DUID 00:04:92:3d:a4:bf:d8:99:95:1d:d2:9f:0e:34:7d:20:a7:e6 forked to background, child pid 3177 [ 27.323710][ T3178] 8021q: adding VLAN 0 to HW filter on device bond0 [ 27.328085][ T3178] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.0.109' (ECDSA) to the list of known hosts. syzkaller login: [ 50.350024][ T3595] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 50.350969][ T3595] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 50.351365][ T3595] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 50.360653][ T3595] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 50.363180][ T3595] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 50.363411][ T3595] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 50.454048][ T3593] chnl_net:caif_netlink_parms(): no params data found [ 50.491266][ T3593] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.491648][ T3593] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.492858][ T3593] device bridge_slave_0 entered promiscuous mode [ 50.496204][ T3593] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.496311][ T3593] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.497250][ T3593] device bridge_slave_1 entered promiscuous mode [ 50.534774][ T3593] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.537343][ T3593] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.563493][ T3593] team0: Port device team_slave_0 added [ 50.564972][ T3593] team0: Port device team_slave_1 added [ 50.584952][ T3593] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 50.584962][ T3593] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 50.584978][ T3593] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 50.586417][ T3593] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 50.586424][ T3593] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 50.586440][ T3593] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 50.671288][ T3593] device hsr_slave_0 entered promiscuous mode [ 50.679457][ T3593] device hsr_slave_1 entered promiscuous mode [ 50.760348][ T3593] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 50.763818][ T3593] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 50.772943][ T3593] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 50.780475][ T3593] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 50.804009][ T3593] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.804051][ T3593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.804353][ T3593] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.804402][ T3593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.850359][ T3593] 8021q: adding VLAN 0 to HW filter on device bond0 [ 50.858381][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.860219][ T14] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.861337][ T14] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.862721][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 50.897828][ T3593] 8021q: adding VLAN 0 to HW filter on device team0 [ 50.913038][ T1142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.913475][ T1142] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.913512][ T1142] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.913744][ T1142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.914049][ T1142] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.914079][ T1142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.917469][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 50.917935][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 50.920842][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 50.927970][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.934450][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.938220][ T3593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 50.967558][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 50.967681][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 50.975117][ T3593] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 51.132996][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.137558][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.139169][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.139836][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.141517][ T3593] device veth0_vlan entered promiscuous mode [ 51.147085][ T3593] device veth1_vlan entered promiscuous mode [ 51.166488][ T3593] device veth0_macvtap entered promiscuous mode [ 51.169682][ T3593] device veth1_macvtap entered promiscuous mode [ 51.171324][ T2929] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 51.171919][ T2929] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 51.173916][ T2929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 51.174480][ T2929] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 51.188319][ T3593] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 51.188512][ T2929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.196707][ T3593] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 51.196972][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 51.200608][ T3593] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.200645][ T3593] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.200683][ T3593] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.200714][ T3593] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.327499][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 executing program [ 51.327514][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 51.329555][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 51.350345][ T66] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 51.350345][ T66] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 51.350363][ T66] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 51.351677][ T1142] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 51.364939][ T3593] ================================================================== [ 51.364948][ T3593] BUG: KASAN: use-after-free in mas_next_nentry+0x997/0xaa0 [ 51.364990][ T3593] Read of size 8 at addr ffff88807811e418 by task syz-executor361/3593 [ 51.365009][ T3593] [ 51.365014][ T3593] CPU: 1 PID: 3593 Comm: syz-executor361 Not tainted 5.18.0-rc4-next-20220427-syzkaller #0 [ 51.365036][ T3593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.365049][ T3593] Call Trace: [ 51.365056][ T3593] [ 51.365063][ T3593] dump_stack_lvl+0xcd/0x134 [ 51.365099][ T3593] print_address_description.constprop.0.cold+0xeb/0x495 [ 51.365135][ T3593] ? mas_next_nentry+0x997/0xaa0 [ 51.365156][ T3593] kasan_report.cold+0xf4/0x1c6 [ 51.365187][ T3593] ? mas_next_nentry+0x997/0xaa0 [ 51.365209][ T3593] mas_next_nentry+0x997/0xaa0 [ 51.365236][ T3593] mas_next+0x1eb/0xc40 [ 51.365261][ T3593] ? split_vma+0xa7/0xe0 [ 51.365285][ T3593] userfaultfd_ioctl+0x2527/0x40f0 [ 51.365323][ T3593] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 51.365354][ T3593] ? userfaultfd_read+0x1900/0x1900 [ 51.365386][ T3593] ? vfs_fileattr_set+0xbe0/0xbe0 [ 51.365422][ T3593] ? __context_tracking_exit+0xb8/0xe0 [ 51.365443][ T3593] ? set_bios_reboot+0x2/0x85 [ 51.365474][ T3593] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 51.365503][ T3593] ? userfaultfd_read+0x1900/0x1900 [ 51.365537][ T3593] __x64_sys_ioctl+0x193/0x200 [ 51.365567][ T3593] do_syscall_64+0x35/0xb0 [ 51.365596][ T3593] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 51.365623][ T3593] RIP: 0033:0x7f4e5785d939 [ 51.365640][ T3593] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 51.365786][ T3593] RSP: 002b:00007ffff7501a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 51.365809][ T3593] RAX: ffffffffffffffda RBX: 0000000000000031 RCX: 00007f4e5785d939 [ 51.365823][ T3593] RDX: 00000000200001c0 RSI: 00000000c020aa00 RDI: 0000000000000003 [ 51.365836][ T3593] RBP: 00007ffff7501b10 R08: 00007ffff7501a72 R09: 00007ffff7501a72 [ 51.365851][ T3593] R10: 00007ffff7501a72 R11: 0000000000000246 R12: 00007ffff7501ae0 [ 51.365865][ T3593] R13: 00007f4e578e14e0 R14: 0000000000000003 R15: 00007ffff7501a72 [ 51.365889][ T3593] [ 51.365896][ T3593] [ 51.365900][ T3593] Allocated by task 3592: [ 51.365909][ T3593] kasan_save_stack+0x1e/0x40 [ 51.365945][ T3593] __kasan_slab_alloc+0x90/0xc0 [ 51.365964][ T3593] kmem_cache_alloc_bulk+0x39f/0x720 [ 51.365993][ T3593] mas_alloc_nodes+0x1df/0x6b0 [ 51.366012][ T3593] mas_node_count+0x101/0x130 [ 51.366029][ T3593] mas_wr_modify+0x2505/0x5ac0 [ 51.366050][ T3593] mas_wr_store_entry.isra.0+0x66e/0x10f0 [ 51.366072][ T3593] mas_store+0xac/0xf0 [ 51.366091][ T3593] dup_mmap+0x845/0x1030 [ 51.366113][ T3593] dup_mm+0x91/0x370 [ 51.366133][ T3593] copy_process+0x3b07/0x6fd0 [ 51.366166][ T3593] kernel_clone+0xe7/0xab0 [ 51.366188][ T3593] __do_sys_clone+0xc8/0x110 [ 51.366210][ T3593] do_syscall_64+0x35/0xb0 [ 51.366238][ T3593] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 51.366262][ T3593] [ 51.366265][ T3593] Freed by task 3593: [ 51.366274][ T3593] kasan_save_stack+0x1e/0x40 [ 51.366305][ T3593] kasan_set_track+0x21/0x30 [ 51.366336][ T3593] kasan_set_free_info+0x20/0x30 [ 51.366357][ T3593] ____kasan_slab_free+0x166/0x1a0 [ 51.366389][ T3593] slab_free_freelist_hook+0x8b/0x1c0 [ 51.366417][ T3593] kmem_cache_free_bulk+0x2c0/0xb60 [ 51.366447][ T3593] mas_destroy+0x394/0x5c0 [ 51.366467][ T3593] mas_store_prealloc+0xec/0x150 [ 51.366489][ T3593] __vma_adjust+0x6ba/0x18f0 [ 51.366506][ T3593] __split_vma+0x443/0x530 [ 51.366524][ T3593] split_vma+0x9f/0xe0 [ 51.366541][ T3593] userfaultfd_ioctl+0x39f4/0x40f0 [ 51.366572][ T3593] __x64_sys_ioctl+0x193/0x200 [ 51.366599][ T3593] do_syscall_64+0x35/0xb0 [ 51.366625][ T3593] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 51.366648][ T3593] [ 51.366651][ T3593] The buggy address belongs to the object at ffff88807811e400 [ 51.366651][ T3593] which belongs to the cache maple_node of size 256 [ 51.366668][ T3593] The buggy address is located 24 bytes inside of [ 51.366668][ T3593] 256-byte region [ffff88807811e400, ffff88807811e500) [ 51.366688][ T3593] [ 51.366692][ T3593] The buggy address belongs to the physical page: [ 51.366699][ T3593] page:ffffea0001e04780 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7811e [ 51.366722][ T3593] head:ffffea0001e04780 order:1 compound_mapcount:0 compound_pincount:0 [ 51.366738][ T3593] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 51.366767][ T3593] raw: 00fff00000010200 0000000000000000 dead000000000001 ffff888010c4fdc0 [ 51.366787][ T3593] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 51.366798][ T3593] page dumped because: kasan: bad access detected [ 51.366806][ T3593] page_owner tracks the page as allocated [ 51.366812][ T3593] page last allocated via order 1, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 3286, tgid 3286 (dhcpcd-run-hook), ts 27966983290, free_ts 22717162691 [ 51.366851][ T3593] get_page_from_freelist+0xba2/0x3e00 [ 51.366875][ T3593] __alloc_pages+0x1b2/0x500 [ 51.366897][ T3593] alloc_pages+0x1aa/0x310 [ 51.366928][ T3593] allocate_slab+0x26c/0x3c0 [ 51.366955][ T3593] ___slab_alloc+0x985/0xd90 [ 51.366983][ T3593] kmem_cache_alloc_bulk+0x21c/0x720 [ 51.367013][ T3593] mas_alloc_nodes+0x2b0/0x6b0 [ 51.367031][ T3593] mas_preallocate+0xfb/0x270 [ 51.367052][ T3593] __vma_adjust+0x226/0x18f0 [ 51.367069][ T3593] __split_vma+0x443/0x530 [ 51.367087][ T3593] do_mas_align_munmap+0x4f5/0xe80 [ 51.367107][ T3593] do_mas_munmap+0x202/0x2c0 [ 51.367126][ T3593] mmap_region+0x219/0x1c70 [ 51.367150][ T3593] do_mmap+0x825/0xf60 [ 51.367168][ T3593] vm_mmap_pgoff+0x1b7/0x290 [ 51.367195][ T3593] ksys_mmap_pgoff+0x40d/0x5a0 [ 51.367213][ T3593] page last free stack trace: [ 51.367218][ T3593] free_pcp_prepare+0x549/0xd20 [ 51.367237][ T3593] free_unref_page+0x19/0x6a0 [ 51.367258][ T3593] __unfreeze_partials+0x17c/0x1a0 [ 51.367287][ T3593] qlist_free_all+0x6a/0x170 [ 51.367309][ T3593] kasan_quarantine_reduce+0x180/0x200 [ 51.367335][ T3593] __kasan_slab_alloc+0xa2/0xc0 [ 51.367353][ T3593] __kmalloc+0x200/0x350 [ 51.367381][ T3593] tomoyo_realpath_from_path+0xc3/0x620 [ 51.367409][ T3593] tomoyo_realpath_nofollow+0xc8/0xe0 [ 51.367436][ T3593] tomoyo_find_next_domain+0x280/0x1f80 [ 51.367458][ T3593] tomoyo_bprm_check_security+0x121/0x1a0 [ 51.367487][ T3593] security_bprm_check+0x45/0xa0 [ 51.367509][ T3593] bprm_execve+0x732/0x1970 [ 51.367538][ T3593] do_execveat_common+0x727/0x890 [ 51.367568][ T3593] __x64_sys_execve+0x8f/0xc0 [ 51.367597][ T3593] do_syscall_64+0x35/0xb0 [ 51.367623][ T3593] [ 51.367627][ T3593] Memory state around the buggy address: [ 51.367636][ T3593] ffff88807811e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.367648][ T3593] ffff88807811e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.367661][ T3593] >ffff88807811e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.367671][ T3593] ^ [ 51.367681][ T3593] ffff88807811e480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.367695][ T3593] ffff88807811e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.367706][ T3593] ================================================================== [ 51.367715][ T3593] Kernel panic - not syncing: panic_on_warn set ... [ 51.367726][ T3593] CPU: 1 PID: 3593 Comm: syz-executor361 Not tainted 5.18.0-rc4-next-20220427-syzkaller #0 [ 51.367750][ T3593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.367763][ T3593] Call Trace: [ 51.367770][ T3593] [ 51.367778][ T3593] dump_stack_lvl+0xcd/0x134 [ 51.367810][ T3593] panic+0x2d7/0x636 [ 51.367838][ T3593] ? panic_print_sys_info.part.0+0x10b/0x10b [ 51.367872][ T3593] ? mark_held_locks+0x9f/0xe0 [ 51.367908][ T3593] ? mas_next_nentry+0x997/0xaa0 [ 51.367932][ T3593] ? mas_next_nentry+0x997/0xaa0 [ 51.367954][ T3593] end_report.part.0+0x3f/0x7c [ 51.367984][ T3593] kasan_report.cold+0x93/0x1c6 [ 51.368016][ T3593] ? mas_next_nentry+0x997/0xaa0 [ 51.368039][ T3593] mas_next_nentry+0x997/0xaa0 [ 51.368067][ T3593] mas_next+0x1eb/0xc40 [ 51.368093][ T3593] ? split_vma+0xa7/0xe0 [ 51.368115][ T3593] userfaultfd_ioctl+0x2527/0x40f0 [ 51.368157][ T3593] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 51.368188][ T3593] ? userfaultfd_read+0x1900/0x1900 [ 51.368221][ T3593] ? vfs_fileattr_set+0xbe0/0xbe0 [ 51.368258][ T3593] ? __context_tracking_exit+0xb8/0xe0 [ 51.368282][ T3593] ? set_bios_reboot+0x2/0x85 [ 51.368314][ T3593] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 51.368343][ T3593] ? userfaultfd_read+0x1900/0x1900 [ 51.368377][ T3593] __x64_sys_ioctl+0x193/0x200 [ 51.368408][ T3593] do_syscall_64+0x35/0xb0 [ 51.368439][ T3593] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 51.368466][ T3593] RIP: 0033:0x7f4e5785d939 [ 51.368483][ T3593] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 51.368504][ T3593] RSP: 002b:00007ffff7501a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 51.368526][ T3593] RAX: ffffffffffffffda RBX: 0000000000000031 RCX: 00007f4e5785d939 [ 51.368541][ T3593] RDX: 00000000200001c0 RSI: 00000000c020aa00 RDI: 0000000000000003 [ 51.368556][ T3593] RBP: 00007ffff7501b10 R08: 00007ffff7501a72 R09: 00007ffff7501a72 [ 51.368571][ T3593] R10: 00007ffff7501a72 R11: 0000000000000246 R12: 00007ffff7501ae0 [ 51.368586][ T3593] R13: 00007f4e578e14e0 R14: 0000000000000003 R15: 00007ffff7501a72 [ 51.368608][ T3593] [ 51.372901][ T3593] Kernel Offset: disabled