Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '[localhost]:16060' (ECDSA) to the list of known hosts. syzkaller login: [ 124.738275][ T39] kauditd_printk_skb: 7 callbacks suppressed [ 124.738287][ T39] audit: type=1400 audit(1579251534.872:42): avc: denied { map } for pid=8722 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16526 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2020/01/17 08:58:54 fuzzer started 2020/01/17 08:58:57 dialing manager at 10.0.2.10:42607 2020/01/17 08:58:57 syscalls: 2863 2020/01/17 08:58:57 code coverage: enabled 2020/01/17 08:58:57 comparison tracing: enabled 2020/01/17 08:58:57 extra coverage: enabled 2020/01/17 08:58:57 setuid sandbox: enabled 2020/01/17 08:58:57 namespace sandbox: enabled 2020/01/17 08:58:57 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/17 08:58:57 fault injection: enabled 2020/01/17 08:58:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/17 08:58:57 net packet injection: enabled 2020/01/17 08:58:57 net device setup: enabled 2020/01/17 08:58:57 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/01/17 08:58:57 devlink PCI setup: PCI device 0000:00:10.0 is not available 08:59:47 executing program 0: syz_emit_ethernet(0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000000000)={0x0, 0x2, [0x0, 0xf46]}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x40000, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000140)={0x8, 0x1ff, 0x1}) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) lookup_dcookie(0xffffffff, &(0x7f0000000040)=""/5, 0x5) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x5b, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) lsetxattr$security_ima(0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r4 = socket(0x11, 0x2, 0xfe) bind$packet(r4, &(0x7f0000000100)={0x11, 0x1c, r3, 0x1, 0x0, 0x6, @local}, 0x14) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080), 0x2) [ 177.529996][ T39] audit: type=1400 audit(1579251587.662:43): avc: denied { map } for pid=8747 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=52 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 08:59:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0xd10c) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='sched\x00') getsockopt$IPT_SO_GET_REVISION_MATCH(r4, 0x0, 0x42, 0x0, &(0x7f0000000400)) r5 = openat(r4, &(0x7f0000000280)='./file0\x00', 0x410000, 0x81) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000140)=ANY=[@ANYRES16, @ANYRESOCT], 0x2) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1) fcntl$setsig(r2, 0xa, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x38) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r6, 0x0, r2) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030000000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030000000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000013000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000001c0)={0x0, 0x80000}) 08:59:48 executing program 2: syz_emit_ethernet(0x0, &(0x7f0000000200)=ANY=[], 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x40000, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) lookup_dcookie(0xffffffff, &(0x7f0000000040)=""/5, 0x5) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x5b, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) lsetxattr$security_ima(0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r4 = socket(0x11, 0x2, 0xfe) bind$packet(r4, &(0x7f0000000100)={0x11, 0x1c, r3, 0x1, 0x0, 0x6, @local}, 0x14) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) [ 177.986738][ T8750] IPVS: ftp: loaded support on port[0] = 21 [ 177.986980][ T8748] IPVS: ftp: loaded support on port[0] = 21 08:59:48 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f0000000000)=0x7, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = socket$inet(0x10, 0x2, 0x0) epoll_create1(0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="1c0000006a6be2f3d65c7fac6914dcb6f1b0e54755734dbefe464763764fd25d66cb83bdbab20eb13185344d8b9dde21ad29a36461c3dd141601c8eb716fafb252733af4bd78d56530e1cd19fc5ab783d0386fe4d21c401fceb4caea2a9e52716ce12674309a485eef64110e5c860316911c69cde10296127fb79669951c5470499809f3d9a71392e0a9159aa897a9e0b013f8962a820cc2f324804d8f69b14c576f311f96b35fec098f1c3fc5e2d1b6f87a64b60c90b48748cc67b1485fcc9a0a0aa5c50763acecf7e1bcb0d6d016b64de59ee18ff7e1b7bfe4e08328c4", @ANYRES16=r4, @ANYBLOB="080626bd7000fcdbdf25110000000800040000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8020}, 0x80) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46600) io_setup(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f00000004c0)='security.evm\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="090007000000140000cd17bb6a641a30bdfccec3bff796f6838785cec2c9422efda8b897846f8b"], 0x1, 0x1) io_setup(0x3, &(0x7f0000000200)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000f80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000f40)={0x0}, 0x1, 0x0, 0x0, 0x15}, 0x80) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r9 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r9, r7, r8) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file0/file0\x00', 0x400, 0x47f, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r8, r10) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000003c0)=@req={0x10000, 0xa5b, 0xfffffffe}, 0x10) io_getevents(0x0, 0x0, 0x3, &(0x7f00000002c0)=[{}, {}, {}], 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000260007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) fcntl$dupfd(r1, 0x0, r1) [ 178.173102][ T8752] IPVS: ftp: loaded support on port[0] = 21 [ 178.347297][ T8754] IPVS: ftp: loaded support on port[0] = 21 [ 178.348114][ T8750] chnl_net:caif_netlink_parms(): no params data found [ 178.420190][ T8748] chnl_net:caif_netlink_parms(): no params data found [ 178.497503][ T8750] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.509490][ T8750] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.523844][ T8750] device bridge_slave_0 entered promiscuous mode [ 178.541350][ T8750] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.552829][ T8750] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.567445][ T8750] device bridge_slave_1 entered promiscuous mode [ 178.598350][ T8748] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.620284][ T8748] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.643611][ T8748] device bridge_slave_0 entered promiscuous mode [ 178.668260][ T8748] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.685160][ T8748] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.696516][ T8748] device bridge_slave_1 entered promiscuous mode [ 178.726540][ T8750] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 178.748952][ T8750] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 178.792026][ T8748] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 178.818081][ T8748] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 178.865037][ T8748] team0: Port device team_slave_0 added [ 178.879153][ T8752] chnl_net:caif_netlink_parms(): no params data found [ 178.898734][ T8750] team0: Port device team_slave_0 added [ 178.914003][ T8750] team0: Port device team_slave_1 added [ 178.929479][ T8748] team0: Port device team_slave_1 added [ 179.075732][ T8750] device hsr_slave_0 entered promiscuous mode [ 179.193704][ T8750] device hsr_slave_1 entered promiscuous mode [ 179.376361][ T8748] device hsr_slave_0 entered promiscuous mode [ 179.462725][ T8748] device hsr_slave_1 entered promiscuous mode [ 179.532283][ T8748] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 179.544996][ T8748] Cannot create hsr debugfs directory [ 179.568562][ T8752] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.580775][ T8752] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.594316][ T8752] device bridge_slave_0 entered promiscuous mode [ 179.633784][ T8754] chnl_net:caif_netlink_parms(): no params data found [ 179.662337][ T8752] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.674757][ T8752] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.688343][ T8752] device bridge_slave_1 entered promiscuous mode [ 179.746626][ T8752] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 179.780488][ T8752] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 179.826843][ T8752] team0: Port device team_slave_0 added [ 179.837507][ T8754] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.851276][ T8754] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.865328][ T8754] device bridge_slave_0 entered promiscuous mode [ 179.887829][ T8754] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.910644][ T8754] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.940148][ T8754] device bridge_slave_1 entered promiscuous mode [ 179.969239][ T8752] team0: Port device team_slave_1 added [ 180.084605][ T8752] device hsr_slave_0 entered promiscuous mode [ 180.136102][ T8752] device hsr_slave_1 entered promiscuous mode [ 180.212335][ T8752] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 180.225411][ T8752] Cannot create hsr debugfs directory [ 180.244360][ T8754] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 180.262783][ T8754] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 180.280294][ T39] audit: type=1400 audit(1579251590.422:44): avc: denied { create } for pid=8748 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 180.295858][ T8748] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 180.314540][ T39] audit: type=1400 audit(1579251590.422:45): avc: denied { write } for pid=8748 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 180.314560][ T39] audit: type=1400 audit(1579251590.422:46): avc: denied { read } for pid=8748 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 180.441636][ T8748] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 180.524389][ T8750] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 180.630658][ T8750] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 180.680553][ T8750] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 180.754957][ T8750] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 180.834152][ T8748] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 180.896175][ T8754] team0: Port device team_slave_0 added [ 180.927121][ T8748] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 181.036463][ T8754] team0: Port device team_slave_1 added [ 181.146228][ T8754] device hsr_slave_0 entered promiscuous mode [ 181.242712][ T8754] device hsr_slave_1 entered promiscuous mode [ 181.302340][ T8754] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 181.313723][ T8754] Cannot create hsr debugfs directory [ 181.369640][ T8752] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 181.437256][ T8752] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 181.554847][ T8752] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 181.625683][ T8752] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 181.809352][ T8754] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 181.875455][ T8754] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 181.965617][ T8754] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 182.074498][ T8754] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 182.230171][ T8748] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.248182][ T8750] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.285447][ T8748] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.296369][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.309660][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.319900][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.329545][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.349628][ T8750] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.369446][ T8752] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.389294][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.403869][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.417589][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.427145][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.454330][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.464865][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.478087][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.490497][ T8762] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.501948][ T8762] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.514910][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.526248][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.539564][ T8762] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.548757][ T8762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.560599][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.573925][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.585021][ T8762] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.594603][ T8762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.607564][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.617704][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.634906][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.655544][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.681617][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.715426][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.734364][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.749167][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.762862][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.780877][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.803643][ T8752] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.819626][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.835695][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.849835][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.866448][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.886974][ T28] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.905357][ T28] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.929440][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.960769][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.973711][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.986573][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.998136][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.011507][ T8762] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.021704][ T8762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.031676][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.047023][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.067982][ T8750] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 183.085465][ T8750] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 183.108663][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.118790][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.137809][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.154927][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.172839][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.187440][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.202914][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.213486][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.225282][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.245261][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.265815][ T8754] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.285130][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.299599][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.313903][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.326019][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.338786][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 183.351639][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 183.362630][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.375317][ T8748] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.402493][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.414386][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.425946][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.437843][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.457553][ T8750] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.470465][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.485199][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.499275][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.512856][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.529373][ T8752] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.545519][ T8754] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.562669][ T8764] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 183.574696][ T8764] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 183.585715][ T8764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.598496][ T8764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.611482][ T8764] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.622479][ T8764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.641440][ T8748] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.657697][ T3358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.680264][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.692886][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.705332][ T34] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.715194][ T34] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.734605][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 183.746095][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 183.756951][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 183.770260][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 183.782974][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 183.795997][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 183.811091][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.841253][ T8750] device veth0_vlan entered promiscuous mode [ 183.852819][ T8752] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.867104][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 183.879294][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.891936][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.915589][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.930672][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.943425][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.957018][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.969592][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.987187][ T8750] device veth1_vlan entered promiscuous mode [ 184.008653][ T8764] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 184.020090][ T8764] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 184.033803][ T8764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.046469][ T8764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.070631][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.073542][ T39] audit: type=1400 audit(1579251594.202:47): avc: denied { associate } for pid=8750 comm="syz-executor.1" name="syz1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 184.086120][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.139188][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 184.157323][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 184.173928][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.201105][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.238990][ T8748] device veth0_vlan entered promiscuous mode [ 184.275757][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 184.306079][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.338264][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.370196][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.379495][ T39] audit: type=1400 audit(1579251594.502:48): avc: denied { open } for pid=8768 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 184.409726][ T8752] device veth0_vlan entered promiscuous mode [ 184.448740][ T39] audit: type=1400 audit(1579251594.502:49): avc: denied { kernel } for pid=8768 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 184.468463][ T8752] device veth1_vlan entered promiscuous mode [ 184.540771][ T8754] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 184.560660][ T8771] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 184.572747][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 184.598244][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.610471][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 184.625148][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 184.639867][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 184.654908][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.674092][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.932308][ C3] hrtimer: interrupt took 42683 ns [ 190.029714][ T8754] device veth0_vlan entered promiscuous mode [ 190.050104][ T8754] device veth1_vlan entered promiscuous mode [ 191.206474][ T3358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 191.221916][ T3358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 191.234907][ T3358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 191.248217][ T3358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.261772][ T3358] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 191.273031][ T3358] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 191.283365][ T3358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.294686][ T3358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.312897][ T8748] device veth1_vlan entered promiscuous mode [ 289.109143][ T8775] IPVS: ftp: loaded support on port[0] = 21 [ 289.196535][ T8775] chnl_net:caif_netlink_parms(): no params data found [ 289.244439][ T8775] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.256095][ T8775] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.269377][ T8775] device bridge_slave_0 entered promiscuous mode [ 289.286108][ T8775] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.289158][ T8778] IPVS: ftp: loaded support on port[0] = 21 [ 289.299781][ T8775] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.325265][ T8775] device bridge_slave_1 entered promiscuous mode [ 289.370967][ T8775] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 289.408266][ T8775] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 289.473991][ T8775] team0: Port device team_slave_0 added [ 289.485742][ T8775] team0: Port device team_slave_1 added [ 289.495886][ T8778] chnl_net:caif_netlink_parms(): no params data found [ 292.940609][ T8775] device hsr_slave_0 entered promiscuous mode [ 294.999698][ T8775] device hsr_slave_1 entered promiscuous mode [ 297.695545][ T8775] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 297.736694][ T8775] Cannot create hsr debugfs directory [ 328.125752][ T8764] ------------[ cut here ]------------ [ 328.144842][ T8764] Type was not set for devlink port. [ 328.154377][ T8764] WARNING: CPU: 0 PID: 8764 at net/core/devlink.c:6399 devlink_port_type_warn+0x15/0x20 [ 328.154377][ T8764] Kernel panic - not syncing: panic_on_warn set ... [ 328.154377][ T8764] CPU: 0 PID: 8764 Comm: kworker/0:4 Not tainted 5.5.0-rc6-syzkaller #0 [ 328.154377][ T8764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 328.154377][ T8764] Workqueue: events devlink_port_type_warn [ 328.154377][ T8764] Call Trace: [ 328.154377][ T8764] dump_stack+0x197/0x210 [ 328.154377][ T8764] ? devlink_free+0x2d0/0x2f0 [ 328.154377][ T8764] panic+0x2e3/0x75c [ 328.154377][ T8764] ? add_taint.cold+0x16/0x16 [ 328.154377][ T8764] ? __kasan_check_write+0x14/0x20 [ 328.154377][ T8764] ? __warn.cold+0x14/0x3e [ 328.154377][ T8764] ? __warn+0xd9/0x1cf [ 328.154377][ T8764] ? devlink_port_type_warn+0x15/0x20 [ 328.154377][ T8764] __warn.cold+0x2f/0x3e [ 328.154377][ T8764] ? devlink_port_type_warn+0x15/0x20 [ 328.154377][ T8764] report_bug+0x289/0x300 [ 328.154377][ T8764] do_error_trap+0x11b/0x200 [ 328.154377][ T8764] do_invalid_op+0x37/0x50 [ 328.154377][ T8764] ? devlink_port_type_warn+0x15/0x20 [ 328.154377][ T8764] invalid_op+0x23/0x30 [ 328.154377][ T8764] RIP: 0010:devlink_port_type_warn+0x15/0x20 [ 328.154377][ T8764] Code: 89 df e8 de fc 7d fb e9 d3 fe ff ff 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 e8 57 3d 40 fb 48 c7 c7 e0 56 d8 88 e8 ea ec 10 fb <0f> 0b 5d c3 0f 1f 80 00 00 00 00 55 48 89 e5 41 55 49 89 f5 41 54 [ 328.154377][ T8764] RSP: 0018:ffffc900016c7d30 EFLAGS: 00010282 [ 328.154377][ T8764] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 328.154377][ T8764] RDX: 0000000000000000 RSI: ffffffff815e5396 RDI: fffff520002d8f98 [ 328.154377][ T8764] RBP: ffffc900016c7d30 R08: ffff8880609dc380 R09: fffffbfff165e7bf [ 328.154377][ T8764] R10: fffffbfff165e7be R11: ffffffff8b2f3df7 R12: ffff8880282094c0 [ 328.154377][ T8764] R13: 0000000000000000 R14: ffff888021c0ff00 R15: ffff88802d036b40 [ 328.154377][ T8764] ? vprintk_func+0x86/0x189 [ 328.154377][ T8764] process_one_work+0x9af/0x1740 [ 328.154377][ T8764] ? pwq_dec_nr_in_flight+0x320/0x320 [ 328.154377][ T8764] ? lock_acquire+0x190/0x410 [ 328.154377][ T8764] worker_thread+0x98/0xe40 [ 328.154377][ T8764] ? trace_hardirqs_on+0x67/0x240 [ 328.154377][ T8764] kthread+0x361/0x430 [ 328.154377][ T8764] ? process_one_work+0x1740/0x1740 [ 328.154377][ T8764] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 328.154377][ T8764] ret_from_fork+0x24/0x30 [ 328.154377][ T8764] Kernel Offset: disabled [ 328.154377][ T8764] Rebooting in 86400 seconds..