Warning: Permanently added '[localhost]:35015' (ED25519) to the list of known hosts. 1970/01/01 00:04:11 ignoring optional flag "sandboxArg"="0" 1970/01/01 00:04:13 parsed 1 programs [ 254.987737][ T3395] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 1970/01/01 00:04:14 executed programs: 0 [ 258.854730][ T3401] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 258.898119][ T3401] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 260.883344][ T3401] hsr_slave_0: entered promiscuous mode [ 260.948031][ T3401] hsr_slave_1: entered promiscuous mode [ 262.882562][ T3401] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 262.970506][ T3401] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 263.029999][ T3401] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 263.103648][ T3401] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 264.648464][ T3401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 270.263755][ T3401] veth0_vlan: entered promiscuous mode [ 270.381700][ T3401] veth1_vlan: entered promiscuous mode [ 270.677673][ T3401] veth0_macvtap: entered promiscuous mode [ 270.731698][ T3401] veth1_macvtap: entered promiscuous mode [ 270.971610][ T3401] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 270.974204][ T3401] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 270.981982][ T3401] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 270.984556][ T3401] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.682200][ T3516] ================================================================== [ 271.690819][ T3516] BUG: KASAN: invalid-access in neon_aes_ctr_encrypt+0x15c/0x1ec [ 271.693028][ T3516] Read at addr f5ff00000b033ff1 by task syz-executor.0/3516 [ 271.693933][ T3516] Pointer tag: [f5], memory tag: [fe] [ 271.694744][ T3516] [ 271.696700][ T3516] CPU: 0 PID: 3516 Comm: syz-executor.0 Not tainted 6.8.0-rc6-syzkaller-g45ec2f5f6ed3 #0 [ 271.697838][ T3516] Hardware name: linux,dummy-virt (DT) [ 271.698880][ T3516] Call trace: [ 271.699780][ T3516] dump_backtrace+0x94/0xec [ 271.700842][ T3516] show_stack+0x18/0x24 [ 271.701624][ T3516] dump_stack_lvl+0x48/0x60 [ 271.702448][ T3516] print_report+0x108/0x618 [ 271.703029][ T3516] kasan_report+0x88/0xac [ 271.703858][ T3516] __do_kernel_fault+0x17c/0x1e8 [ 271.704363][ T3516] do_tag_check_fault+0x78/0x8c [ 271.704852][ T3516] do_mem_abort+0x44/0x94 [ 271.705414][ T3516] el1_abort+0x40/0x60 [ 271.705898][ T3516] el1h_64_sync_handler+0xd8/0xe4 [ 271.706448][ T3516] el1h_64_sync+0x64/0x68 [ 271.706990][ T3516] neon_aes_ctr_encrypt+0x15c/0x1ec [ 271.707599][ T3516] ctr_encrypt+0xfc/0x144 [ 271.708124][ T3516] crypto_skcipher_decrypt+0x4c/0x60 [ 271.708705][ T3516] skcipher_recvmsg+0x39c/0x46c [ 271.709216][ T3516] sock_read_iter+0xec/0x118 [ 271.709722][ T3516] vfs_read+0x2cc/0x304 [ 271.710207][ T3516] ksys_read+0xe8/0x104 [ 271.710759][ T3516] __arm64_sys_read+0x1c/0x28 [ 271.711314][ T3516] invoke_syscall+0x48/0x114 [ 271.711902][ T3516] el0_svc_common.constprop.0+0x40/0xe0 [ 271.712504][ T3516] do_el0_svc+0x1c/0x28 [ 271.713019][ T3516] el0_svc+0x34/0xd8 [ 271.713520][ T3516] el0t_64_sync_handler+0x100/0x12c [ 271.714361][ T3516] el0t_64_sync+0x19c/0x1a0 [ 271.715242][ T3516] [ 271.715969][ T3516] The buggy address belongs to the physical page: [ 271.716776][ T3516] page:000000007b26d4bf refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4b033 [ 271.718064][ T3516] flags: 0x1ffc10000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0x4) [ 271.719168][ T3516] page_type: 0xffffffff() [ 271.720346][ T3516] raw: 01ffc10000000000 fffffc0000351248 fffffc0000194ac8 0000000000000000 [ 271.721120][ T3516] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 271.721947][ T3516] page dumped because: kasan: bad access detected [ 271.722553][ T3516] [ 271.722941][ T3516] Memory state around the buggy address: [ 271.723769][ T3516] ffff00000b033d00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 271.724470][ T3516] ffff00000b033e00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 271.725311][ T3516] >ffff00000b033f00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 271.726121][ T3516] ^ [ 271.727858][ T3516] ffff00000b034000: f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 [ 271.729021][ T3516] ffff00000b034100: f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 [ 271.730062][ T3516] ================================================================== [ 271.733554][ T3516] Disabling lock debugging due to kernel taint 1970/01/01 00:04:34 executed programs: 1 1970/01/01 00:04:39 executed programs: 3 1970/01/01 00:04:45 executed programs: 5 1970/01/01 00:04:50 executed programs: 7 1970/01/01 00:04:55 executed programs: 9 1970/01/01 00:05:01 executed programs: 11