Warning: Permanently added '10.128.0.196' (ECDSA) to the list of known hosts. syzkaller login: [ 50.332341][ T3594] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 50.333137][ T3594] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 50.333539][ T3594] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 50.334393][ T3594] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 50.334859][ T3594] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 50.335105][ T3594] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 50.431752][ T3593] chnl_net:caif_netlink_parms(): no params data found [ 50.469831][ T3593] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.470254][ T3593] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.471008][ T3593] device bridge_slave_0 entered promiscuous mode [ 50.475975][ T3593] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.476082][ T3593] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.477103][ T3593] device bridge_slave_1 entered promiscuous mode [ 50.515427][ T3593] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.517025][ T3593] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.547228][ T3593] team0: Port device team_slave_0 added [ 50.548475][ T3593] team0: Port device team_slave_1 added [ 50.570560][ T3593] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 50.570571][ T3593] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 50.570587][ T3593] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 50.573107][ T3593] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 50.573120][ T3593] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 50.573146][ T3593] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 50.664507][ T3593] device hsr_slave_0 entered promiscuous mode [ 50.665473][ T3593] device hsr_slave_1 entered promiscuous mode [ 50.742720][ T3593] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 50.746294][ T3593] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 50.748153][ T3593] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 50.750085][ T3593] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 50.769056][ T3593] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.769216][ T3593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.769755][ T3593] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.769826][ T3593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.830521][ T3593] 8021q: adding VLAN 0 to HW filter on device bond0 [ 50.838741][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.841020][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.848879][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.863491][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 50.867524][ T3593] 8021q: adding VLAN 0 to HW filter on device team0 [ 50.874717][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.875256][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.875317][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.875789][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.876169][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.876219][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.890894][ T3606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 50.891703][ T3606] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 50.897025][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 50.931128][ T3606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.944161][ T3606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.947418][ T3593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 50.961018][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 50.961161][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 50.970269][ T3593] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 51.102889][ T1132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.107274][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.107824][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.108163][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.110998][ T3593] device veth0_vlan entered promiscuous mode [ 51.119561][ T3593] device veth1_vlan entered promiscuous mode [ 51.139595][ T3606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 51.140153][ T3606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 51.140860][ T3606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 51.145371][ T3593] device veth0_macvtap entered promiscuous mode [ 51.148937][ T3593] device veth1_macvtap entered promiscuous mode [ 51.168387][ T3593] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 51.168582][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.174855][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 51.180265][ T3593] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 51.182530][ T3606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 51.185063][ T3593] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.185099][ T3593] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.185132][ T3593] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.185163][ T3593] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 51.297560][ T55] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 51.297574][ T55] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 51.298882][ T1132] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 51.320631][ T976] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 51.320648][ T976] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 51.322013][ T142] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 51.340191][ T3593] ================================================================== [ 51.340191][ T3593] ================================================================== [ 51.340201][ T3593] BUG: KASAN: use-after-free in mas_next_nentry+0x997/0xaa0 [ 51.340241][ T3593] Read of size 8 at addr ffff888073eeae18 by task syz-executor854/3593 [ 51.340260][ T3593] [ 51.340265][ T3593] CPU: 0 PID: 3593 Comm: syz-executor854 Not tainted 5.18.0-rc4-next-20220427-syzkaller #0 [ 51.340288][ T3593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.340300][ T3593] Call Trace: [ 51.340307][ T3593] [ 51.340314][ T3593] dump_stack_lvl+0xcd/0x134 [ 51.340350][ T3593] print_address_description.constprop.0.cold+0xeb/0x495 [ 51.340392][ T3593] ? mas_next_nentry+0x997/0xaa0 [ 51.340413][ T3593] kasan_report.cold+0xf4/0x1c6 [ 51.340444][ T3593] ? mas_next_nentry+0x997/0xaa0 [ 51.340466][ T3593] mas_next_nentry+0x997/0xaa0 [ 51.340493][ T3593] mas_next+0x1eb/0xc40 [ 51.340519][ T3593] ? split_vma+0xa7/0xe0 [ 51.340541][ T3593] userfaultfd_ioctl+0x2527/0x40f0 [ 51.340580][ T3593] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 51.340610][ T3593] ? userfaultfd_read+0x1900/0x1900 [ 51.340642][ T3593] ? vfs_fileattr_set+0xbe0/0xbe0 [ 51.340679][ T3593] ? __context_tracking_exit+0xb8/0xe0 [ 51.340703][ T3593] ? set_bios_reboot+0x2/0x85 [ 51.340734][ T3593] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 51.340762][ T3593] ? userfaultfd_read+0x1900/0x1900 [ 51.340795][ T3593] __x64_sys_ioctl+0x193/0x200 [ 51.340825][ T3593] do_syscall_64+0x35/0xb0 [ 51.340854][ T3593] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 51.340881][ T3593] RIP: 0033:0x7efe7583e939 [ 51.340897][ T3593] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 51.340918][ T3593] RSP: 002b:00007fff4c9a23d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 51.340941][ T3593] RAX: ffffffffffffffda RBX: 0000000000000031 RCX: 00007efe7583e939 [ 51.340956][ T3593] RDX: 0000000020000080 RSI: 00000000c020aa00 RDI: 0000000000000003 [ 51.340969][ T3593] RBP: 00007fff4c9a24d0 R08: 00007fff4c9a2432 R09: 00007fff4c9a2432 [ 51.340984][ T3593] R10: 00007fff4c9a2432 R11: 0000000000000246 R12: 00007fff4c9a24a0 [ 51.340998][ T3593] R13: 00007efe758c24e0 R14: 0000000000000003 R15: 00007fff4c9a2432 [ 51.341020][ T3593] [ 51.341027][ T3593] [ 51.341030][ T3593] Allocated by task 3592: [ 51.341039][ T3593] kasan_save_stack+0x1e/0x40 [ 51.341072][ T3593] __kasan_slab_alloc+0x90/0xc0 [ 51.341090][ T3593] kmem_cache_alloc_bulk+0x39f/0x720 [ 51.341120][ T3593] mas_alloc_nodes+0x1df/0x6b0 [ 51.341138][ T3593] mas_node_count+0x101/0x130 [ 51.341155][ T3593] mas_wr_modify+0x2505/0x5ac0 [ 51.341175][ T3593] mas_wr_store_entry.isra.0+0x66e/0x10f0 [ 51.341198][ T3593] mas_store+0xac/0xf0 [ 51.341217][ T3593] dup_mmap+0x845/0x1030 [ 51.341238][ T3593] dup_mm+0x91/0x370 [ 51.341259][ T3593] copy_process+0x3b07/0x6fd0 [ 51.341287][ T3593] kernel_clone+0xe7/0xab0 [ 51.341309][ T3593] __do_sys_clone+0xc8/0x110 [ 51.341334][ T3593] do_syscall_64+0x35/0xb0 [ 51.341360][ T3593] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 51.341388][ T3593] [ 51.341391][ T3593] Freed by task 3593: [ 51.341399][ T3593] kasan_save_stack+0x1e/0x40 [ 51.341430][ T3593] kasan_set_track+0x21/0x30 [ 51.341460][ T3593] kasan_set_free_info+0x20/0x30 [ 51.341481][ T3593] ____kasan_slab_free+0x166/0x1a0 [ 51.341512][ T3593] slab_free_freelist_hook+0x8b/0x1c0 [ 51.341540][ T3593] kmem_cache_free_bulk+0x2c0/0xb60 [ 51.341570][ T3593] mas_destroy+0x394/0x5c0 [ 51.341590][ T3593] mas_store_prealloc+0xec/0x150 [ 51.341611][ T3593] __vma_adjust+0x6ba/0x18f0 [ 51.341628][ T3593] __split_vma+0x443/0x530 [ 51.341646][ T3593] split_vma+0x9f/0xe0 [ 51.341663][ T3593] userfaultfd_ioctl+0x39f4/0x40f0 [ 51.341692][ T3593] __x64_sys_ioctl+0x193/0x200 [ 51.341718][ T3593] do_syscall_64+0x35/0xb0 [ 51.341744][ T3593] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 51.341768][ T3593] [ 51.341770][ T3593] The buggy address belongs to the object at ffff888073eeae00 [ 51.341770][ T3593] which belongs to the cache maple_node of size 256 [ 51.341786][ T3593] The buggy address is located 24 bytes inside of [ 51.341786][ T3593] 256-byte region [ffff888073eeae00, ffff888073eeaf00) [ 51.341806][ T3593] [ 51.341809][ T3593] The buggy address belongs to the physical page: [ 51.341816][ T3593] page:ffffea0001cfba80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x73eea [ 51.341838][ T3593] head:ffffea0001cfba80 order:1 compound_mapcount:0 compound_pincount:0 [ 51.341854][ T3593] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 51.341883][ T3593] raw: 00fff00000010200 0000000000000000 dead000000000122 ffff888010c4fdc0 [ 51.341902][ T3593] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 51.341913][ T3593] page dumped because: kasan: bad access detected [ 51.341921][ T3593] page_owner tracks the page as allocated [ 51.341926][ T3593] page last allocated via order 1, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 3592, tgid 3592 (syz-executor854), ts 49234311759, free_ts 49217281978 [ 51.341965][ T3593] get_page_from_freelist+0xba2/0x3e00 [ 51.341989][ T3593] __alloc_pages+0x1b2/0x500 [ 51.342010][ T3593] alloc_pages+0x1aa/0x310 [ 51.342042][ T3593] allocate_slab+0x26c/0x3c0 [ 51.342069][ T3593] ___slab_alloc+0x985/0xd90 [ 51.342096][ T3593] kmem_cache_alloc_bulk+0x21c/0x720 [ 51.342126][ T3593] mas_alloc_nodes+0x2b0/0x6b0 [ 51.342143][ T3593] mas_preallocate+0xfb/0x270 [ 51.342164][ T3593] mmap_region+0xd31/0x1c70 [ 51.342183][ T3593] do_mmap+0x825/0xf60 [ 51.342201][ T3593] vm_mmap_pgoff+0x1b7/0x290 [ 51.342227][ T3593] ksys_mmap_pgoff+0x79/0x5a0 [ 51.342244][ T3593] do_syscall_64+0x35/0xb0 [ 51.342270][ T3593] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 51.342294][ T3593] page last free stack trace: [ 51.342299][ T3593] free_pcp_prepare+0x549/0xd20 [ 51.342318][ T3593] free_unref_page+0x19/0x6a0 [ 51.342337][ T3593] qlist_free_all+0x6a/0x170 [ 51.342360][ T3593] kasan_quarantine_reduce+0x180/0x200 [ 51.342391][ T3593] __kasan_slab_alloc+0xa2/0xc0 [ 51.342410][ T3593] kmem_cache_alloc+0x204/0x3b0 [ 51.342439][ T3593] __anon_vma_prepare+0x60/0x560 [ 51.342467][ T3593] __handle_mm_fault+0x3159/0x3530 [ 51.342495][ T3593] handle_mm_fault+0x1c8/0x790 [ 51.342522][ T3593] do_user_addr_fault+0x489/0x11c0 [ 51.342550][ T3593] exc_page_fault+0x9e/0x180 [ 51.342581][ T3593] asm_exc_page_fault+0x1e/0x30 [ 51.342605][ T3593] [ 51.342607][ T3593] Memory state around the buggy address: [ 51.342616][ T3593] ffff888073eead00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.342631][ T3593] ffff888073eead80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.342645][ T3593] >ffff888073eeae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.342655][ T3593] ^ [ 51.342665][ T3593] ffff888073eeae80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.342679][ T3593] ffff888073eeaf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.342689][ T3593] ================================================================== [ 51.357225][ T3593] Kernel panic - not syncing: panic_on_warn set ... [ 51.357239][ T3593] CPU: 0 PID: 3593 Comm: syz-executor854 Not tainted 5.18.0-rc4-next-20220427-syzkaller #0 [ 51.357263][ T3593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.357276][ T3593] Call Trace: [ 51.357282][ T3593] [ 51.357291][ T3593] dump_stack_lvl+0xcd/0x134 [ 51.357327][ T3593] panic+0x2d7/0x636 [ 51.357355][ T3593] ? panic_print_sys_info.part.0+0x10b/0x10b [ 51.357394][ T3593] ? preempt_schedule_common+0x59/0xc0 [ 51.357427][ T3593] ? mas_next_nentry+0x997/0xaa0 [ 51.357450][ T3593] ? preempt_schedule_thunk+0x16/0x18 [ 51.357485][ T3593] ? mas_next_nentry+0x997/0xaa0 [ 51.357507][ T3593] end_report.part.0+0x3f/0x7c [ 51.357537][ T3593] kasan_report.cold+0x93/0x1c6 [ 51.357569][ T3593] ? mas_next_nentry+0x997/0xaa0 [ 51.357592][ T3593] mas_next_nentry+0x997/0xaa0 [ 51.357619][ T3593] mas_next+0x1eb/0xc40 [ 51.357646][ T3593] ? split_vma+0xa7/0xe0 [ 51.357668][ T3593] userfaultfd_ioctl+0x2527/0x40f0 [ 51.357707][ T3593] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 51.357738][ T3593] ? userfaultfd_read+0x1900/0x1900 [ 51.357771][ T3593] ? vfs_fileattr_set+0xbe0/0xbe0 [ 51.357808][ T3593] ? __context_tracking_exit+0xb8/0xe0 [ 51.357831][ T3593] ? set_bios_reboot+0x2/0x85 [ 51.357863][ T3593] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 51.357892][ T3593] ? userfaultfd_read+0x1900/0x1900 [ 51.357925][ T3593] __x64_sys_ioctl+0x193/0x200 [ 51.357956][ T3593] do_syscall_64+0x35/0xb0 [ 51.357985][ T3593] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 51.358012][ T3593] RIP: 0033:0x7efe7583e939 [ 51.358030][ T3593] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 51.358050][ T3593] RSP: 002b:00007fff4c9a23d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 51.358073][ T3593] RAX: ffffffffffffffda RBX: 0000000000000031 RCX: 00007efe7583e939 [ 51.358088][ T3593] RDX: 0000000020000080 RSI: 00000000c020aa00 RDI: 0000000000000003 [ 51.358102][ T3593] RBP: 00007fff4c9a24d0 R08: 00007fff4c9a2432 R09: 00007fff4c9a2432 [ 51.358117][ T3593] R10: 00007fff4c9a2432 R11: 0000000000000246 R12: 00007fff4c9a24a0 [ 51.358132][ T3593] R13: 00007efe758c24e0 R14: 0000000000000003 R15: 00007fff4c9a2432 [ 51.358153][ T3593] [ 51.363910][ T3593] Kernel Offset: disabled