[ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Started Getty on tty2. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. [ 62.317894][ T8321] __swap_info_get: Bad swap file entry 3fff3ff80000a [ 62.325434][ T8321] BUG: Bad page map in process (agetty) pte:1800ffffea00 pmd:12950067 [ 62.334849][ T8321] addr:00007f6793000000 vm_flags:08100073 anon_vma:ffff888028e40500 mapping:0000000000000000 index:7f6793000 [ 62.346500][ T8321] file:(null) fault:0x0 mmap:0x0 readpage:0x0 [ 62.352623][ T8321] CPU: 0 PID: 8321 Comm: (agetty) Not tainted 5.12.0-rc7-syzkaller #0 [ 62.360808][ T8321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.370888][ T8321] Call Trace: [ 62.374191][ T8321] dump_stack+0x141/0x1d7 [ 62.378589][ T8321] print_bad_pte.cold+0x2bc/0x2e5 [ 62.383649][ T8321] ? fault_around_bytes_get+0x40/0x40 [ 62.389068][ T8321] unmap_page_range+0x1bcf/0x2650 [ 62.394186][ T8321] ? vm_normal_page_pmd+0x510/0x510 [ 62.399426][ T8321] ? lock_downgrade+0x6e0/0x6e0 [ 62.404310][ T8321] ? uprobe_munmap+0x1c/0x560 [ 62.409022][ T8321] unmap_single_vma+0x198/0x300 [ 62.413909][ T8321] unmap_vmas+0x16d/0x2f0 [ 62.418281][ T8321] ? zap_vma_ptes+0x100/0x100 [ 62.422989][ T8321] ? lru_add_drain_cpu+0x4e2/0x900 [ 62.428147][ T8321] exit_mmap+0x2a8/0x590 [ 62.432423][ T8321] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 62.438473][ T8321] __mmput+0x122/0x470 [ 62.443290][ T8321] mmput+0x58/0x60 [ 62.443410][ T8321] begin_new_exec+0xea7/0x2c40 [ 62.443466][ T8321] load_elf_binary+0x159d/0x4b40 [ 62.443508][ T8321] ? find_held_lock+0x2d/0x110 [ 62.443540][ T8321] ? bprm_execve+0x806/0x19a0 [ 62.443573][ T8321] ? elf_core_dump+0x3370/0x3370 [ 62.443599][ T8321] ? do_raw_read_unlock+0x3b/0x70 [ 62.443626][ T8321] ? _raw_read_unlock+0x24/0x40 [ 62.443652][ T8321] ? load_misc_binary+0x641/0xb30 [ 62.443686][ T8321] bprm_execve+0x821/0x19a0 [ 62.443720][ T8321] ? open_exec+0x70/0x70 [ 62.443756][ T8321] do_execveat_common+0x626/0x7c0 [ 62.443784][ T8321] ? bprm_execve+0x19a0/0x19a0 [ 62.443813][ T8321] ? getname_flags.part.0+0x1dd/0x4f0 [ 62.443845][ T8321] __x64_sys_execve+0x8f/0xc0 [ 62.443871][ T8321] ? trace_hardirqs_on+0x38/0x1c0 [ 62.443901][ T8321] do_syscall_64+0x2d/0x70 [ 62.443920][ T8321] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 62.443946][ T8321] RIP: 0033:0x7f6794e92647 [ 62.443984][ T8321] Code: Unable to access opcode bytes at RIP 0x7f6794e9261d. [ 62.443995][ T8321] RSP: 002b:00007ffdbc71faf8 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 62.444020][ T8321] RAX: ffffffffffffffda RBX: 000055fa75a43ec0 RCX: 00007f6794e92647 [ 62.444035][ T8321] RDX: 000055fa759d6f50 RSI: 000055fa75a33de0 RDI: 000055fa75a41a70 [ 62.444051][ T8321] RBP: 00007ffdbc71fc60 R08: 000055fa75a33de0 R09: 0000000000000000 [ 62.444065][ T8321] R10: 00007f6794efbf10 R11: 0000000000000246 R12: 000055fa75a42bc8 [ 62.444081][ T8321] R13: 0000000000000000 R14: 000055fa75a33de0 R15: 00007ffdbc71fd40 [ 62.444195][ T8321] Disabling lock debugging due to kernel taint [ 62.491711][ T8321] __swap_info_get: Bad swap file entry 3ffffffffffef [ 62.491733][ T8321] BUG: Bad page map in process (agetty) pte:0000204e pmd:12950067 [ 62.491748][ T8321] addr:00007f6793001000 vm_flags:08100073 anon_vma:ffff888028e40500 mapping:0000000000000000 index:7f6793001 [ 62.491771][ T8321] file:(null) fault:0x0 mmap:0x0 readpage:0x0 [ 62.491802][ T8321] CPU: 0 PID: 8321 Comm: (agetty) Tainted: G B 5.12.0-rc7-syzkaller #0 [ 62.491826][ T8321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.491838][ T8321] Call Trace: [ 62.491846][ T8321] dump_stack+0x141/0x1d7 [ 62.491870][ T8321] print_bad_pte.cold+0x2bc/0x2e5 [ 62.491897][ T8321] ? fault_around_bytes_get+0x40/0x40 [ 62.491926][ T8321] unmap_page_range+0x1bcf/0x2650 [ 62.491957][ T8321] ? vm_normal_page_pmd+0x510/0x510 [ 62.491983][ T8321] ? lock_downgrade+0x6e0/0x6e0 [ 62.492006][ T8321] ? uprobe_munmap+0x1c/0x560 [ 62.492029][ T8321] unmap_single_vma+0x198/0x300 [ 62.492054][ T8321] unmap_vmas+0x16d/0x2f0 [ 62.492077][ T8321] ? zap_vma_ptes+0x100/0x100 [ 62.492102][ T8321] ? lru_add_drain_cpu+0x4e2/0x900 [ 62.492132][ T8321] exit_mmap+0x2a8/0x590 [ 62.492152][ T8321] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 62.492182][ T8321] __mmput+0x122/0x470 [ 62.492205][ T8321] mmput+0x58/0x60 [ 62.492225][ T8321] begin_new_exec+0xea7/0x2c40 [ 62.492254][ T8321] load_elf_binary+0x159d/0x4b40 [ 62.492281][ T8321] ? find_held_lock+0x2d/0x110 [ 62.492304][ T8321] ? bprm_execve+0x806/0x19a0 [ 62.492328][ T8321] ? elf_core_dump+0x3370/0x3370 [ 62.492348][ T8321] ? do_raw_read_unlock+0x3b/0x70 [ 62.492373][ T8321] ? _raw_read_unlock+0x24/0x40 [ 62.492397][ T8321] ? load_misc_binary+0x641/0xb30 [ 62.492422][ T8321] bprm_execve+0x821/0x19a0 [ 62.492447][ T8321] ? open_exec+0x70/0x70 [ 62.492485][ T8321] do_execveat_common+0x626/0x7c0 [ 62.492511][ T8321] ? bprm_execve+0x19a0/0x19a0 [ 62.492535][ T8321] ? getname_flags.part.0+0x1dd/0x4f0 [ 62.492560][ T8321] __x64_sys_execve+0x8f/0xc0 [ 62.492584][ T8321] ? trace_hardirqs_on+0x38/0x1c0 [ 62.492609][ T8321] do_syscall_64+0x2d/0x70 [ 62.492630][ T8321] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 62.492655][ T8321] RIP: 0033:0x7f6794e92647 [ 62.492678][ T8321] Code: Unable to access opcode bytes at RIP 0x7f6794e9261d. [ 62.492687][ T8321] RSP: 002b:00007ffdbc71faf8 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 62.492711][ T8321] RAX: ffffffffffffffda RBX: 000055fa75a43ec0 RCX: 00007f6794e92647 [ 62.492726][ T8321] RDX: 000055fa759d6f50 RSI: 000055fa75a33de0 RDI: 000055fa75a41a70 [ 62.492742][ T8321] RBP: 00007ffdbc71fc60 R08: 000055fa75a33de0 R09: 0000000000000000 [ 62.492757][ T8321] R10: 00007f6794efbf10 R11: 0000000000000246 R12: 000055fa75a42bc8 [ 62.492772][ T8321] R13: 0000000000000000 R14: 000055fa75a33de0 R15: 00007ffdbc71fd40 [ 62.508327][ T8321] BUG: Bad rss-counter state mm:ffff888026939500 type:MM_SWAPENTS val:-2 Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.52' (ECDSA) to the list of known hosts. 2021/04/22 15:53:01 fuzzer started 2021/04/22 15:53:01 dialing manager at 10.128.0.169:45807 2021/04/22 15:53:01 syscalls: 1690 2021/04/22 15:53:01 code coverage: enabled 2021/04/22 15:53:01 comparison tracing: enabled 2021/04/22 15:53:01 extra coverage: enabled 2021/04/22 15:53:01 setuid sandbox: enabled 2021/04/22 15:53:01 namespace sandbox: enabled 2021/04/22 15:53:01 Android sandbox: /sys/fs/selinux/policy does not exist 2021/04/22 15:53:01 fault injection: enabled 2021/04/22 15:53:01 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/04/22 15:53:01 net packet injection: enabled 2021/04/22 15:53:01 net device setup: enabled 2021/04/22 15:53:01 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/04/22 15:53:01 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/04/22 15:53:01 USB emulation: enabled 2021/04/22 15:53:01 hci packet injection: enabled 2021/04/22 15:53:01 wifi device emulation: enabled 2021/04/22 15:53:01 802.15.4 emulation: enabled 2021/04/22 15:53:01 fetching corpus: 0, signal 0/2000 (executing program) 2021/04/22 15:53:02 fetching corpus: 50, signal 43218/46497 (executing program) syzkaller login: [ 68.000693][ C1] ================================================================== [ 68.008818][ C1] BUG: KASAN: use-after-free in skb_try_coalesce+0x1334/0x1440 [ 68.016362][ C1] Write of size 4 at addr ffff88801a768008 by task systemd/1 [ 68.023732][ C1] [ 68.026062][ C1] CPU: 1 PID: 1 Comm: systemd Tainted: G B 5.12.0-rc7-syzkaller #0 [ 68.035337][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.045385][ C1] Call Trace: [ 68.048657][ C1] [ 68.051500][ C1] dump_stack+0x141/0x1d7 [ 68.055825][ C1] ? skb_try_coalesce+0x1334/0x1440 [ 68.061061][ C1] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 68.068098][ C1] ? skb_try_coalesce+0x1334/0x1440 [ 68.073315][ C1] ? skb_try_coalesce+0x1334/0x1440 [ 68.078970][ C1] kasan_report.cold+0x7c/0xd8 [ 68.083750][ C1] ? __sanitizer_cov_trace_cmp8+0x61/0x70 [ 68.089495][ C1] ? skb_try_coalesce+0x1334/0x1440 [ 68.094709][ C1] skb_try_coalesce+0x1334/0x1440 [ 68.099749][ C1] tcp_try_coalesce+0x393/0x920 [ 68.104619][ C1] ? tcp_urg.part.0+0x2d0/0x2d0 [ 68.109472][ C1] ? lock_release+0x522/0x720 [ 68.114159][ C1] ? ktime_get+0x38a/0x470 [ 68.118565][ C1] ? trace_hardirqs_on+0x5b/0x1c0 [ 68.123582][ C1] tcp_queue_rcv+0x8a/0x6e0 [ 68.128076][ C1] tcp_rcv_established+0x175e/0x1eb0 [ 68.133536][ C1] ? tcp_data_queue+0x4b10/0x4b10 [ 68.138576][ C1] ? do_raw_spin_lock+0x120/0x2b0 [ 68.143612][ C1] tcp_v4_do_rcv+0x5d1/0x870 [ 68.148263][ C1] tcp_v4_rcv+0x3298/0x3950 [ 68.152775][ C1] ? tcp_v4_early_demux+0x8f0/0x8f0 [ 68.158000][ C1] ? lock_release+0x720/0x720 [ 68.162688][ C1] ? nf_hook.constprop.0+0x3d2/0x650 [ 68.168058][ C1] ? ip_protocol_deliver_rcu+0xa20/0xa20 [ 68.173795][ C1] ip_protocol_deliver_rcu+0x5c/0xa20 [ 68.179179][ C1] ip_local_deliver_finish+0x20a/0x370 [ 68.184661][ C1] ip_local_deliver+0x1b3/0x200 [ 68.189645][ C1] ip_sublist_rcv_finish+0x9a/0x2c0 [ 68.194854][ C1] ip_list_rcv_finish.constprop.0+0x51e/0x6e0 [ 68.200942][ C1] ? ip_rcv_finish_core.constprop.0+0x1e70/0x1e70 [ 68.207380][ C1] ? ip_list_rcv_finish.constprop.0+0x6e0/0x6e0 [ 68.213637][ C1] ? ip_rcv_core+0x867/0xcb0 [ 68.222088][ C1] ip_list_rcv+0x34e/0x490 [ 68.226518][ C1] ? lock_release+0x522/0x720 [ 68.231192][ C1] ? ip_rcv+0xd0/0xd0 [ 68.235173][ C1] ? ip_rcv+0xd0/0xd0 [ 68.240214][ C1] __netif_receive_skb_list_core+0x549/0x8e0 [ 68.246195][ C1] ? lock_acquire+0x58a/0x740 [ 68.250885][ C1] ? process_backlog+0x6c0/0x6c0 [ 68.256000][ C1] ? eth_gro_receive+0x870/0x870 [ 68.261043][ C1] ? ktime_get_with_offset+0x3f2/0x500 [ 68.266512][ C1] netif_receive_skb_list_internal+0x777/0xd70 [ 68.272678][ C1] ? __netif_receive_skb_list_core+0x8e0/0x8e0 [ 68.278826][ C1] ? xdp_linearize_page+0x840/0x840 [ 68.284028][ C1] ? vring_new_virtqueue+0x130/0x160 [ 68.289299][ C1] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 68.295007][ C1] ? virtqueue_get_buf_ctx_split+0x423/0x5f0 [ 68.300991][ C1] ? detach_buf_split+0x599/0x7b0 [ 68.306012][ C1] napi_complete_done+0x1f1/0x880 [ 68.311065][ C1] virtqueue_napi_complete+0x2c/0xc0 [ 68.316343][ C1] virtnet_poll+0xbbb/0x10b0 [ 68.320941][ C1] ? receive_buf+0x6220/0x6220 [ 68.325707][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 68.330580][ C1] ? lock_acquire+0x58a/0x740 [ 68.335249][ C1] __napi_poll+0xaf/0x440 [ 68.339566][ C1] net_rx_action+0x801/0xb40 [ 68.344143][ C1] ? napi_threaded_poll+0x5b0/0x5b0 [ 68.349332][ C1] ? sched_clock_cpu+0x18/0x1f0 [ 68.354178][ C1] ? __common_interrupt+0x9e/0x200 [ 68.359286][ C1] __do_softirq+0x29b/0x9f6 [ 68.363791][ C1] irq_exit_rcu+0x134/0x200 [ 68.368325][ C1] common_interrupt+0xa4/0xd0 [ 68.372996][ C1] [ 68.375917][ C1] asm_common_interrupt+0x1e/0x40 [ 68.381050][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x60 [ 68.387219][ C1] Code: 81 e1 00 01 00 00 65 48 8b 14 25 00 f0 01 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 34 15 00 00 85 c0 74 2b 8b 82 10 15 00 00 <83> f8 02 75 20 48 8b 8a 18 15 00 00 8b 92 14 15 00 00 48 8b 01 48 [ 68.407457][ C1] RSP: 0018:ffffc90000c67860 EFLAGS: 00000246 [ 68.413565][ C1] RAX: 0000000000000000 RBX: 000000000000000f RCX: 0000000000000000 [ 68.421556][ C1] RDX: ffff888011518000 RSI: ffffffff8393548a RDI: 0000000000000003 [ 68.430592][ C1] RBP: ffff888020965700 R08: 0000000000000000 R09: 000000000000000f [ 68.440146][ C1] R10: ffffffff83935477 R11: 0000000000000010 R12: 0000000000000022 [ 68.448115][ C1] R13: 0000000000000020 R14: dffffc0000000000 R15: 0000000000000000 [ 68.456802][ C1] ? tomoyo_domain_quota_is_ok+0x307/0x550 [ 68.463159][ C1] ? tomoyo_domain_quota_is_ok+0x31a/0x550 [ 68.469043][ C1] tomoyo_domain_quota_is_ok+0x31a/0x550 [ 68.474818][ C1] tomoyo_supervisor+0x2f2/0xf00 [ 68.480304][ C1] ? tomoyo_profile+0x50/0x50 [ 68.485012][ C1] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 68.492830][ C1] ? kasan_quarantine_put+0xf5/0x210 [ 68.498134][ C1] ? trace_hardirqs_on+0x5b/0x1c0 [ 68.503165][ C1] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 68.508896][ C1] ? tomoyo_path_matches_pattern+0x110/0x280 [ 68.514961][ C1] ? tomoyo_check_path_acl+0xab/0x210 [ 68.520450][ C1] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 68.526829][ C1] ? tomoyo_same_mount_acl+0x450/0x450 [ 68.532287][ C1] tomoyo_path_permission+0x270/0x3a0 [ 68.537654][ C1] tomoyo_path_perm+0x2f0/0x400 [ 68.542515][ C1] ? tomoyo_check_open_permission+0x380/0x380 [ 68.548579][ C1] ? may_linkat+0x2d0/0x2d0 [ 68.553079][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 68.559320][ C1] ? getname_flags.part.0+0x1dd/0x4f0 [ 68.564800][ C1] security_inode_getattr+0xcf/0x140 [ 68.570086][ C1] vfs_statx+0x164/0x390 [ 68.574366][ C1] ? do_readlinkat+0x2f0/0x2f0 [ 68.579138][ C1] ? lock_acquire+0x58a/0x740 [ 68.583913][ C1] __do_sys_newfstatat+0x96/0x120 [ 68.588940][ C1] ? __do_compat_sys_newlstat+0x110/0x110 [ 68.594654][ C1] ? lock_release+0x522/0x720 [ 68.599329][ C1] ? __context_tracking_exit+0xb8/0xe0 [ 68.604859][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 68.609745][ C1] ? account_other_time+0x205/0x370 [ 68.614934][ C1] ? syscall_enter_from_user_mode+0x27/0x70 [ 68.620826][ C1] ? trace_hardirqs_on+0x5b/0x1c0 [ 68.625844][ C1] do_syscall_64+0x2d/0x70 [ 68.630264][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.636161][ C1] RIP: 0033:0x7f6794eb544b [ 68.640573][ C1] Code: 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 83 ff 01 48 89 d0 77 38 48 63 fe 4d 63 d0 48 89 c6 48 89 ca b8 06 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 f3 c3 0f 1f 00 48 8b 15 19 da 2b 00 f7 d8 [ 68.660186][ C1] RSP: 002b:00007ffdbc71f858 EFLAGS: 00000246 ORIG_RAX: 0000000000000106 [ 68.668666][ C1] RAX: ffffffffffffffda RBX: 00007ffdbc71fbe0 RCX: 00007f6794eb544b [ 68.676794][ C1] RDX: 00007ffdbc71f870 RSI: 000055fa75af90a3 RDI: 0000000000000013 [ 68.686002][ C1] RBP: 000055fa75af90a3 R08: 0000000000000100 R09: 0000000000008040 [ 68.694028][ C1] R10: 0000000000000100 R11: 0000000000000246 R12: 00007ffdbc71f960 [ 68.702982][ C1] R13: 0000000000000008 R14: 00007ffdbc71f870 R15: 000055fa75af7fc0 [ 68.710969][ C1] [ 68.713286][ C1] Allocated by task 1: [ 68.717348][ C1] kasan_save_stack+0x1b/0x40 [ 68.722024][ C1] __kasan_slab_alloc+0x75/0x90 [ 68.726875][ C1] kmem_cache_alloc+0x155/0x370 [ 68.731882][ C1] getname_flags.part.0+0x50/0x4f0 [ 68.736986][ C1] getname+0x8e/0xd0 [ 68.740861][ C1] do_sys_openat2+0xf5/0x420 [ 68.745433][ C1] __x64_sys_open+0x119/0x1c0 [ 68.750112][ C1] do_syscall_64+0x2d/0x70 [ 68.754532][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.760528][ C1] [ 68.762834][ C1] Freed by task 1: [ 68.766531][ C1] kasan_save_stack+0x1b/0x40 [ 68.771238][ C1] kasan_set_track+0x1c/0x30 [ 68.775817][ C1] kasan_set_free_info+0x20/0x30 [ 68.780761][ C1] __kasan_slab_free+0xf5/0x130 [ 68.785612][ C1] slab_free_freelist_hook+0x92/0x210 [ 68.790989][ C1] kmem_cache_free+0x8a/0x740 [ 68.795649][ C1] putname+0xe1/0x120 [ 68.799612][ C1] do_sys_openat2+0x153/0x420 [ 68.804273][ C1] __x64_sys_open+0x119/0x1c0 [ 68.808968][ C1] do_syscall_64+0x2d/0x70 [ 68.813378][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.819269][ C1] [ 68.821574][ C1] The buggy address belongs to the object at ffff88801a768000 [ 68.821574][ C1] which belongs to the cache names_cache of size 4096 [ 68.839439][ C1] The buggy address is located 8 bytes inside of [ 68.839439][ C1] 4096-byte region [ffff88801a768000, ffff88801a769000) [ 68.852705][ C1] The buggy address belongs to the page: [ 68.858323][ C1] page:ffffea000069da00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a768 [ 68.868461][ C1] head:ffffea000069da00 order:3 compound_mapcount:0 compound_pincount:0 [ 68.876775][ C1] flags: 0xfff00000010200(slab|head) [ 68.882060][ C1] raw: 00fff00000010200 0000000000000000 0000000100000001 ffff8880109bd140 [ 68.890625][ C1] raw: 0000000000000000 0000000000070007 00000001ffffffff 0000000000000000 [ 68.899185][ C1] page dumped because: kasan: bad access detected [ 68.905588][ C1] [ 68.907890][ C1] Memory state around the buggy address: [ 68.913496][ C1] ffff88801a767f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 68.921542][ C1] ffff88801a767f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 68.929600][ C1] >ffff88801a768000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.937662][ C1] ^ [ 68.941975][ C1] ffff88801a768080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.950035][ C1] ffff88801a768100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.960372][ C1] ================================================================== [ 68.968771][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 68.975362][ C1] CPU: 1 PID: 1 Comm: systemd Tainted: G B 5.12.0-rc7-syzkaller #0 [ 68.985334][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 69.001231][ C1] Call Trace: [ 69.006767][ C1] [ 69.009718][ C1] dump_stack+0x141/0x1d7 [ 69.014067][ C1] panic+0x306/0x73d [ 69.017959][ C1] ? __warn_printk+0xf3/0xf3 [ 69.022571][ C1] ? skb_try_coalesce+0x1334/0x1440 [ 69.027767][ C1] ? trace_hardirqs_on+0x38/0x1c0 [ 69.032796][ C1] ? trace_hardirqs_on+0x51/0x1c0 [ 69.037837][ C1] ? skb_try_coalesce+0x1334/0x1440 [ 69.043058][ C1] ? skb_try_coalesce+0x1334/0x1440 [ 69.048258][ C1] end_report.cold+0x5a/0x5a [ 69.052956][ C1] kasan_report.cold+0x6a/0xd8 [ 69.057714][ C1] ? __sanitizer_cov_trace_cmp8+0x61/0x70 [ 69.066134][ C1] ? skb_try_coalesce+0x1334/0x1440 [ 69.071329][ C1] skb_try_coalesce+0x1334/0x1440 [ 69.076355][ C1] tcp_try_coalesce+0x393/0x920 [ 69.081210][ C1] ? tcp_urg.part.0+0x2d0/0x2d0 [ 69.086176][ C1] ? lock_release+0x522/0x720 [ 69.090845][ C1] ? ktime_get+0x38a/0x470 [ 69.095268][ C1] ? trace_hardirqs_on+0x5b/0x1c0 [ 69.100396][ C1] tcp_queue_rcv+0x8a/0x6e0 [ 69.104917][ C1] tcp_rcv_established+0x175e/0x1eb0 [ 69.110318][ C1] ? tcp_data_queue+0x4b10/0x4b10 [ 69.115360][ C1] ? do_raw_spin_lock+0x120/0x2b0 [ 69.121105][ C1] tcp_v4_do_rcv+0x5d1/0x870 [ 69.125746][ C1] tcp_v4_rcv+0x3298/0x3950 [ 69.130270][ C1] ? tcp_v4_early_demux+0x8f0/0x8f0 [ 69.135481][ C1] ? lock_release+0x720/0x720 [ 69.140148][ C1] ? nf_hook.constprop.0+0x3d2/0x650 [ 69.145443][ C1] ? ip_protocol_deliver_rcu+0xa20/0xa20 [ 69.151093][ C1] ip_protocol_deliver_rcu+0x5c/0xa20 [ 69.156550][ C1] ip_local_deliver_finish+0x20a/0x370 [ 69.164273][ C1] ip_local_deliver+0x1b3/0x200 [ 69.169148][ C1] ip_sublist_rcv_finish+0x9a/0x2c0 [ 69.174460][ C1] ip_list_rcv_finish.constprop.0+0x51e/0x6e0 [ 69.181670][ C1] ? ip_rcv_finish_core.constprop.0+0x1e70/0x1e70 [ 69.188077][ C1] ? ip_list_rcv_finish.constprop.0+0x6e0/0x6e0 [ 69.195179][ C1] ? ip_rcv_core+0x867/0xcb0 [ 69.202678][ C1] ip_list_rcv+0x34e/0x490 [ 69.207106][ C1] ? lock_release+0x522/0x720 [ 69.211769][ C1] ? ip_rcv+0xd0/0xd0 [ 69.215743][ C1] ? ip_rcv+0xd0/0xd0 [ 69.219742][ C1] __netif_receive_skb_list_core+0x549/0x8e0 [ 69.225804][ C1] ? lock_acquire+0x58a/0x740 [ 69.230488][ C1] ? process_backlog+0x6c0/0x6c0 [ 69.235424][ C1] ? eth_gro_receive+0x870/0x870 [ 69.240350][ C1] ? ktime_get_with_offset+0x3f2/0x500 [ 69.245807][ C1] netif_receive_skb_list_internal+0x777/0xd70 [ 69.251974][ C1] ? __netif_receive_skb_list_core+0x8e0/0x8e0 [ 69.258986][ C1] ? xdp_linearize_page+0x840/0x840 [ 69.264172][ C1] ? vring_new_virtqueue+0x130/0x160 [ 69.269447][ C1] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 69.275548][ C1] ? virtqueue_get_buf_ctx_split+0x423/0x5f0 [ 69.281519][ C1] ? detach_buf_split+0x599/0x7b0 [ 69.286560][ C1] napi_complete_done+0x1f1/0x880 [ 69.291603][ C1] virtqueue_napi_complete+0x2c/0xc0 [ 69.296901][ C1] virtnet_poll+0xbbb/0x10b0 [ 69.301497][ C1] ? receive_buf+0x6220/0x6220 [ 69.310168][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 69.315607][ C1] ? lock_acquire+0x58a/0x740 [ 69.320269][ C1] __napi_poll+0xaf/0x440 [ 69.324590][ C1] net_rx_action+0x801/0xb40 [ 69.329218][ C1] ? napi_threaded_poll+0x5b0/0x5b0 [ 69.334404][ C1] ? sched_clock_cpu+0x18/0x1f0 [ 69.339253][ C1] ? __common_interrupt+0x9e/0x200 [ 69.344454][ C1] __do_softirq+0x29b/0x9f6 [ 69.348959][ C1] irq_exit_rcu+0x134/0x200 [ 69.353449][ C1] common_interrupt+0xa4/0xd0 [ 69.358110][ C1] [ 69.361024][ C1] asm_common_interrupt+0x1e/0x40 [ 69.366036][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x60 [ 69.372179][ C1] Code: 81 e1 00 01 00 00 65 48 8b 14 25 00 f0 01 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 34 15 00 00 85 c0 74 2b 8b 82 10 15 00 00 <83> f8 02 75 20 48 8b 8a 18 15 00 00 8b 92 14 15 00 00 48 8b 01 48 [ 69.391793][ C1] RSP: 0018:ffffc90000c67860 EFLAGS: 00000246 [ 69.397851][ C1] RAX: 0000000000000000 RBX: 000000000000000f RCX: 0000000000000000 [ 69.405898][ C1] RDX: ffff888011518000 RSI: ffffffff8393548a RDI: 0000000000000003 [ 69.413880][ C1] RBP: ffff888020965700 R08: 0000000000000000 R09: 000000000000000f [ 69.421885][ C1] R10: ffffffff83935477 R11: 0000000000000010 R12: 0000000000000022 [ 69.429879][ C1] R13: 0000000000000020 R14: dffffc0000000000 R15: 0000000000000000 [ 69.437836][ C1] ? tomoyo_domain_quota_is_ok+0x307/0x550 [ 69.443638][ C1] ? tomoyo_domain_quota_is_ok+0x31a/0x550 [ 69.449706][ C1] tomoyo_domain_quota_is_ok+0x31a/0x550 [ 69.455538][ C1] tomoyo_supervisor+0x2f2/0xf00 [ 69.460480][ C1] ? tomoyo_profile+0x50/0x50 [ 69.465251][ C1] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 69.471176][ C1] ? kasan_quarantine_put+0xf5/0x210 [ 69.476457][ C1] ? trace_hardirqs_on+0x5b/0x1c0 [ 69.481487][ C1] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 69.487212][ C1] ? tomoyo_path_matches_pattern+0x110/0x280 [ 69.493197][ C1] ? tomoyo_check_path_acl+0xab/0x210 [ 69.498582][ C1] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 69.504901][ C1] ? tomoyo_same_mount_acl+0x450/0x450 [ 69.510347][ C1] tomoyo_path_permission+0x270/0x3a0 [ 69.515715][ C1] tomoyo_path_perm+0x2f0/0x400 [ 69.520593][ C1] ? tomoyo_check_open_permission+0x380/0x380 [ 69.526669][ C1] ? may_linkat+0x2d0/0x2d0 [ 69.531169][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 69.537395][ C1] ? getname_flags.part.0+0x1dd/0x4f0 [ 69.542763][ C1] security_inode_getattr+0xcf/0x140 [ 69.548047][ C1] vfs_statx+0x164/0x390 [ 69.552288][ C1] ? do_readlinkat+0x2f0/0x2f0 [ 69.557040][ C1] ? lock_acquire+0x58a/0x740 [ 69.561704][ C1] __do_sys_newfstatat+0x96/0x120 [ 69.566721][ C1] ? __do_compat_sys_newlstat+0x110/0x110 [ 69.573133][ C1] ? lock_release+0x522/0x720 [ 69.577814][ C1] ? __context_tracking_exit+0xb8/0xe0 [ 69.583284][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 69.588154][ C1] ? account_other_time+0x205/0x370 [ 69.593370][ C1] ? syscall_enter_from_user_mode+0x27/0x70 [ 69.599376][ C1] ? trace_hardirqs_on+0x5b/0x1c0 [ 69.604416][ C1] do_syscall_64+0x2d/0x70 [ 69.608880][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 69.614787][ C1] RIP: 0033:0x7f6794eb544b [ 69.619205][ C1] Code: 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 83 ff 01 48 89 d0 77 38 48 63 fe 4d 63 d0 48 89 c6 48 89 ca b8 06 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 f3 c3 0f 1f 00 48 8b 15 19 da 2b 00 f7 d8 [ 69.638831][ C1] RSP: 002b:00007ffdbc71f858 EFLAGS: 00000246 ORIG_RAX: 0000000000000106 [ 69.647249][ C1] RAX: ffffffffffffffda RBX: 00007ffdbc71fbe0 RCX: 00007f6794eb544b [ 69.655675][ C1] RDX: 00007ffdbc71f870 RSI: 000055fa75af90a3 RDI: 0000000000000013 [ 69.663721][ C1] RBP: 000055fa75af90a3 R08: 0000000000000100 R09: 0000000000008040 [ 69.672000][ C1] R10: 0000000000000100 R11: 0000000000000246 R12: 00007ffdbc71f960 [ 69.680062][ C1] R13: 0000000000000008 R14: 00007ffdbc71f870 R15: 000055fa75af7fc0 [ 69.688642][ C1] Kernel Offset: disabled [ 69.692972][ C1] Rebooting in 86400 seconds..