Warning: Permanently added '10.128.0.49' (ECDSA) to the list of known hosts.
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   28.596745] ==================================================================
[   28.604138] BUG: KASAN: use-after-free in __lock_acquire+0x2c57/0x3f20
[   28.610795] Read of size 8 at addr ffff8880b41c7d20 by task kworker/u4:2/34
[   28.617879] 
[   28.619501] CPU: 1 PID: 34 Comm: kworker/u4:2 Not tainted 4.14.232-syzkaller #0
[   28.626936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   28.636300] Workqueue: tipc_rcv tipc_recv_work
[   28.640886] Call Trace:
[   28.643472]  dump_stack+0x1b2/0x281
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   28.647097]  print_address_description.cold+0x54/0x1d3
[   28.652382]  kasan_report_error.cold+0x8a/0x191
[   28.657049]  ? __lock_acquire+0x2c57/0x3f20
[   28.661373]  __asan_report_load8_noabort+0x68/0x70
[   28.666300]  ? tipc_subscrb_rcv_cb+0x300/0xa40
[   28.670917]  ? __lock_acquire+0x2c57/0x3f20
[   28.675254]  __lock_acquire+0x2c57/0x3f20
[   28.679525]  ? io_schedule_timeout+0x140/0x140
[   28.684126]  ? __wake_up_common_lock+0xcd/0x140
[   28.688799]  ? trace_hardirqs_on+0x10/0x10
[   28.693027]  ? trace_hardirqs_on+0x10/0x10
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   28.697258]  ? preempt_schedule_common+0x45/0xc0
[   28.702015]  ? ___preempt_schedule+0x16/0x18
[   28.706432]  ? tipc_recvmsg+0x43e/0x9e0
[   28.710403]  ? __local_bh_enable_ip+0x132/0x170
[   28.715061]  lock_acquire+0x170/0x3f0
[   28.718854]  ? tipc_subscrb_rcv_cb+0x4d4/0xa40
[   28.723434]  _raw_spin_lock_bh+0x2f/0x40
[   28.727494]  ? tipc_subscrb_rcv_cb+0x4d4/0xa40
[   28.732065]  tipc_subscrb_rcv_cb+0x4d4/0xa40
[   28.736466]  tipc_receive_from_sock+0x25c/0x450
[   28.741127]  ? trace_hardirqs_on+0x10/0x10
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   28.745370]  ? tipc_close_conn+0x200/0x200
[   28.749603]  ? lock_downgrade+0x740/0x740
[   28.753750]  tipc_recv_work+0x75/0xd0
[   28.757541]  process_one_work+0x793/0x14a0
[   28.761771]  ? work_busy+0x320/0x320
[   28.765479]  ? worker_thread+0x158/0xff0
[   28.769539]  ? _raw_spin_unlock_irq+0x24/0x80
[   28.774048]  worker_thread+0x5cc/0xff0
[   28.777927]  ? rescuer_thread+0xc80/0xc80
[   28.782072]  kthread+0x30d/0x420
[   28.785433]  ? kthread_create_on_node+0xd0/0xd0
[   28.790101]  ret_from_fork+0x24/0x30
[   28.793805] 
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   28.795425] Allocated by task 34:
[   28.798870]  kasan_kmalloc+0xeb/0x160
[   28.802674]  kmem_cache_alloc_trace+0x131/0x3d0
[   28.807347]  tipc_subscrb_connect_cb+0x40/0x150
[   28.812081]  tipc_accept_from_sock+0x25b/0x400
[   28.816665]  tipc_recv_work+0x75/0xd0
[   28.820465]  process_one_work+0x793/0x14a0
[   28.824700]  worker_thread+0x5cc/0xff0
[   28.828673]  kthread+0x30d/0x420
[   28.832034]  ret_from_fork+0x24/0x30
[   28.835738] 
[   28.837536] Freed by task 2859:
[   28.840812]  kasan_slab_free+0xc3/0x1a0
[   28.844785]  kfree+0xc9/0x250
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   28.847895]  tipc_subscrb_put+0x22/0x30
[   28.851870]  tipc_close_conn+0x16a/0x200
[   28.855925]  tipc_send_work+0x41e/0x520
[   28.859899]  process_one_work+0x793/0x14a0
[   28.864130]  worker_thread+0x5cc/0xff0
[   28.868019]  kthread+0x30d/0x420
[   28.871428]  ret_from_fork+0x24/0x30
[   28.875159] 
[   28.876778] The buggy address belongs to the object at ffff8880b41c7d00
[   28.876778]  which belongs to the cache kmalloc-96 of size 96
[   28.889279] The buggy address is located 32 bytes inside of
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   28.889279]  96-byte region [ffff8880b41c7d00, ffff8880b41c7d60)
[   28.900974] The buggy address belongs to the page:
[   28.905902] page:ffffea0002d071c0 count:1 mapcount:0 mapping:ffff8880b41c7000 index:0xffff8880b41c7e00
[   28.915349] flags: 0xfff00000000100(slab)
[   28.919497] raw: 00fff00000000100 ffff8880b41c7000 ffff8880b41c7e00 000000010000001c
[   28.927376] raw: ffffea00027cafe0 ffffea0002d05120 ffff88813fe804c0 0000000000000000
[   28.935431] page dumped because: kasan: bad access detected
[   28.941135] 
[   28.942768] Memory state around the buggy address:
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   28.947689]  ffff8880b41c7c00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[   28.955044]  ffff8880b41c7c80: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[   28.962403] >ffff8880b41c7d00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[   28.969754]                                ^
[   28.974157]  ffff8880b41c7d80: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[   28.981505]  ffff8880b41c7e00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[   28.988852] ==================================================================
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   28.996202] Disabling lock debugging due to kernel taint
[   29.001641] Kernel panic - not syncing: panic_on_warn set ...
[   29.001641] 
[   29.008991] CPU: 1 PID: 34 Comm: kworker/u4:2 Tainted: G    B           4.14.232-syzkaller #0
[   29.017755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   29.027156] Workqueue: tipc_rcv tipc_recv_work
[   29.031741] Call Trace:
[   29.034331]  dump_stack+0x1b2/0x281
[   29.037959]  panic+0x1f9/0x42d
[   29.041149]  ? add_taint.cold+0x16/0x16
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   29.045141]  ? lock_downgrade+0x740/0x740
[   29.049295]  kasan_end_report+0x43/0x49
[   29.053271]  kasan_report_error.cold+0xa7/0x191
[   29.057940]  ? __lock_acquire+0x2c57/0x3f20
[   29.062259]  __asan_report_load8_noabort+0x68/0x70
[   29.067185]  ? tipc_subscrb_rcv_cb+0x300/0xa40
[   29.071766]  ? __lock_acquire+0x2c57/0x3f20
[   29.076081]  __lock_acquire+0x2c57/0x3f20
[   29.080236]  ? io_schedule_timeout+0x140/0x140
[   29.084812]  ? __wake_up_common_lock+0xcd/0x140
[   29.089483]  ? trace_hardirqs_on+0x10/0x10
[   29.093713]  ? trace_hardirqs_on+0x10/0x10
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   29.097946]  ? preempt_schedule_common+0x45/0xc0
[   29.102697]  ? ___preempt_schedule+0x16/0x18
[   29.107099]  ? tipc_recvmsg+0x43e/0x9e0
[   29.111067]  ? __local_bh_enable_ip+0x132/0x170
[   29.115727]  lock_acquire+0x170/0x3f0
[   29.119521]  ? tipc_subscrb_rcv_cb+0x4d4/0xa40
[   29.124101]  _raw_spin_lock_bh+0x2f/0x40
[   29.128154]  ? tipc_subscrb_rcv_cb+0x4d4/0xa40
[   29.132727]  tipc_subscrb_rcv_cb+0x4d4/0xa40
[   29.137252]  tipc_receive_from_sock+0x25c/0x450
[   29.141951]  ? trace_hardirqs_on+0x10/0x10
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[   29.146180]  ? tipc_close_conn+0x200/0x200
[   29.150413]  ? lock_downgrade+0x740/0x740
[   29.154560]  tipc_recv_work+0x75/0xd0
[   29.158358]  process_one_work+0x793/0x14a0
[   29.162596]  ? work_busy+0x320/0x320
[   29.166305]  ? worker_thread+0x158/0xff0
[   29.170372]  ? _raw_spin_unlock_irq+0x24/0x80
[   29.174866]  worker_thread+0x5cc/0xff0
[   29.178751]  ? rescuer_thread+0xc80/0xc80
[   29.182940]  kthread+0x30d/0x420
[   29.186314]  ? kthread_create_on_node+0xd0/0xd0
[   29.190981]  ret_from_fork+0x24/0x30
[   29.195552] Kernel Offset: disabled
[   29.199162] Rebooting in 86400 seconds..