Warning: Permanently added '10.128.0.127' (ECDSA) to the list of known hosts. syzkaller login: [ 52.919437][ T8359] IPVS: ftp: loaded support on port[0] = 21 [ 53.073863][ T8359] chnl_net:caif_netlink_parms(): no params data found [ 53.124904][ T8359] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.132681][ T8359] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.140584][ T8359] device bridge_slave_0 entered promiscuous mode [ 53.152862][ T8359] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.160072][ T8359] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.169295][ T8359] device bridge_slave_1 entered promiscuous mode [ 53.190586][ T8359] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.204438][ T8359] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.227735][ T8359] team0: Port device team_slave_0 added [ 53.235322][ T8359] team0: Port device team_slave_1 added [ 53.253798][ T8359] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 53.261296][ T8359] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.289575][ T8359] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 53.303333][ T8359] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 53.310592][ T8359] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.337464][ T8359] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 53.364839][ T8359] device hsr_slave_0 entered promiscuous mode [ 53.372436][ T8359] device hsr_slave_1 entered promiscuous mode [ 53.472980][ T8359] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 53.485077][ T8359] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 53.495947][ T8359] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 53.507179][ T8359] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 53.531363][ T8359] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.538649][ T8359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.546774][ T8359] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.553965][ T8359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.602787][ T8359] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.616799][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.629698][ T3130] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.639138][ T3130] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.648152][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 53.663214][ T8359] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.676032][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.684609][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.692004][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.705255][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.714212][ T3130] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.721471][ T3130] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.742258][ T4806] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.762338][ T4806] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.770340][ T4806] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.780241][ T4806] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.789446][ T4806] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.802143][ T8359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 53.820818][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 53.828335][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 53.842977][ T8359] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.863383][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 53.883410][ T4806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.892090][ T4806] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 53.899912][ T4806] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 53.915650][ T8359] device veth0_vlan entered promiscuous mode [ 53.929413][ T8359] device veth1_vlan entered promiscuous mode [ 53.950854][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 53.959026][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 53.968584][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 53.981905][ T8359] device veth0_macvtap entered promiscuous mode [ 53.993709][ T8359] device veth1_macvtap entered promiscuous mode [ 54.011972][ T8359] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 54.019500][ T4806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 54.030002][ T4806] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 54.045462][ T8359] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 54.054407][ T4806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 54.068891][ T8359] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.082005][ T8359] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.091299][ T8359] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.100027][ T8359] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.153547][ T8359] ================================================================== [ 54.161841][ T8359] BUG: KASAN: use-after-free in ipvlan_queue_xmit+0xdbd/0x1010 [ 54.169392][ T8359] Read of size 4 at addr ffff8881417567ff by task syz-executor102/8359 [ 54.177636][ T8359] [ 54.179950][ T8359] CPU: 0 PID: 8359 Comm: syz-executor102 Not tainted 5.12.0-rc6-syzkaller #0 [ 54.188693][ T8359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.199176][ T8359] Call Trace: [ 54.202458][ T8359] dump_stack+0x176/0x24e [ 54.206851][ T8359] print_address_description+0x5f/0x3a0 [ 54.212433][ T8359] kasan_report+0x15c/0x200 [ 54.216926][ T8359] ? ipvlan_queue_xmit+0xdbd/0x1010 [ 54.222170][ T8359] ipvlan_queue_xmit+0xdbd/0x1010 [ 54.227210][ T8359] ipvlan_start_xmit+0x45/0x170 [ 54.232053][ T8359] __dev_direct_xmit+0x49b/0x700 [ 54.236983][ T8359] packet_direct_xmit+0x163/0x290 [ 54.242029][ T8359] packet_sendmsg+0x4cd8/0x6650 [ 54.246886][ T8359] ? __lock_acquire+0x1342/0x5e60 [ 54.251909][ T8359] ? smack_socket_sendmsg+0x100/0x450 [ 54.257286][ T8359] ? tomoyo_socket_sendmsg_permission+0x207/0x340 [ 54.263719][ T8359] ? packet_getsockopt+0xbd0/0xbd0 [ 54.268838][ T8359] __sys_sendto+0x438/0x5c0 [ 54.273353][ T8359] __x64_sys_sendto+0xda/0xf0 [ 54.278017][ T8359] do_syscall_64+0x2d/0x70 [ 54.282425][ T8359] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 54.288309][ T8359] RIP: 0033:0x449d49 [ 54.292220][ T8359] Code: 28 c3 e8 aa 15 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 54.311815][ T8359] RSP: 002b:00007ffd54a19f08 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 54.320397][ T8359] RAX: ffffffffffffffda RBX: 00007ffd54a19f60 RCX: 0000000000449d49 [ 54.328387][ T8359] RDX: 000000000000000e RSI: 0000000020000000 RDI: 0000000000000004 [ 54.336346][ T8359] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffff09 [ 54.344329][ T8359] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd54a19f70 [ 54.352310][ T8359] R13: 00007ffd54a19f58 R14: 00007ffd54a19f90 R15: 0000000000000003 [ 54.360284][ T8359] [ 54.362617][ T8359] The buggy address belongs to the page: [ 54.368237][ T8359] page:ffffea000505d580 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x141756 [ 54.378557][ T8359] flags: 0x57ff00000000000() [ 54.383136][ T8359] raw: 057ff00000000000 0000000000000000 ffffea000505d588 0000000000000000 [ 54.391703][ T8359] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 54.400268][ T8359] page dumped because: kasan: bad access detected [ 54.406665][ T8359] [ 54.408977][ T8359] Memory state around the buggy address: [ 54.414589][ T8359] ffff888141756680: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.422634][ T8359] ffff888141756700: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.430680][ T8359] >ffff888141756780: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.438739][ T8359] ^ [ 54.446717][ T8359] ffff888141756800: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.454766][ T8359] ffff888141756880: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.462810][ T8359] ================================================================== [ 54.470860][ T8359] Disabling lock debugging due to kernel taint [ 54.477077][ T8359] Kernel panic - not syncing: panic_on_warn set ... [ 54.483663][ T8359] CPU: 0 PID: 8359 Comm: syz-executor102 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 54.493821][ T8359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.503889][ T8359] Call Trace: [ 54.507157][ T8359] dump_stack+0x176/0x24e [ 54.511498][ T8359] panic+0x291/0x800 [ 54.515396][ T8359] ? trace_hardirqs_on+0x30/0x80 [ 54.520329][ T8359] kasan_report+0x1ff/0x200 [ 54.524814][ T8359] ? ipvlan_queue_xmit+0xdbd/0x1010 [ 54.529997][ T8359] ipvlan_queue_xmit+0xdbd/0x1010 [ 54.535030][ T8359] ipvlan_start_xmit+0x45/0x170 [ 54.539871][ T8359] __dev_direct_xmit+0x49b/0x700 [ 54.544794][ T8359] packet_direct_xmit+0x163/0x290 [ 54.549814][ T8359] packet_sendmsg+0x4cd8/0x6650 [ 54.554662][ T8359] ? __lock_acquire+0x1342/0x5e60 [ 54.559669][ T8359] ? smack_socket_sendmsg+0x100/0x450 [ 54.565041][ T8359] ? tomoyo_socket_sendmsg_permission+0x207/0x340 [ 54.571442][ T8359] ? packet_getsockopt+0xbd0/0xbd0 [ 54.576551][ T8359] __sys_sendto+0x438/0x5c0 [ 54.581227][ T8359] __x64_sys_sendto+0xda/0xf0 [ 54.586023][ T8359] do_syscall_64+0x2d/0x70 [ 54.590479][ T8359] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 54.596360][ T8359] RIP: 0033:0x449d49 [ 54.600459][ T8359] Code: 28 c3 e8 aa 15 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 54.620150][ T8359] RSP: 002b:00007ffd54a19f08 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 54.628567][ T8359] RAX: ffffffffffffffda RBX: 00007ffd54a19f60 RCX: 0000000000449d49 [ 54.636535][ T8359] RDX: 000000000000000e RSI: 0000000020000000 RDI: 0000000000000004 [ 54.644489][ T8359] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffff09 [ 54.652457][ T8359] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd54a19f70 [ 54.660426][ T8359] R13: 00007ffd54a19f58 R14: 00007ffd54a19f90 R15: 0000000000000003 [ 54.669304][ T8359] Kernel Offset: disabled [ 54.673741][ T8359] Rebooting in 86400 seconds..