syzkaller login: [ 60.703458][ T38] audit: type=1400 audit(1575023812.732:41): avc: denied { map } for pid=7806 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '[localhost]:46604' (ECDSA) to the list of known hosts. [ 72.138487][ T38] audit: type=1400 audit(1575023824.172:42): avc: denied { map } for pid=7821 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16525 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2019/11/29 10:37:04 fuzzer started 2019/11/29 10:37:06 dialing manager at 10.0.2.10:46599 2019/11/29 10:37:07 syscalls: 2543 2019/11/29 10:37:07 code coverage: enabled 2019/11/29 10:37:07 comparison tracing: enabled 2019/11/29 10:37:07 extra coverage: extra coverage is not supported by the kernel 2019/11/29 10:37:07 setuid sandbox: enabled 2019/11/29 10:37:07 namespace sandbox: enabled 2019/11/29 10:37:07 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/29 10:37:07 fault injection: enabled 2019/11/29 10:37:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/29 10:37:07 net packet injection: enabled 2019/11/29 10:37:07 net device setup: enabled 2019/11/29 10:37:07 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/29 10:37:07 devlink PCI setup: PCI device 0000:00:10.0 is not available 10:37:21 executing program 0: syz_mount_image$msdos(&(0x7f00000007c0)='msdos\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@fat=@flush='flush'}]}) [ 89.487786][ T38] audit: type=1400 audit(1575023841.522:43): avc: denied { map } for pid=7841 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=18759 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 89.601955][ T7842] IPVS: ftp: loaded support on port[0] = 21 10:37:21 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) [ 89.668545][ T7842] chnl_net:caif_netlink_parms(): no params data found [ 89.711619][ T7842] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.721753][ T7842] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.730252][ T7842] device bridge_slave_0 entered promiscuous mode [ 89.742791][ T7842] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.750125][ T7842] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.758767][ T7842] device bridge_slave_1 entered promiscuous mode [ 89.777278][ T7842] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 89.790784][ T7842] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 89.790862][ T7845] IPVS: ftp: loaded support on port[0] = 21 10:37:21 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000001e00)={0x28, 0x0, 0xffffffff, @host}, 0x10) [ 89.822972][ T7842] team0: Port device team_slave_0 added [ 89.835698][ T7842] team0: Port device team_slave_1 added [ 89.927463][ T7842] device hsr_slave_0 entered promiscuous mode 10:37:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffbc, 0x10}, [@ldst={0x7, 0xff05}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) [ 89.976001][ T7842] device hsr_slave_1 entered promiscuous mode 10:37:22 executing program 4: write(0xffffffffffffffff, &(0x7f0000000000)="1f", 0x1) r0 = socket$inet6(0xa, 0x800000003, 0xff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) [ 90.116423][ T7848] IPVS: ftp: loaded support on port[0] = 21 [ 90.146227][ T7850] IPVS: ftp: loaded support on port[0] = 21 [ 90.199760][ T7842] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 90.204301][ T38] audit: type=1400 audit(1575023842.232:44): avc: denied { create } for pid=7842 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 90.235529][ T38] audit: type=1400 audit(1575023842.232:45): avc: denied { write } for pid=7842 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 10:37:22 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000003280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[{0x10, 0x11}], 0x10}}], 0x2, 0x0) socket$inet(0x10, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0c9f000006000000d00899295bd9993c27df055fa6aa4863d376b872aa7c318bd90cdcddfcaddcad4f0c3bf5b906468a5fb233a735db7742ee342f9323f51df29f5b3df1e0d6cb40baa33605a838c8724be43708d8abafd2c5713b51a2253673fe4da147f40e3f8d02ffffffffc0c51c4dfd9baa4f3cd88ca813c0c8c589523f2748eae112b9220174ea114e40f0746e2cc6c868c17ff5b4ae10b67c1c1dfc9bd8a999c8b49171918a866e93db5f216da2ade5da4dd27800422671b2a534f01fef74d99a8c319b9b65ae27d09e71696819f14eb69beee930fee56684c73e4eb4b25cd4a1701f0e5fb449cdc677"], 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000006c80)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="f5", 0x1}], 0x1}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6587b967483041ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xf83c, 0x2, 0x0, 0x27) [ 90.235545][ T38] audit: type=1400 audit(1575023842.232:46): avc: denied { read } for pid=7842 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 90.352733][ T7842] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 90.405826][ T7845] chnl_net:caif_netlink_parms(): no params data found [ 90.414450][ T7842] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 90.508261][ T7842] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 90.605929][ T7853] IPVS: ftp: loaded support on port[0] = 21 [ 90.636696][ T7855] IPVS: ftp: loaded support on port[0] = 21 [ 90.657437][ T7848] chnl_net:caif_netlink_parms(): no params data found [ 90.687364][ T7845] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.695224][ T7845] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.703016][ T7845] device bridge_slave_0 entered promiscuous mode [ 90.736567][ T7845] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.744443][ T7845] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.753148][ T7845] device bridge_slave_1 entered promiscuous mode [ 90.774397][ T7845] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 90.787446][ T7845] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 90.825666][ T7845] team0: Port device team_slave_0 added [ 90.838585][ T7848] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.847379][ T7848] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.855700][ T7848] device bridge_slave_0 entered promiscuous mode [ 90.869849][ T7845] team0: Port device team_slave_1 added [ 90.882370][ T7848] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.889941][ T7848] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.899035][ T7848] device bridge_slave_1 entered promiscuous mode [ 91.016069][ T7845] device hsr_slave_0 entered promiscuous mode [ 91.094504][ T7845] device hsr_slave_1 entered promiscuous mode [ 91.154485][ T7845] debugfs: Directory 'hsr0' with parent '/' already present! [ 91.168022][ T7848] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 91.179530][ T7848] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 91.235782][ T7848] team0: Port device team_slave_0 added [ 91.243030][ T7848] team0: Port device team_slave_1 added [ 91.268945][ T7850] chnl_net:caif_netlink_parms(): no params data found [ 91.336757][ T7848] device hsr_slave_0 entered promiscuous mode [ 91.384561][ T7848] device hsr_slave_1 entered promiscuous mode [ 91.444502][ T7848] debugfs: Directory 'hsr0' with parent '/' already present! [ 91.472788][ T7845] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 91.527793][ T7845] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 91.596335][ T7845] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 91.636491][ T7845] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 91.696358][ T7853] chnl_net:caif_netlink_parms(): no params data found [ 91.706207][ T7855] chnl_net:caif_netlink_parms(): no params data found [ 91.724852][ T7842] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.762501][ T7850] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.770392][ T7850] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.778395][ T7850] device bridge_slave_0 entered promiscuous mode [ 91.786389][ T7850] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.793398][ T7850] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.801317][ T7850] device bridge_slave_1 entered promiscuous mode [ 91.816829][ T7842] 8021q: adding VLAN 0 to HW filter on device team0 [ 91.847444][ T7855] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.855158][ T7855] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.862881][ T7855] device bridge_slave_0 entered promiscuous mode [ 91.870342][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 91.878299][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 91.886894][ T7848] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 91.932021][ T7853] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.940925][ T7853] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.951465][ T7853] device bridge_slave_0 entered promiscuous mode [ 91.967569][ T7850] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 91.977077][ T7855] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.984084][ T7855] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.993344][ T7855] device bridge_slave_1 entered promiscuous mode [ 92.008652][ T7848] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 92.087726][ T7853] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.095042][ T7853] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.102733][ T7853] device bridge_slave_1 entered promiscuous mode [ 92.115874][ T7850] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 92.134086][ T7848] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 92.206007][ T7848] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 92.266320][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.275032][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.283497][ T561] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.290594][ T561] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.298497][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 92.312407][ T7853] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 92.322716][ T7855] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 92.332694][ T7853] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 92.343396][ T7855] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 92.379220][ T7850] team0: Port device team_slave_0 added [ 92.388649][ T7850] team0: Port device team_slave_1 added [ 92.404891][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.413145][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.425325][ T561] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.432334][ T561] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.444885][ T7855] team0: Port device team_slave_0 added [ 92.455507][ T7853] team0: Port device team_slave_0 added [ 92.463098][ T7855] team0: Port device team_slave_1 added [ 92.566386][ T7850] device hsr_slave_0 entered promiscuous mode [ 92.614570][ T7850] device hsr_slave_1 entered promiscuous mode [ 92.684369][ T7850] debugfs: Directory 'hsr0' with parent '/' already present! [ 92.695364][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 92.705112][ T7853] team0: Port device team_slave_1 added [ 92.733246][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 92.741687][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 92.750162][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 92.758387][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 92.766820][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 92.774788][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 92.782899][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.791661][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 92.908051][ T7853] device hsr_slave_0 entered promiscuous mode [ 92.984587][ T7853] device hsr_slave_1 entered promiscuous mode [ 93.034431][ T7853] debugfs: Directory 'hsr0' with parent '/' already present! [ 93.096229][ T7855] device hsr_slave_0 entered promiscuous mode [ 93.184623][ T7855] device hsr_slave_1 entered promiscuous mode [ 93.234597][ T7855] debugfs: Directory 'hsr0' with parent '/' already present! [ 93.243548][ T7842] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 93.256930][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.267211][ T561] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.285406][ T7845] 8021q: adding VLAN 0 to HW filter on device bond0 [ 93.318618][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 93.326627][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 93.353057][ T7855] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 93.397514][ T7845] 8021q: adding VLAN 0 to HW filter on device team0 [ 93.404839][ T7850] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 93.478126][ T7850] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 93.558613][ T7850] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 93.667371][ T7855] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 93.758865][ T7855] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 93.846868][ T7855] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 93.891066][ T7850] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 93.952687][ T7842] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 93.963240][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 93.970780][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 93.978364][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 93.987272][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 93.995602][ T7865] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.002470][ T7865] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.010003][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 94.018343][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.026604][ T7865] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.033590][ T7865] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.043210][ T7853] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 94.099936][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 94.112095][ T7853] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 94.166467][ T7853] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 94.216657][ T7853] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 94.290555][ T38] audit: type=1400 audit(1575023846.322:47): avc: denied { associate } for pid=7842 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 94.293071][ T7848] 8021q: adding VLAN 0 to HW filter on device bond0 [ 94.323786][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 94.340310][ T7848] 8021q: adding VLAN 0 to HW filter on device team0 [ 94.358295][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.366187][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.373705][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 94.412612][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 94.421458][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.430180][ T7865] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.437357][ T7865] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.437624][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 94.453977][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 94.462537][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 94.462720][ T7868] FAT-fs (loop0): bogus number of reserved sectors [ 94.471041][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.477630][ T7868] FAT-fs (loop0): Can't find a valid FAT filesystem [ 94.486011][ T7865] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.499492][ T7865] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.507162][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 94.515737][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 94.524740][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 94.534871][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 94.543347][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.551720][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 94.560390][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 94.569129][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 94.579422][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 94.587652][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 94.595545][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 94.609154][ T7845] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 94.620752][ T7845] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 94.640220][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 94.649907][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 94.659281][ T7868] FAT-fs (loop0): bogus number of reserved sectors [ 94.665683][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 94.666272][ T7868] FAT-fs (loop0): Can't find a valid FAT filesystem [ 94.682807][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 94.698553][ T7850] 8021q: adding VLAN 0 to HW filter on device bond0 [ 94.719040][ T7848] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 94.729931][ T7848] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 94.742105][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 10:37:26 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x90) write(r4, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000500)={0x3, &(0x7f00000004c0)=[{0x0, 0x0, 0x7, 0x4}, {0x0, 0x0, 0x81, 0x8}, {0x1, 0x40, 0x5, 0x40}]}, 0x8) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000300)={'ip_vti0\x00', {0x2, 0x4e20, @remote}}) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f00000003c0)=@nfc, &(0x7f00000002c0)=0x80, 0x0) listen(0xffffffffffffffff, 0x0) sendfile(r4, r5, 0x0, 0x7fffffa7) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000400)={0x0, 0xffffffffffffff94, &(0x7f0000000380)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) [ 94.753004][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.762860][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 94.771550][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 94.781638][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 94.801468][ T7845] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 94.810649][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 94.821992][ T38] audit: type=1800 audit(1575023846.852:48): pid=7877 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=22 res=0 [ 94.845728][ C3] protocol 88fb is buggy, dev hsr_slave_0 [ 94.845804][ C3] protocol 88fb is buggy, dev hsr_slave_1 [ 94.860172][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 94.861102][ T38] audit: type=1804 audit(1575023846.852:49): pid=7877 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir535746085/syzkaller.0kKuyE/1/file0/file0" dev="loop0" ino=22 res=1 [ 94.867784][ C2] protocol 88fb is buggy, dev hsr_slave_0 [ 94.867812][ C2] protocol 88fb is buggy, dev hsr_slave_1 [ 94.868102][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.895423][ T38] audit: type=1400 audit(1575023846.882:50): avc: denied { open } for pid=7876 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 94.901827][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.907002][ T38] audit: type=1400 audit(1575023846.882:51): avc: denied { kernel } for pid=7876 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 94.968661][ C3] protocol 88fb is buggy, dev hsr_slave_0 [ 94.974304][ C2] protocol 88fb is buggy, dev hsr_slave_0 [ 94.974514][ C3] protocol 88fb is buggy, dev hsr_slave_1 [ 94.980318][ C2] protocol 88fb is buggy, dev hsr_slave_1 [ 94.991393][ T7850] 8021q: adding VLAN 0 to HW filter on device team0 [ 95.009137][ T7848] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 95.032576][ T4281] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 95.040389][ T4281] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 95.067436][ T7855] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.086375][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 95.094517][ C3] protocol 88fb is buggy, dev hsr_slave_0 [ 95.094548][ C3] protocol 88fb is buggy, dev hsr_slave_1 [ 95.096034][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.125183][ T7855] 8021q: adding VLAN 0 to HW filter on device team0 [ 95.135974][ T7853] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.144043][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 95.154863][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 10:37:27 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000001e00)={0x28, 0x0, 0xffffffff, @host}, 0x10) [ 95.172354][ T3019] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.179644][ T3019] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.195162][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.204953][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.219772][ T3019] bridge0: port 2(bridge_slave_1) entered blocking state 10:37:27 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000001e00)={0x28, 0x0, 0xffffffff, @host}, 0x10) [ 95.227069][ T3019] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.234869][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 95.235855][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 95.268651][ T7853] 8021q: adding VLAN 0 to HW filter on device team0 10:37:27 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000001e00)={0x28, 0x0, 0xffffffff, @host}, 0x10) 10:37:27 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) [ 95.292146][ T7850] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 10:37:27 executing program 2: bind$vsock_stream(0xffffffffffffffff, &(0x7f0000001e00)={0x28, 0x0, 0xffffffff, @host}, 0x10) 10:37:27 executing program 2: bind$vsock_stream(0xffffffffffffffff, &(0x7f0000001e00)={0x28, 0x0, 0xffffffff, @host}, 0x10) [ 95.320401][ T7850] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 95.346742][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 95.360959][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 10:37:27 executing program 2: bind$vsock_stream(0xffffffffffffffff, &(0x7f0000001e00)={0x28, 0x0, 0xffffffff, @host}, 0x10) [ 95.370733][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.383369][ T2780] bridge0: port 1(bridge_slave_0) entered blocking state 10:37:27 executing program 2: socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000001e00)={0x28, 0x0, 0xffffffff, @host}, 0x10) [ 95.390621][ T2780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.402080][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 95.411487][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 95.421476][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 95.429360][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.437242][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.446547][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.458122][ T2780] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.465317][ T2780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.472599][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 95.481358][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 95.489707][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 95.498193][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 95.506697][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 95.514815][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 95.523185][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 95.531486][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 95.539715][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 95.548195][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 95.572536][ T7855] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 95.583711][ T7855] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 95.601079][ T38] audit: type=1804 audit(1575023847.632:52): pid=7881 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir535746085/syzkaller.0kKuyE/1/file0/file0" dev="loop0" ino=22 res=1 [ 95.614556][ T7855] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 95.637538][ T38] audit: type=1804 audit(1575023847.672:53): pid=7877 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir535746085/syzkaller.0kKuyE/1/file0/file0" dev="loop0" ino=22 res=1 [ 95.637662][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 95.677354][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 95.685674][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 95.693269][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 95.701355][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 95.710519][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.719154][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.726415][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.734123][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.742983][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.751582][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.760211][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.767945][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 95.776854][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 95.785381][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 95.793763][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 95.802191][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 95.810637][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 95.819162][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 95.827494][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 95.835699][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 95.844437][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 95.852759][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 95.860389][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 95.870535][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 95.878449][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 95.886265][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 95.901320][ T7853] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 95.912501][ T7853] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 95.945030][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 95.953690][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 95.962657][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 95.970948][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 95.979701][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 95.988011][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 95.996172][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 96.003738][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 96.012478][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 96.024296][ T7850] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.041231][ T7853] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.048755][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 96.056839][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 96.121515][ T38] audit: type=1400 audit(1575023848.152:54): avc: denied { prog_load } for pid=7937 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 96.161840][ T38] audit: type=1400 audit(1575023848.182:55): avc: denied { prog_run } for pid=7937 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 10:37:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffbc, 0x10}, [@ldst={0x7, 0xff05}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 10:37:28 executing program 4: write(0xffffffffffffffff, &(0x7f0000000000)="1f", 0x1) r0 = socket$inet6(0xa, 0x800000003, 0xff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 10:37:29 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x90) write(r4, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000500)={0x3, &(0x7f00000004c0)=[{0x0, 0x0, 0x7, 0x4}, {0x0, 0x0, 0x81, 0x8}, {0x1, 0x40, 0x5, 0x40}]}, 0x8) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000300)={'ip_vti0\x00', {0x2, 0x4e20, @remote}}) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f00000003c0)=@nfc, &(0x7f00000002c0)=0x80, 0x0) listen(0xffffffffffffffff, 0x0) sendfile(r4, r5, 0x0, 0x7fffffa7) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000400)={0x0, 0xffffffffffffff94, &(0x7f0000000380)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) 10:37:29 executing program 2: socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000001e00)={0x28, 0x0, 0xffffffff, @host}, 0x10) 10:37:29 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x90) write(r4, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000500)={0x3, &(0x7f00000004c0)=[{0x0, 0x0, 0x7, 0x4}, {0x0, 0x0, 0x81, 0x8}, {0x1, 0x40, 0x5, 0x40}]}, 0x8) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000300)={'ip_vti0\x00', {0x2, 0x4e20, @remote}}) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f00000003c0)=@nfc, &(0x7f00000002c0)=0x80, 0x0) listen(0xffffffffffffffff, 0x0) sendfile(r4, r5, 0x0, 0x7fffffa7) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000400)={0x0, 0xffffffffffffff94, &(0x7f0000000380)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) 10:37:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffbc, 0x10}, [@ldst={0x7, 0xff05}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 10:37:29 executing program 4: write(0xffffffffffffffff, &(0x7f0000000000)="1f", 0x1) r0 = socket$inet6(0xa, 0x800000003, 0xff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 10:37:29 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000003280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[{0x10, 0x11}], 0x10}}], 0x2, 0x0) socket$inet(0x10, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0c9f000006000000d00899295bd9993c27df055fa6aa4863d376b872aa7c318bd90cdcddfcaddcad4f0c3bf5b906468a5fb233a735db7742ee342f9323f51df29f5b3df1e0d6cb40baa33605a838c8724be43708d8abafd2c5713b51a2253673fe4da147f40e3f8d02ffffffffc0c51c4dfd9baa4f3cd88ca813c0c8c589523f2748eae112b9220174ea114e40f0746e2cc6c868c17ff5b4ae10b67c1c1dfc9bd8a999c8b49171918a866e93db5f216da2ade5da4dd27800422671b2a534f01fef74d99a8c319b9b65ae27d09e71696819f14eb69beee930fee56684c73e4eb4b25cd4a1701f0e5fb449cdc677"], 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000006c80)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="f5", 0x1}], 0x1}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6587b967483041ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xf83c, 0x2, 0x0, 0x27) 10:37:29 executing program 2: socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000001e00)={0x28, 0x0, 0xffffffff, @host}, 0x10) 10:37:29 executing program 4: write(0xffffffffffffffff, &(0x7f0000000000)="1f", 0x1) r0 = socket$inet6(0xa, 0x800000003, 0xff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 10:37:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffbc, 0x10}, [@ldst={0x7, 0xff05}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 10:37:29 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, 0x0, 0x0) [ 97.181139][ T38] audit: type=1800 audit(1575023849.212:56): pid=7965 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=23 res=0 10:37:29 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, 0x0, 0x0) [ 97.237438][ T38] audit: type=1800 audit(1575023849.232:57): pid=7995 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16599 res=0 10:37:29 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, 0x0, 0x0) [ 100.494252][ C3] hrtimer: interrupt took 27584 ns [ 202.424192][ C3] rcu: INFO: rcu_preempt self-detected stall on CPU [ 202.430233][ C3] rcu: 3-....: (10499 ticks this GP) idle=a12/1/0x4000000000000004 softirq=7483/7483 fqs=5250 [ 202.430233][ C3] (t=10502 jiffies g=5613 q=922) [ 202.430233][ C3] NMI backtrace for cpu 3 [ 202.430233][ C3] CPU: 3 PID: 7965 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 202.430233][ C3] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 202.430233][ C3] Call Trace: [ 202.430233][ C3] [ 202.430233][ C3] dump_stack+0x197/0x210 [ 202.430233][ C3] nmi_cpu_backtrace.cold+0x70/0xb2 [ 202.430233][ C3] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 202.430233][ C3] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 202.430233][ C3] arch_trigger_cpumask_backtrace+0x14/0x20 [ 202.430233][ C3] rcu_dump_cpu_stacks+0x183/0x1cf [ 202.430233][ C3] ? find_next_bit+0x107/0x130 [ 202.430233][ C3] rcu_sched_clock_irq.cold+0x509/0xc02 [ 202.430233][ C3] ? raise_softirq+0x138/0x340 [ 202.430233][ C3] update_process_times+0x2d/0x70 [ 202.430233][ C3] tick_sched_handle+0xa2/0x190 [ 202.430233][ C3] tick_sched_timer+0x53/0x140 [ 202.430233][ C3] __hrtimer_run_queues+0x364/0xe40 [ 202.430233][ C3] ? tick_sched_do_timer+0x1b0/0x1b0 [ 202.430233][ C3] ? hrtimer_init+0x330/0x330 [ 202.430233][ C3] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 202.430233][ C3] ? ktime_get_update_offsets_now+0x2ce/0x430 [ 202.430233][ C3] hrtimer_interrupt+0x314/0x770 [ 202.430233][ C3] smp_apic_timer_interrupt+0x160/0x610 [ 202.430233][ C3] apic_timer_interrupt+0xf/0x20 [ 202.430233][ C3] RIP: 0010:neigh_fill_info+0x6a5/0xee0 [ 202.430233][ C3] Code: 00 fc ff df 48 c1 e8 03 80 3c 08 00 0f 85 0c 08 00 00 48 83 3d 73 fe 41 03 00 0f 84 08 07 00 00 e8 30 a8 a3 fb 4c 89 e7 57 9d <0f> 1f 44 00 00 e8 21 a8 a3 fb 4c 8d a3 18 01 00 00 48 b9 00 00 00 [ 202.430233][ C3] RSP: 0018:ffff88807ed094b0 EFLAGS: 00000206 ORIG_RAX: ffffffffffffff13 [ 202.430233][ C3] RAX: ffff888023f90180 RBX: ffff88807cedc000 RCX: dffffc0000000000 [ 202.430233][ C3] RDX: 0000000000000100 RSI: ffffffff85d135f0 RDI: 0000000000000206 [ 202.430233][ C3] RBP: ffff88807ed095f8 R08: 1ffffffff15377b2 R09: fffffbfff15377b3 [ 202.430233][ C3] R10: fffffbfff15377b2 R11: ffffffff8a9bbd97 R12: 0000000000000206 [ 202.430233][ C3] R13: ffff88807ed095d0 R14: 0000000000000200 R15: ffff888077a72200 [ 202.430233][ C3] ? apic_timer_interrupt+0xa/0x20 [ 202.430233][ C3] ? neigh_fill_info+0x6a0/0xee0 [ 202.430233][ C3] ? trace_hardirqs_on_caller+0x6a/0x240 [ 202.430233][ C3] ? neigh_seq_start+0x620/0x620 [ 202.430233][ C3] ? __this_cpu_preempt_check+0x2c/0x190 [ 202.430233][ C3] ? __this_cpu_preempt_check+0x35/0x190 [ 202.430233][ C3] ? retint_kernel+0x2b/0x2b [ 202.430233][ C3] __neigh_notify+0xb2/0x160 [ 202.430233][ C3] neigh_cleanup_and_release+0xf6/0x430 [ 202.430233][ C3] neigh_remove_one+0x3ba/0x440 [ 202.430233][ C3] ___neigh_create+0x1674/0x2560 [ 202.430233][ C3] ? __this_cpu_preempt_check+0x35/0x190 [ 202.430233][ C3] ? retint_kernel+0x2b/0x2b [ 202.430233][ C3] __neigh_create+0x2f/0x40 [ 202.430233][ C3] ip6_finish_output2+0x94f/0x25c0 [ 202.430233][ C3] ? ip6_mtu+0x2e6/0x450 [ 202.430233][ C3] ? ip6_frag_next+0xb20/0xb20 [ 202.430233][ C3] ? lock_downgrade+0x920/0x920 [ 202.430233][ C3] ? rcu_read_lock_held+0x9c/0xb0 [ 202.430233][ C3] ? __kasan_check_read+0x11/0x20 [ 202.430233][ C3] __ip6_finish_output+0x444/0xaa0 [ 202.430233][ C3] ? __ip6_finish_output+0x444/0xaa0 [ 202.430233][ C3] ip6_finish_output+0x38/0x1f0 [ 202.430233][ C3] ip6_output+0x25e/0x880 [ 202.430233][ C3] ? ip6_finish_output+0x1f0/0x1f0 [ 202.430233][ C3] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 202.430233][ C3] ? __ip6_finish_output+0xaa0/0xaa0 [ 202.430233][ C3] ? rcu_read_lock_held_common+0x130/0x130 [ 202.430233][ C3] ndisc_send_skb+0xf1f/0x1490 [ 202.430233][ C3] ? nf_hook.constprop.0+0x560/0x560 [ 202.430233][ C3] ? memcpy+0x46/0x50 [ 202.430233][ C3] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.430233][ C3] ndisc_send_rs+0x134/0x720 [ 202.430233][ C3] addrconf_rs_timer+0x30f/0x6e0 [ 202.430233][ C3] ? ipv6_get_lladdr+0x490/0x490 [ 202.430233][ C3] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 202.430233][ C3] call_timer_fn+0x1ac/0x780 [ 202.430233][ C3] ? ipv6_get_lladdr+0x490/0x490 [ 202.430233][ C3] ? msleep_interruptible+0x150/0x150 [ 202.430233][ C3] ? run_timer_softirq+0x6b1/0x1790 [ 202.430233][ C3] ? trace_hardirqs_on+0x67/0x240 [ 202.430233][ C3] ? ipv6_get_lladdr+0x490/0x490 [ 202.430233][ C3] ? ipv6_get_lladdr+0x490/0x490 [ 202.430233][ C3] run_timer_softirq+0x6c3/0x1790 [ 202.430233][ C3] ? add_timer+0x930/0x930 [ 202.430233][ C3] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 202.430233][ C3] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 202.430233][ C3] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 202.430233][ C3] __do_softirq+0x262/0x98c [ 202.430233][ C3] ? sched_clock_cpu+0x14e/0x1b0 [ 202.430233][ C3] irq_exit+0x19b/0x1e0 [ 202.430233][ C3] smp_apic_timer_interrupt+0x1a3/0x610 [ 202.430233][ C3] apic_timer_interrupt+0xf/0x20 [ 202.430233][ C3] [ 202.430233][ C3] RIP: 0010:_raw_spin_unlock_irq+0x4f/0x80 [ 202.430233][ C3] Code: c0 68 34 13 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 33 48 83 3d 12 6a 96 01 00 74 20 fb 66 0f 1f 44 00 00 01 00 00 00 e8 e7 ab d3 f9 65 8b 05 18 54 85 78 85 c0 74 06 41 [ 202.430233][ C3] RSP: 0018:ffff888022f06f78 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 202.430233][ C3] RAX: 1ffffffff122668d RBX: ffff888023f90180 RCX: 0000000000000007 [ 202.430233][ C3] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff888023f90a14 [ 202.430233][ C3] RBP: ffff888022f06f80 R08: 1ffffffff15377bb R09: fffffbfff15377bc [ 202.430233][ C3] R10: fffffbfff15377bb R11: ffffffff8a9bbddf R12: ffff88807ed37380 [ 202.430233][ C3] R13: ffff888067e1d6c0 R14: 0000000000000000 R15: 0000000000000001 [ 202.430233][ C3] ? _raw_spin_unlock_irq+0x23/0x80 [ 202.430233][ C3] finish_task_switch+0x147/0x750 [ 202.430233][ C3] ? finish_task_switch+0x119/0x750 [ 202.430233][ C3] __schedule+0x8e9/0x1f30 [ 202.430233][ C3] ? __sched_text_start+0x8/0x8 [ 202.430233][ C3] ? __kasan_check_read+0x11/0x20 [ 202.430233][ C3] ? preempt_schedule+0x4b/0x60 [ 202.430233][ C3] preempt_schedule_common+0x4f/0xe0 [ 202.430233][ C3] preempt_schedule+0x4b/0x60 [ 202.430233][ C3] ___preempt_schedule+0x16/0x18 [ 202.430233][ C3] ? __blk_mq_delay_run_hw_queue+0x565/0x600 [ 202.430233][ C3] __blk_mq_delay_run_hw_queue+0x56a/0x600 [ 202.430233][ C3] blk_mq_run_hw_queue+0x191/0x340 [ 202.430233][ C3] ? blk_mq_delay_run_hw_queue+0x30/0x30 [ 202.430233][ C3] ? dd_dispatch_request+0x8e0/0x8e0 [ 202.430233][ C3] blk_mq_sched_insert_requests+0x303/0x680 [ 202.430233][ C3] blk_mq_flush_plug_list+0x87a/0xd90 [ 202.430233][ C3] ? blk_mq_insert_requests+0x640/0x640 [ 202.430233][ C3] blk_flush_plug_list+0x349/0x520 [ 202.430233][ C3] ? fat_add_cluster+0x100/0x100 [ 202.430233][ C3] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 202.430233][ C3] ? blk_insert_cloned_request+0x530/0x530 [ 202.430233][ C3] ? put_pages_list+0x2c8/0x3e0 [ 202.430233][ C3] blk_finish_plug+0x58/0xa2 [ 202.430233][ C3] ? _fat_bmap+0x90/0x90 [ 202.430233][ C3] read_pages+0x125/0x610 [ 202.430233][ C3] ? read_cache_pages+0x740/0x740 [ 202.430233][ C3] ? __page_cache_alloc+0x116/0x490 [ 202.430233][ C3] ? __lock_acquire+0x8a0/0x4a00 [ 202.430233][ C3] ? lock_downgrade+0x920/0x920 [ 202.430233][ C3] __do_page_cache_readahead+0x4e0/0x5d0 [ 202.430233][ C3] ? read_pages+0x610/0x610 [ 202.430233][ C3] ondemand_readahead+0x55c/0xd30 [ 202.430233][ C3] page_cache_sync_readahead+0x27c/0x510 [ 202.430233][ C3] generic_file_read_iter+0x173a/0x2ac0 [ 202.430233][ C3] ? filemap_write_and_wait_range+0x1d0/0x1d0 [ 202.430233][ C3] ? trace_hardirqs_on+0x67/0x240 [ 202.430233][ C3] ? iter_file_splice_write+0x5a9/0xbe0 [ 202.430233][ C3] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.430233][ C3] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 202.430233][ C3] ? iov_iter_pipe+0xba/0x2f0 [ 202.430233][ C3] generic_file_splice_read+0x4af/0x800 [ 202.430233][ C3] ? add_to_pipe+0x350/0x350 [ 202.430233][ C3] ? rw_verify_area+0x126/0x360 [ 202.430233][ C3] ? add_to_pipe+0x350/0x350 [ 202.430233][ C3] do_splice_to+0x127/0x180 [ 202.430233][ C3] splice_direct_to_actor+0x2d2/0x970 [ 202.430233][ C3] ? generic_pipe_buf_nosteal+0x10/0x10 [ 202.430233][ C3] ? do_splice_to+0x180/0x180 [ 202.430233][ C3] ? rw_verify_area+0x126/0x360 [ 202.430233][ C3] do_splice_direct+0x1da/0x2a0 [ 202.430233][ C3] ? splice_direct_to_actor+0x970/0x970 [ 202.430233][ C3] ? rcu_read_lock_any_held+0xcd/0xf0 [ 202.430233][ C3] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.430233][ C3] ? __this_cpu_preempt_check+0x35/0x190 [ 202.430233][ C3] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.430233][ C3] ? __sb_start_write+0x1e5/0x460 [ 202.430233][ C3] do_sendfile+0x597/0xd00 [ 202.430233][ C3] ? do_compat_pwritev64+0x1c0/0x1c0 [ 202.430233][ C3] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 202.430233][ C3] ? put_timespec64+0xda/0x140 [ 202.430233][ C3] __x64_sys_sendfile64+0x1dd/0x220 [ 202.430233][ C3] ? __ia32_sys_sendfile+0x230/0x230 [ 202.430233][ C3] ? do_syscall_64+0x26/0x790 [ 202.430233][ C3] ? lockdep_hardirqs_on+0x421/0x5e0 [ 202.430233][ C3] ? trace_hardirqs_on+0x67/0x240 [ 202.430233][ C3] do_syscall_64+0xfa/0x790 [ 202.430233][ C3] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.430233][ C3] RIP: 0033:0x45a759 [ 202.430233][ C3] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 202.430233][ C3] RSP: 002b:00007fd7e7937c88 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 202.430233][ C3] RAX: ffffffffffffffda RBX: 000000000071bf00 RCX: 000000000045a759 [ 202.430233][ C3] RDX: 0000000000000000 RSI: 000000000000000a RDI: 0000000000000009 [ 202.430233][ C3] RBP: 0000000000000004 R08: 0000000000000000 R09: 0000000000000000 [ 202.430233][ C3] R10: 000000007fffffa7 R11: 0000000000000246 R12: 00007fd7e79386d4 [ 202.430233][ C3] R13: 00000000004af63f R14: 00000000006f2d90 R15: 00000000ffffffff