kernel panic: LEN_9P 49c:LINE, from core 1: PIT16SZ 2, GBIT16(buf) 0 e KerBIT16SZ 2, GBIT16(bnel at 0x0uf) 0 ADDR!This

0 views
Skip to first unread message

syzbot

unread,
Jul 18, 2018, 8:40:02 PM7/18/18
to aka...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: bf9a9ba0d6af Add panic_hwtf() for kernel faults
git tree: https://github.com/akaros/akaros.git/master
console output: https://syzkaller.appspot.com/x/log.txt?x=11be5978400000
kernel config: https://syzkaller.appspot.com/x/.config?x=efef8cf2939304d3
dashboard link: https://syzkaller.appspot.com/bug?extid=a02e9f86de6ed3397953
compiler:

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+a02e9f...@syzkaller.appspotmail.com

IT16(buf) 0 49 kernel panic at kern/arch/x86/trap.n:309, from core 1:
LEN_9P 49c:309, from core 1: PIT16SZ 2, GBIT16(buf) 0 e KerBIT16SZ 2,
GBIT16(bnel at 0x0uf) 0 00000000000001b!This is bad!
00:38:56 executing program 3:
r0 = openat$net_ipifc_0_data(0xffffffffffffff9c,
&(0x7f0000000140)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0)
fcntl$F_GETFD(r0, 0x1)
openat$dev_user(0xffffffffffffff9c, &(0x7f0000000080)='/dev/user\x00', 0xa,
0x3, 0x0)
openat$net_udp_0_local(0xffffffffffffff9c,
&(0x7f0000000040)='/net/udp/0/local\x00', 0x11, 0x1, 0x0)
openat$net_ether0_stats(0xffffffffffffff9c,
&(0x7f0000000000)='/net/ether0/stats\x00', 0x12, 0x1, 0x0)
00:38:56 executing program 6:
openat$proc_self_status(0xffffffffffffff9c,
&(0x7f0000000000)='/proc/self/status\x00', 0x12, 0x1, 0x0)
r0 = openat$net_ipifc_0_ctl(0xffffffffffffff9c,
&(0x7f0000000040)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0)
fstat(r0, &(0x7f00000000c0))
00:38:56 executing program 4:
openat$net_ether0_0_stats(0xffffffffffffff9c,
&(0x7f0000000000)='/net/ether0/0/stats\x00', 0x14, 0x1, 0x0)
openat$prof_kptrace(0xffffffffffffff9c,
&(0x7f0000000040)='/prof/kptrace\x00', 0xe, 0x3, 0x0)
openat$dev_drivers(0xffffffffffffff9c,
&(0x7f0000000080)='/dev/drivers\x00', 0xd, 0x1, 0x0)
r0 = openat$prof_empty(0xffffffffffffff9c,
&(0x7f00000000c0)='/prof/.empty\x00', 0xd, 0x3, 0x0)
openat$dev_osversion(0xffffffffffffff9c,
&(0x7f0000000100)='/dev/osversion\x00', 0xf, 0x1, 0x0)
openat$net_tcp_0_local(0xffffffffffffff9c,
&(0x7f0000000140)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0)
openat$net_icmpv6_stats(0xffffffffffffff9c,
&(0x7f0000000180)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0)
r1 = openat$net_udp_0_local(0xffffffffffffff9c,
&(0x7f00000001c0)='/net/udp/0/local\x00', 0x11, 0x1, 0x0)
read(r1, &(0x7f0000000200)=""/153, 0x99)
openat$net_tcp_0_err(0xffffffffffffff9c,
&(0x7f00000002c0)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0)
r2 = openat$net_ether0_0_data(0xffffffffffffff9c,
&(0x7f0000000300)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0)
openat$dev_bintime(0xffffffffffffff9c,
&(0x7f0000000340)='/dev/bintime\x00', 0xd, 0x3, 0x0)
openat$net_empty(0xffffffffffffff9c, &(0x7f0000000380)='/net/.empty\x00',
0xc, 0x3, 0x0)
openat$prof_kptrace(0xffffffffffffff9c,
&(0x7f00000003c0)='/prof/kptrace\x00', 0xe, 0x3, 0x0)
openat$prof_kptrace(0xffffffffffffff9c,
&(0x7f0000000400)='/prof/kptrace\x00', 0xe, 0x3, 0x0)
openat$net_tcp_1_listen(0xffffffffffffff9c,
&(0x7f0000000440)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0)
openat$net_ether0_2_ifstats(0xffffffffffffff9c,
&(0x7f0000000480)='/net/ether0/2/ifstats\x00', 0x16, 0x1, 0x0)
openat$prof_kpdata(0xffffffffffffff9c,
&(0x7f00000004c0)='/prof/kpdata\x00', 0xd, 0x3, 0x0)
openat$net_udp_0_ctl(0xffffffffffffff9c,
&(0x7f0000000500)='/net/udp/0/ctl\x00', 0xf, 0x3, 0x0)
r3 = openat$net_ether0_stats(0xffffffffffffff9c,
&(0x7f0000000540)='/net/ether0/stats\x00', 0x12, 0x1, 0x0)
openat$net_tcp_stats(0xffffffffffffff9c,
&(0x7f0000000580)='/net/tcp/stats\x00', 0xf, 0x1, 0x0)
openat$proc_self_syscall(0xffffffffffffff9c,
&(0x7f00000005c0)='/proc/self/syscall\x00', 0x13, 0x1, 0x0)
fstat(r0, &(0x7f0000000600))
proc_create(&(0x7f0000000680)='./file0\x00', 0x8,
&(0x7f00000006c0)='/\x00', 0x2, 0x0)
openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000700)='/prof/.empty\x00',
0xd, 0x3, 0x0)
nmount(r2, &(0x7f0000000740)='./file0\x00', 0x8, 0x4)
openat$proc_self_args(0xffffffffffffff9c,
&(0x7f0000000780)='/proc/self/args\x00', 0x10, 0x3, 0x0)
openat$net_ipifc_0_listen(0xffffffffffffff9c,
&(0x7f00000007c0)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0)
openat$net_icmpv6_stats(0xffffffffffffff9c,
&(0x7f0000000800)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0)
openat(r3, &(0x7f0000000840)='./file0\x00', 0x8, 0x2, 0x4)
00:38:56 executing program 5:
openat$net_ether0_0_ctl(0xffffffffffffff9c,
&(0x7f0000000000)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0)
r0 = openat$net_tcp_1_status(0xffffffffffffff9c,
&(0x7f0000000040)='/net/tcp/1/status\x00', 0x12, 0x1, 0x0)
fcntl$F_SETFD(r0, 0x2, 0x1)
openat$net_tcp_1_listen(0xffffffffffffff9c,
&(0x7f0000000080)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0)
r1 = openat$dev_sysstat(0xffffffffffffff9c,
&(0x7f00000000c0)='/dev/sysstat\x00', 0xd, 0x3, 0x0)
r2 = openat$net_ipifc_0_snoop(0xffffffffffffff9c,
&(0x7f0000000100)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0)
tap_fds(&(0x7f00000005c0)=[{r1, 0x1, 0x9, 0x81,
&(0x7f00000001c0)={&(0x7f0000000140)="d458df5ffd387fc6581c8ef59154aabdeeef6b4aaf1df25c5d9cbbd9966e93092b33a8c1e7b8e3cfe174481549a10033df435767dafde3e227bbd881d67d1d91c4e1d69b9da69dd615fe9319f0040ea9",
0xfffffffffffffffd, 0x1, 0x1, 0x81, 0x7}}, {r1, 0x3, 0x20, 0x9,
&(0x7f0000000280)={&(0x7f0000000200)="3bc77f11d2aeda20f97e0192571266f00df7b1f380b4afc1c19c53a778d6f95121a014b70aa95d8c77dfa34bd52eab10bf913f1f61dc7d55c19e32c59fe1e324456392325d45e812d9aff93ece532b70",
0x7, 0x1, 0x6, 0x2, 0x3}}, {r2, 0x3, 0x80, 0x3,
&(0x7f0000000340)={&(0x7f00000002c0)="fb2162925663ddc724e640089de05d452a25c734062d476ff07c1ca2a6a24e2028829ee2b0880ef5325a62839edf6b89c3dd1e59a62f3755f29bddd82819a8072f66104799995f83c57fa54215d7bf4d",
0x0, 0x1, 0x52c7, 0x6, 0xfff}}, {r2, 0x3, 0xa1, 0x1,
&(0x7f0000000400)={&(0x7f0000000380)="9a231c419fac2b685db53ae051784fe469b721bb5c93f072fa1c83138023d60869772c515c33d2efaac75cf627f95e9fc55c0575eb70248bf72f98529f80a94e91a2ca8660ab16bf6a28b9ea468b2a09",
0xf6, 0x1, 0x9, 0x1, 0x800}}, {r0, 0x2, 0x400, 0x7fff,
&(0x7f00000004c0)={&(0x7f0000000440)="57b180e562c8e0af9ad7586f9955d974f0711042eba81a8f078a568e13b019697422a11ddebbd0514166a37a4ac42447a07413af0fe23e5c9f8c006bcca086f162c7fc9ee4fb6f559b64dcd078423f20",
0x3, 0x0, 0x8001, 0x47, 0x20}}, {r2, 0x2, 0x400, 0xa1,
&(0x7f0000000580)={&(0x7f0000000500)="a4d431ae6513523bcd42a4f99ea8c36260bb5d6ad9e33866e39fdf0bacb41c14de345b769f4138f8397a25b453d1b821b91dfaec07fc901d566adc352ec7571c4b3e865d58c491f5c5cad19db62ca09e",
0x3, 0x1, 0x9, 0x1, 0xffffffffffffff81}}], 0x6)
openat$net_arp(0xffffffffffffff9c, &(0x7f0000000680)='/net/arp\x00', 0x9,
0x3, 0x0)
openat$net_ipifc_stats(0xffffffffffffff9c,
&(0x7f00000006c0)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0)
r3 = openat$dev_hostowner(0xffffffffffffff9c,
&(0x7f0000000700)='/dev/hostowner\x00', 0xf, 0x3, 0x0)
openat$net_ether0_0_ctl(0xffffffffffffff9c,
&(0x7f0000000740)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0)
r4 = openat$net_tcp_2_listen(0xffffffffffffff9c,
&(0x7f0000000780)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0)
openat$net_udp_0_ctl(0xffffffffffffff9c,
&(0x7f00000007c0)='/net/udp/0/ctl\x00', 0xf, 0x3, 0x0)
r5 = proc_create(&(0x7f0000000800)='./file0\x00', 0x8,
&(0x7f0000000840)='/dev/hostowner\x00', 0xf, 0x1)
fchdir(r5, r2)
openat$dev_config(0xffffffffffffff9c, &(0x7f0000000880)='/dev/config\x00',
0xc, 0x1, 0x0)
openat$net_icmpv6_stats(0xffffffffffffff9c,
&(0x7f00000008c0)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0)
r6 = openat$dev_bintime(0xffffffffffffff9c,
&(0x7f0000000900)='/dev/bintime\x00', 0xd, 0x3, 0x0)
openat(r4, &(0x7f0000000940)='./file0\x00', 0x8, 0x8000, 0x8)
openat$proc_self_syscall(0xffffffffffffff9c,
&(0x7f0000000980)='/proc/self/syscall\x00', 0x13, 0x1, 0x0)
openat$net_ipifc_0_local(0xffffffffffffff9c,
&(0x7f00000009c0)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0)
openat$net_udp_0_listen(0xffffffffffffff9c,
&(0x7f0000000a00)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0)
fcntl$F_DUPFD(r6, 0x0, r3, 0x0)
openat$dev_hostdomain(0xffffffffffffff9c,
&(0x7f0000000a40)='/dev/hostdomain\x00', 0x10, 0x3, 0x0)
openat$net_tcp_2_listen(0xffffffffffffff9c,
&(0x7f0000000a80)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0)
openat$net_tcp_2_listen(0xffffffffffffff9c,
&(0x7f0000000ac0)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0)
openat$net_arp(0xffffffffffffff9c, &(0x7f0000000b00)='/net/arp\x00', 0x9,
0x3, 0x0)
openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/ppid\x00', 0xa,
0x1, 0x0)
openat$prof_mpstat(0xffffffffffffff9c,
&(0x7f0000000b80)='/prof/mpstat\x00', 0xd, 0x3, 0x0)
openat$net_tcp_2_status(0xffffffffffffff9c,
&(0x7f0000000bc0)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0)
00:38:56 executing program 1:
r0 = openat$dev_caphash(0xffffffffffffff9c,
&(0x7f0000000000)='/dev/caphash\x00', 0xd, 0x3, 0x0)
openat$proc_self_mem(0xffffffffffffff9c,
&(0x7f0000000080)='/proc/self/mem\x00', 0xf, 0x1, 0x0)
fcntl$F_SYNC(r0, 0x65)
openat$net_ipifc_clone(0xffffffffffffff9c,
&(0x7f00000000c0)='/net/ipifc/clone\x00', 0xffffffffffffff8b, 0x3, 0x0)
openat$net_tcp_0_listen(0xffffffffffffff9c,
&(0x7f0000000040)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0)
00:38:56 executing program 3:
r0 = openat$net_ipifc_0_listen(0xffffffffffffff9c,
&(0x7f0000000000)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0)
abort_sysc_fd(r0)
r1 = openat$proc_self_args(0xffffffffffffff9c,
&(0x7f0000000040)='/proc/self/args\x00', 0x10, 0x3, 0x0)
openat$net_iprouter(0xffffffffffffff9c,
&(0x7f0000000080)='/net/iprouter\x00', 0xe, 0x3, 0x0)
openat$net_tcp_stats(0xffffffffffffff9c,
&(0x7f00000000c0)='/net/tcp/stats\x00', 0xf, 0x1, 0x0)
openat$net_ether0_clone(0xffffffffffffff9c,
&(0x7f0000000100)='/net/ether0/clone\x00', 0x12, 0x3, 0x0)
openat$net_udp_0_remote(0xffffffffffffff9c,
&(0x7f0000000140)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0)
fcntl$F_GETFD(r1, 0x1)
openat$net_ipifc_0_ctl(0xffffffffffffff9c,
&(0x7f0000000180)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0)
openat$proc_self_profile(0xffffffffffffff9c,
&(0x7f00000001c0)='/proc/self/profile\x00', 0x13, 0x1, 0x0)
openat$dev_empty(0xffffffffffffff9c, &(0x7f0000000200)='/dev/.empty\x00',
0xc, 0x3, 0x0)
openat$net_ether0_1_ifstats(0xffffffffffffff9c,
&(0x7f0000000240)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0)
openat$proc_self_notepg(0xffffffffffffff9c,
&(0x7f0000000280)='/proc/self/notepg\x00', 0x12, 0x1, 0x0)
r2 = openat$net_ether0_0_data(0xffffffffffffff9c,
&(0x7f00000002c0)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0)
openat$net_ipifc_0_local(0xffffffffffffff9c,
&(0x7f0000000300)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0)
openat$dev_time(0xffffffffffffff9c, &(0x7f0000000340)='/dev/time\x00', 0xa,
0x3, 0x0)
openat$net_ipifc_0_local(0xffffffffffffff9c,
&(0x7f0000000380)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0)
openat$net_tcp_2_err(0xffffffffffffff9c,
&(0x7f00000003c0)='/net/tcp/2/err\x00', 0xf, 0x3, 0x0)
fwstat(r2, &(0x7f0000000400)=""/4096, 0x1000, 0x0)
openat$net_ipifc_0_snoop(0xffffffffffffff9c,
&(0x7f0000001400)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0)
openat$prof_kpdata(0xffffffffffffff9c,
&(0x7f0000001440)='/prof/kpdata\x00', 0xd, 0x3, 0x0)
openat$net_ipselftab(0xffffffffffffff9c,
&(0x7f0000001480)='/net/ipselftab\x00', 0xf, 0x1, 0x0)
openat$dev_hostowner(0xffffffffffffff9c,
&(0x7f00000014c0)='/dev/hostowner\x00', 0xf, 0x3, 0x0)
openat$proc_self_strace_traceset(0xffffffffffffff9c,
&(0x7f0000001500)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0)
openat$net_tcp_1_status(0xffffffffffffff9c,
&(0x7f0000001540)='/net/tcp/1/status\x00', 0x12, 0x1, 0x0)
openat$net_ether0_1_ifstats(0xffffffffffffff9c,
&(0x7f0000001580)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0)
openat$net_tcp_0_ctl(0xffffffffffffff9c,
&(0x7f00000015c0)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0)
openat$proc_self_core(0xffffffffffffff9c,
&(0x7f0000001600)='/proc/self/core\x00', 0x10, 0x1, 0x0)
openat$net_ipifc_0_err(0xffffffffffffff9c,
&(0x7f0000001640)='/net/ipifc/0/err\x00', 0x11, 0x3, 0x0)
openat$proc_self_profile(0xffffffffffffff9c,
&(0x7f0000001680)='/proc/self/profile\x00', 0x13, 0x1, 0x0)
00:38:56 executing program 7:
r0 = openat$net_tcp_2_err(0xffffffffffffff9c,
&(0x7f0000000200)='/net/tcp/2/err\x00', 0x358942e1ebc86fda, 0x3, 0x0)
fd2path(r0, &(0x7f00000000c0)=""/234, 0xea)
00:38:56 executing program 2:
r0 = openat$prof_kpctl(0xffffffffffffff9c,
&(0x7f0000000040)='/prof/kpctl\x00', 0xfffffffffffffeca, 0x3, 0x0)
openat$net_tcp_1_listen(0xffffffffffffff9c,
&(0x7f0000000080)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0)
fstat(r0, &(0x7f0000000100))
openat$net_ether0_0_ctl(0xffffffffffffff9c,
&(0x7f0000000000)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0)
HW TRAP frame at 0xfffffff00010cd30 on core 1
rax 0x0000000000000000
rbx 0xffff800006f6fce0
rcx 0xfffffff00010cea0
rdx 0xfffffff00010cd6c
rbp 0xfffffff00010ce38
rsi 0x0000000000000000
rdi 0xfffffff00010cea0
r8 0x0000000000000001
r9 0xffffffffc8790880
r10 0x0000000000000030
r11 0xffff8000073f21a0
r12 0xffff8000145a0ac0
r13 0x0000000020000180
r14 0x0000000000000073
r15 0x00000000000000ba
trap 0x0000000e Page Fault
gsbs 0xffffffffc8667c40
fsbs 0x0000000000000000
err 0x--------00000000
rip 0xffffffffc20583b4
cs 0x------------0008
flag 0x0000000000010246
rsp 0xfffffff00010cdf8
ss 0x------------0010
Backtrace of kernel context on Core 1:
#01 [<0xffffffffc20583b4>] in sys_readlink at src/syscall.c:2037
#02 [<0xffffffffc20593c9>] in syscall at src/syscall.c:2528
#03 [<0xffffffffc2059584>] in run_local_syscall at src/syscall.c:2563
#04 [<0xffffffffc2059ab9>] in prep_syscalls at src/syscall.c:2583
#05 [<0xffffffffc20ab29a>] in sysenter_callwrapper at arch/x86/trap.c:851
00:39:01 executing program 0:
proc_destroy(0xffffffffffffffff, 0x0)
r0 = openat$net_ipifc_clone(0xffffffffffffff9c,
&(0x7f0000000000)='/net/ipifc/clone\x00', 0x11, 0x3, 0x0)
nbind(&(0x7f0000000100)='./file0\x00', 0x8,
&(0x7f0000000140)='./file0\x00', 0x8, 0x5)
fchdir(0xffffffffffffffff, r0)
proc_create(&(0x7f0000000040)='./file0\x00', 0x8, &(0x7f0000000080)="e600",
0x2, 0x20000000000000)
dup_fds_to(0xffffffffffffffff, &(0x7f0000000180), 0x0)
00:39:01 executing program 4:
mkdir(&(0x7f0000000100)='./file0/file0\x00', 0xe, 0xffffffffffffffff)
lstat(&(0x7f0000000040)='./file0\x00', 0x8, &(0x7f0000000080))
lstat(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000140))
00:39:02 executing program 6:
openat$net_ether0_2_ctl(0xffffffffffffff9c,
&(0x7f0000000080)='/net/ether0/2/ctl\x00', 0x7b0fa169aec2c78c, 0x3, 0x0)
openat$net_udp_0_ctl(0xffffffffffffff9c,
&(0x7f0000000040)='/net/udp/0/ctl\x00', 0xf, 0x3, 0x0)
openat$net_tcp_0_remote(0xffffffffffffff9c,
&(0x7f0000000000)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0)
00:39:02 executing program 5:
openat$net_ipifc_1_snoop(0xffffffffffffff9c,
&(0x7f0000000040)='/net/ipifc/1/snoop\x00', 0xffffffffffffff9d, 0x1, 0x0)
openat$net_ether0_2_data(0xffffffffffffff9c,
&(0x7f00000000c0)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0)
openat$net_tcp_1_ctl(0xffffffffffffff9c,
&(0x7f0000000080)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0)
openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kprint\x00',
0xc, 0x1, 0x0)
00:39:02 executing program 1:
r0 = openat$net_tcp_1_remote(0xffffffffffffff9c,
&(0x7f0000000000)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0)
fd2path(r0, &(0x7f0000000040)=""/102, 0x66)
r1 = openat$net_ether0_2_ifstats(0xffffffffffffff9c,
&(0x7f00000001c0)='/net/ether0/2/ifstats\x00', 0x16, 0x1, 0x0)
fcntl$F_GETFD(r1, 0x1)
00:39:02 executing program 2:
r0 = openat$dev_null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00',
0xa, 0x1, 0x0)
fd2path(r0, &(0x7f0000000040)=""/160, 0xa0)
openat$dev_null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0xa,
0x1, 0x0)
00:39:02 executing program 3:
r0 = openat$net_udp_0_status(0xffffffffffffff9c,
&(0x7f0000000000)='/net/udp/0/status\x00', 0x12, 0x1, 0x0)
openat$net_ipifc_0_data(0xffffffffffffff9c,
&(0x7f0000000180)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0)
openat$net_tcp_0_err(0xffffffffffffff9c,
&(0x7f0000000040)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0)
openat$net_udp_0_remote(0xffffffffffffff9c,
&(0x7f0000000140)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0)
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000000, 0xd012, r0, 0x0)
openat$net_ipifc_0_data(0xffffffffffffff9c,
&(0x7f0000000100)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0)
openat$net_ether0_clone(0xffffffffffffff9c,
&(0x7f00000000c0)='/net/ether0/clone\x00', 0x12, 0x3, 0x0)
openat$net_tcp_0_listen(0xffffffffffffff9c,
&(0x7f0000000080)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0)
00:39:02 executing program 7:
openat$net_ether0_2_ifstats(0xffffffffffffff9c,
&(0x7f0000000040)='/net/ether0/2/ifstats\x00', 0x16, 0x1, 0x0)
openat$proc_self_maps(0xffffffffffffff9c,
&(0x7f0000000000)='/proc/self/maps\x00', 0x10, 0x1, 0x0)
openat$net_iprouter(0xffffffffffffff9c,
&(0x7f0000000080)='/net/iprouter\x00', 0xe, 0x3, 0x0)


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#bug-status-tracking for how to communicate with
syzbot.

syzbot

unread,
Jul 19, 2018, 4:23:15 PM7/19/18
to Barret Rhoden, br...@cs.berkeley.edu, aka...@googlegroups.com
> On 2018-07-18 at 17:40 syzbot
> #syz invalid

Your 'invalid' command is accepted, but please keep aka...@googlegroups.com
mailing list in CC next time. It serves as a history of what happened with
each bug report. Thank you.

Barret Rhoden

unread,
Jul 19, 2018, 4:24:01 PM7/19/18
to syzbot, aka...@googlegroups.com
On 2018-07-18 at 17:40 syzbot
<syzbot+a02e9f...@syzkaller.appspotmail.com> wrote:
#syz invalid
Reply all
Reply to author
Forward
0 new messages