[  OK  ] Started Getty on tty2.
[  OK  ] Started Getty on tty1.
[  OK  ] Started Serial Getty on ttyS0.
[  OK  ] Reached target Login Prompts.
[  OK  ] Reached target Multi-User System.
[  OK  ] Reached target Graphical Interface.
         Starting Update UTMP about System Runlevel Changes...
[  OK  ] Started Update UTMP about System Runlevel Changes.
         Starting Load/Save RF Kill Switch Status...
[  OK  ] Started Load/Save RF Kill Switch Status.


Debian GNU/Linux 9 syzkaller ttyS0

Warning: Permanently added '10.128.0.161' (ECDSA) to the list of known hosts.
2020/04/08 17:48:44 parsed 1 programs
2020/04/08 17:48:47 executed programs: 0
syzkaller login: [   44.076235] audit: type=1400 audit(1586368127.047:8): avc:  denied  { execmem } for  pid=6455 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1
[   44.108696] IPVS: ftp: loaded support on port[0] = 21
[   44.199602] chnl_net:caif_netlink_parms(): no params data found
[   44.307835] bridge0: port 1(bridge_slave_0) entered blocking state
[   44.314861] bridge0: port 1(bridge_slave_0) entered disabled state
[   44.322166] device bridge_slave_0 entered promiscuous mode
[   44.330827] bridge0: port 2(bridge_slave_1) entered blocking state
[   44.337921] bridge0: port 2(bridge_slave_1) entered disabled state
[   44.345749] device bridge_slave_1 entered promiscuous mode
[   44.363973] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   44.373003] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   44.393293] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   44.401010] team0: Port device team_slave_0 added
[   44.407183] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   44.414810] team0: Port device team_slave_1 added
[   44.430746] batman_adv: batadv0: Adding interface: batadv_slave_0
[   44.437194] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   44.462458] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   44.474467] batman_adv: batadv0: Adding interface: batadv_slave_1
[   44.480723] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   44.506268] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   44.517389] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   44.525498] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   44.587173] device hsr_slave_0 entered promiscuous mode
[   44.634638] device hsr_slave_1 entered promiscuous mode
[   44.685097] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[   44.692349] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[   44.767326] bridge0: port 2(bridge_slave_1) entered blocking state
[   44.773782] bridge0: port 2(bridge_slave_1) entered forwarding state
[   44.780810] bridge0: port 1(bridge_slave_0) entered blocking state
[   44.787262] bridge0: port 1(bridge_slave_0) entered forwarding state
[   44.822585] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[   44.829859] 8021q: adding VLAN 0 to HW filter on device bond0
[   44.839140] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   44.849329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   44.868509] bridge0: port 1(bridge_slave_0) entered disabled state
[   44.875860] bridge0: port 2(bridge_slave_1) entered disabled state
[   44.882872] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[   44.895357] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[   44.901523] 8021q: adding VLAN 0 to HW filter on device team0
[   44.911431] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   44.919305] bridge0: port 1(bridge_slave_0) entered blocking state
[   44.925865] bridge0: port 1(bridge_slave_0) entered forwarding state
[   44.936043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   44.943594] bridge0: port 2(bridge_slave_1) entered blocking state
[   44.949979] bridge0: port 2(bridge_slave_1) entered forwarding state
[   44.966735] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   44.975550] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   44.986824] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   45.000329] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[   45.010703] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[   45.021916] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[   45.028540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   45.036785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   45.045842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   45.058755] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[   45.067062] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   45.073733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   45.086488] 8021q: adding VLAN 0 to HW filter on device batadv0
[   45.099123] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready
[   45.109467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   45.147085] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready
[   45.155053] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready
[   45.161613] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready
[   45.172256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   45.180806] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   45.188600] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   45.198765] device veth0_vlan entered promiscuous mode
[   45.208694] device veth1_vlan entered promiscuous mode
[   45.223803] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready
[   45.233314] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready
[   45.240867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   45.249659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   45.259634] device veth0_macvtap entered promiscuous mode
[   45.266772] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready
[   45.275864] device veth1_macvtap entered promiscuous mode
[   45.282020] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready
[   45.292363] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready
[   45.302103] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready
[   45.311977] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready
[   45.320623] batman_adv: batadv0: Interface activated: batadv_slave_0
[   45.328452] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[   45.336592] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   45.343689] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   45.352230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   45.363654] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready
[   45.370929] batman_adv: batadv0: Interface activated: batadv_slave_1
[   45.377642] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   45.385589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   45.823444] ==================================================================
[   45.831094] BUG: KASAN: use-after-free in __list_add_valid+0x93/0xa0
[   45.837598] Read of size 8 at addr ffff8880a0194b20 by task syz-executor.0/6738
[   45.845042] 
[   45.846662] CPU: 1 PID: 6738 Comm: syz-executor.0 Not tainted 4.19.114-syzkaller #0
[   45.854439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   45.863818] Call Trace:
[   45.866411]  dump_stack+0x188/0x20d
[   45.870043]  ? __list_add_valid+0x93/0xa0
[   45.874302]  print_address_description.cold+0x7c/0x212
[   45.879615]  ? __list_add_valid+0x93/0xa0
[   45.883755]  kasan_report.cold+0x88/0x2b9
[   45.887903]  __list_add_valid+0x93/0xa0
[   45.891887]  rdma_listen+0x609/0x880
[   45.895599]  ucma_listen+0x14d/0x1c0
[   45.899311]  ? ucma_notify+0x190/0x190
[   45.903189]  ? __might_fault+0x192/0x1d0
[   45.907349]  ? _copy_from_user+0xd2/0x140
[   45.911493]  ? ucma_notify+0x190/0x190
[   45.915374]  ucma_write+0x285/0x350
[   45.918987]  ? ucma_open+0x280/0x280
[   45.922692]  ? __fget+0x319/0x510
[   45.926141]  __vfs_write+0xf7/0x760
[   45.929752]  ? ucma_open+0x280/0x280
[   45.933449]  ? kernel_read+0x110/0x110
[   45.937326]  ? __inode_security_revalidate+0xd3/0x120
[   45.942512]  ? avc_policy_seqno+0x9/0x70
[   45.946574]  ? selinux_file_permission+0x87/0x520
[   45.951406]  ? security_file_permission+0x84/0x220
[   45.956337]  vfs_write+0x206/0x550
[   45.959877]  ksys_write+0x12b/0x2a0
[   45.963491]  ? __ia32_sys_read+0xb0/0xb0
[   45.967538]  ? __ia32_sys_clock_settime+0x260/0x260
[   45.972550]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[   45.977289]  ? trace_hardirqs_off_caller+0x55/0x210
[   45.982300]  ? do_syscall_64+0x21/0x620
[   45.986261]  do_syscall_64+0xf9/0x620
[   45.990068]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[   45.995253] RIP: 0033:0x45c889
[   45.998434] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[   46.017495] RSP: 002b:00007f83ed078c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[   46.025186] RAX: ffffffffffffffda RBX: 00007f83ed0796d4 RCX: 000000000045c889
[   46.032465] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003
[   46.039716] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000
[   46.046976] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
[   46.054248] R13: 0000000000000cc0 R14: 00000000004cee8e R15: 000000000076bf0c
[   46.061512] 
[   46.063125] Allocated by task 6730:
[   46.066739]  kasan_kmalloc+0xbf/0xe0
[   46.070440]  kmem_cache_alloc_trace+0x14d/0x7a0
[   46.075093]  __rdma_create_id+0x5b/0x630
[   46.079136]  ucma_create_id+0x1cb/0x5a0
[   46.083093]  ucma_write+0x285/0x350
[   46.086703]  __vfs_write+0xf7/0x760
[   46.090311]  vfs_write+0x206/0x550
[   46.093832]  ksys_write+0x12b/0x2a0
[   46.097451]  do_syscall_64+0xf9/0x620
[   46.101248]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[   46.106418] 
[   46.108049] Freed by task 6730:
[   46.111313]  __kasan_slab_free+0xf7/0x140
[   46.115446]  kfree+0xce/0x220
[   46.118543]  ucma_close+0x10b/0x320
[   46.122155]  __fput+0x2cd/0x890
[   46.125424]  task_work_run+0x13f/0x1b0
[   46.129309]  exit_to_usermode_loop+0x25a/0x2b0
[   46.133882]  do_syscall_64+0x538/0x620
[   46.137776]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[   46.142941] 
[   46.144555] The buggy address belongs to the object at ffff8880a0194940
[   46.144555]  which belongs to the cache kmalloc-2048 of size 2048
[   46.157456] The buggy address is located 480 bytes inside of
[   46.157456]  2048-byte region [ffff8880a0194940, ffff8880a0195140)
[   46.169396] The buggy address belongs to the page:
[   46.174309] page:ffffea0002806500 count:1 mapcount:0 mapping:ffff88812c3dcc40 index:0x0 compound_mapcount: 0
[   46.184275] flags: 0xfffe0000008100(slab|head)
[   46.188860] raw: 00fffe0000008100 ffffea000220bd08 ffffea00022e6a08 ffff88812c3dcc40
[   46.196745] raw: 0000000000000000 ffff8880a01940c0 0000000100000003 0000000000000000
[   46.204650] page dumped because: kasan: bad access detected
[   46.210341] 
[   46.211961] Memory state around the buggy address:
[   46.216875]  ffff8880a0194a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.224234]  ffff8880a0194a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.231601] >ffff8880a0194b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.238958]                                ^
[   46.243357]  ffff8880a0194b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.250911]  ffff8880a0194c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.258269] ==================================================================
[   46.265763] Disabling lock debugging due to kernel taint
[   46.277438] Kernel panic - not syncing: panic_on_warn set ...
[   46.277438] 
[   46.284844] CPU: 1 PID: 6738 Comm: syz-executor.0 Tainted: G    B             4.19.114-syzkaller #0
[   46.294032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   46.303410] Call Trace:
[   46.306009]  dump_stack+0x188/0x20d
[   46.309648]  panic+0x26a/0x50e
[   46.312857]  ? __warn_printk+0xf3/0xf3
[   46.316749]  ? preempt_schedule_common+0x4a/0xc0
[   46.321489]  ? __list_add_valid+0x93/0xa0
[   46.325623]  ? ___preempt_schedule+0x16/0x18
[   46.330118]  ? trace_hardirqs_on+0x55/0x210
[   46.334485]  ? __list_add_valid+0x93/0xa0
[   46.338616]  kasan_end_report+0x43/0x49
[   46.342626]  kasan_report.cold+0xa4/0x2b9
[   46.346772]  __list_add_valid+0x93/0xa0
[   46.350808]  rdma_listen+0x609/0x880
[   46.354521]  ucma_listen+0x14d/0x1c0
[   46.358224]  ? ucma_notify+0x190/0x190
[   46.362143]  ? __might_fault+0x192/0x1d0
[   46.366188]  ? _copy_from_user+0xd2/0x140
[   46.370320]  ? ucma_notify+0x190/0x190
[   46.374203]  ucma_write+0x285/0x350
[   46.377911]  ? ucma_open+0x280/0x280
[   46.381615]  ? __fget+0x319/0x510
[   46.385103]  __vfs_write+0xf7/0x760
[   46.388717]  ? ucma_open+0x280/0x280
[   46.393181]  ? kernel_read+0x110/0x110
[   46.397079]  ? __inode_security_revalidate+0xd3/0x120
[   46.402304]  ? avc_policy_seqno+0x9/0x70
[   46.406394]  ? selinux_file_permission+0x87/0x520
[   46.411234]  ? security_file_permission+0x84/0x220
[   46.416153]  vfs_write+0x206/0x550
[   46.419681]  ksys_write+0x12b/0x2a0
[   46.423291]  ? __ia32_sys_read+0xb0/0xb0
[   46.427339]  ? __ia32_sys_clock_settime+0x260/0x260
[   46.432343]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[   46.437096]  ? trace_hardirqs_off_caller+0x55/0x210
[   46.442096]  ? do_syscall_64+0x21/0x620
[   46.446055]  do_syscall_64+0xf9/0x620
[   46.449843]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[   46.455031] RIP: 0033:0x45c889
[   46.458215] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[   46.477225] RSP: 002b:00007f83ed078c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[   46.484921] RAX: ffffffffffffffda RBX: 00007f83ed0796d4 RCX: 000000000045c889
[   46.492178] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003
[   46.499442] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000
[   46.506708] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
[   46.513968] R13: 0000000000000cc0 R14: 00000000004cee8e R15: 000000000076bf0c
[   46.522639] Kernel Offset: disabled
[   46.526264] Rebooting in 86400 seconds..