device team0 entered promiscuous mode device team_slave_0 entered promiscuous mode device team_slave_1 entered promiscuous mode general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 0 PID: 10604 Comm: syz-executor.0 Not tainted 4.14.266-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. task: ffff8880475004c0 task.stack: ffff888047508000 RIP: 0010:scatterwalk_start include/crypto/scatterwalk.h:86 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:111 [inline] RIP: 0010:scatterwalk_copychunks+0x4a3/0x680 crypto/scatterwalk.c:55 RSP: 0018:ffff88804750f520 EFLAGS: 00010202 bridge0: port 3(team0) entered blocking state RAX: dffffc0000000000 RBX: 0000000000001000 RCX: ffffc90005bf2000 RDX: 0000000000000002 RSI: ffffffff8316f464 RDI: ffff8880b1117128 RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed1008fda349 R10: ffff888047ed1a4c R11: 0000000000000000 R12: 0000000000001000 R13: ffff88804750f5d8 R14: 0000000000003000 R15: ffff8880b1117134 FS: 00007f6b7b25b700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2da27000 CR3: 000000009f4fb000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: scatterwalk_map_and_copy crypto/scatterwalk.c:72 [inline] scatterwalk_map_and_copy+0x100/0x1a0 crypto/scatterwalk.c:60 bridge0: port 3(team0) entered forwarding state audit: type=1804 audit(1644770350.330:4): pid=10611 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir916032491/syzkaller.OW4hbN/77/bus" dev="sda1" ino=14013 res=1 audit: type=1800 audit(1644770350.330:5): pid=10611 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="bus" dev="sda1" ino=14013 res=0 gcmaes_encrypt.constprop.0+0x5b5/0xc00 arch/x86/crypto/aesni-intel_glue.c:778 audit: type=1804 audit(1644770350.420:6): pid=10627 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir203668090/syzkaller.9WzPJx/85/bus" dev="sda1" ino=14011 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1644770350.440:7): pid=10605 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir310505404/syzkaller.nxY4OF/78/bus" dev="sda1" ino=13983 res=1 Code: fc ff df 80 3c 02 00 0f 85 d9 01 00 00 48 8d 45 10 49 89 6d 00 48 89 c2 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 81 01 00 00 48 b8 00 00 00 RIP: scatterwalk_start include/crypto/scatterwalk.h:86 [inline] RSP: ffff88804750f520 RIP: scatterwalk_pagedone include/crypto/scatterwalk.h:111 [inline] RSP: ffff88804750f520 RIP: scatterwalk_copychunks+0x4a3/0x680 crypto/scatterwalk.c:55 RSP: ffff88804750f520 ---[ end trace 8c428de344eb2e8e ]--- ---------------- Code disassembly (best guess), 2 bytes skipped: 0: df 80 3c 02 00 0f filds 0xf00023c(%rax) 6: 85 d9 test %ebx,%ecx 8: 01 00 add %eax,(%rax) a: 00 48 8d add %cl,-0x73(%rax) d: 45 10 49 89 adc %r9b,-0x77(%r9) 11: 6d insl (%dx),%es:(%rdi) 12: 00 48 89 add %cl,-0x77(%rax) 15: c2 48 89 retq $0x8948 18: 44 24 18 rex.R and $0x18,%al 1b: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 22: fc ff df 25: 48 c1 ea 03 shr $0x3,%rdx * 29: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction 2d: 84 c0 test %al,%al 2f: 74 08 je 0x39 31: 3c 03 cmp $0x3,%al 33: 0f 8e 81 01 00 00 jle 0x1ba 39: 48 rex.W 3a: b8 .byte 0xb8 3b: 00 00 add %al,(%rax)