[ 89.336877][ T2045] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. [ 89.342128][ T2045] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. Warning: Permanently added '[localhost]:34902' (ECDSA) to the list of known hosts. 1970/01/01 00:01:46 fuzzer started 1970/01/01 00:01:49 connecting to host at localhost:36511 1970/01/01 00:01:50 checking machine... 1970/01/01 00:01:50 checking revisions... 1970/01/01 00:01:51 testing simple program... executing program executing program [ 117.347990][ T2207] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 117.386358][ T2207] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link executing program [ 119.936136][ T2207] device hsr_slave_0 entered promiscuous mode [ 119.981282][ T2207] device hsr_slave_1 entered promiscuous mode [ 121.958808][ T2207] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 122.042834][ T2207] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 122.138912][ T2207] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 122.245927][ T2207] netdevsim netdevsim0 netdevsim3: renamed from eth3 executing program [ 124.389309][ T2207] 8021q: adding VLAN 0 to HW filter on device bond0 [ 124.515583][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 124.550831][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready executing program [ 125.718138][ T1978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 125.739061][ T1978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.821243][ T1978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 125.832710][ T1978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.912059][ T2524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 125.992739][ T1978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 126.242698][ T1978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 126.269655][ T1978] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 126.337980][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 126.361218][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 126.426687][ T2207] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 126.696309][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 126.698893][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready executing program [ 129.119427][ T2525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 129.130571][ T2525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.205628][ T2525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 130.210822][ T2525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.228170][ T2525] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.238706][ T2525] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.306785][ T2207] device veth0_vlan entered promiscuous mode [ 130.491641][ T2207] device veth1_vlan entered promiscuous mode [ 130.919960][ T2525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 130.950499][ T2525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 131.033143][ T2207] device veth0_macvtap entered promiscuous mode [ 131.121670][ T2207] device veth1_macvtap entered promiscuous mode [ 131.218517][ T2525] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 131.242084][ T2525] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 131.398205][ T2525] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 131.420030][ T2525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.500752][ T1809] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 131.512504][ T1809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 131.580515][ T2207] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.582108][ T2207] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.583279][ T2207] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.588513][ T2207] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 132.387645][ T2207] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 133.332527][ T1133] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 133.530729][ T1133] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:02:13 building call list... [ 133.681423][ T1133] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 133.840793][ T1133] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program [ 136.797397][ T1133] device hsr_slave_0 left promiscuous mode [ 136.868152][ T1133] device hsr_slave_1 left promiscuous mode [ 137.015105][ T1133] device veth1_macvtap left promiscuous mode [ 137.016475][ T1133] device veth0_macvtap left promiscuous mode [ 137.024861][ T1133] device veth1_vlan left promiscuous mode [ 137.025925][ T1133] device veth0_vlan left promiscuous mode executing program [ 138.528993][ T22] ================================================================== [ 138.529985][ T22] BUG: KASAN: invalid-access in __entry_tramp_text_end+0xddc/0xe000 [ 138.531517][ T22] Read at addr f2ff00000328e1a0 by task kdevtmpfs/22 [ 138.532406][ T22] Pointer tag: [f2], memory tag: [fe] [ 138.533795][ T22] [ 138.536435][ T22] CPU: 1 PID: 22 Comm: kdevtmpfs Not tainted 5.14.0-syzkaller-10764-gd6c338a74129 #0 [ 138.541194][ T22] Hardware name: linux,dummy-virt (DT) [ 138.544535][ T22] Call trace: [ 138.546288][ T22] dump_backtrace+0x0/0x1ac [ 138.548268][ T22] show_stack+0x18/0x24 [ 138.550046][ T22] dump_stack_lvl+0x68/0x84 [ 138.551870][ T22] print_address_description+0x7c/0x2b4 [ 138.554067][ T22] kasan_report+0x134/0x380 [ 138.555321][ T22] __do_kernel_fault+0x128/0x1bc [ 138.556343][ T22] do_tag_check_fault+0x74/0x90 [ 138.557380][ T22] do_mem_abort+0x44/0xb4 [ 138.558394][ T22] el1_abort+0x40/0x60 [ 138.559616][ T22] el1h_64_sync_handler+0xb0/0xd0 [ 138.560539][ T22] el1h_64_sync+0x78/0x7c [ 138.561594][ T22] __entry_tramp_text_end+0xddc/0xe000 [ 138.562613][ T22] d_lookup+0x44/0x70 [ 138.563372][ T22] lookup_dcache+0x24/0x84 [ 138.564253][ T22] __lookup_hash+0x24/0xd0 [ 138.565138][ T22] kern_path_locked+0x90/0x10c [ 138.566043][ T22] handle_remove+0x38/0x284 [ 138.566890][ T22] devtmpfsd+0x8c/0xd0 [ 138.567781][ T22] kthread+0x150/0x15c [ 138.568628][ T22] ret_from_fork+0x10/0x20 [ 138.569721][ T22] [ 138.570366][ T22] Allocated by task 22: [ 138.571265][ T22] kasan_save_stack+0x28/0x60 [ 138.572355][ T22] __kasan_slab_alloc+0xb0/0x110 [ 138.573196][ T22] kmem_cache_alloc+0x194/0x2f4 [ 138.574137][ T22] getname_kernel+0x30/0x150 [ 138.574842][ T22] kern_path_locked+0x2c/0x10c [ 138.575615][ T22] handle_remove+0x38/0x284 [ 138.576509][ T22] devtmpfsd+0x8c/0xd0 [ 138.577322][ T22] kthread+0x150/0x15c [ 138.578223][ T22] ret_from_fork+0x10/0x20 [ 138.579174][ T22] [ 138.579758][ T22] Freed by task 22: [ 138.580480][ T22] kasan_save_stack+0x28/0x60 [ 138.581350][ T22] kasan_set_track+0x28/0x3c [ 138.582266][ T22] kasan_set_free_info+0x20/0x30 [ 138.583073][ T22] ____kasan_slab_free.constprop.0+0x178/0x1e0 [ 138.584061][ T22] __kasan_slab_free+0x10/0x1c [ 138.584926][ T22] slab_free_freelist_hook+0xc4/0x20c [ 138.585705][ T22] kmem_cache_free+0x9c/0x3d4 [ 138.586510][ T22] putname.part.0+0x68/0x7c [ 138.587352][ T22] kern_path_locked+0x64/0x10c [ 138.588148][ T22] handle_remove+0x38/0x284 [ 138.589107][ T22] devtmpfsd+0x8c/0xd0 [ 138.590274][ T22] kthread+0x150/0x15c [ 138.591577][ T22] ret_from_fork+0x10/0x20 [ 138.592952][ T22] [ 138.593709][ T22] The buggy address belongs to the object at ffff00000328e180 [ 138.593709][ T22] which belongs to the cache names_cache of size 4096 [ 138.596408][ T22] The buggy address is located 32 bytes inside of [ 138.596408][ T22] 4096-byte region [ffff00000328e180, ffff00000328f180) [ 138.598282][ T22] The buggy address belongs to the page: [ 138.599336][ T22] page:00000000cc545bb4 refcount:1 mapcount:0 mapping:0000000000000000 index:0xf2ff000003288000 pfn:0x43288 [ 138.601223][ T22] head:00000000cc545bb4 order:3 compound_mapcount:0 compound_pincount:0 [ 138.602698][ T22] flags: 0x1ffc00000010200(slab|head|node=0|zone=0|lastcpupid=0x7ff|kasantag=0x0) [ 138.604876][ T22] raw: 01ffc00000010200 0000000000000000 dead000000000122 f7ff000002837700 [ 138.606238][ T22] raw: f2ff000003288000 0000000080070003 00000001ffffffff 0000000000000000 [ 138.607593][ T22] page dumped because: kasan: bad access detected [ 138.608920][ T22] [ 138.609511][ T22] Memory state around the buggy address: [ 138.611096][ T22] ffff00000328df00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 138.613016][ T22] ffff00000328e000: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 138.618045][ T22] >ffff00000328e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 138.619244][ T22] ^ [ 138.620246][ T22] ffff00000328e200: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 138.621312][ T22] ffff00000328e300: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 138.622463][ T22] ================================================================== [ 138.623445][ T22] Disabling lock debugging due to kernel taint [ 139.909815][ T1133] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 140.065479][ T1133] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface executing program [ 140.625578][ T1133] bond0 (unregistering): Released all slaves executing program executing program executing program executing program executing program [ 158.057233][ T2199] can: request_module (can-proto-0) failed. [ 158.251147][ T2199] can: request_module (can-proto-0) failed. [ 158.391351][ T2199] can: request_module (can-proto-0) failed. executing program executing program executing program [ 167.161539][ T2045] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. [ 167.172798][ T2045] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. [ 167.187338][ T2045] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. [ 167.193587][ T2045] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. executing program VM DIAGNOSIS: 21:44:01 Registers: info registers vcpu 0 PC=ffff800011127f98 X00=ffff800011127f90 X01=0000000000000000 X02=0000000000000001 X03=ffff00007fbc1b00 X04=0000000000000000 X05=f3ff000003af9e80 X06=ffff80006d9c0000 X07=ffff800012202000 X08=ffff80001232d000 X09=0000000000000000 X10=0000000000000009 X11=0000000000000000 X12=ffff80001249c000 X13=ffff800012217000 X14=00000000000039c9 X15=00004c4b40000000 X16=ffff800010004000 X17=ffff80006d9c0000 X18=0000000000000000 X19=ffff80001232f208 X20=ffff80001232f200 X21=0000000000000000 X22=0000000000000004 X23=ffff80001232f208 X24=0000000000000028 X25=0000000000000000 X26=ffff80001013edd0 X27=ffff00007fbbcf00 X28=ffff00007fbbcec0 X29=ffff800010003d70 X30=c1f880001013e570 SP=ffff800010003d70 PSTATE=004000c9 ---- EL2h BTYPE=0 FPCR=00000000 FPSR=00000010 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=0000000000000000:3fcde3386d15a6c1 Z01=0000000000000000:3fd0000000000000 Z02=0000000000000000:3ff3333333333333 Z03=0000000000000000:413b10f000000000 Z04=0000000000000000:3fea9c5bd5d1c5fd Z05=0000000000000000:3fd6d251453d2594 Z06=0000000000000000:3fd3333333333333 Z07=0000000000000000:3feb5a659124f6d9 Z08=0000000000000000:3f937a351b04f1a0 Z09=0000000000000000:3fe4a52efb299c7a Z10=0000000000000000:3fe0000000000000 Z11=0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000 Z16=0000000000000000:0000000000000000 Z17=0000000000000000:0000000000000000 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=0000000000000000:00000000c7035f84 Z31=0000000000000000:0000000000000000 info registers vcpu 1 PC=ffff80001078068c X00=ffff8000125e5000 X01=0000000000000002 X02=0000000000000000 X03=0000000000000018 X04=fdff000002b38880 X05=0000000000000031 X06=352e38333120205b X07=205b5d3539373333 X08=000000000000005d X09=ffff8000126ab520 X10=000000000000005d X11=ffff800012301b78 X12=5b5d353937333335 X13=205d323254202020 X14=0000000000000000 X15=0000000000000020 X16=6478302b646e655f X17=30306578302f6364 X18=00000000fffffffd X19=ffff80001245994c X20=ffff800010780664 X21=fdff000002b38880 X22=ffff800012459960 X23=0000000000000f01 X24=0000000000000018 X25=ffff80001221ff90 X26=0000000000000000 X27=ffff800012459948 X28=ffff80001224d110 X29=ffff8000126ab5d0 X30=ffff80001078068c SP=ffff8000126ab5d0 PSTATE=804000c9 N--- EL2h BTYPE=0 FPCR=00000000 FPSR=00000010 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=0000000000000000:3fd2ecacfdb1ead5 Z01=0000000000000000:3fd0000000000000 Z02=0000000000000000:3ff3333333333333 Z03=0000000000000000:3ff0000000000000 Z04=0000000000000000:3ff0000000000000 Z05=0000000000000000:3fd3333333333333 Z06=0000000000000000:0000004000001010 Z07=0000000000000000:3ff2d1c8521280b4 Z08=0000000000000000:3fc0e42c88540c04 Z09=0000000000000000:3fe269000c3fdcde Z10=0000000000000000:3fe0000000000000 Z11=0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000 Z16=0000000000000000:0000000000000000 Z17=0000000000000000:0000000000000000 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=0000000000000000:000000007772356a Z31=0000000000000000:0000000000000000