alloc_trace+0x153/0x7d0 [ 63.801252][ T7244] __rdma_create_id+0x5b/0x850 [ 63.806032][ T7244] ucma_create_id+0x1cb/0x580 [ 63.810686][ T7244] ucma_write+0x285/0x350 [ 63.815001][ T7244] __vfs_write+0x76/0x100 [ 63.819306][ T7244] vfs_write+0x262/0x5c0 [ 63.823536][ T7244] ksys_write+0x1e8/0x250 [ 63.827845][ T7244] do_fast_syscall_32+0x270/0xe8f [ 63.832851][ T7244] entry_SYSENTER_compat+0x70/0x7f [ 63.837943][ T7244] [ 63.840249][ T7244] Freed by task 7230: [ 63.844208][ T7244] save_stack+0x1b/0x80 [ 63.848339][ T7244] __kasan_slab_free+0xf7/0x140 [ 63.853173][ T7244] kfree+0x109/0x2b0 [ 63.857053][ T7244] ucma_close+0x10b/0x300 [ 63.861356][ T7244] __fput+0x2da/0x850 [ 63.865315][ T7244] task_work_run+0x13f/0x1b0 [ 63.869880][ T7244] exit_to_usermode_loop+0x2fa/0x360 [ 63.875141][ T7244] do_fast_syscall_32+0xbef/0xe8f [ 63.880140][ T7244] entry_SYSENTER_compat+0x70/0x7f [ 63.885232][ T7244] [ 63.887540][ T7244] The buggy address belongs to the object at ffff88809ed52000 [ 63.887540][ T7244] which belongs to the cache kmalloc-2k of size 2048 [ 63.901568][ T7244] The buggy address is located 480 bytes inside of [ 63.901568][ T7244] 2048-byte region [ffff88809ed52000, ffff88809ed52800) [ 63.914906][ T7244] The buggy address belongs to the page: [ 63.920513][ T7244] page:ffffea00027b5480 refcount:1 mapcount:0 mapping:ffff8880aa000e00 index:0x0 [ 63.929601][ T7244] flags: 0xfffe0000000200(slab) [ 63.934430][ T7244] raw: 00fffe0000000200 ffffea00027b8cc8 ffffea00029af548 ffff8880aa000e00 [ 63.942999][ T7244] raw: 0000000000000000 ffff88809ed52000 0000000100000001 0000000000000000 [ 63.951593][ T7244] page dumped because: kasan: bad access detected [ 63.957993][ T7244] [ 63.960301][ T7244] Memory state around the buggy address: [ 63.965919][ T7244] ffff88809ed52080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.973957][ T7244] ffff88809ed52100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.981996][ T7244] >ffff88809ed52180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.990029][ T7244] ^ [ 63.997209][ T7244] ffff88809ed52200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.005244][ T7244] ffff88809ed52280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.013276][ T7244] ================================================================== [ 64.021306][ T7244] Disabling lock debugging due to kernel taint [ 64.033758][ T7244] Kernel panic - not syncing: panic_on_warn set ... [ 64.040524][ T7244] CPU: 0 PID: 7244 Comm: syz-executor.0 Tainted: G B 5.6.0-syzkaller #0 [ 64.050147][ T7244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.060310][ T7244] Call Trace: [ 64.063591][ T7244] dump_stack+0x188/0x20d [ 64.067979][ T7244] panic+0x2e3/0x75c [ 64.071933][ T7244] ? add_taint.cold+0x16/0x16 [ 64.076608][ T7244] ? preempt_schedule_common+0x5e/0xc0 [ 64.082063][ T7244] ? __list_add_valid+0x93/0xa0 [ 64.086958][ T7244] ? ___preempt_schedule+0x16/0x18 [ 64.092052][ T7244] ? trace_hardirqs_on+0x55/0x220 [ 64.097063][ T7244] ? __list_add_valid+0x93/0xa0 [ 64.103817][ T7244] end_report+0x43/0x49 [ 64.107999][ T7244] ? __list_add_valid+0x93/0xa0 [ 64.112840][ T7244] __kasan_report.cold+0xd/0x32 [ 64.117679][ T7244] ? __list_add_valid+0x93/0xa0 [ 64.122554][ T7244] kasan_report+0xe/0x20 [ 64.126787][ T7244] __list_add_valid+0x93/0xa0 [ 64.131489][ T7244] rdma_listen+0x681/0x910 [ 64.135892][ T7244] ucma_listen+0x14d/0x1c0 [ 64.140308][ T7244] ? ucma_notify+0x190/0x190 [ 64.144879][ T7244] ? __might_fault+0x190/0x1d0 [ 64.149662][ T7244] ? _copy_from_user+0x123/0x190 [ 64.154714][ T7244] ? ucma_notify+0x190/0x190 [ 64.159295][ T7244] ucma_write+0x285/0x350 [ 64.163607][ T7244] ? ucma_open+0x270/0x270 [ 64.168140][ T7244] ? security_file_permission+0x8a/0x370 [ 64.173766][ T7244] ? ucma_open+0x270/0x270 [ 64.178196][ T7244] __vfs_write+0x76/0x100 [ 64.182508][ T7244] vfs_write+0x262/0x5c0 [ 64.186731][ T7244] ksys_write+0x1e8/0x250 [ 64.191083][ T7244] ? __ia32_sys_read+0xb0/0xb0 [ 64.195826][ T7244] ? __x64_sys_clock_gettime32+0x240/0x240 [ 64.201610][ T7244] ? trace_hardirqs_off_caller+0x55/0x230 [ 64.207309][ T7244] do_fast_syscall_32+0x270/0xe8f [ 64.212378][ T7244] entry_SYSENTER_compat+0x70/0x7f [ 64.218637][ T7244] Kernel Offset: disabled [ 64.222960][ T7244] Rebooting in 86400 seconds..