[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.29' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 34.734236] audit: type=1804 audit(1658671572.655:2): pid=7987 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor284" name="/root/bus" dev="sda1" ino=13859 res=1 [ 34.752939] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 34.820287] FAULT_INJECTION: forcing a failure. [ 34.820287] name failslab, interval 1, probability 0, space 0, times 1 [ 34.831762] CPU: 1 PID: 7990 Comm: syz-executor284 Not tainted 4.14.289-syzkaller #0 [ 34.839635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 34.848965] Call Trace: [ 34.851539] dump_stack+0x1b2/0x281 [ 34.855155] should_fail.cold+0x10a/0x149 [ 34.859282] should_failslab+0xd6/0x130 [ 34.863237] kmem_cache_alloc_node_trace+0x25a/0x400 [ 34.868327] __kmalloc_node_track_caller+0x38/0x70 [ 34.873259] __alloc_skb+0x96/0x510 [ 34.876867] sk_stream_alloc_skb+0xb1/0x760 [ 34.881168] ? tcp_send_mss+0x9f/0x2e0 [ 34.885036] ? ipv6_frag_exit+0x40/0x40 [ 34.888994] do_tcp_sendpages+0x835/0x1750 [ 34.893214] ? lock_sock_nested+0x98/0x100 [ 34.897427] ? sk_stream_alloc_skb+0x760/0x760 [ 34.901988] tcp_sendpage_locked+0x81/0x130 [ 34.906287] tcp_sendpage+0x3a/0x60 [ 34.909979] inet_sendpage+0x155/0x590 [ 34.913843] ? tcp_sendpage_locked+0x130/0x130 [ 34.918421] ? current_kernel_time64+0x154/0x230 [ 34.923153] ? inet_getname+0x3a0/0x3a0 [ 34.927102] sock_sendpage+0xdf/0x140 [ 34.930998] pipe_to_sendpage+0x226/0x2d0 [ 34.935125] ? sockfs_setattr+0x140/0x140 [ 34.939256] ? direct_splice_actor+0x160/0x160 [ 34.943886] __splice_from_pipe+0x326/0x7a0 [ 34.948200] ? direct_splice_actor+0x160/0x160 [ 34.952771] generic_splice_sendpage+0xc1/0x110 [ 34.957426] ? vmsplice_to_user+0x1b0/0x1b0 [ 34.961730] ? rw_verify_area+0xe1/0x2a0 [ 34.965770] ? vmsplice_to_user+0x1b0/0x1b0 [ 34.970068] direct_splice_actor+0x115/0x160 [ 34.974456] splice_direct_to_actor+0x27c/0x730 [ 34.979105] ? generic_pipe_buf_nosteal+0x10/0x10 [ 34.983928] ? do_splice_to+0x140/0x140 [ 34.987888] ? rw_verify_area+0xe1/0x2a0 [ 34.991935] do_splice_direct+0x164/0x210 [ 34.996065] ? splice_direct_to_actor+0x730/0x730 [ 35.000886] ? rw_verify_area+0xe1/0x2a0 [ 35.004925] do_sendfile+0x47f/0xb30 [ 35.008623] ? do_compat_writev+0x180/0x180 [ 35.012926] SyS_sendfile64+0xff/0x110 [ 35.016809] ? SyS_sendfile+0x130/0x130 [ 35.020762] ? do_syscall_64+0x4c/0x640 [ 35.024712] ? SyS_sendfile+0x130/0x130 [ 35.028669] do_syscall_64+0x1d5/0x640 [ 35.032544] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 35.037708] RIP: 0033:0x7f59bca6ee99 [ 35.041413] RSP: 002b:00007f59bc9de2e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 35.049097] RAX: ffffffffffffffda RBX: 00007f59bcaf8500 RCX: 00007f59bca6ee99 [ 35.056342] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000007 [ 35.063587] RBP: 00007f59bcac5194 R08: 0000000000000001 R09: 0000000000000034 executing program [ 35.070835] R10: 0000800100020018 R11: 0000000000000246 R12: 00007f59bcaf850c [ 35.078100] R13: 00007f59bc9de2f0 R14: 00007f59bcaf8508 R15: 0000000000000001 [ 35.096253] audit: type=1804 audit(1658671573.015:3): pid=7994 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor284" name="/root/bus" dev="sda1" ino=13859 res=1 [ 35.096620] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 35.125788] FAULT_INJECTION: forcing a failure. [ 35.125788] name failslab, interval 1, probability 0, space 0, times 0 [ 35.137045] CPU: 0 PID: 7994 Comm: syz-executor284 Not tainted 4.14.289-syzkaller #0 [ 35.144910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 35.154267] Call Trace: [ 35.156838] dump_stack+0x1b2/0x281 [ 35.160448] should_fail.cold+0x10a/0x149 [ 35.164584] should_failslab+0xd6/0x130 [ 35.168546] __kmalloc+0x2c1/0x400 [ 35.172065] ? tls_push_record+0xfa/0x1270 [ 35.176297] tls_push_record+0xfa/0x1270 [ 35.180360] tls_sw_sendpage+0x760/0xb50 [ 35.184416] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 35.188548] inet_sendpage+0x155/0x590 [ 35.192418] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 35.196551] ? current_kernel_time64+0x154/0x230 [ 35.201289] ? inet_getname+0x3a0/0x3a0 [ 35.205249] sock_sendpage+0xdf/0x140 [ 35.209039] pipe_to_sendpage+0x226/0x2d0 [ 35.213184] ? sockfs_setattr+0x140/0x140 [ 35.217312] ? direct_splice_actor+0x160/0x160 [ 35.221877] __splice_from_pipe+0x326/0x7a0 [ 35.226180] ? direct_splice_actor+0x160/0x160 [ 35.230760] generic_splice_sendpage+0xc1/0x110 [ 35.235417] ? vmsplice_to_user+0x1b0/0x1b0 [ 35.239721] ? rw_verify_area+0xe1/0x2a0 [ 35.243880] ? vmsplice_to_user+0x1b0/0x1b0 [ 35.248193] direct_splice_actor+0x115/0x160 [ 35.252603] splice_direct_to_actor+0x27c/0x730 [ 35.257260] ? generic_pipe_buf_nosteal+0x10/0x10 [ 35.262087] ? do_splice_to+0x140/0x140 [ 35.266049] ? rw_verify_area+0xe1/0x2a0 [ 35.270101] do_splice_direct+0x164/0x210 [ 35.274232] ? splice_direct_to_actor+0x730/0x730 [ 35.279058] ? rw_verify_area+0xe1/0x2a0 [ 35.283105] do_sendfile+0x47f/0xb30 [ 35.286818] ? do_compat_writev+0x180/0x180 [ 35.291135] SyS_sendfile64+0xff/0x110 [ 35.295008] ? SyS_sendfile+0x130/0x130 [ 35.298963] ? do_syscall_64+0x4c/0x640 [ 35.302917] ? SyS_sendfile+0x130/0x130 [ 35.306873] do_syscall_64+0x1d5/0x640 [ 35.310748] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 35.315915] RIP: 0033:0x7f59bca6ee99 executing program [ 35.319602] RSP: 002b:00007f59bca202e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 35.327289] RAX: ffffffffffffffda RBX: 00007f59bcaf84e0 RCX: 00007f59bca6ee99 [ 35.334534] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000006 [ 35.341778] RBP: 00007f59bcac5194 R08: 0000000000000001 R09: 0000000000000034 [ 35.349039] R10: 0000800100020018 R11: 0000000000000246 R12: 00007f59bcaf84ec [ 35.356283] R13: 00007f59bca202f0 R14: 00007f59bcaf84e8 R15: 0000000000000001 [ 35.371051] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 35.374861] audit: type=1804 audit(1658671573.285:4): pid=7996 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor284" name="/root/bus" dev="sda1" ino=13859 res=1 [ 35.383549] FAULT_INJECTION: forcing a failure. [ 35.383549] name failslab, interval 1, probability 0, space 0, times 0 [ 35.411590] CPU: 0 PID: 7996 Comm: syz-executor284 Not tainted 4.14.289-syzkaller #0 [ 35.419468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 35.428801] Call Trace: [ 35.431380] dump_stack+0x1b2/0x281 [ 35.434994] should_fail.cold+0x10a/0x149 [ 35.439125] should_failslab+0xd6/0x130 [ 35.443096] __kmalloc+0x2c1/0x400 [ 35.446617] ? tls_push_record+0xfa/0x1270 [ 35.450829] tls_push_record+0xfa/0x1270 [ 35.454870] tls_sw_sendpage+0x760/0xb50 [ 35.458948] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 35.463083] inet_sendpage+0x155/0x590 [ 35.466950] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 35.471077] ? current_kernel_time64+0x154/0x230 [ 35.475806] ? inet_getname+0x3a0/0x3a0 [ 35.479755] sock_sendpage+0xdf/0x140 [ 35.483537] pipe_to_sendpage+0x226/0x2d0 [ 35.487659] ? sockfs_setattr+0x140/0x140 [ 35.491784] ? direct_splice_actor+0x160/0x160 [ 35.496342] __splice_from_pipe+0x326/0x7a0 [ 35.500641] ? direct_splice_actor+0x160/0x160 [ 35.505217] generic_splice_sendpage+0xc1/0x110 [ 35.509865] ? vmsplice_to_user+0x1b0/0x1b0 [ 35.514167] ? rw_verify_area+0xe1/0x2a0 [ 35.518216] ? vmsplice_to_user+0x1b0/0x1b0 [ 35.522513] direct_splice_actor+0x115/0x160 [ 35.526913] splice_direct_to_actor+0x27c/0x730 [ 35.531578] ? generic_pipe_buf_nosteal+0x10/0x10 [ 35.536411] ? do_splice_to+0x140/0x140 [ 35.540361] ? rw_verify_area+0xe1/0x2a0 [ 35.544412] do_splice_direct+0x164/0x210 [ 35.548537] ? splice_direct_to_actor+0x730/0x730 [ 35.553356] ? rw_verify_area+0xe1/0x2a0 [ 35.557392] do_sendfile+0x47f/0xb30 [ 35.561085] ? do_compat_writev+0x180/0x180 [ 35.565391] SyS_sendfile64+0xff/0x110 [ 35.569254] ? SyS_sendfile+0x130/0x130 [ 35.573206] ? do_syscall_64+0x4c/0x640 [ 35.577156] ? SyS_sendfile+0x130/0x130 [ 35.581109] do_syscall_64+0x1d5/0x640 [ 35.584975] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 35.590141] RIP: 0033:0x7f59bca6ee99 [ 35.593824] RSP: 002b:00007f59bca202e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 35.601505] RAX: ffffffffffffffda RBX: 00007f59bcaf84e0 RCX: 00007f59bca6ee99 [ 35.608749] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000006 [ 35.615993] RBP: 00007f59bcac5194 R08: 0000000000000001 R09: 0000000000000034 [ 35.623242] R10: 0000800100020018 R11: 0000000000000246 R12: 00007f59bcaf84ec [ 35.630487] R13: 00007f59bca202f0 R14: 00007f59bcaf84e8 R15: 0000000000000001 [ 35.681063] kasan: CONFIG_KASAN_INLINE enabled [ 35.685744] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 35.693178] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 35.699396] Modules linked in: [ 35.702565] CPU: 0 PID: 7996 Comm: syz-executor284 Not tainted 4.14.289-syzkaller #0 [ 35.710419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 35.719753] task: ffff8880b3228440 task.stack: ffff888095b78000 [ 35.725790] RIP: 0010:scatterwalk_copychunks+0x4a3/0x680 [ 35.731214] RSP: 0018:ffff888095b7f520 EFLAGS: 00010202 [ 35.736551] RAX: dffffc0000000000 RBX: 000000000000401d RCX: 0000000000000000 [ 35.743810] RDX: 0000000000000002 RSI: ffff8880b115439d RDI: ffff8880b30b2e58 [ 35.751056] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed10165bf803 [ 35.758303] R10: ffff8880b2dfc01c R11: 0000000000000000 R12: 000000000000401d [ 35.765547] R13: ffff888095b7f5d8 R14: 0000000000001000 R15: ffff8880b30b2e64 [ 35.772792] FS: 00007f59bca20700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 [ 35.780994] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 35.786851] CR2: 00007f59bcab0040 CR3: 00000000ac182000 CR4: 00000000003406f0 [ 35.794113] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 35.801359] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 35.808606] Call Trace: [ 35.812130] scatterwalk_map_and_copy+0x100/0x1a0 [ 35.816947] ? scatterwalk_ffwd+0x420/0x420 [ 35.821249] ? aesni_gcm_enc_avx2+0x155/0x170 [ 35.825722] ? kernel_fpu_end+0xf4/0x140 [ 35.829759] ? kernel_fpu_enable+0x30/0x30 [ 35.833971] gcmaes_encrypt.constprop.0+0x6cd/0xc00 [ 35.838963] ? generic_gcmaes_encrypt+0xf4/0x130 [ 35.843691] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 35.848508] ? tls_push_record+0xfa/0x1270 [ 35.852719] ? cryptd_aead_child+0x9/0x40 [ 35.857189] ? tls_push_record+0x938/0x1270 [ 35.861489] ? tls_sw_sendpage+0x760/0xb50 [ 35.865700] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 35.869835] ? inet_sendpage+0x155/0x590 [ 35.873883] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 35.878004] ? current_kernel_time64+0x154/0x230 [ 35.882732] ? inet_getname+0x3a0/0x3a0 [ 35.886690] ? sock_sendpage+0xdf/0x140 [ 35.890641] ? pipe_to_sendpage+0x226/0x2d0 [ 35.894936] ? sockfs_setattr+0x140/0x140 [ 35.899060] ? direct_splice_actor+0x160/0x160 [ 35.903633] ? __splice_from_pipe+0x326/0x7a0 [ 35.908104] ? direct_splice_actor+0x160/0x160 [ 35.912660] ? generic_splice_sendpage+0xc1/0x110 [ 35.917476] ? vmsplice_to_user+0x1b0/0x1b0 [ 35.921772] ? rw_verify_area+0xe1/0x2a0 [ 35.925807] ? vmsplice_to_user+0x1b0/0x1b0 [ 35.930104] ? direct_splice_actor+0x115/0x160 [ 35.934658] ? splice_direct_to_actor+0x27c/0x730 [ 35.939477] ? generic_pipe_buf_nosteal+0x10/0x10 [ 35.944292] ? do_splice_to+0x140/0x140 [ 35.948240] ? rw_verify_area+0xe1/0x2a0 [ 35.952277] ? do_splice_direct+0x164/0x210 [ 35.956575] ? splice_direct_to_actor+0x730/0x730 [ 35.961392] ? rw_verify_area+0xe1/0x2a0 [ 35.965425] ? do_sendfile+0x47f/0xb30 [ 35.969287] ? do_compat_writev+0x180/0x180 [ 35.973583] ? SyS_sendfile64+0xff/0x110 [ 35.977630] ? SyS_sendfile+0x130/0x130 [ 35.981585] ? do_syscall_64+0x4c/0x640 [ 35.985537] ? SyS_sendfile+0x130/0x130 [ 35.989488] ? do_syscall_64+0x1d5/0x640 [ 35.993526] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 35.998865] Code: fc ff df 80 3c 02 00 0f 85 d9 01 00 00 48 8d 45 10 49 89 6d 00 48 89 c2 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 81 01 00 00 48 b8 00 00 00 [ 36.017928] RIP: scatterwalk_copychunks+0x4a3/0x680 RSP: ffff888095b7f520 [ 36.025131] ---[ end trace 57102f7d4b8f3636 ]--- [ 36.029877] Kernel panic - not syncing: Fatal exception [ 36.035383] Kernel Offset: disabled [ 36.038990] Rebooting in 86400 seconds..