Warning: Permanently added '[localhost]:34035' (ECDSA) to the list of known hosts. 2019/11/29 10:31:35 fuzzer started [ 67.756908][ T38] audit: type=1400 audit(1575023495.381:42): avc: denied { map } for pid=7807 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16525 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2019/11/29 10:31:40 dialing manager at 10.0.2.10:46599 2019/11/29 10:31:40 syscalls: 2543 2019/11/29 10:31:40 code coverage: enabled 2019/11/29 10:31:40 comparison tracing: enabled 2019/11/29 10:31:40 extra coverage: extra coverage is not supported by the kernel 2019/11/29 10:31:40 setuid sandbox: enabled 2019/11/29 10:31:40 namespace sandbox: enabled 2019/11/29 10:31:40 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/29 10:31:40 fault injection: enabled 2019/11/29 10:31:40 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/29 10:31:40 net packet injection: enabled 2019/11/29 10:31:40 net device setup: enabled 2019/11/29 10:31:40 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/29 10:31:40 devlink PCI setup: PCI device 0000:00:10.0 is not available 10:31:54 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip6_flowlabel\x00') read$FUSE(r0, 0x0, 0x0) [ 87.121141][ T38] audit: type=1400 audit(1575023514.741:43): avc: denied { map } for pid=7827 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=17735 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 10:31:54 executing program 1: socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x288}], 0x1000014, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x90) write(r3, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000240)={&(0x7f0000000040)="f30fbc7a00d918c4e3adcf660100c4e1f8162bc4c27d178500000100c4e25d8c61d7662e65f30f7e10660f3804fdc4c1a973d30a8fe878c10bfe", {0x7}, 0x0, &(0x7f0000000080)="670f01fbc4c1515f1ff3d8e50f0feca7f20f5a802e72f47ec4e18855ba7e306f202e67660fe5c7c4e279134a00c4c17df2efc4c21192b41900000100"}, 0x0, 0x8, &(0x7f0000000280)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000500)={0x2, &(0x7f00000004c0)=[{0x0, 0x0, 0x7, 0x4}, {0x1, 0x40, 0x5, 0x40}]}, 0x8) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r6, 0x891a, &(0x7f0000000300)={'ip_vti0\x00', {0x2, 0x4e20, @remote}}) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f00000003c0)=@nfc, &(0x7f00000002c0)=0x80, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) sendfile(r3, r4, 0x0, 0x7fffffa7) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000400)={0x0, 0xffffffffffffff94, &(0x7f0000000380)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="18001800000038d1"], 0x48}}, 0x0) [ 87.289634][ T7828] IPVS: ftp: loaded support on port[0] = 21 [ 87.334984][ T7830] IPVS: ftp: loaded support on port[0] = 21 [ 87.384126][ T7828] chnl_net:caif_netlink_parms(): no params data found 10:31:55 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xffffffffffffff18, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) r0 = socket(0x11, 0x800000003, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000001c0)={@multicast1, @multicast2}, &(0x7f0000000200)=0xc) r2 = epoll_create1(0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000001c0)={@multicast1, @multicast2}, &(0x7f0000000200)=0xc) sendmsg$nl_route_sched(r3, &(0x7f0000000600)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040000}, 0x4) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f00000001c0)=0x2) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = socket(0x10, 0x80002, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x80000, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff00000000000000000100000000ffffff81000004800000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 87.431553][ T7828] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.440406][ T7828] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.450416][ T7828] device bridge_slave_0 entered promiscuous mode [ 87.460322][ T7828] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.468473][ T7828] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.479267][ T7828] device bridge_slave_1 entered promiscuous mode [ 87.496872][ T7828] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.509860][ T7828] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.533965][ T7828] team0: Port device team_slave_0 added [ 87.544732][ T7828] team0: Port device team_slave_1 added [ 87.553873][ T7833] IPVS: ftp: loaded support on port[0] = 21 10:31:55 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/psched\x00') close(r0) [ 87.684453][ T7828] device hsr_slave_0 entered promiscuous mode 10:31:55 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x7, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) [ 87.732590][ T7828] device hsr_slave_1 entered promiscuous mode [ 87.835229][ T7830] chnl_net:caif_netlink_parms(): no params data found [ 87.857625][ T7837] IPVS: ftp: loaded support on port[0] = 21 10:31:55 executing program 5: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000340)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @initdev}, &(0x7f0000000180)=0x10, 0x80000) fstat(r1, &(0x7f0000000740)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x400000000081}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r6, &(0x7f0000000380)="13ba0e6d24ef4d953069273a07078fec25a554c13414ec361e56b277cd523df88978fc44bdce393183cf732f102df6c17586442a07d7b7869efdb51a8ee85d63af031c7f636a3438b5ee0eb8f8025cc5ef2813d8a23ae1ba27e252345d6b1dd1c608781d58dcd9cddb02", 0x6a, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0xffffffff}, 0x1c) [ 87.867454][ T7839] IPVS: ftp: loaded support on port[0] = 21 [ 87.916262][ T7830] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.924808][ T7830] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.934036][ T7830] device bridge_slave_0 entered promiscuous mode [ 87.952950][ T38] audit: type=1400 audit(1575023515.571:44): avc: denied { create } for pid=7828 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 87.977869][ T38] audit: type=1400 audit(1575023515.581:45): avc: denied { write } for pid=7828 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 88.002502][ T38] audit: type=1400 audit(1575023515.581:46): avc: denied { read } for pid=7828 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 88.027852][ T7830] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.036589][ T7830] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.044458][ T7830] device bridge_slave_1 entered promiscuous mode [ 88.066148][ T7828] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 88.144754][ T7828] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 88.195161][ T7828] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 88.256950][ T7828] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 88.371656][ T7830] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.384713][ T7842] IPVS: ftp: loaded support on port[0] = 21 [ 88.411691][ T7830] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.452868][ T7830] team0: Port device team_slave_0 added [ 88.488039][ T7830] team0: Port device team_slave_1 added [ 88.510476][ T7833] chnl_net:caif_netlink_parms(): no params data found [ 88.584973][ T7830] device hsr_slave_0 entered promiscuous mode [ 88.642406][ T7830] device hsr_slave_1 entered promiscuous mode [ 88.712156][ T7830] debugfs: Directory 'hsr0' with parent '/' already present! [ 88.791127][ T7837] chnl_net:caif_netlink_parms(): no params data found [ 88.835562][ T7839] chnl_net:caif_netlink_parms(): no params data found [ 88.899529][ T7833] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.908224][ T7833] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.916250][ T7833] device bridge_slave_0 entered promiscuous mode [ 88.927072][ T7833] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.934810][ T7833] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.942535][ T7833] device bridge_slave_1 entered promiscuous mode [ 88.965276][ T7830] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 89.047287][ T7830] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 89.113671][ T7842] chnl_net:caif_netlink_parms(): no params data found [ 89.122156][ T7830] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 89.179220][ T7833] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 89.191312][ T7833] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 89.208341][ T7837] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.215643][ T7837] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.223636][ T7837] device bridge_slave_0 entered promiscuous mode [ 89.230947][ T7830] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 89.283999][ T7839] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.291833][ T7839] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.301182][ T7839] device bridge_slave_0 entered promiscuous mode [ 89.310547][ T7839] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.318676][ T7839] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.327354][ T7839] device bridge_slave_1 entered promiscuous mode [ 89.347254][ T7833] team0: Port device team_slave_0 added [ 89.356014][ T7837] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.363434][ T7837] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.371324][ T7837] device bridge_slave_1 entered promiscuous mode [ 89.396652][ T7833] team0: Port device team_slave_1 added [ 89.413706][ T7839] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 89.431286][ T7837] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 89.443151][ T7837] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 89.457002][ T7839] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 89.498221][ T7842] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.506059][ T7842] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.514729][ T7842] device bridge_slave_0 entered promiscuous mode [ 89.523315][ T7842] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.531200][ T7842] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.539971][ T7842] device bridge_slave_1 entered promiscuous mode [ 89.556970][ T7837] team0: Port device team_slave_0 added [ 89.579459][ T7839] team0: Port device team_slave_0 added [ 89.586583][ T7842] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 89.599798][ T7837] team0: Port device team_slave_1 added [ 89.654667][ T7833] device hsr_slave_0 entered promiscuous mode [ 89.712308][ T7833] device hsr_slave_1 entered promiscuous mode [ 89.752183][ T7833] debugfs: Directory 'hsr0' with parent '/' already present! [ 89.763605][ T7839] team0: Port device team_slave_1 added [ 89.771665][ T7842] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 89.806713][ T7828] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.864100][ T7839] device hsr_slave_0 entered promiscuous mode [ 89.912638][ T7839] device hsr_slave_1 entered promiscuous mode [ 89.982186][ T7839] debugfs: Directory 'hsr0' with parent '/' already present! [ 89.991141][ T7842] team0: Port device team_slave_0 added [ 90.044102][ T7837] device hsr_slave_0 entered promiscuous mode [ 90.102455][ T7837] device hsr_slave_1 entered promiscuous mode [ 90.182264][ T7837] debugfs: Directory 'hsr0' with parent '/' already present! [ 90.208802][ T7828] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.219798][ T7842] team0: Port device team_slave_1 added [ 90.235549][ T7833] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 90.313801][ T7833] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 90.397333][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.406003][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.413772][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 90.423196][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.431983][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.439375][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.447627][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 90.463880][ T7833] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 90.544775][ T7833] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 90.630871][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.640485][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.650465][ T7850] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.658671][ T7850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.688133][ T7837] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 90.733392][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 90.817781][ T7842] device hsr_slave_0 entered promiscuous mode [ 90.902314][ T7842] device hsr_slave_1 entered promiscuous mode [ 90.962184][ T7842] debugfs: Directory 'hsr0' with parent '/' already present! [ 90.971509][ T7839] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 91.056514][ T7837] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 91.133727][ T7837] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 91.173784][ T7837] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 91.213500][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 91.228501][ T7830] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.236048][ T7839] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 91.304076][ T7839] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 91.343616][ T7839] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 91.409596][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 91.419354][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.431625][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.455985][ T7842] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 91.513313][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.522729][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.539873][ T7842] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 91.606205][ T7842] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 91.683486][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.691593][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.699995][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 91.707723][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 91.714911][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.723235][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.750866][ T7842] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 91.827370][ T7830] 8021q: adding VLAN 0 to HW filter on device team0 [ 91.836117][ T7828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.868078][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 91.876918][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 91.885211][ T3233] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.892402][ T3233] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.899987][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.929606][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 91.937946][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.947161][ T7841] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.954212][ T7841] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.963660][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 91.971327][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 91.985707][ T7839] 8021q: adding VLAN 0 to HW filter on device bond0 [ 92.001071][ T7833] 8021q: adding VLAN 0 to HW filter on device bond0 [ 92.011193][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 92.020665][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 92.029808][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 92.039093][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 92.047737][ T7841] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 92.068836][ T7828] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 92.086504][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 92.095053][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 92.106532][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.114674][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.124428][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 92.132813][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.149501][ T7839] 8021q: adding VLAN 0 to HW filter on device team0 [ 92.161460][ T38] audit: type=1400 audit(1575023519.781:47): avc: denied { associate } for pid=7828 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 92.177359][ T7837] 8021q: adding VLAN 0 to HW filter on device bond0 [ 92.198098][ T7830] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 92.209658][ T7830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 92.218155][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 92.226551][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.234910][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.243334][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.266323][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.275157][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.294483][ T409] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.301621][ T409] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.309952][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 10:31:59 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip6_flowlabel\x00') read$FUSE(r0, 0x0, 0x0) [ 92.320649][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.329808][ T409] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.337105][ T409] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.346037][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 92.354739][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 10:31:59 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip6_flowlabel\x00') read$FUSE(r0, 0x0, 0x0) [ 92.366140][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 92.379922][ T7833] 8021q: adding VLAN 0 to HW filter on device team0 [ 92.397354][ T7842] 8021q: adding VLAN 0 to HW filter on device bond0 [ 92.408057][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 10:32:00 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip6_flowlabel\x00') read$FUSE(r0, 0x0, 0x0) [ 92.417293][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 92.426990][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 92.442295][ T7830] 8021q: adding VLAN 0 to HW filter on device batadv0 10:32:00 executing program 0: read$FUSE(0xffffffffffffffff, 0x0, 0x0) [ 92.459593][ T7837] 8021q: adding VLAN 0 to HW filter on device team0 [ 92.476322][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 92.484795][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 92.492653][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 10:32:00 executing program 0: read$FUSE(0xffffffffffffffff, 0x0, 0x0) [ 92.509728][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 92.518739][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.526727][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.534566][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 10:32:00 executing program 0: read$FUSE(0xffffffffffffffff, 0x0, 0x0) [ 92.552360][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 10:32:00 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) read$FUSE(r0, 0x0, 0x0) [ 92.560880][ T3233] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.568513][ T3233] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.576786][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 92.585105][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.593644][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.602139][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.609923][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 92.620273][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.629141][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 92.639922][ T7842] 8021q: adding VLAN 0 to HW filter on device team0 [ 92.662634][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.671559][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.680375][ T7852] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.688150][ T7852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.697225][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.708322][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.717058][ T7852] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.724278][ T7852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.731728][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.740656][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.749104][ T7852] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.756175][ T7852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.764364][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 92.773766][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 92.802775][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 92.833637][ T3743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 92.841857][ T3743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.852525][ T3743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.860680][ T38] audit: type=1800 audit(1575023520.481:48): pid=7882 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=22 res=0 [ 92.861770][ T3743] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.884101][ T38] audit: type=1804 audit(1575023520.481:49): pid=7882 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir485685474/syzkaller.9lqMb4/0/file0/file0" dev="loop1" ino=22 res=1 [ 92.890480][ T3743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.891485][ T3743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 92.916859][ C3] protocol 88fb is buggy, dev hsr_slave_0 [ 92.916977][ C3] protocol 88fb is buggy, dev hsr_slave_1 [ 92.919247][ T38] audit: type=1400 audit(1575023520.541:50): avc: denied { open } for pid=7881 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 92.926935][ T3743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.934115][ T38] audit: type=1400 audit(1575023520.541:51): avc: denied { kernel } for pid=7881 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 93.002346][ T3743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 93.010774][ T3743] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.017983][ T3743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.022130][ C3] protocol 88fb is buggy, dev hsr_slave_0 [ 93.024495][ T7886] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 93.024530][ T7886] FAT-fs (loop1): Filesystem has been set read-only [ 93.025292][ T7886] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) [ 93.035808][ T7837] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 93.041223][ C3] protocol 88fb is buggy, dev hsr_slave_1 [ 93.048985][ T7837] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 93.095142][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 93.103090][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 93.111805][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 93.121502][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 93.131068][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 93.140166][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 93.148653][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.156995][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.162089][ C3] protocol 88fb is buggy, dev hsr_slave_0 [ 93.165415][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.170386][ C3] protocol 88fb is buggy, dev hsr_slave_1 [ 93.178355][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.191830][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 93.200221][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 93.208879][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 93.216751][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 93.225353][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 93.233900][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.241932][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.250107][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 93.257650][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 93.264865][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 93.279982][ T7839] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 93.292020][ C3] protocol 88fb is buggy, dev hsr_slave_0 [ 93.297454][ C3] protocol 88fb is buggy, dev hsr_slave_1 [ 93.304230][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 93.311495][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 93.327371][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 93.338773][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 93.346986][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 93.360262][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 93.369014][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 93.388743][ T7837] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 93.398340][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 93.406050][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.414358][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 10:32:01 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) read$FUSE(r0, 0x0, 0x0) [ 93.430427][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 93.438525][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 93.448677][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 93.463359][ T272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.471732][ T272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.494046][ T7842] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 93.505391][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 93.516891][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.525155][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.546164][ T7842] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 93.555348][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 93.564996][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 93.575122][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 93.584790][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 93.598082][ T7833] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 93.674568][ T7919] devpts: called with bogus options [ 93.815773][ T7922] loop2: p1 p2 p3 [ 93.952011][ C2] hrtimer: interrupt took 25804 ns [ 94.074612][ T7915] loop2: p1 p2 p3 10:32:01 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/psched\x00') close(r0) 10:32:01 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) read$FUSE(r0, 0x0, 0x0) 10:32:01 executing program 1: socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x288}], 0x1000014, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x90) write(r3, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000240)={&(0x7f0000000040)="f30fbc7a00d918c4e3adcf660100c4e1f8162bc4c27d178500000100c4e25d8c61d7662e65f30f7e10660f3804fdc4c1a973d30a8fe878c10bfe", {0x7}, 0x0, &(0x7f0000000080)="670f01fbc4c1515f1ff3d8e50f0feca7f20f5a802e72f47ec4e18855ba7e306f202e67660fe5c7c4e279134a00c4c17df2efc4c21192b41900000100"}, 0x0, 0x8, &(0x7f0000000280)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000500)={0x2, &(0x7f00000004c0)=[{0x0, 0x0, 0x7, 0x4}, {0x1, 0x40, 0x5, 0x40}]}, 0x8) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r6, 0x891a, &(0x7f0000000300)={'ip_vti0\x00', {0x2, 0x4e20, @remote}}) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f00000003c0)=@nfc, &(0x7f00000002c0)=0x80, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) sendfile(r3, r4, 0x0, 0x7fffffa7) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000400)={0x0, 0xffffffffffffff94, &(0x7f0000000380)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="18001800000038d1"], 0x48}}, 0x0) 10:32:01 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x7, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 10:32:01 executing program 5: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000340)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @initdev}, &(0x7f0000000180)=0x10, 0x80000) fstat(r1, &(0x7f0000000740)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x400000000081}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r6, &(0x7f0000000380)="13ba0e6d24ef4d953069273a07078fec25a554c13414ec361e56b277cd523df88978fc44bdce393183cf732f102df6c17586442a07d7b7869efdb51a8ee85d63af031c7f636a3438b5ee0eb8f8025cc5ef2813d8a23ae1ba27e252345d6b1dd1c608781d58dcd9cddb02", 0x6a, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0xffffffff}, 0x1c) 10:32:01 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xffffffffffffff18, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) r0 = socket(0x11, 0x800000003, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000001c0)={@multicast1, @multicast2}, &(0x7f0000000200)=0xc) r2 = epoll_create1(0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000001c0)={@multicast1, @multicast2}, &(0x7f0000000200)=0xc) sendmsg$nl_route_sched(r3, &(0x7f0000000600)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040000}, 0x4) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f00000001c0)=0x2) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = socket(0x10, 0x80002, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x80000, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff00000000000000000100000000ffffff81000004800000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 94.116997][ T7942] devpts: called with bogus options 10:32:01 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x7, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 10:32:01 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xffffffffffffff18, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) r0 = socket(0x11, 0x800000003, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000001c0)={@multicast1, @multicast2}, &(0x7f0000000200)=0xc) r2 = epoll_create1(0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000001c0)={@multicast1, @multicast2}, &(0x7f0000000200)=0xc) sendmsg$nl_route_sched(r3, &(0x7f0000000600)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040000}, 0x4) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f00000001c0)=0x2) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = socket(0x10, 0x80002, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x80000, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff00000000000000000100000000ffffff81000004800000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 10:32:01 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip6_flowlabel\x00') read$FUSE(0xffffffffffffffff, 0x0, 0x0) 10:32:01 executing program 5: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000340)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @initdev}, &(0x7f0000000180)=0x10, 0x80000) fstat(r1, &(0x7f0000000740)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x400000000081}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r6, &(0x7f0000000380)="13ba0e6d24ef4d953069273a07078fec25a554c13414ec361e56b277cd523df88978fc44bdce393183cf732f102df6c17586442a07d7b7869efdb51a8ee85d63af031c7f636a3438b5ee0eb8f8025cc5ef2813d8a23ae1ba27e252345d6b1dd1c608781d58dcd9cddb02", 0x6a, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0xffffffff}, 0x1c) [ 94.152185][ T38] audit: type=1800 audit(1575023521.771:52): pid=7944 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16567 res=0 [ 94.179866][ T38] audit: type=1804 audit(1575023521.801:53): pid=7944 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir485685474/syzkaller.9lqMb4/1/file0" dev="sda1" ino=16567 res=1 [ 94.261888][ T7952] devpts: called with bogus options 10:32:01 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip6_flowlabel\x00') read$FUSE(0xffffffffffffffff, 0x0, 0x0) 10:32:01 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x7, &(0x7f0000000080)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "9d92ded5ecadbc02"}, 0x10}}, 0x0) 10:32:01 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip6_flowlabel\x00') read$FUSE(0xffffffffffffffff, 0x0, 0x0) [ 94.392549][ C3] protocol 88fb is buggy, dev hsr_slave_0 [ 94.399261][ C3] protocol 88fb is buggy, dev hsr_slave_1 [ 200.061968][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 200.061968][ C0] rcu: 0-....: (1 GPs behind) idle=87a/1/0x4000000000000004 softirq=7484/7486 fqs=4645 [ 200.061968][ C0] (t=10502 jiffies g=5709 q=2384) [ 200.061968][ C0] NMI backtrace for cpu 0 [ 200.061968][ C0] CPU: 0 PID: 7975 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 200.091692][ C0] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 200.091692][ C0] Call Trace: [ 200.091692][ C0] [ 200.091692][ C0] dump_stack+0x197/0x210 [ 200.091692][ C0] nmi_cpu_backtrace.cold+0x70/0xb2 [ 200.091692][ C0] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 200.091692][ C0] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 200.091692][ C0] arch_trigger_cpumask_backtrace+0x14/0x20 [ 200.091692][ C0] rcu_dump_cpu_stacks+0x183/0x1cf [ 200.091692][ C0] ? find_next_bit+0x107/0x130 [ 200.091692][ C0] rcu_sched_clock_irq.cold+0x509/0xc02 [ 200.091692][ C0] ? raise_softirq+0x138/0x340 [ 200.091692][ C0] update_process_times+0x2d/0x70 [ 200.091692][ C0] tick_sched_handle+0xa2/0x190 [ 200.091692][ C0] tick_sched_timer+0x53/0x140 [ 200.091692][ C0] __hrtimer_run_queues+0x364/0xe40 [ 200.091692][ C0] ? tick_sched_do_timer+0x1b0/0x1b0 [ 200.091692][ C0] ? hrtimer_init+0x330/0x330 [ 200.091692][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 200.091692][ C0] ? ktime_get_update_offsets_now+0x2ce/0x430 [ 200.091692][ C0] hrtimer_interrupt+0x314/0x770 [ 200.091692][ C0] smp_apic_timer_interrupt+0x160/0x610 [ 200.091692][ C0] apic_timer_interrupt+0xf/0x20 [ 200.091692][ C0] RIP: 0010:__module_address+0x0/0x340 [ 200.091692][ C0] Code: 0f 0b 0f 0b e8 21 c2 47 00 eb cf e8 1a c2 47 00 eb 97 e8 33 c2 47 00 e9 57 ff ff ff 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 <48> 39 3d 51 91 96 07 0f 87 7e 02 00 00 55 48 89 e5 41 57 41 56 49 [ 200.091692][ C0] RSP: 0018:ffff88802d6091e0 EFLAGS: 00000296 ORIG_RAX: ffffffffffffff13 [ 200.091692][ C0] RAX: 0000000000000302 RBX: 0000000000000000 RCX: 1ffffffff15a529c [ 200.091692][ C0] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000000 [ 200.091692][ C0] RBP: ffff88802d609200 R08: 1ffff11005ac7044 R09: ffffed1005ac7045 [ 200.091692][ C0] R10: ffffed1005ac7044 R11: ffff88802d638223 R12: 0000000000000000 [ 200.091692][ C0] R13: 0000000000000000 R14: ffff888011a601c0 R15: ffff88802d000c40 [ 200.091692][ C0] ? apic_timer_interrupt+0xa/0x20 [ 200.091692][ C0] ? __module_text_address+0x13/0x150 [ 200.091692][ C0] ? rcu_dynticks_curr_cpu_in_eqs+0x54/0xb0 [ 200.091692][ C0] is_module_text_address+0x1b/0x4a [ 200.091692][ C0] kernel_text_address+0x67/0xf0 [ 200.091692][ C0] __kernel_text_address+0xd/0x40 [ 200.091692][ C0] unwind_get_return_address+0x61/0xa0 [ 200.091692][ C0] ? profile_setup.cold+0xbb/0xbb [ 200.091692][ C0] arch_stack_walk+0x97/0xf0 [ 200.091692][ C0] stack_trace_save+0xac/0xe0 [ 200.091692][ C0] ? stack_trace_consume_entry+0x190/0x190 [ 200.091692][ C0] ? __kasan_check_write+0x14/0x20 [ 200.091692][ C0] ? pvclock_clocksource_read+0x2c6/0x4d0 [ 200.091692][ C0] ? trace_hardirqs_off+0x62/0x240 [ 200.091692][ C0] save_stack+0x23/0x90 [ 200.091692][ C0] ? save_stack+0x23/0x90 [ 200.091692][ C0] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 200.091692][ C0] ? kasan_slab_alloc+0xf/0x20 [ 200.091692][ C0] ? __kmalloc+0x14c/0x770 [ 200.091692][ C0] ? ___neigh_create+0x1312/0x2560 [ 200.091692][ C0] ? __neigh_create+0x2f/0x40 [ 200.091692][ C0] ? ip6_finish_output2+0x94f/0x25c0 [ 200.091692][ C0] ? __ip6_finish_output+0x444/0xaa0 [ 200.091692][ C0] ? ip6_finish_output+0x38/0x1f0 [ 200.091692][ C0] ? ip6_output+0x25e/0x880 [ 200.091692][ C0] ? ndisc_send_skb+0xf1f/0x1490 [ 200.091692][ C0] ? ndisc_send_rs+0x134/0x720 [ 200.091692][ C0] ? addrconf_rs_timer+0x30f/0x6e0 [ 200.091692][ C0] ? call_timer_fn+0x1ac/0x780 [ 200.091692][ C0] ? run_timer_softirq+0x6c3/0x1790 [ 200.091692][ C0] ? __do_softirq+0x262/0x98c [ 200.091692][ C0] ? irq_exit+0x19b/0x1e0 [ 200.091692][ C0] ? smp_apic_timer_interrupt+0x1a3/0x610 [ 200.091692][ C0] ? apic_timer_interrupt+0xf/0x20 [ 200.091692][ C0] ? generic_exec_single+0x33a/0x4c0 [ 200.091692][ C0] ? smp_call_function_single+0x17c/0x480 [ 200.091692][ C0] ? task_function_call+0xe9/0x180 [ 200.091692][ C0] ? perf_install_in_context+0x308/0x5a0 [ 200.091692][ C0] ? __do_sys_perf_event_open+0x1cbc/0x2c70 [ 200.091692][ C0] ? __x64_sys_perf_event_open+0xbe/0x150 [ 200.091692][ C0] ? do_syscall_64+0xfa/0x790 [ 200.091692][ C0] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.091692][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 200.091692][ C0] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 200.091692][ C0] ? retint_kernel+0x2b/0x2b [ 200.091692][ C0] ? trace_hardirqs_on_caller+0x6a/0x240 [ 200.091692][ C0] ? __kasan_check_read+0x11/0x20 [ 200.091692][ C0] ? mark_lock+0xc2/0x1220 [ 200.091692][ C0] ? should_fail+0x1de/0x852 [ 200.091692][ C0] ? mark_held_locks+0xa4/0xf0 [ 200.091692][ C0] ? __kmalloc+0x2a4/0x770 [ 200.091692][ C0] ? ___neigh_create+0x1312/0x2560 [ 200.091692][ C0] ? __kmalloc+0x2a4/0x770 [ 200.091692][ C0] ? kasan_unpoison_shadow+0x35/0x50 [ 200.091692][ C0] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 200.091692][ C0] kasan_slab_alloc+0xf/0x20 [ 200.091692][ C0] __kmalloc+0x14c/0x770 [ 200.091692][ C0] ? ip6t_do_table+0xdb3/0x1cc0 [ 200.091692][ C0] ? __local_bh_enable_ip+0x15a/0x270 [ 200.091692][ C0] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 200.091692][ C0] ? ___neigh_create+0x1312/0x2560 [ 200.091692][ C0] ___neigh_create+0x1312/0x2560 [ 200.091692][ C0] ? mark_held_locks+0xf0/0xf0 [ 200.091692][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.091692][ C0] ? debug_smp_processor_id+0x33/0x18a [ 200.091692][ C0] ? rcu_read_lock_held_common+0xa0/0x130 [ 200.091692][ C0] __neigh_create+0x2f/0x40 [ 200.091692][ C0] ip6_finish_output2+0x94f/0x25c0 [ 200.091692][ C0] ? ip6_mtu+0x2e6/0x450 [ 200.091692][ C0] ? ip6_frag_next+0xb20/0xb20 [ 200.091692][ C0] ? lock_downgrade+0x920/0x920 [ 200.091692][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 200.091692][ C0] ? __kasan_check_read+0x11/0x20 [ 200.091692][ C0] __ip6_finish_output+0x444/0xaa0 [ 200.091692][ C0] ? __ip6_finish_output+0x444/0xaa0 [ 200.091692][ C0] ip6_finish_output+0x38/0x1f0 [ 200.091692][ C0] ip6_output+0x25e/0x880 [ 200.091692][ C0] ? ip6_finish_output+0x1f0/0x1f0 [ 200.091692][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 200.091692][ C0] ? __ip6_finish_output+0xaa0/0xaa0 [ 200.091692][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 200.091692][ C0] ndisc_send_skb+0xf1f/0x1490 [ 200.091692][ C0] ? nf_hook.constprop.0+0x560/0x560 [ 200.091692][ C0] ? memcpy+0x46/0x50 [ 200.091692][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.091692][ C0] ndisc_send_rs+0x134/0x720 [ 200.091692][ C0] addrconf_rs_timer+0x30f/0x6e0 [ 200.091692][ C0] ? ipv6_get_lladdr+0x490/0x490 [ 200.091692][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 200.091692][ C0] call_timer_fn+0x1ac/0x780 [ 200.091692][ C0] ? ipv6_get_lladdr+0x490/0x490 [ 200.091692][ C0] ? msleep_interruptible+0x150/0x150 [ 200.091692][ C0] ? run_timer_softirq+0x6b1/0x1790 [ 200.091692][ C0] ? trace_hardirqs_on+0x67/0x240 [ 200.091692][ C0] ? ipv6_get_lladdr+0x490/0x490 [ 200.091692][ C0] ? ipv6_get_lladdr+0x490/0x490 [ 200.091692][ C0] run_timer_softirq+0x6c3/0x1790 [ 200.091692][ C0] ? add_timer+0x930/0x930 [ 200.091692][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 200.091692][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 200.091692][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 200.091692][ C0] __do_softirq+0x262/0x98c [ 200.091692][ C0] ? sched_clock_cpu+0x14e/0x1b0 [ 200.091692][ C0] irq_exit+0x19b/0x1e0 [ 200.091692][ C0] smp_apic_timer_interrupt+0x1a3/0x610 [ 200.091692][ C0] apic_timer_interrupt+0xf/0x20 [ 200.091692][ C0] [ 200.091692][ C0] RIP: 0010:generic_exec_single+0x33a/0x4c0 [ 200.091692][ C0] Code: 00 fc ff df 48 c1 e8 03 80 3c 10 00 0f 85 68 01 00 00 48 83 3d 2e 81 a9 07 00 0f 84 e0 00 00 00 e8 eb 2a 0b 00 48 89 df 57 9d <0f> 1f 44 00 00 45 31 ed e9 39 fe ff ff e8 d4 2a 0b 00 0f 0b e9 23 [ 200.091692][ C0] RSP: 0018:ffff8880107b7a80 EFLAGS: 00000212 ORIG_RAX: ffffffffffffff13 [ 200.091692][ C0] RAX: 0000000000040000 RBX: 0000000000000212 RCX: ffffc9001189b000 [ 200.091692][ C0] RDX: 0000000000000769 RSI: ffffffff8169b335 RDI: 0000000000000212 [ 200.091692][ C0] RBP: ffff8880107b7ab0 R08: 1ffffffff15377bb R09: fffffbfff15377bc [ 200.091692][ C0] R10: fffffbfff15377bb R11: ffffffff8a9bbddf R12: 0000000000000200 [ 200.091692][ C0] R13: ffff8880107b7b00 R14: ffff8880107b7bd0 R15: ffffffff818bd170 [ 200.091692][ C0] ? perf_duration_warn+0x40/0x40 [ 200.091692][ C0] ? generic_exec_single+0x335/0x4c0 [ 200.091692][ C0] ? __perf_event_enable+0x930/0x930 [ 200.091692][ C0] smp_call_function_single+0x17c/0x480 [ 200.091692][ C0] ? perf_duration_warn+0x40/0x40 [ 200.091692][ C0] ? generic_exec_single+0x4c0/0x4c0 [ 200.091692][ C0] ? __do_sys_perf_event_open+0x174c/0x2c70 [ 200.091692][ C0] ? __perf_event_enable+0x930/0x930 [ 200.091692][ C0] task_function_call+0xe9/0x180 [ 200.091692][ C0] ? perf_event_addr_filters_exec+0x310/0x310 [ 200.091692][ C0] ? __do_sys_perf_event_open+0x174c/0x2c70 [ 200.091692][ C0] ? __perf_event_enable+0x930/0x930 [ 200.091692][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.091692][ C0] ? exclusive_event_installable+0x257/0x320 [ 200.091692][ C0] perf_install_in_context+0x308/0x5a0 [ 200.091692][ C0] ? list_add_event+0xed0/0xed0 [ 200.091692][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 200.091692][ C0] ? __perf_event_header_size.isra.0+0x166/0x1c0 [ 200.091692][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 200.091692][ C0] __do_sys_perf_event_open+0x1cbc/0x2c70 [ 200.091692][ C0] ? perf_event_set_output+0x4e0/0x4e0 [ 200.091692][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 200.091692][ C0] ? put_timespec64+0xda/0x140 [ 200.091692][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 200.091692][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 200.091692][ C0] ? do_syscall_64+0x26/0x790 [ 200.091692][ C0] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.091692][ C0] ? do_syscall_64+0x26/0x790 [ 200.091692][ C0] __x64_sys_perf_event_open+0xbe/0x150 [ 200.091692][ C0] do_syscall_64+0xfa/0x790 [ 200.091692][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.091692][ C0] RIP: 0033:0x45a759 [ 200.091692][ C0] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 200.091692][ C0] RSP: 002b:00007fcd0e5d2c88 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 200.091692][ C0] RAX: ffffffffffffffda RBX: 000000000071c0f8 RCX: 000000000045a759 [ 200.091692][ C0] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 000000002001d000 [ 200.091692][ C0] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 200.091692][ C0] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007fcd0e5d36d4 [ 200.091692][ C0] R13: 00000000004aec17 R14: 00000000006f1cb0 R15: 00000000ffffffff [ 201.187563][ C0] sched: RT throttling activated