WARNING: can't dereference registers at 00000000000002f0 for ip retint_user+0x8/0x18 rdma_op ffff88809b38c218 conn xmit_rdma (null) overlayfs: missing 'lowerdir' rdma_op ffff888099b92658 conn xmit_rdma (null) overlayfs: fs on './file0' does not support file handles, falling back to index=off. rdma_op ffff88809874c658 conn xmit_rdma (null) rdma_op ffff88809c082f98 conn xmit_rdma (null) overlayfs: missing 'lowerdir' audit: type=1804 audit(1639129355.315:2): pid=9575 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir966171084/syzkaller.jssfKZ/4/file1/bus" dev="loop5" ino=3 res=1 audit: type=1804 audit(1639129355.385:3): pid=9575 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir966171084/syzkaller.jssfKZ/4/file1/bus" dev="loop5" ino=3 res=1 overlayfs: missing 'lowerdir' rdma_op ffff888097d5b858 conn xmit_rdma (null) overlayfs: missing 'lowerdir' overlayfs: missing 'lowerdir' overlayfs: missing 'lowerdir' overlayfs: fs on './file0' does not support file handles, falling back to index=off. overlayfs: fs on './file0' does not support file handles, falling back to index=off. overlayfs: fs on './file0' does not support file handles, falling back to index=off. overlayfs: fs on './file0' does not support file handles, falling back to index=off. rdma_op ffff8880993f01d8 conn xmit_rdma (null) overlayfs: missing 'lowerdir' overlayfs: missing 'lowerdir' overlayfs: missing 'lowerdir' overlayfs: missing 'lowerdir' overlayfs: fs on './file0' does not support file handles, falling back to index=off. overlayfs: fs on './file0' does not support file handles, falling back to index=off. overlayfs: fs on './file0' does not support file handles, falling back to index=off. overlayfs: fs on './file0' does not support file handles, falling back to index=off. overlayfs: missing 'lowerdir' overlayfs: missing 'lowerdir' overlayfs: missing 'lowerdir' overlayfs: fs on './file0' does not support file handles, falling back to index=off. overlayfs: missing 'lowerdir' overlayfs: fs on './file0' does not support file handles, falling back to index=off. overlayfs: fs on './file0' does not support file handles, falling back to index=off. overlayfs: fs on './file0' does not support file handles, falling back to index=off. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. block nbd0: Attempted send on invalid socket print_req_error: I/O error, dev nbd0, sector 3512548010789078 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1639129356.755:4): pid=9681 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir966171084/syzkaller.jssfKZ/8/bus" dev="sda1" ino=13913 res=1 block nbd0: Attempted send on invalid socket print_req_error: I/O error, dev nbd0, sector 3512548010789078 Buffer I/O error on dev nbd0p4, logical block 1716264579708304, async page read audit: type=1804 audit(1639129356.975:5): pid=9694 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir966171084/syzkaller.jssfKZ/8/bus" dev="sda1" ino=13913 res=1 audit: type=1804 audit(1639129357.295:6): pid=9673 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir966171084/syzkaller.jssfKZ/8/bus" dev="sda1" ino=13913 res=1 audit: type=1804 audit(1639129357.755:7): pid=9741 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir966171084/syzkaller.jssfKZ/9/bus" dev="sda1" ino=13960 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1639129357.765:8): pid=9743 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir671495902/syzkaller.IaTfD8/7/bus" dev="sda1" ino=13962 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1639129358.105:9): pid=9746 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir966171084/syzkaller.jssfKZ/9/bus" dev="sda1" ino=13960 res=1 audit: type=1804 audit(1639129358.145:10): pid=9756 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir275570341/syzkaller.PHACff/13/bus" dev="sda1" ino=13963 res=1 audit: type=1804 audit(1639129358.175:11): pid=9745 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir671495902/syzkaller.IaTfD8/7/bus" dev="sda1" ino=13962 res=1 vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN kauditd_printk_skb: 1 callbacks suppressed audit: type=1804 audit(1639129360.695:13): pid=9791 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir966171084/syzkaller.jssfKZ/10/bus" dev="sda1" ino=13971 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1639129360.745:14): pid=9782 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir671495902/syzkaller.IaTfD8/8/bus" dev="sda1" ino=13966 res=1 vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. audit: type=1804 audit(1639129360.755:15): pid=9792 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir275570341/syzkaller.PHACff/14/bus" dev="sda1" ino=13972 res=1 audit: type=1804 audit(1639129360.905:16): pid=9801 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir966171084/syzkaller.jssfKZ/10/bus" dev="sda1" ino=13971 res=1 netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. F2FS-fs (loop3): Unable to read 2th superblock attempt to access beyond end of device loop3: rw=12288, want=4104, limit=12 F2FS-fs (loop3): invalid crc value attempt to access beyond end of device audit: type=1804 audit(1639129360.915:17): pid=9808 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir671495902/syzkaller.IaTfD8/8/bus" dev="sda1" ino=13966 res=1 netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. loop3: rw=12288, want=8200, limit=12 F2FS-fs (loop3): invalid crc value F2FS-fs (loop3): Failed to get valid F2FS checkpoint F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock audit: type=1804 audit(1639129360.945:18): pid=9792 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir275570341/syzkaller.PHACff/14/bus" dev="sda1" ino=13972 res=1 attempt to access beyond end of device loop3: rw=12288, want=4104, limit=12 F2FS-fs (loop3): invalid crc value attempt to access beyond end of device loop3: rw=12288, want=8200, limit=12 F2FS-fs (loop3): invalid crc value F2FS-fs (loop3): Failed to get valid F2FS checkpoint F2FS-fs (loop3): Unable to read 2th superblock attempt to access beyond end of device loop3: rw=12288, want=4104, limit=12 attempt to access beyond end of device loop3: rw=12288, want=8200, limit=12 attempt to access beyond end of device netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. loop3: rw=12288, want=4104, limit=12 audit: type=1804 audit(1639129362.885:19): pid=9891 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir966171084/syzkaller.jssfKZ/11/bus" dev="sda1" ino=13967 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. attempt to access beyond end of device TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. loop3: rw=12288, want=8200, limit=12 audit: type=1804 audit(1639129362.955:20): pid=9894 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir671495902/syzkaller.IaTfD8/9/bus" dev="sda1" ino=13975 res=1 audit: type=1804 audit(1639129362.965:21): pid=9893 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir275570341/syzkaller.PHACff/15/bus" dev="sda1" ino=13976 res=1 attempt to access beyond end of device loop3: rw=12288, want=4104, limit=12 attempt to access beyond end of device loop3: rw=12288, want=8200, limit=12 attempt to access beyond end of device audit: type=1804 audit(1639129363.065:22): pid=9891 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir966171084/syzkaller.jssfKZ/11/bus" dev="sda1" ino=13967 res=1 loop3: rw=12288, want=4104, limit=12 attempt to access beyond end of device loop3: rw=12288, want=8200, limit=12 attempt to access beyond end of device loop3: rw=12288, want=4104, limit=12 attempt to access beyond end of device loop3: rw=12288, want=8200, limit=12 attempt to access beyond end of device loop3: rw=12288, want=4104, limit=12 attempt to access beyond end of device L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. loop3: rw=12288, want=8200, limit=12