Warning: Permanently added '10.128.1.42' (ECDSA) to the list of known hosts. 2020/05/22 22:48:53 parsed 1 programs 2020/05/22 22:48:53 executed programs: 0 [ 54.781031][ T6805] IPVS: ftp: loaded support on port[0] = 21 [ 54.879708][ T6805] chnl_net:caif_netlink_parms(): no params data found [ 54.932380][ T6805] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.940163][ T6805] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.949578][ T6805] device bridge_slave_0 entered promiscuous mode [ 54.958597][ T6805] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.965684][ T6805] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.974009][ T6805] device bridge_slave_1 entered promiscuous mode [ 54.995138][ T6805] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.006756][ T6805] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.030783][ T6805] team0: Port device team_slave_0 added [ 55.039375][ T6805] team0: Port device team_slave_1 added [ 55.057810][ T6805] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 55.064743][ T6805] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 55.092241][ T6805] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 55.104992][ T6805] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 55.112429][ T6805] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 55.139323][ T6805] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 55.210280][ T6805] device hsr_slave_0 entered promiscuous mode [ 55.247000][ T6805] device hsr_slave_1 entered promiscuous mode [ 55.371434][ T6805] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 55.410376][ T6805] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 55.459674][ T6805] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 55.509507][ T6805] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 55.583488][ T6805] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.590813][ T6805] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.598755][ T6805] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.605815][ T6805] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.650968][ T6805] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.664409][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.675274][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.683647][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.692014][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 55.705719][ T6805] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.717073][ T3828] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.725627][ T3828] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.732883][ T3828] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.744268][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.753942][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.761073][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.788359][ T3828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.798380][ T3828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.807951][ T3828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.817559][ T3828] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.829988][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.840684][ T6805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.860166][ T3828] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 55.867917][ T3828] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 55.882150][ T6805] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 55.901458][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 55.910709][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 55.937072][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 55.945256][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 55.954885][ T6805] device veth0_vlan entered promiscuous mode [ 55.964748][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 55.973030][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.985001][ T6805] device veth1_vlan entered promiscuous mode [ 56.004785][ T3828] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 56.013228][ T3828] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 56.021426][ T3828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 56.030079][ T3828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 56.041452][ T6805] device veth0_macvtap entered promiscuous mode [ 56.051740][ T6805] device veth1_macvtap entered promiscuous mode [ 56.069824][ T6805] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 56.077420][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 56.085498][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 56.094674][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 56.103591][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 56.117834][ T6805] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 56.125897][ T3827] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 56.134886][ T3827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 56.361693][ T7013] ubi0: attaching mtd0 [ 56.367658][ T7013] ubi0: scanning is finished [ 56.372337][ T7013] ubi0: empty MTD device detected [ 56.449748][ T7013] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 56.457643][ T7013] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 56.464827][ T7013] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 56.474484][ T7013] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 56.483510][ T7013] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 56.491028][ T7013] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 56.499535][ T7013] ubi0: max/mean erase counter: 0/0, WL threshold: 4096, image sequence number: 80553401 [ 56.510047][ T7013] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 56.521093][ T7017] ubi0: background thread "ubi_bgt0d" started, PID 7017 [ 56.542857][ T7019] ubi0: detaching mtd0 [ 56.552067][ T7019] ================================================================== [ 56.560325][ T7019] BUG: KASAN: use-after-free in uif_close+0x15e/0x190 [ 56.567176][ T7019] Read of size 4 at addr ffff8880a92a09e8 by task syz-executor.0/7019 [ 56.575324][ T7019] [ 56.577662][ T7019] CPU: 0 PID: 7019 Comm: syz-executor.0 Not tainted 5.7.0-rc6-next-20200522-syzkaller #0 [ 56.587463][ T7019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.597529][ T7019] Call Trace: [ 56.600831][ T7019] dump_stack+0x18f/0x20d [ 56.605173][ T7019] ? uif_close+0x15e/0x190 [ 56.609597][ T7019] ? uif_close+0x15e/0x190 [ 56.614028][ T7019] print_address_description.constprop.0.cold+0xd3/0x413 [ 56.621061][ T7019] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 56.627061][ T7019] ? vprintk_func+0x97/0x1a6 [ 56.631786][ T7019] ? uif_close+0x15e/0x190 [ 56.636183][ T7019] kasan_report.cold+0x1f/0x37 [ 56.640940][ T7019] ? uif_close+0x15e/0x190 [ 56.645492][ T7019] uif_close+0x15e/0x190 [ 56.649780][ T7019] ubi_detach_mtd_dev+0x226/0x432 [ 56.654794][ T7019] ctrl_cdev_ioctl+0x1bf/0x2b0 [ 56.659544][ T7019] ? vol_cdev_llseek+0x160/0x160 [ 56.664460][ T7019] ? __x64_sys_futex+0x380/0x4f0 [ 56.669379][ T7019] ? vol_cdev_llseek+0x160/0x160 [ 56.674294][ T7019] ksys_ioctl+0x11a/0x180 [ 56.678611][ T7019] __x64_sys_ioctl+0x6f/0xb0 [ 56.683192][ T7019] do_syscall_64+0xf6/0x7d0 [ 56.687692][ T7019] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 56.693560][ T7019] RIP: 0033:0x45ca29 [ 56.697434][ T7019] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 56.717029][ T7019] RSP: 002b:00007fff49d0ffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 56.725431][ T7019] RAX: ffffffffffffffda RBX: 00000000004e1080 RCX: 000000000045ca29 [ 56.733394][ T7019] RDX: 000000000076006e RSI: 0000000040046f41 RDI: 0000000000000003 [ 56.741341][ T7019] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 56.749291][ T7019] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 56.757260][ T7019] R13: 0000000000000209 R14: 00000000004c44c1 R15: 0000000002017914 [ 56.765215][ T7019] [ 56.767531][ T7019] Allocated by task 7013: [ 56.771857][ T7019] save_stack+0x1b/0x40 [ 56.776006][ T7019] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 56.781614][ T7019] kmem_cache_alloc_trace+0x153/0x7d0 [ 56.786986][ T7019] ubi_attach_mtd_dev+0x2e7/0x27c0 [ 56.792246][ T7019] ctrl_cdev_ioctl+0x229/0x2b0 [ 56.796988][ T7019] ksys_ioctl+0x11a/0x180 [ 56.801301][ T7019] __x64_sys_ioctl+0x6f/0xb0 [ 56.805884][ T7019] do_syscall_64+0xf6/0x7d0 [ 56.810364][ T7019] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 56.816251][ T7019] [ 56.818564][ T7019] Freed by task 7019: [ 56.822523][ T7019] save_stack+0x1b/0x40 [ 56.826667][ T7019] __kasan_slab_free+0xf7/0x140 [ 56.831505][ T7019] kfree+0x109/0x2b0 [ 56.835386][ T7019] device_release+0x71/0x200 [ 56.839956][ T7019] kobject_put+0x1c8/0x2f0 [ 56.844349][ T7019] cdev_device_del+0x69/0x80 [ 56.848917][ T7019] uif_close+0xea/0x190 [ 56.853048][ T7019] ubi_detach_mtd_dev+0x226/0x432 [ 56.858052][ T7019] ctrl_cdev_ioctl+0x1bf/0x2b0 [ 56.862793][ T7019] ksys_ioctl+0x11a/0x180 [ 56.867116][ T7019] __x64_sys_ioctl+0x6f/0xb0 [ 56.871697][ T7019] do_syscall_64+0xf6/0x7d0 [ 56.876196][ T7019] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 56.882067][ T7019] [ 56.884371][ T7019] The buggy address belongs to the object at ffff8880a92a0000 [ 56.884371][ T7019] which belongs to the cache kmalloc-8k of size 8192 [ 56.898399][ T7019] The buggy address is located 2536 bytes inside of [ 56.898399][ T7019] 8192-byte region [ffff8880a92a0000, ffff8880a92a2000) [ 56.911824][ T7019] The buggy address belongs to the page: [ 56.917439][ T7019] page:ffffea0002a4a800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 head:ffffea0002a4a800 order:2 compound_mapcount:0 compound_pincount:0 [ 56.932594][ T7019] flags: 0xfffe0000010200(slab|head) [ 56.937877][ T7019] raw: 00fffe0000010200 ffffea0002479508 ffff8880aa001b50 ffff8880aa0021c0 [ 56.946455][ T7019] raw: 0000000000000000 ffff8880a92a0000 0000000100000001 0000000000000000 [ 56.955009][ T7019] page dumped because: kasan: bad access detected [ 56.961392][ T7019] [ 56.963694][ T7019] Memory state around the buggy address: [ 56.969300][ T7019] ffff8880a92a0880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.977338][ T7019] ffff8880a92a0900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.985376][ T7019] >ffff8880a92a0980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.993445][ T7019] ^ [ 57.000892][ T7019] ffff8880a92a0a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 57.008940][ T7019] ffff8880a92a0a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 57.016993][ T7019] ================================================================== [ 57.025045][ T7019] Disabling lock debugging due to kernel taint [ 57.052784][ T7019] Kernel panic - not syncing: panic_on_warn set ... [ 57.059436][ T7019] CPU: 0 PID: 7019 Comm: syz-executor.0 Tainted: G B 5.7.0-rc6-next-20200522-syzkaller #0 [ 57.070600][ T7019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 57.080648][ T7019] Call Trace: [ 57.084045][ T7019] dump_stack+0x18f/0x20d [ 57.088366][ T7019] ? uif_close+0x110/0x190 [ 57.092775][ T7019] panic+0x2e3/0x75c [ 57.096655][ T7019] ? __warn_printk+0xf3/0xf3 [ 57.101225][ T7019] ? preempt_schedule_common+0x5e/0xc0 [ 57.106661][ T7019] ? uif_close+0x15e/0x190 [ 57.111054][ T7019] ? uif_close+0x15e/0x190 [ 57.115456][ T7019] ? preempt_schedule_thunk+0x16/0x18 [ 57.120805][ T7019] ? trace_hardirqs_on+0x55/0x230 [ 57.125806][ T7019] ? uif_close+0x15e/0x190 [ 57.130198][ T7019] ? uif_close+0x15e/0x190 [ 57.134593][ T7019] end_report+0x4d/0x53 [ 57.138726][ T7019] kasan_report.cold+0xd/0x37 [ 57.143378][ T7019] ? uif_close+0x15e/0x190 [ 57.147767][ T7019] uif_close+0x15e/0x190 [ 57.152100][ T7019] ubi_detach_mtd_dev+0x226/0x432 [ 57.157103][ T7019] ctrl_cdev_ioctl+0x1bf/0x2b0 [ 57.161862][ T7019] ? vol_cdev_llseek+0x160/0x160 [ 57.166803][ T7019] ? __x64_sys_futex+0x380/0x4f0 [ 57.171755][ T7019] ? vol_cdev_llseek+0x160/0x160 [ 57.176679][ T7019] ksys_ioctl+0x11a/0x180 [ 57.181008][ T7019] __x64_sys_ioctl+0x6f/0xb0 [ 57.185582][ T7019] do_syscall_64+0xf6/0x7d0 [ 57.190065][ T7019] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 57.195933][ T7019] RIP: 0033:0x45ca29 [ 57.199823][ T7019] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 57.219529][ T7019] RSP: 002b:00007fff49d0ffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 57.227916][ T7019] RAX: ffffffffffffffda RBX: 00000000004e1080 RCX: 000000000045ca29 [ 57.235868][ T7019] RDX: 000000000076006e RSI: 0000000040046f41 RDI: 0000000000000003 [ 57.243837][ T7019] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 57.252011][ T7019] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 57.259984][ T7019] R13: 0000000000000209 R14: 00000000004c44c1 R15: 0000000002017914 [ 57.269206][ T7019] Kernel Offset: disabled [ 57.273544][ T7019] Rebooting in 86400 seconds..