Warning: Permanently added '[localhost]:55451' (ECDSA) to the list of known hosts. 2019/11/29 10:46:51 fuzzer started [ 69.901800][ T38] audit: type=1400 audit(1575024411.569:42): avc: denied { map } for pid=7819 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16525 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2019/11/29 10:46:55 dialing manager at 10.0.2.10:46599 2019/11/29 10:46:55 syscalls: 2543 2019/11/29 10:46:55 code coverage: enabled 2019/11/29 10:46:55 comparison tracing: enabled 2019/11/29 10:46:55 extra coverage: extra coverage is not supported by the kernel 2019/11/29 10:46:55 setuid sandbox: enabled 2019/11/29 10:46:55 namespace sandbox: enabled 2019/11/29 10:46:55 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/29 10:46:55 fault injection: enabled 2019/11/29 10:46:55 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/29 10:46:55 net packet injection: enabled 2019/11/29 10:46:55 net device setup: enabled 2019/11/29 10:46:55 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/29 10:46:55 devlink PCI setup: PCI device 0000:00:10.0 is not available 10:47:12 executing program 0: socket$vsock_stream(0x28, 0x1, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket(0x0, 0x0, 0x0) [ 90.648283][ T38] audit: type=1400 audit(1575024432.319:43): avc: denied { map } for pid=7840 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=17735 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 10:47:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp6\x00') sendfile(r1, r2, 0x0, 0x7ffff000) [ 90.837446][ T7841] IPVS: ftp: loaded support on port[0] = 21 [ 90.837452][ T7843] IPVS: ftp: loaded support on port[0] = 21 10:47:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010105070100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) [ 90.932310][ T7841] chnl_net:caif_netlink_parms(): no params data found [ 90.990103][ T7843] chnl_net:caif_netlink_parms(): no params data found [ 91.005572][ T7847] IPVS: ftp: loaded support on port[0] = 21 10:47:12 executing program 3: capget(&(0x7f0000000080)={0x0, 0xffffffffffffffff}, 0x0) [ 91.019830][ T7841] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.028593][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.037681][ T7841] device bridge_slave_0 entered promiscuous mode [ 91.063312][ T7841] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.071363][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.081279][ T7841] device bridge_slave_1 entered promiscuous mode [ 91.120985][ T7843] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.128137][ T7843] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.135733][ T7843] device bridge_slave_0 entered promiscuous mode [ 91.146451][ T7843] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.153530][ T7843] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.161071][ T7843] device bridge_slave_1 entered promiscuous mode 10:47:12 executing program 4: socket$inet6(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000003280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f5ffe0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x2, 0x6, 0x4}, 0x20) socket$inet(0x10, 0x2, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000006c80)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="f5", 0x1}], 0x1}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6587b967483041ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xf83c, 0x2, 0x0, 0x27) [ 91.173638][ T7841] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 91.186725][ T7841] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 91.219147][ T7843] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 91.236230][ T7850] IPVS: ftp: loaded support on port[0] = 21 [ 91.253820][ T7843] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 91.274734][ T7841] team0: Port device team_slave_0 added [ 91.295043][ T7841] team0: Port device team_slave_1 added [ 91.305773][ T7843] team0: Port device team_slave_0 added 10:47:13 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x18) [ 91.352569][ T7843] team0: Port device team_slave_1 added [ 91.375904][ T7852] IPVS: ftp: loaded support on port[0] = 21 [ 91.405879][ T7847] chnl_net:caif_netlink_parms(): no params data found [ 91.483542][ T7841] device hsr_slave_0 entered promiscuous mode [ 91.532196][ T7841] device hsr_slave_1 entered promiscuous mode [ 91.643513][ T7843] device hsr_slave_0 entered promiscuous mode [ 91.702069][ T7843] device hsr_slave_1 entered promiscuous mode [ 91.771825][ T7843] debugfs: Directory 'hsr0' with parent '/' already present! [ 91.797760][ T7855] IPVS: ftp: loaded support on port[0] = 21 [ 91.822912][ T38] audit: type=1400 audit(1575024433.489:44): avc: denied { create } for pid=7843 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 91.847289][ T38] audit: type=1400 audit(1575024433.489:45): avc: denied { write } for pid=7843 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 91.872882][ T38] audit: type=1400 audit(1575024433.499:46): avc: denied { read } for pid=7843 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 91.897909][ T7847] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.904720][ T7847] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.911991][ T7847] device bridge_slave_0 entered promiscuous mode [ 91.921855][ T7847] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.929195][ T7847] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.937319][ T7847] device bridge_slave_1 entered promiscuous mode [ 91.949534][ T7843] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 92.048705][ T7843] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 92.114448][ T7843] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 92.206998][ T7843] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 92.298847][ T7847] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 92.310894][ T7850] chnl_net:caif_netlink_parms(): no params data found [ 92.326557][ T7841] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 92.385875][ T7841] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 92.473067][ T7841] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 92.564702][ T7847] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 92.574609][ T7841] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 92.662282][ T7850] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.669515][ T7850] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.679194][ T7850] device bridge_slave_0 entered promiscuous mode [ 92.696593][ T7847] team0: Port device team_slave_0 added [ 92.704095][ T7847] team0: Port device team_slave_1 added [ 92.712179][ T7850] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.719204][ T7850] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.726976][ T7850] device bridge_slave_1 entered promiscuous mode [ 92.755537][ T7850] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 92.823404][ T7847] device hsr_slave_0 entered promiscuous mode [ 92.892480][ T7847] device hsr_slave_1 entered promiscuous mode [ 92.931785][ T7847] debugfs: Directory 'hsr0' with parent '/' already present! [ 92.953724][ T7850] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 93.017417][ T7850] team0: Port device team_slave_0 added [ 93.024487][ T7852] chnl_net:caif_netlink_parms(): no params data found [ 93.033386][ T7850] team0: Port device team_slave_1 added [ 93.075973][ T7855] chnl_net:caif_netlink_parms(): no params data found [ 93.117663][ T7847] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 93.233538][ T7850] device hsr_slave_0 entered promiscuous mode [ 93.311886][ T7850] device hsr_slave_1 entered promiscuous mode [ 93.371831][ T7850] debugfs: Directory 'hsr0' with parent '/' already present! [ 93.386443][ T7847] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 93.473409][ T7852] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.480217][ T7852] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.487842][ T7852] device bridge_slave_0 entered promiscuous mode [ 93.509700][ T7852] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.518515][ T7852] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.531119][ T7852] device bridge_slave_1 entered promiscuous mode [ 93.539690][ T7847] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 93.653738][ T7847] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 93.748995][ T7855] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.756203][ T7855] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.763512][ T7855] device bridge_slave_0 entered promiscuous mode [ 93.773159][ T7855] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.780021][ T7855] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.787804][ T7855] device bridge_slave_1 entered promiscuous mode [ 93.794771][ T7850] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 93.857607][ T7852] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 93.880411][ T7850] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 93.925005][ T7850] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 93.994303][ T7852] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 94.017005][ T7855] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 94.029661][ T7843] 8021q: adding VLAN 0 to HW filter on device bond0 [ 94.036979][ T7850] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 94.107064][ T7852] team0: Port device team_slave_0 added [ 94.115598][ T7855] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 94.136385][ T7852] team0: Port device team_slave_1 added [ 94.152277][ T7855] team0: Port device team_slave_0 added [ 94.166575][ T7855] team0: Port device team_slave_1 added [ 94.180297][ T7841] 8021q: adding VLAN 0 to HW filter on device bond0 [ 94.283390][ T7852] device hsr_slave_0 entered promiscuous mode [ 94.321898][ T7852] device hsr_slave_1 entered promiscuous mode [ 94.391827][ T7852] debugfs: Directory 'hsr0' with parent '/' already present! [ 94.405619][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.414839][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.425959][ T7843] 8021q: adding VLAN 0 to HW filter on device team0 [ 94.503700][ T7855] device hsr_slave_0 entered promiscuous mode [ 94.541966][ T7855] device hsr_slave_1 entered promiscuous mode [ 94.581838][ T7855] debugfs: Directory 'hsr0' with parent '/' already present! [ 94.608891][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 94.617927][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.627365][ T7859] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.634766][ T7859] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.642546][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 94.651136][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.659999][ T7859] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.667221][ T7859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.674616][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 94.682887][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 94.691417][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 94.711480][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 94.721281][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 94.730275][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 94.739112][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 94.749758][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 94.763333][ T7852] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 94.824611][ T7852] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 94.875305][ T7852] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 94.956570][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 94.964744][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.972763][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.980333][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.988503][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 94.997799][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 95.008923][ T7841] 8021q: adding VLAN 0 to HW filter on device team0 [ 95.019765][ T7852] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 95.090652][ T7847] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.099547][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 95.118094][ T7855] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 95.203169][ T7855] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 95.263920][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 95.272203][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.280089][ T29] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.287439][ T29] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.314012][ T7850] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.322880][ T7855] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 95.383596][ T7855] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 95.475670][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 95.483563][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.492518][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.500616][ T29] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.507822][ T29] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.515593][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 95.523943][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 95.532293][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 95.539171][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 95.560532][ T7850] 8021q: adding VLAN 0 to HW filter on device team0 [ 95.579014][ T7843] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 95.588618][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 95.589531][ T38] audit: type=1400 audit(1575024437.259:47): avc: denied { associate } for pid=7843 comm="syz-executor.1" name="syz1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 95.596483][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.626770][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 95.635413][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 95.643481][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 95.651882][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 95.660217][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 95.668527][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 95.686424][ T7841] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 95.699747][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 95.715361][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 95.723172][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 95.736706][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.745448][ T2786] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.752777][ T2786] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.756633][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 10:47:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp6\x00') sendfile(r1, r2, 0x0, 0x7ffff000) [ 95.772081][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.780429][ T2786] bridge0: port 2(bridge_slave_1) entered blocking state 10:47:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp6\x00') sendfile(r1, r2, 0x0, 0x7ffff000) [ 95.787695][ T2786] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.795875][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 95.804935][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 10:47:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp6\x00') sendfile(r1, r2, 0x0, 0x7ffff000) [ 95.814951][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 95.822998][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.830462][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 95.839593][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 95.850674][ T7847] 8021q: adding VLAN 0 to HW filter on device team0 10:47:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7ffff000) [ 95.875625][ T7841] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 95.884226][ T3255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 95.892783][ T3255] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 95.900034][ T3255] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 95.916734][ T3255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 10:47:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7ffff000) [ 95.925041][ T3255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.933930][ T3255] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.940809][ T3255] bridge0: port 1(bridge_slave_0) entered forwarding state 10:47:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7ffff000) [ 95.948498][ T3255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.957470][ T3255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.966025][ T3255] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.973255][ T3255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.980630][ T3255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 95.990337][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 96.009382][ T7850] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 96.019997][ T7850] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 96.037723][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.046341][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.054970][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.064421][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.072821][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 96.080853][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.089245][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.097475][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.105789][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 96.113884][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 96.121216][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 96.132644][ T7852] 8021q: adding VLAN 0 to HW filter on device bond0 [ 96.145570][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.154522][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.163108][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 96.182109][ T7852] 8021q: adding VLAN 0 to HW filter on device team0 [ 96.192682][ T7863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.201001][ T7863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.209293][ T7863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 96.217517][ T7863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 96.225000][ T7863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 96.233487][ T7863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.241793][ T7863] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 96.249424][ T7863] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 96.260617][ T7847] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 96.272899][ T38] audit: type=1400 audit(1575024437.939:48): avc: denied { open } for pid=7890 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 96.274095][ T7847] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 96.309840][ T7850] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.316958][ T38] audit: type=1400 audit(1575024437.939:49): avc: denied { kernel } for pid=7890 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 96.343072][ T7863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.351521][ T7863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.359732][ T7863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.368143][ T7863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.378144][ T7863] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.386174][ T7863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.395092][ T7863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 96.421078][ T7855] 8021q: adding VLAN 0 to HW filter on device bond0 [ 96.430039][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.438866][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.447818][ T7856] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.454983][ T7856] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.477890][ T390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 96.487160][ T390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 96.498988][ T390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.508785][ T390] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.518960][ T390] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 96.527337][ T390] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 96.535336][ T390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.544354][ T390] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.554158][ T390] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 96.568135][ T7847] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.585558][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 96.594191][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.602328][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 10:47:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp6\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x7ffff000) 10:47:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp6\x00') sendfile(r1, r2, 0x0, 0x7ffff000) [ 96.621383][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 96.636535][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.647486][ T7859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.660798][ T7855] 8021q: adding VLAN 0 to HW filter on device team0 [ 96.688448][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 96.699066][ T38] audit: type=1400 audit(1575024438.369:50): avc: denied { prog_load } for pid=7910 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 96.722008][ T390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.722357][ T390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.738890][ T390] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.745948][ T390] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.753662][ T390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.762330][ T390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.762643][ T38] audit: type=1400 audit(1575024438.439:51): avc: denied { prog_run } for pid=7910 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 96.770482][ T390] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.800287][ T390] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.807879][ T390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 96.816231][ T390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 10:47:18 executing program 0: socket$vsock_stream(0x28, 0x1, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket(0x0, 0x0, 0x0) 10:47:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp6\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x7ffff000) [ 96.842713][ T7855] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 96.853839][ T7855] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 96.865362][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 96.872921][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.881077][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.889508][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.898113][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.907002][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 96.915435][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.923704][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.931760][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.939839][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 96.947879][ T7856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 96.969450][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 96.980024][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 96.991263][ T7863] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 96.992175][ C0] hrtimer: interrupt took 27864 ns [ 96.998994][ T7863] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 97.017489][ T7852] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 97.029351][ T7855] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 97.186731][ T38] audit: type=1400 audit(1575024438.859:52): avc: denied { map_create } for pid=7937 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 97.223261][ T38] audit: type=1400 audit(1575024438.869:53): avc: denied { map_read map_write } for pid=7937 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 10:47:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010105070100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 10:47:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp6\x00') sendfile(r1, r2, 0x0, 0x7ffff000) 10:47:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp6\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x7ffff000) 10:47:19 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) dup(r0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='threaded\x00', 0x9) splice(0xffffffffffffffff, &(0x7f0000001280)=0x2, 0xffffffffffffffff, 0x0, 0x800000a, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) getpriority(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r1, &(0x7f0000001280), r2, 0x0, 0x800000a, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x800000a, 0x0) r3 = add_key$user(&(0x7f00000002c0)='user\x00', 0x0, &(0x7f00000005c0)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919", 0x66, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) keyctl$chown(0x4, r3, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000400)) add_key$user(&(0x7f00000002c0)='us`\x99\x00', 0x0, &(0x7f0000000700)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2", 0xa0, 0xfffffffffffffffe) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000140)=""/56, 0x38) openat$dsp(0xffffffffffffff9c, 0x0, 0x10901, 0x0) unshare(0x600) prctl$PR_GET_PDEATHSIG(0x2, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:47:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x18) 10:47:19 executing program 4: socket$inet6(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000003280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f5ffe0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x2, 0x6, 0x4}, 0x20) socket$inet(0x10, 0x2, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000006c80)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="f5", 0x1}], 0x1}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6587b967483041ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xf83c, 0x2, 0x0, 0x27) 10:47:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp6\x00') sendfile(r1, r2, 0x0, 0x7ffff000) 10:47:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp6\x00') sendfile(r1, r2, 0x0, 0x7ffff000) 10:47:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x18) 10:47:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x18) 10:47:19 executing program 5: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x18) 10:47:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp6\x00') sendfile(r1, r2, 0x0, 0x7ffff000) 10:47:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp6\x00') 10:47:20 executing program 5: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x18) 10:47:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp6\x00') sendfile(r1, r2, 0x0, 0x7ffff000) [ 204.381622][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 204.384813][ C1] rcu: 1-....: (1 GPs behind) idle=12a/1/0x4000000000000004 softirq=7702/7825 fqs=5212 [ 204.384813][ C1] (t=10500 jiffies g=5653 q=2351) [ 204.384813][ C1] NMI backtrace for cpu 1 [ 204.384813][ C1] CPU: 1 PID: 7951 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 204.384813][ C1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 204.384813][ C1] Call Trace: [ 204.384813][ C1] [ 204.384813][ C1] dump_stack+0x197/0x210 [ 204.384813][ C1] nmi_cpu_backtrace.cold+0x70/0xb2 [ 204.384813][ C1] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 204.384813][ C1] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 204.384813][ C1] arch_trigger_cpumask_backtrace+0x14/0x20 [ 204.384813][ C1] rcu_dump_cpu_stacks+0x183/0x1cf [ 204.384813][ C1] ? find_next_bit+0x107/0x130 [ 204.384813][ C1] rcu_sched_clock_irq.cold+0x509/0xc02 [ 204.384813][ C1] ? raise_softirq+0x138/0x340 [ 204.384813][ C1] update_process_times+0x2d/0x70 [ 204.384813][ C1] tick_sched_handle+0xa2/0x190 [ 204.384813][ C1] tick_sched_timer+0x53/0x140 [ 204.384813][ C1] __hrtimer_run_queues+0x364/0xe40 [ 204.384813][ C1] ? tick_sched_do_timer+0x1b0/0x1b0 [ 204.384813][ C1] ? hrtimer_init+0x330/0x330 [ 204.384813][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 204.384813][ C1] ? ktime_get_update_offsets_now+0x2ce/0x430 [ 204.384813][ C1] hrtimer_interrupt+0x314/0x770 [ 204.384813][ C1] smp_apic_timer_interrupt+0x160/0x610 [ 204.384813][ C1] apic_timer_interrupt+0xf/0x20 [ 204.384813][ C1] RIP: 0010:validate_xmit_xfrm+0x437/0xf10 [ 204.384813][ C1] Code: 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 0f b6 04 02 48 89 da 83 e2 07 38 d0 7f 08 84 c0 0f 85 7f 0a 00 00 c6 03 01 84 79 0a fb 4c 89 e0 48 83 c4 38 5b 41 5c 41 5d 41 5e 41 5f 5d [ 204.384813][ C1] RSP: 0018:ffff88807ec09518 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 204.384813][ C1] RAX: 0000000000000502 RBX: ffff88807ec09690 RCX: ffffffff866a60bf [ 204.384813][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 204.384813][ C1] RBP: ffff88807ec09578 R08: ffff8880741c8180 R09: ffffed100fd87045 [ 204.384813][ C1] R10: ffffed100fd87044 R11: ffff88807ec38223 R12: ffff888074050c80 [ 204.384813][ C1] R13: 0000000000000000 R14: 000030884fdd59e9 R15: 0000000000000000 [ 204.384813][ C1] ? apic_timer_interrupt+0xa/0x20 [ 204.384813][ C1] ? validate_xmit_xfrm+0x5f/0xf10 [ 204.384813][ C1] ? validate_xmit_xfrm+0x5f/0xf10 [ 204.384813][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 204.384813][ C1] validate_xmit_skb+0x817/0xe50 [ 204.384813][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 204.384813][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 204.384813][ C1] ? netdev_core_pick_tx+0x1db/0x2f0 [ 204.384813][ C1] __dev_queue_xmit+0xa48/0x35c0 [ 204.384813][ C1] ? __kasan_check_read+0x11/0x20 [ 204.384813][ C1] ? __lock_acquire+0x16f2/0x4a00 [ 204.384813][ C1] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 204.384813][ C1] ? __kasan_check_read+0x11/0x20 [ 204.384813][ C1] ? mark_lock+0xc2/0x1220 [ 204.384813][ C1] ? mark_held_locks+0xa4/0xf0 [ 204.384813][ C1] ? ip6_finish_output2+0xc98/0x25c0 [ 204.384813][ C1] ? __ip6_finish_output+0x444/0xaa0 [ 204.384813][ C1] ? ip6_finish_output2+0xc98/0x25c0 [ 204.384813][ C1] dev_queue_xmit+0x18/0x20 [ 204.384813][ C1] ? dev_queue_xmit+0x18/0x20 [ 204.384813][ C1] ip6_finish_output2+0xfbe/0x25c0 [ 204.384813][ C1] ? ip6_frag_next+0xb20/0xb20 [ 204.384813][ C1] ? lock_downgrade+0x920/0x920 [ 204.384813][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 204.384813][ C1] ? __kasan_check_read+0x11/0x20 [ 204.384813][ C1] __ip6_finish_output+0x444/0xaa0 [ 204.384813][ C1] ? __ip6_finish_output+0x444/0xaa0 [ 204.384813][ C1] ip6_finish_output+0x38/0x1f0 [ 204.384813][ C1] ip6_output+0x25e/0x880 [ 204.384813][ C1] ? ip6_finish_output+0x1f0/0x1f0 [ 204.384813][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 204.384813][ C1] ? __ip6_finish_output+0xaa0/0xaa0 [ 204.384813][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 204.384813][ C1] ndisc_send_skb+0xf1f/0x1490 [ 204.384813][ C1] ? nf_hook.constprop.0+0x560/0x560 [ 204.384813][ C1] ? memcpy+0x46/0x50 [ 204.384813][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 204.384813][ C1] ndisc_send_rs+0x134/0x720 [ 204.384813][ C1] addrconf_rs_timer+0x30f/0x6e0 [ 204.384813][ C1] ? ipv6_get_lladdr+0x490/0x490 [ 204.384813][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 204.384813][ C1] call_timer_fn+0x1ac/0x780 [ 204.384813][ C1] ? ipv6_get_lladdr+0x490/0x490 [ 204.384813][ C1] ? msleep_interruptible+0x150/0x150 [ 204.384813][ C1] ? ipv6_get_lladdr+0x490/0x490 [ 204.384813][ C1] run_timer_softirq+0x6c3/0x1790 [ 204.384813][ C1] ? add_timer+0x930/0x930 [ 204.384813][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 204.384813][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 204.384813][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 204.384813][ C1] __do_softirq+0x262/0x98c [ 204.384813][ C1] ? sched_clock_cpu+0x14e/0x1b0 [ 204.384813][ C1] irq_exit+0x19b/0x1e0 [ 204.384813][ C1] smp_apic_timer_interrupt+0x1a3/0x610 [ 204.384813][ C1] apic_timer_interrupt+0xf/0x20 [ 204.384813][ C1] [ 204.384813][ C1] RIP: 0010:_raw_spin_unlock_irq+0x4f/0x80 [ 204.384813][ C1] Code: c0 68 34 13 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 33 48 83 3d 12 6a 96 01 00 74 20 fb 66 0f 1f 44 00 00 01 00 00 00 e8 e7 ab d3 f9 65 8b 05 18 54 85 78 85 c0 74 06 41 [ 204.384813][ C1] RSP: 0018:ffff888068adf8d8 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 204.384813][ C1] RAX: 1ffffffff122668d RBX: ffff8880741c8180 RCX: 0000000000000006 [ 204.384813][ C1] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff8880741c8a14 [ 204.384813][ C1] RBP: ffff888068adf8e0 R08: 1ffffffff15377bb R09: fffffbfff15377bc [ 204.384813][ C1] R10: fffffbfff15377bb R11: ffffffff8a9bbddf R12: ffff88807ec37380 [ 204.384813][ C1] R13: ffff88807ea9c040 R14: ffff88807c9eed40 R15: 0000000000000000 [ 204.384813][ C1] ? _raw_spin_unlock_irq+0x23/0x80 [ 204.384813][ C1] finish_task_switch+0x147/0x750 [ 204.384813][ C1] ? finish_task_switch+0x119/0x750 [ 204.384813][ C1] __schedule+0x8e9/0x1f30 [ 204.384813][ C1] ? __sched_text_start+0x8/0x8 [ 204.384813][ C1] ? smp_call_function_single+0x40b/0x480 [ 204.384813][ C1] ? preempt_schedule+0x4b/0x60 [ 204.384813][ C1] ? preempt_schedule+0x4b/0x60 [ 204.384813][ C1] preempt_schedule_common+0x4f/0xe0 [ 204.384813][ C1] ? __perf_event_enable+0x930/0x930 [ 204.384813][ C1] preempt_schedule+0x4b/0x60 [ 204.384813][ C1] ___preempt_schedule+0x16/0x18 [ 204.384813][ C1] ? smp_call_function_single+0x40b/0x480 [ 204.384813][ C1] smp_call_function_single+0x410/0x480 [ 204.384813][ C1] ? perf_duration_warn+0x40/0x40 [ 204.384813][ C1] ? generic_exec_single+0x4c0/0x4c0 [ 204.384813][ C1] ? __do_sys_perf_event_open+0x174c/0x2c70 [ 204.384813][ C1] ? __perf_event_enable+0x930/0x930 [ 204.384813][ C1] task_function_call+0xe9/0x180 [ 204.384813][ C1] ? perf_event_addr_filters_exec+0x310/0x310 [ 204.384813][ C1] ? __do_sys_perf_event_open+0x174c/0x2c70 [ 204.384813][ C1] ? __perf_event_enable+0x930/0x930 [ 204.384813][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 204.384813][ C1] ? exclusive_event_installable+0x257/0x320 [ 204.384813][ C1] perf_install_in_context+0x308/0x5a0 [ 204.384813][ C1] ? list_add_event+0xed0/0xed0 [ 204.384813][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 204.384813][ C1] ? __perf_event_header_size.isra.0+0x166/0x1c0 [ 204.384813][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 204.384813][ C1] __do_sys_perf_event_open+0x1cbc/0x2c70 [ 204.384813][ C1] ? perf_event_set_output+0x4e0/0x4e0 [ 204.384813][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 204.384813][ C1] ? put_timespec64+0xda/0x140 [ 204.384813][ C1] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 204.384813][ C1] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 204.384813][ C1] ? do_syscall_64+0x26/0x790 [ 204.384813][ C1] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.384813][ C1] ? do_syscall_64+0x26/0x790 [ 204.384813][ C1] __x64_sys_perf_event_open+0xbe/0x150 [ 204.384813][ C1] do_syscall_64+0xfa/0x790 [ 204.384813][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.384813][ C1] RIP: 0033:0x45a759 [ 204.384813][ C1] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 204.384813][ C1] RSP: 002b:00007ff88076bc88 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 204.384813][ C1] RAX: ffffffffffffffda RBX: 000000000071bf00 RCX: 000000000045a759 [ 204.384813][ C1] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 000000002001d000 [ 204.384813][ C1] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 204.384813][ C1] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007ff88076c6d4 [ 204.384813][ C1] R13: 00000000004aec17 R14: 00000000006f1cb0 R15: 00000000ffffffff