netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. IPVS: ftp: loaded support on port[0] = 21 BUG: MAX_LOCKDEP_CHAINS too low! turning off the locking correctness validator. CPU: 0 PID: 19393 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 add_chain_cache kernel/locking/lockdep.c:2259 [inline] lookup_chain_cache_add kernel/locking/lockdep.c:2371 [inline] validate_chain kernel/locking/lockdep.c:2391 [inline] __lock_acquire.cold+0x420/0x57e kernel/locking/lockdep.c:3416 lock_acquire+0x170/0x3c0 kernel/locking/lockdep.c:3908 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:144 perf_ctx_lock kernel/events/core.c:163 [inline] perf_event_context_sched_in kernel/events/core.c:3433 [inline] __perf_event_task_sched_in+0x525/0x9b0 kernel/events/core.c:3491 perf_event_task_sched_in include/linux/perf_event.h:1115 [inline] finish_task_switch+0x437/0x760 kernel/sched/core.c:2676 context_switch kernel/sched/core.c:2831 [inline] __schedule+0x88f/0x2040 kernel/sched/core.c:3517 preempt_schedule_irq+0xb0/0x140 kernel/sched/core.c:3744 retint_kernel+0x1b/0x2d RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline] RIP: 0010:lock_acquire+0x1ec/0x3c0 kernel/locking/lockdep.c:3911 Code: 08 00 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 0f 85 b7 01 00 00 48 83 3d 09 2e a6 08 00 0f 84 2a 01 00 00 48 8b 7c 24 08 57 9d <0f> 1f 44 00 00 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e 41 5f c3 65 8b RSP: 0018:ffff88809d077de0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: 1ffffffff13e3051 RBX: ffff888040530180 RCX: 000000000000141e RDX: dffffc0000000000 RSI: 00000000b31002a3 RDI: 0000000000000286 RBP: ffff8880aed4c7d0 R08: ffffffff8cd21630 R09: 0000000000000000 R10: ffff888040530a08 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001 down_read+0x36/0x80 kernel/locking/rwsem.c:24 iterate_supers+0xdb/0x290 fs/super.c:631 ksys_sync+0xa8/0x150 fs/sync.c:115 __ia32_sys_sync+0xa/0x10 fs/sync.c:124 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7eff3b9ca0f9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007eff31ad9168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2 RAX: ffffffffffffffda RBX: 00007eff3baea1f0 RCX: 00007eff3b9ca0f9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007eff3ba25ae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe5e43b70f R14: 00007eff31ad9300 R15: 0000000000022000 nla_parse: 1 callbacks suppressed netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. device erspan1 entered promiscuous mode netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. device erspan1 entered promiscuous mode audit: type=1326 audit(1678042955.868:13356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19586 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad6fec70f9 code=0x7ffc0000 netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. audit: type=1326 audit(1678042955.878:13357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19586 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad6fec70f9 code=0x7ffc0000 audit: type=1326 audit(1678042955.908:13358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19586 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fad6fec70f9 code=0x7ffc0000 audit: type=1326 audit(1678042955.908:13359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19586 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad6fec70f9 code=0x7ffc0000 audit: type=1326 audit(1678042955.908:13360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19586 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad6fec70f9 code=0x7ffc0000 audit: type=1326 audit(1678042955.908:13361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19586 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fad6fec70f9 code=0x7ffc0000 audit: type=1326 audit(1678042955.908:13362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19586 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad6fec70f9 code=0x7ffc0000 audit: type=1326 audit(1678042955.908:13363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19586 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad6fec70f9 code=0x7ffc0000 audit: type=1326 audit(1678042955.908:13364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19586 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fad6fec70f9 code=0x7ffc0000 audit: type=1326 audit(1678042955.908:13365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19586 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad6fec70f9 code=0x7ffc0000 netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. kauditd_printk_skb: 56 callbacks suppressed audit: type=1804 audit(1678042961.538:13422): pid=20094 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=15147 res=1 audit: type=1804 audit(1678042962.499:13423): pid=20247 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=15380 res=1 audit: type=1804 audit(1678042962.519:13424): pid=20247 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=15380 res=1 xt_limit: Overflow, try lower: 0/0 audit: type=1804 audit(1678042962.519:13425): pid=20247 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=15380 res=1 audit: type=1804 audit(1678042962.519:13426): pid=20247 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=15380 res=1 xt_limit: Overflow, try lower: 0/0 audit: type=1804 audit(1678042962.519:13427): pid=20247 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=15380 res=1 audit: type=1804 audit(1678042962.519:13428): pid=20247 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=15380 res=1 xt_limit: Overflow, try lower: 0/0 audit: type=1804 audit(1678042962.529:13429): pid=20247 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=15380 res=1 audit: type=1804 audit(1678042962.529:13430): pid=20247 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=15380 res=1 audit: type=1804 audit(1678042962.529:13431): pid=20247 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=15380 res=1 kauditd_printk_skb: 58 callbacks suppressed audit: type=1804 audit(1678042966.959:13490): pid=20505 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=15953 res=1 audit: type=1804 audit(1678042967.909:13491): pid=20673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=16165 res=1 audit: type=1804 audit(1678042968.849:13492): pid=20727 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=15811 res=1 audit: type=1804 audit(1678042969.789:13493): pid=20780 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=16172 res=1 ---------------- Code disassembly (best guess): 0: 08 00 or %al,(%rax) 2: 00 00 add %al,(%rax) 4: 00 00 add %al,(%rax) 6: 00 48 c1 add %cl,-0x3f(%rax) 9: e8 03 80 3c 10 callq 0x103c8011 e: 00 0f add %cl,(%rdi) 10: 85 b7 01 00 00 48 test %esi,0x48000001(%rdi) 16: 83 3d 09 2e a6 08 00 cmpl $0x0,0x8a62e09(%rip) # 0x8a62e26 1d: 0f 84 2a 01 00 00 je 0x14d 23: 48 8b 7c 24 08 mov 0x8(%rsp),%rdi 28: 57 push %rdi 29: 9d popfq * 2a: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) <-- trapping instruction 2f: 48 83 c4 18 add $0x18,%rsp 33: 5b pop %rbx 34: 5d pop %rbp 35: 41 5c pop %r12 37: 41 5d pop %r13 39: 41 5e pop %r14 3b: 41 5f pop %r15 3d: c3 retq 3e: 65 gs 3f: 8b .byte 0x8b