[ 68.105445][ T26] audit: type=1400 audit(1573398333.855:38): avc: denied { watch } for pid=9473 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 68.428868][ T26] audit: type=1800 audit(1573398334.215:39): pid=9383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 68.450703][ T26] audit: type=1800 audit(1573398334.225:40): pid=9383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 69.061637][ T26] audit: type=1400 audit(1573398334.845:41): avc: denied { map } for pid=9561 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.49' (ECDSA) to the list of known hosts. 2019/11/10 15:05:41 fuzzer started syzkaller login: [ 75.524522][ T26] audit: type=1400 audit(1573398341.315:42): avc: denied { map } for pid=9570 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/11/10 15:05:43 dialing manager at 10.128.0.26:46513 2019/11/10 15:05:43 syscalls: 2589 2019/11/10 15:05:43 code coverage: enabled 2019/11/10 15:05:43 comparison tracing: enabled 2019/11/10 15:05:43 extra coverage: extra coverage is not supported by the kernel 2019/11/10 15:05:43 setuid sandbox: enabled 2019/11/10 15:05:43 namespace sandbox: enabled 2019/11/10 15:05:43 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/10 15:05:43 fault injection: enabled 2019/11/10 15:05:43 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/10 15:05:43 net packet injection: enabled 2019/11/10 15:05:43 net device setup: enabled 2019/11/10 15:05:43 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/10 15:05:43 devlink PCI setup: PCI device 0000:00:10.0 is not available 15:08:50 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) prlimit64(r0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000100)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) ioctl$MON_IOCQ_RING_SIZE(r1, 0x9205) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast1}, r3}}, 0x48) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x0, {0x7, 0x9, "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", 0x9, 0x58, 0x1, 0x0, 0x1, 0x3f, 0x81}, r3}}, 0x128) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_IRQ_LINE(r5, 0x4008ae61, &(0x7f0000000000)={0x0, 0x10}) [ 264.470658][ T26] audit: type=1400 audit(1573398530.255:43): avc: denied { map } for pid=9585 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=105 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 15:08:50 executing program 1: mbind(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x3, &(0x7f0000000000)=0x7, 0x9, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000006000/0x4000)=nil) [ 264.696838][ T9586] IPVS: ftp: loaded support on port[0] = 21 [ 264.828212][ T9589] IPVS: ftp: loaded support on port[0] = 21 [ 264.841811][ T9586] chnl_net:caif_netlink_parms(): no params data found 15:08:50 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000240)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) syz_open_procfs(0x0, &(0x7f0000000200)='mountstats\x00') socket$kcm(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10031, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = userfaultfd(0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000140)={'bridge_slave_0\x00', &(0x7f00000001c0)=ANY=[@ANYRES16=r3]}) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 264.916345][ T9586] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.924927][ T9586] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.933644][ T9586] device bridge_slave_0 entered promiscuous mode [ 264.946669][ T9586] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.972172][ T9586] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.980224][ T9586] device bridge_slave_1 entered promiscuous mode [ 265.035093][ T9586] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 265.054972][ T9586] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 265.129695][ T9586] team0: Port device team_slave_0 added [ 265.165330][ T9586] team0: Port device team_slave_1 added 15:08:51 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000001d00810ee00f80ecdb4cb9e307f029a00d637003f7003efb0a00020003000f0000000f00060005000600", 0x2e}], 0x1}, 0x0) [ 265.193633][ T9589] chnl_net:caif_netlink_parms(): no params data found [ 265.217906][ T9592] IPVS: ftp: loaded support on port[0] = 21 [ 265.255492][ T9586] device hsr_slave_0 entered promiscuous mode [ 265.302577][ T9586] device hsr_slave_1 entered promiscuous mode 15:08:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000000)={'bond0\x00\x16\bIpK\f\x00\x06\x02\xff', @ifru_names='team0\x00'}) [ 265.496979][ T9594] IPVS: ftp: loaded support on port[0] = 21 [ 265.516068][ T9589] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.532221][ T9589] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.540389][ T9589] device bridge_slave_0 entered promiscuous mode [ 265.654704][ T9589] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.661863][ T9589] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.673233][ T9589] device bridge_slave_1 entered promiscuous mode [ 265.739531][ T9586] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.746819][ T9586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.754866][ T9586] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.761957][ T9586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.895028][ T2979] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.923732][ T2979] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.108299][ T9592] chnl_net:caif_netlink_parms(): no params data found [ 266.124219][ T9621] IPVS: ftp: loaded support on port[0] = 21 [ 266.164862][ T9589] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 266.231661][ T9589] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 266.321089][ T9589] team0: Port device team_slave_0 added [ 266.367241][ T9589] team0: Port device team_slave_1 added [ 266.418275][ T9586] 8021q: adding VLAN 0 to HW filter on device bond0 15:08:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, 0x0, &(0x7f00000001c0)=0x20b) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup2(r0, r2) dup3(r5, r1, 0x0) [ 266.545342][ T9589] device hsr_slave_0 entered promiscuous mode [ 266.572805][ T9589] device hsr_slave_1 entered promiscuous mode [ 266.602271][ T9589] debugfs: Directory 'hsr0' with parent '/' already present! [ 266.669655][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 266.693459][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.766826][ T9592] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.790483][ T9592] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.813318][ T9592] device bridge_slave_0 entered promiscuous mode [ 266.833287][ T9592] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.840366][ T9592] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.868127][ T9592] device bridge_slave_1 entered promiscuous mode [ 266.891424][ T9586] 8021q: adding VLAN 0 to HW filter on device team0 [ 266.973725][ T9625] IPVS: ftp: loaded support on port[0] = 21 [ 267.108687][ T9619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 267.155916][ T9619] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.222784][ T9619] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.229894][ T9619] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.284286][ T9592] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 267.327724][ T9594] chnl_net:caif_netlink_parms(): no params data found [ 267.388725][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 267.405954][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 267.445679][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.452838][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.497329][ T9592] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 267.550667][ T9621] chnl_net:caif_netlink_parms(): no params data found [ 267.654853][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 267.669632][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 267.766237][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 267.818508][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 267.843341][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 267.878906][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 267.917978][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 267.927226][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 267.988084][ T9594] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.008211][ T9594] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.033249][ T9594] device bridge_slave_0 entered promiscuous mode [ 268.053101][ T9594] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.060171][ T9594] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.096719][ T9594] device bridge_slave_1 entered promiscuous mode [ 268.159418][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 268.171376][ T9586] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 268.186741][ T9592] team0: Port device team_slave_0 added [ 268.231604][ T9621] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.240477][ T9621] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.249209][ T9621] device bridge_slave_0 entered promiscuous mode [ 268.258796][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 268.267467][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 268.277485][ T9592] team0: Port device team_slave_1 added [ 268.297538][ T9594] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 268.307374][ T9621] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.314758][ T9621] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.323037][ T9621] device bridge_slave_1 entered promiscuous mode [ 268.344933][ T9621] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 268.365626][ T9594] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 268.394459][ T9621] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 268.475595][ T9592] device hsr_slave_0 entered promiscuous mode [ 268.532852][ T9592] device hsr_slave_1 entered promiscuous mode [ 268.572554][ T9592] debugfs: Directory 'hsr0' with parent '/' already present! [ 268.586198][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 268.593930][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 268.603226][ T9594] team0: Port device team_slave_0 added [ 268.623431][ T9621] team0: Port device team_slave_0 added [ 268.640900][ T9586] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 268.649427][ T9594] team0: Port device team_slave_1 added [ 268.663709][ T9589] 8021q: adding VLAN 0 to HW filter on device bond0 [ 268.687183][ T9621] team0: Port device team_slave_1 added [ 268.740237][ T9589] 8021q: adding VLAN 0 to HW filter on device team0 [ 268.783450][ T9620] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.809845][ T9620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.877516][ T9594] device hsr_slave_0 entered promiscuous mode [ 268.915423][ T9594] device hsr_slave_1 entered promiscuous mode [ 268.954472][ T9594] debugfs: Directory 'hsr0' with parent '/' already present! [ 269.041021][ T9621] device hsr_slave_0 entered promiscuous mode [ 269.097969][ T9621] device hsr_slave_1 entered promiscuous mode [ 269.147885][ T9621] debugfs: Directory 'hsr0' with parent '/' already present! [ 269.165422][ T26] audit: type=1400 audit(1573398534.945:44): avc: denied { associate } for pid=9586 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 269.268330][ T9619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.289120][ T9619] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.327558][ T9619] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.334753][ T9619] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.367297][ T9619] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 269.392909][ T9619] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.427937][ T9619] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.435079][ T9619] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.472638][ T9619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 269.823074][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 269.833234][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 269.892069][ C0] hrtimer: interrupt took 46672 ns [ 269.946453][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 269.970576][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 270.004053][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 270.018133][ T9721] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 270.073693][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 270.114004][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 270.136478][ T9721] kasan: CONFIG_KASAN_INLINE enabled [ 270.152251][ T9721] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 270.153458][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 270.192313][ T9721] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 270.199321][ T9721] CPU: 1 PID: 9721 Comm: syz-executor.0 Not tainted 5.4.0-rc6+ #0 [ 270.207220][ T9721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.217303][ T9721] RIP: 0010:kvm_coalesced_mmio_init+0x67/0x120 [ 270.222651][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 270.223476][ T9721] Code: 00 48 01 c3 48 89 fa 48 b8 00 00 00 00 80 88 ff ff 48 c1 fb 06 48 c1 ea 03 48 c1 e3 0c 48 01 c3 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 9a 00 00 00 49 89 9c 24 d8 96 00 00 48 c7 c2 60 [ 270.250247][ T9721] RSP: 0018:ffff88805f4e7c08 EFLAGS: 00010286 [ 270.256325][ T9721] RAX: dffffc0000000000 RBX: ffff8880a7559000 RCX: ffffc90006399000 [ 270.264391][ T9721] RDX: 00000000000012db RSI: ffffffff8108569c RDI: 00000000000096d8 [ 270.272903][ T9721] RBP: ffff88805f4e7c18 R08: 0000000000000000 R09: ffffed1015d26b75 [ 270.281067][ T9721] R10: ffffed1015d26b74 R11: ffff8880ae935ba3 R12: 0000000000000000 [ 270.289055][ T9721] R13: dffffc0000000000 R14: ffffc90012c77000 R15: ffff888056920000 [ 270.297040][ T9721] FS: 00007f2f3a924700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 270.305978][ T9721] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 270.312566][ T9721] CR2: 0000000001461b38 CR3: 0000000094e96000 CR4: 00000000001406e0 [ 270.320543][ T9721] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 270.328524][ T9721] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 270.336499][ T9721] Call Trace: [ 270.339795][ T9721] kvm_dev_ioctl+0x81e/0x1610 [ 270.344494][ T9721] ? kvm_debugfs_release+0x90/0x90 [ 270.349787][ T9721] ? ___might_sleep+0x163/0x2c0 [ 270.354662][ T9721] ? kvm_debugfs_release+0x90/0x90 [ 270.359970][ T9721] do_vfs_ioctl+0xdb6/0x13e0 [ 270.364663][ T9721] ? ioctl_preallocate+0x210/0x210 [ 270.369785][ T9721] ? selinux_file_mprotect+0x620/0x620 [ 270.375251][ T9721] ? __fget+0x384/0x560 [ 270.379420][ T9721] ? ksys_dup3+0x3e0/0x3e0 [ 270.383850][ T9721] ? nsecs_to_jiffies+0x30/0x30 [ 270.388800][ T9721] ? tomoyo_file_ioctl+0x23/0x30 [ 270.393976][ T9721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.400405][ T9721] ? security_file_ioctl+0x8d/0xc0 [ 270.405527][ T9721] ksys_ioctl+0xab/0xd0 [ 270.409698][ T9721] __x64_sys_ioctl+0x73/0xb0 [ 270.414299][ T9721] do_syscall_64+0xfa/0x760 [ 270.418908][ T9721] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.425413][ T9721] RIP: 0033:0x45a219 [ 270.429317][ T9721] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.449093][ T9721] RSP: 002b:00007f2f3a923c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 270.457783][ T9721] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 270.466113][ T9721] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000005 [ 270.474178][ T9721] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 270.482161][ T9721] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f3a9246d4 [ 270.490141][ T9721] R13: 00000000004c348b R14: 00000000004d7708 R15: 00000000ffffffff [ 270.498206][ T9721] Modules linked in: [ 270.510247][ T9594] kobject: 'eth17' (00000000c3fdad46): kobject_add_internal: parent: 'net', set: 'devices' [ 270.563030][ T9594] kobject: 'eth17' (00000000c3fdad46): kobject_uevent_env [ 270.570259][ T9594] kobject: 'eth17' (00000000c3fdad46): fill_kobj_path: path = '/devices/netdevsim3/net/eth17' [ 270.632379][ T9594] kobject: 'queues' (00000000e3d5ac9a): kobject_add_internal: parent: 'eth17', set: '' [ 270.664473][ T9594] kobject: 'queues' (00000000e3d5ac9a): kobject_uevent_env [ 270.671812][ T9594] kobject: 'queues' (00000000e3d5ac9a): kobject_uevent_env: filter function caused the event to drop! [ 270.732886][ T9594] kobject: 'rx-0' (00000000b094c338): kobject_add_internal: parent: 'queues', set: 'queues' [ 270.769531][ T9594] kobject: 'rx-0' (00000000b094c338): kobject_uevent_env [ 270.784356][ T9721] ---[ end trace 38bad754045b06ea ]--- [ 270.791200][ T9721] RIP: 0010:kvm_coalesced_mmio_init+0x67/0x120 [ 270.804101][ T9594] kobject: 'rx-0' (00000000b094c338): fill_kobj_path: path = '/devices/netdevsim3/net/eth17/queues/rx-0' [ 270.833250][ T9721] Code: 00 48 01 c3 48 89 fa 48 b8 00 00 00 00 80 88 ff ff 48 c1 fb 06 48 c1 ea 03 48 c1 e3 0c 48 01 c3 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 9a 00 00 00 49 89 9c 24 d8 96 00 00 48 c7 c2 60 [ 270.862735][ T9594] kobject: 'tx-0' (00000000d01df618): kobject_add_internal: parent: 'queues', set: 'queues' [ 270.882515][ T9594] kobject: 'tx-0' (00000000d01df618): kobject_uevent_env [ 270.889620][ T9594] kobject: 'tx-0' (00000000d01df618): fill_kobj_path: path = '/devices/netdevsim3/net/eth17/queues/tx-0' [ 270.903366][ T9721] RSP: 0018:ffff88805f4e7c08 EFLAGS: 00010286 [ 270.916006][ T9721] RAX: dffffc0000000000 RBX: ffff8880a7559000 RCX: ffffc90006399000 [ 270.935722][ T9594] kobject: 'batman_adv' (0000000091992cad): kobject_add_internal: parent: 'eth17', set: '' [ 270.947667][ T9721] RDX: 00000000000012db RSI: ffffffff8108569c RDI: 00000000000096d8 [ 270.956884][ T9721] RBP: ffff88805f4e7c18 R08: 0000000000000000 R09: ffffed1015d26b75 [ 270.983838][ T9594] kobject: 'eth18' (00000000e5eb0bf5): kobject_add_internal: parent: 'net', set: 'devices' [ 270.992133][ T9721] R10: ffffed1015d26b74 R11: ffff8880ae935ba3 R12: 0000000000000000 [ 271.001990][ T9721] R13: dffffc0000000000 R14: ffffc90012c77000 R15: ffff888056920000 [ 271.012908][ T9594] kobject: 'eth18' (00000000e5eb0bf5): kobject_uevent_env [ 271.020162][ T9594] kobject: 'eth18' (00000000e5eb0bf5): fill_kobj_path: path = '/devices/netdevsim3/net/eth18' [ 271.030607][ T9721] FS: 00007f2f3a924700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 271.054513][ T9721] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 271.061212][ T9721] CR2: 00007f135adb71b0 CR3: 0000000094e96000 CR4: 00000000001406f0 [ 271.062315][ T9594] kobject: 'queues' (0000000063dcc011): kobject_add_internal: parent: 'eth18', set: '' [ 271.084134][ T9721] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 271.104843][ T9721] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 271.130259][ T9594] kobject: 'queues' (0000000063dcc011): kobject_uevent_env [ 271.132312][ T9721] Kernel panic - not syncing: Fatal exception [ 271.145032][ T9721] Kernel Offset: disabled [ 271.149355][ T9721] Rebooting in 86400 seconds..