Warning: Permanently added '10.128.1.40' (ECDSA) to the list of known hosts. 2019/05/01 02:55:20 fuzzer started 2019/05/01 02:55:22 dialing manager at 10.128.0.26:34869 2019/05/01 02:55:22 syscalls: 2440 2019/05/01 02:55:22 code coverage: enabled 2019/05/01 02:55:22 comparison tracing: enabled 2019/05/01 02:55:22 extra coverage: extra coverage is not supported by the kernel 2019/05/01 02:55:22 setuid sandbox: enabled 2019/05/01 02:55:22 namespace sandbox: enabled 2019/05/01 02:55:22 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/01 02:55:22 fault injection: enabled 2019/05/01 02:55:22 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/01 02:55:22 net packet injection: enabled 2019/05/01 02:55:22 net device setup: enabled 02:56:52 executing program 0: syzkaller login: [ 142.496497][ T7926] IPVS: ftp: loaded support on port[0] = 21 02:56:52 executing program 1: [ 142.636703][ T7926] chnl_net:caif_netlink_parms(): no params data found [ 142.692503][ T7926] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.705480][ T7926] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.713991][ T7926] device bridge_slave_0 entered promiscuous mode [ 142.724404][ T7926] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.755382][ T7926] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.763675][ T7926] device bridge_slave_1 entered promiscuous mode [ 142.794851][ T7929] IPVS: ftp: loaded support on port[0] = 21 [ 142.806024][ T7926] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 142.817884][ T7926] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 142.856710][ T7926] team0: Port device team_slave_0 added [ 142.879335][ T7926] team0: Port device team_slave_1 added 02:56:52 executing program 2: [ 142.958840][ T7926] device hsr_slave_0 entered promiscuous mode [ 142.995697][ T7926] device hsr_slave_1 entered promiscuous mode [ 143.071093][ T7931] IPVS: ftp: loaded support on port[0] = 21 [ 143.119185][ T7926] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.126639][ T7926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.134471][ T7926] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.141620][ T7926] bridge0: port 1(bridge_slave_0) entered forwarding state 02:56:52 executing program 3: [ 143.178291][ T7929] chnl_net:caif_netlink_parms(): no params data found [ 143.296099][ T7926] 8021q: adding VLAN 0 to HW filter on device bond0 [ 143.338886][ T7926] 8021q: adding VLAN 0 to HW filter on device team0 [ 143.353946][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 143.369161][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.389009][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.404326][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 143.430106][ T7929] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.438186][ T7929] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.448834][ T7929] device bridge_slave_0 entered promiscuous mode [ 143.469535][ T7936] IPVS: ftp: loaded support on port[0] = 21 02:56:53 executing program 4: [ 143.517764][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.531021][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.538160][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.549869][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.558539][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.565664][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.577772][ T7929] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.584883][ T7929] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.596611][ T7929] device bridge_slave_1 entered promiscuous mode [ 143.652331][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 143.664520][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 143.682918][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.692359][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 143.703780][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 143.754583][ T7931] chnl_net:caif_netlink_parms(): no params data found [ 143.767933][ T7940] IPVS: ftp: loaded support on port[0] = 21 [ 143.783862][ T7926] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 02:56:53 executing program 5: [ 143.801345][ T7926] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 143.819977][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 143.830585][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 143.839654][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 143.851172][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 143.860423][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 143.871396][ T7929] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 143.909756][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 143.928884][ T7929] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 143.993063][ T7926] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 144.003263][ T7929] team0: Port device team_slave_0 added [ 144.039660][ T7929] team0: Port device team_slave_1 added [ 144.053148][ T7942] IPVS: ftp: loaded support on port[0] = 21 [ 144.057098][ T7931] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.066373][ T7931] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.074475][ T7931] device bridge_slave_0 entered promiscuous mode [ 144.083041][ T7931] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.092362][ T7931] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.105467][ T7931] device bridge_slave_1 entered promiscuous mode 02:56:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x74, 0x0, [0x9, 0x0, 0x0, 0xfffffffffffffe00]}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @ioapic}) [ 144.192017][ T7931] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 144.268034][ T7951] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 144.288417][ T7929] device hsr_slave_0 entered promiscuous mode 02:56:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='highspeed\x00', 0x2c6d927e1de6a155) sendto$inet(r0, &(0x7f0000001600)="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", 0x209, 0x0, 0x0, 0x0) [ 144.328172][ T7929] device hsr_slave_1 entered promiscuous mode [ 144.362601][ T7931] bond0: Enslaving bond_slave_1 as an active interface with an up link 02:56:54 executing program 0: syz_open_dev$mouse(0x0, 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, 0x0) socket$inet(0x10, 0x2, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB], 0x0, 0x0, 0x23080, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="98a67223642d9e9091586072ff9d5f5031b44cf4c25cf4"], 0x0, 0x0, 0x5010, 0x0) mount(&(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x5110, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00@\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 144.517515][ T7931] team0: Port device team_slave_0 added [ 144.526009][ T7960] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.534136][ T7960] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.676771][ T7936] chnl_net:caif_netlink_parms(): no params data found [ 144.702710][ T7940] chnl_net:caif_netlink_parms(): no params data found [ 144.729474][ T7931] team0: Port device team_slave_1 added [ 144.743720][ T7962] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.750886][ T7962] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.758476][ T7962] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.765603][ T7962] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.804383][ T7962] device bridge0 entered promiscuous mode [ 144.889163][ T7931] device hsr_slave_0 entered promiscuous mode [ 144.945842][ T7931] device hsr_slave_1 entered promiscuous mode [ 145.009377][ T7960] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.016743][ T7960] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.023971][ T7960] device bridge0 left promiscuous mode [ 145.081020][ T7962] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.088199][ T7962] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.095673][ T7962] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.102799][ T7962] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.119074][ T7962] device bridge0 entered promiscuous mode 02:56:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000780)='/dev/sg#\x00', 0x0, 0x80000000042) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x200000, 0x0, {0x7, 0x1d, 0x0, 0x0, 0x0, 0x0, 0xbfffffff}}, 0x50) [ 145.202834][ C0] hrtimer: interrupt took 44525 ns [ 145.213309][ T7967] sg_write: data in/out 2097116/32 bytes for SCSI command 0xff-- guessing data in; [ 145.213309][ T7967] program syz-executor.0 not setting count and/or reply_len properly 02:56:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000780)='/dev/sg#\x00', 0x0, 0x80000000042) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x200000, 0x0, {0x7, 0x1d, 0x0, 0x0, 0x0, 0x0, 0xbfffffff}}, 0x50) [ 145.335033][ T7940] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.350054][ T7940] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.361101][ T7972] sg_write: data in/out 2097116/32 bytes for SCSI command 0xff-- guessing data in; [ 145.361101][ T7972] program syz-executor.0 not setting count and/or reply_len properly [ 145.382866][ T7940] device bridge_slave_0 entered promiscuous mode [ 145.395952][ T7936] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.403509][ T7936] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.417105][ T7936] device bridge_slave_0 entered promiscuous mode 02:56:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000780)='/dev/sg#\x00', 0x0, 0x80000000042) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x200000, 0x0, {0x7, 0x1d, 0x0, 0x0, 0x0, 0x0, 0xbfffffff}}, 0x50) [ 145.446421][ T7940] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.453517][ T7940] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.476191][ T7940] device bridge_slave_1 entered promiscuous mode [ 145.479656][ T7975] sg_write: data in/out 2097116/32 bytes for SCSI command 0xff-- guessing data in; [ 145.479656][ T7975] program syz-executor.0 not setting count and/or reply_len properly [ 145.500353][ T7936] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.508059][ T7936] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.531120][ T7936] device bridge_slave_1 entered promiscuous mode 02:56:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='highspeed\x00', 0x2c6d927e1de6a155) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) sendto$inet(r0, &(0x7f0000001600)="286bc00b274a655612f105c75658f89c0680641e40e11d7974d2a6c8324491fe2fa9aedb8af2e03d67de8e290491fd3f803c36e67dc035de170c556fe46bbbfeeb4961a2c9115d1bc66f3bf4032f750fdb4a3b04d9e02063dc426b80343c23693868a618a95735a572443e199f0a28ec8318274d8581b43507c9a63a36c90125b70c598e991005607250882b56e33bbb6715013c149bfbe788484d35ad9356b6a6a0e9c72ce0b06d0326077e7324128c2d95d933f8d1da36e2469c394ee8c10e30962df22a98994d7a99c51e25e05cb64e5451c18d43c7d56df83942a6b11ea794afc2444bbd3ba59789e5a583ba02e1c24608257afa6a9b3aab8cbc4fc1c74cfc5d8ef0ec75dc909e1b062af5ffa273ed808eb9b7f09139ce4db1a88f292e6e887862a807802721f4d182b666fbe94df4ca70abdc794696a34f00d79f7532301a75a04d19741a1fcc4fe1d6688fbd94c576b7b770407b5cdaec68f9f27e06da562b6e98c045710f32c5739a919fcdb51e7af5b01e8754ee0fdfe2cf75991bee8938d8fe1926932757f141ba8d7b28c26cc1ada7d14218edf50f80b276e0101e7f1ec2d1e45ff2259763a506a641ee82f58d6b3cacee37980ec37598af1d6f959a37c7327b5c5e9604fd240b93385b70089c035d36735a642bd5fdfb1f6c191ccaea5adf7e5af64bf315bfa5d8e0375a038279f0d75a782e2ad140d741f90a858d9227b2d436b3656a6b62e0f356a22e08e3f5d54cb30206ec0b4b7cc2ba6e776c1230b5bb617f836b6ed85a1cdbc9b0a82dc7ed61996858799ce9b675518a0fe765539099d7c835387e61ae9d867cb5d9d6ae3b6ab667c0d8b88c83caa42ce6008581df01d6968d4ddfb3be51eb1b0d5aba49af7addbee6e2d88da5df239dfc5ecc557fa3fec4bbcd9e09e76173d89b2bc01f56be4e05ab34ad6025264879130cce6476b82f5edf5c310383e1ecf0ec69ba229cb105c2ce6802e4d943caab26eb9ca51493e293aadd4cdc14a2d70af2adc2844db32f92665faa385bd4955d127d622b9d6d3bd3cdb5b30153df5b288032cc266e7b7a427f93404a6d382e97ddfaed4aa5d187c87c54314fb3fb5385381b66c52083ae6d95ab06a5b0c8b565d3c435d6206de6007da0b129715c1f70bdcbbdd4bdf98337ed7ca5b17e0b3a825e5f6a7212ab9d3e00e25f426c7177334c55ef8acd8a037202e0c53bb06f64d2791267c79bb0464605dcdee281836d1719668e3f39cf920f65daff8842e77f59a386bc635030a1ffb3b7648ff3a1c87191c6ce7832f9ea95680acd75a95d93a4f310cc0d38cbd96dd2fb1683c8b5e3dd3f89c485d5b7338b38cbc42af602e8c64617d853e2e12315f493dc9d7678107fcaa1e04dc39be7d0a38abf1c52adbdc6942b86c19e744757ea57a165c5d6fd57cad42b09fde08528c9dc35657834ef7aa89ef59d0bce6da0d9e33946f0af26b18d6b6629f793091fd63fcac9fed16be81f6fe398407ce1457193d01238e923266e6fc8920c94c84b2c539ead49dd753c3ba7269d5317f0ce2a023c4a895f429586e0d95b496d23cb68d1223784657bfdc1de7ca15f043d69dc6e42a52f071293db5c083c144eb24d3310275ba53bf2e4832c9644fb9a4f167bd4b259a41eb13002d14da9c4ea99fa784fa01b04452bd759f61a5e1109c11fcee76c7c132fd9487dc9be0777ee3299468a87994e6ce1caddc50ba486ab4ec1d8177e827ce11df520016088cec09f09f7cc21827c99150cde96f660f0c260a29e4293a77dc68658f2544adc7fec79f38c97b7c78b0e5010649839a2c22c3e6585fbdfb9476425dbe363c1914f11903c08dcc7128aba5a4c9c29117abcd927b3fd231cde6bd6dc5e96e2f4304c700f47a51bcb2be7cd4736a4d09b66ff48689600df54f18ca506f56e07ce9518cd5a6f626a4ca983b8f72090732b7e2dd036a0209920d533d7eab41927a49c250d71d314e313f36ee56de558103329aafa4f30eee43a98b8c4acafb04101543d7ed23c9321863164dfa10f8f6d446054612999ddd8920d8c7c79772c4881e8e9157cc4ff93221dec7702535be4915ab7be353775256d091dbc84", 0x5ce, 0x0, 0x0, 0x0) [ 145.550114][ T7942] chnl_net:caif_netlink_parms(): no params data found [ 145.603224][ T7929] 8021q: adding VLAN 0 to HW filter on device bond0 [ 145.667007][ T7940] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 145.683143][ T7936] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 145.711472][ T7940] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 145.728869][ T7936] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 145.747502][ T7942] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.754600][ T7942] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.763108][ T7942] device bridge_slave_0 entered promiscuous mode [ 145.790917][ T7929] 8021q: adding VLAN 0 to HW filter on device team0 [ 145.798511][ T7942] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.805945][ T7942] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.813698][ T7942] device bridge_slave_1 entered promiscuous mode [ 145.828501][ T7936] team0: Port device team_slave_0 added [ 145.837361][ T7931] 8021q: adding VLAN 0 to HW filter on device bond0 [ 145.849939][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.857856][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.881427][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 145.890636][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 145.899897][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.907037][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.914634][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.923569][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.932050][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.940523][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.948423][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 145.958533][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 145.967603][ T7940] team0: Port device team_slave_0 added [ 145.974392][ T7936] team0: Port device team_slave_1 added [ 146.004296][ T7931] 8021q: adding VLAN 0 to HW filter on device team0 [ 146.013335][ T7942] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 146.027160][ T7942] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 146.044226][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 146.052580][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 146.061023][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 146.070064][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 146.079221][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 146.087929][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 146.097298][ T7940] team0: Port device team_slave_1 added [ 146.141040][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 146.150554][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 146.159220][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 146.167810][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.176277][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.183326][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.191550][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 146.200021][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.208544][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 146.218309][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 146.226920][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.233955][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.241654][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 146.249987][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.258984][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 146.268381][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 146.278501][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 146.294925][ T7942] team0: Port device team_slave_0 added [ 146.338679][ T7936] device hsr_slave_0 entered promiscuous mode [ 146.385607][ T7936] device hsr_slave_1 entered promiscuous mode [ 146.456137][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 146.464687][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 146.473374][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 146.482213][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 146.490885][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 146.499781][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 146.508376][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.516766][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 146.532075][ T7942] team0: Port device team_slave_1 added [ 146.580646][ T7940] device hsr_slave_0 entered promiscuous mode [ 146.635640][ T7940] device hsr_slave_1 entered promiscuous mode [ 146.694976][ T7931] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 146.707056][ T7931] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 146.725924][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 146.734337][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.764215][ T7929] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 146.800857][ T7931] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 146.877504][ T7942] device hsr_slave_0 entered promiscuous mode [ 146.915842][ T7942] device hsr_slave_1 entered promiscuous mode [ 147.026897][ T7940] 8021q: adding VLAN 0 to HW filter on device bond0 02:56:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='highspeed\x00', 0x2c6d927e1de6a155) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000001600)="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", 0x3b4, 0x0, 0x0, 0x0) [ 147.094812][ T7936] 8021q: adding VLAN 0 to HW filter on device bond0 02:56:56 executing program 2: [ 147.140333][ T7940] 8021q: adding VLAN 0 to HW filter on device team0 [ 147.163341][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 147.183204][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.216285][ T7936] 8021q: adding VLAN 0 to HW filter on device team0 [ 147.236650][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 147.244698][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.253022][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 147.284394][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 147.299216][ T7934] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.306338][ T7934] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.314961][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 147.323973][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.332429][ T7934] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.339493][ T7934] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.347632][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 147.374737][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 147.383244][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 147.393415][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 147.402078][ T7934] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.409178][ T7934] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.417912][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 147.426847][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.435142][ T7934] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.442238][ T7934] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.449782][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 147.458864][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 147.468505][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 147.485189][ T7942] 8021q: adding VLAN 0 to HW filter on device bond0 [ 147.494060][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 147.504151][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 147.512417][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 147.531579][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 147.540309][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 147.549324][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 147.567533][ T7942] 8021q: adding VLAN 0 to HW filter on device team0 [ 147.592384][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 147.601268][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.612615][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 147.621980][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 147.631134][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 147.640147][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 147.648624][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 147.657075][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.665152][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 147.673606][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 147.681785][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 147.690544][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.698904][ T2840] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 147.714512][ T7940] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 147.727539][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 147.740892][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 147.750143][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 147.758865][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.765965][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.775162][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 147.784113][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 147.792554][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 147.801362][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.809810][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.816913][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.825168][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 147.846134][ T7936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 147.854770][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 147.876454][ T7940] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 147.886559][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 147.902093][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 147.910859][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 147.929477][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 147.937487][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 147.950760][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 147.959265][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 147.968159][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.980776][ T7942] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 147.992772][ T7942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 148.012555][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 148.021362][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.044142][ T7936] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 148.102965][ T7942] 8021q: adding VLAN 0 to HW filter on device batadv0 02:56:57 executing program 3: 02:56:57 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r0, &(0x7f0000000100)) 02:56:58 executing program 5: 02:56:58 executing program 2: 02:56:58 executing program 1: 02:56:58 executing program 4: 02:56:58 executing program 3: 02:56:58 executing program 4: 02:56:58 executing program 2: 02:56:58 executing program 1: 02:56:58 executing program 0: 02:56:58 executing program 5: 02:56:58 executing program 4: 02:56:58 executing program 1: 02:56:58 executing program 3: 02:56:58 executing program 5: 02:56:58 executing program 2: 02:56:58 executing program 0: 02:56:58 executing program 5: 02:56:58 executing program 4: 02:56:58 executing program 1: 02:56:58 executing program 3: 02:56:58 executing program 0: 02:56:58 executing program 2: 02:56:58 executing program 5: 02:56:58 executing program 4: 02:56:58 executing program 2: 02:56:58 executing program 1: 02:56:58 executing program 3: 02:56:58 executing program 0: 02:56:58 executing program 4: 02:56:58 executing program 5: 02:56:58 executing program 2: 02:56:58 executing program 3: 02:56:58 executing program 0: 02:56:58 executing program 1: 02:56:59 executing program 4: 02:56:59 executing program 3: 02:56:59 executing program 2: 02:56:59 executing program 5: 02:56:59 executing program 0: 02:56:59 executing program 1: 02:56:59 executing program 2: 02:56:59 executing program 1: 02:56:59 executing program 4: 02:56:59 executing program 3: 02:56:59 executing program 5: 02:56:59 executing program 0: 02:56:59 executing program 5: 02:56:59 executing program 4: 02:56:59 executing program 2: 02:56:59 executing program 3: 02:56:59 executing program 1: 02:56:59 executing program 0: 02:56:59 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x7fff, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000340)) 02:56:59 executing program 2: r0 = socket(0x1000000010, 0x4008000000803, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x33c) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) r1 = gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) fstatfs(0xffffffffffffffff, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000), 0x4) tkill(r1, 0x1000000000016) 02:56:59 executing program 1: pause() syz_execute_func(&(0x7f0000004f40)="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") 02:56:59 executing program 4: clone(0xbffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000001000)="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") 02:56:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0xfffffffffffffffe, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, 0x0, 0x0) 02:56:59 executing program 0: pause() open(0x0, 0x0, 0x16a) syz_execute_func(&(0x7f0000000100)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5712d41dfd049b6100f11d46f") syz_execute_func(&(0x7f00000004c0)="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") 02:56:59 executing program 5: 02:56:59 executing program 4: 02:56:59 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x15, &(0x7f0000000500)={@local, @empty, [{}], {@x25}}, 0x0) 02:56:59 executing program 5: clone(0xbffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000a80)="c4e3f9614832074a2be93693980f05460f4ae8c4a37bf0c50141e2e9400f189841ca00002726fa68660f8fc97cc61ba163796379450de29c39c50000f0470fc1a87a520000c461dc55b1e6250000f3d9f7fbc461bd65f90f189700000000c4e2090229c54de90d07e82c71c482b9a7849a001000028f0ba156a1563e533df500c443d9497dbf59f0d234f60f3434b2b2f34cb446c4224d9e7df8b6ebeb0536dee168000001007341c40293a3130966c4a13915715f8f69601656d7138713877474d8d8a1de2ad764b5c1c4213a5fc040dcfec00f383b7d0f12e401f4e39bc422014727ca30ca842aafafe27d19d1660f38298f000000008a2fc4817d5b8cd0c43400008fe978cb5ae2f92e28c47e3aa07ae6423095c3d8c4c3c4a2fd216100770c64e42e4b160bdddd0606c401657d699c7adbe86bc4637d19a6d5b973e85866cc1b540066400f7675094c1b7f7ff0e547c463791422b236f30f2d041f1f0fab0e0077aeaeaaf1eb27cd420f01c2c4623d409a6ed70000ed36d1660f38058bf497610d920d9278c025000000006478c23b80c74382004d8bcaf3460f7ff3f22e6544dde82666f30fa05c65002d080000003802087af358242490073b06c442b9aa8ef9af07b5c4e1fc2bb000a9bb000042c4f2456c400fa03636a6") 02:56:59 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 02:56:59 executing program 4: pause() syz_execute_func(&(0x7f0000000280)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5712d41dfd049b6100f11d46f") syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001180)="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") [ 150.186128][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 150.192111][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:57:00 executing program 0: 02:57:00 executing program 4: [ 150.345531][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 150.351356][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:57:00 executing program 1: ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000008, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000001d80)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = gettid() tgkill(r0, r0, 0xf) 02:57:00 executing program 4: 02:57:00 executing program 0: 02:57:00 executing program 3: 02:57:00 executing program 2: 02:57:00 executing program 4: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f00000001c0), 0x3d0}) syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl(r0, 0x2000c2604110, &(0x7f0000000000)="2cdc991a5803609fc18218b7cb0f6751855032813b657c7918b9b8b9015fd750571ac6c117") 02:57:00 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x28400, 0x189) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') ppoll(&(0x7f0000000080)=[{r0, 0x20}, {r0, 0x1000}], 0x2, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={0x4}, 0x8) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r1, 0x208200) read(r2, &(0x7f0000000200)=""/131, 0x83) open(&(0x7f0000000780)='./bus\x00', 0x140018, 0x4c00000000000000) 02:57:00 executing program 5: prctl$PR_SET_FPEMU(0xa, 0x3) syz_open_dev$sndtimer(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x80000, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f00000005c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f00000000c0)=""/25) lstat(0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) fcntl$addseals(r1, 0x409, 0xa) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x100000000) read(r0, &(0x7f0000000480)=""/100, 0x64) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000000c0)={{0x395a, 0x5}, {0xe588}, 0x4, 0x0, 0x9}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000380)={0x7, 0x79, 0x2}, 0x7) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x800) memfd_create(&(0x7f00000001c0)='/dev/rtc#\x00', 0x4) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) 02:57:00 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000008, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000001d80)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = gettid() tgkill(r0, r0, 0xf) socket$nl_netfilter(0x10, 0x3, 0xc) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 02:57:00 executing program 3: 02:57:00 executing program 1: 02:57:00 executing program 4: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f00000001c0), 0x3d0}) syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl(r0, 0x2000c2604110, &(0x7f0000000000)="2cdc991a5803609fc18218b7cb0f6751855032813b657c7918b9b8b9015fd750571ac6c117") [ 151.003812][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 151.003830][ T26] audit: type=1804 audit(1556679420.715:31): pid=8198 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir752928197/syzkaller.eadIci/21/file0/bus" dev="ramfs" ino=27439 res=1 02:57:00 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d4, &(0x7f0000000040)={0x1000000, 0x0}) 02:57:00 executing program 4: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f00000001c0), 0x3d0}) syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl(r0, 0x2000c2604110, &(0x7f0000000000)="2cdc991a5803609fc18218b7cb0f6751855032813b657c7918b9b8b9015fd750571ac6c117") 02:57:00 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) creat(&(0x7f00000001c0)='./file0\x00', 0x0) syncfs(r0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)) 02:57:00 executing program 1: prctl$PR_SET_FPEMU(0xa, 0x3) syz_open_dev$sndtimer(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x80000, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f00000005c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f00000000c0)=""/25) lstat(0x0, 0x0) fcntl$addseals(r0, 0x409, 0xa) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x100000000) [ 151.188994][ T26] audit: type=1804 audit(1556679420.905:32): pid=8220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir430248973/syzkaller.NfRoCd/13/bus" dev="sda1" ino=16541 res=1 02:57:01 executing program 4: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f00000001c0), 0x3d0}) syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl(r0, 0x2000c2604110, &(0x7f0000000000)="2cdc991a5803609fc18218b7cb0f6751855032813b657c7918b9b8b9015fd750571ac6c117") 02:57:01 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d4, &(0x7f0000000040)={0x1000000, 0x0}) [ 151.589755][ T26] audit: type=1804 audit(1556679421.305:33): pid=8220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir430248973/syzkaller.NfRoCd/13/bus" dev="sda1" ino=16541 res=1 [ 151.939760][ T26] audit: type=1804 audit(1556679421.655:34): pid=8198 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir752928197/syzkaller.eadIci/21/file0/file0/bus" dev="ramfs" ino=27672 res=1 02:57:02 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKFRASET(r0, 0x1264, 0x0) 02:57:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000480)="0adc1f123c123f319bd070") ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:57:02 executing program 4: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f00000001c0), 0x3d0}) syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2000c2604110, &(0x7f0000000000)="2cdc991a5803609fc18218b7cb0f6751855032813b657c7918b9b8b9015fd750571ac6c117") 02:57:02 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d4, &(0x7f0000000040)={0x1000000, 0x0}) 02:57:02 executing program 3: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0xc000002000000000, &(0x7f00000009c0), 0x1a4, &(0x7f00000000c0), 0x0, 0x900}}], 0x40000000000026a, 0x0) 02:57:02 executing program 5: clone(0x16020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000000)="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") 02:57:02 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d4, &(0x7f0000000040)={0x1000000, 0x0}) 02:57:02 executing program 4: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f00000001c0), 0x3d0}) syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2000c2604110, &(0x7f0000000000)="2cdc991a5803609fc18218b7cb0f6751855032813b657c7918b9b8b9015fd750571ac6c117") 02:57:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="fa"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 152.637246][ T8268] syz-executor.5 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 02:57:02 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d4, &(0x7f0000000040)={0x1000000, 0x0}) 02:57:02 executing program 1: clone(0xbffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, 0x0) syz_execute_func(&(0x7f0000001200)="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") 02:57:02 executing program 4: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f00000001c0), 0x3d0}) syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2000c2604110, &(0x7f0000000000)="2cdc991a5803609fc18218b7cb0f6751855032813b657c7918b9b8b9015fd750571ac6c117") [ 152.840415][ T8285] kasan: CONFIG_KASAN_INLINE enabled [ 152.845939][ T8285] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 152.854043][ T8285] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 152.859936][ T8292] warning: process `syz-executor.1' used the deprecated sysctl system call with [ 152.861001][ T8285] CPU: 1 PID: 8285 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190430 #33 [ 152.861012][ T8285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.861035][ T8285] RIP: 0010:vcpu_enter_guest+0xbcd/0x5fb0 [ 152.861063][ T8285] Code: 48 c1 ea 03 80 3c 02 00 0f 85 6f 48 00 00 49 8b 9f b0 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 78 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 39 48 00 00 8b 5b 78 31 ff 89 [ 152.871288][ T8292] mmap: syz-executor.1 (8292) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 152.879619][ T8285] RSP: 0018:ffff888063ae7a00 EFLAGS: 00010006 [ 152.879630][ T8285] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90005de1000 [ 152.879637][ T8285] RDX: 000000000000000f RSI: ffffffff810cd7b2 RDI: 0000000000000078 [ 152.879645][ T8285] RBP: ffff888063ae7b10 R08: ffff888063ad8480 R09: ffffed1015d26be0 [ 152.879653][ T8285] R10: ffffed1015d26bdf R11: ffff8880ae935efb R12: ffff888063be006c [ 152.879661][ T8285] R13: 0000000000000001 R14: ffff888063be0070 R15: ffff888063be0040 [ 152.879672][ T8285] FS: 00007ff8f779b700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 152.879679][ T8285] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 152.879687][ T8285] CR2: 0000000000625208 CR3: 00000000949b1000 CR4: 00000000001426e0 [ 152.879696][ T8285] Call Trace: [ 152.879724][ T8285] ? emulator_read_emulated+0x50/0x50 [ 152.879747][ T8285] ? lock_acquire+0x16f/0x3f0 [ 153.014332][ T8285] ? kvm_check_async_pf_completion+0x2d8/0x440 [ 153.020515][ T8285] kvm_arch_vcpu_ioctl_run+0x425/0x1750 [ 153.026079][ T8285] ? kvm_arch_vcpu_ioctl_run+0x425/0x1750 [ 153.031824][ T8285] kvm_vcpu_ioctl+0x4dc/0xf90 [ 153.036597][ T8285] ? kvm_set_memory_region+0x50/0x50 [ 153.041892][ T8285] ? tomoyo_path_number_perm+0x263/0x520 [ 153.047544][ T8285] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 153.053376][ T8285] ? __fget+0x35a/0x550 [ 153.057564][ T8285] ? kvm_set_memory_region+0x50/0x50 [ 153.061872][ T3878] kobject: 'loop3' (00000000a4529609): kobject_uevent_env [ 153.062970][ T8285] do_vfs_ioctl+0xd6e/0x1390 [ 153.062990][ T8285] ? ioctl_preallocate+0x210/0x210 [ 153.063014][ T8285] ? __fget+0x381/0x550 [ 153.080319][ T3878] kobject: 'loop3' (00000000a4529609): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 153.083974][ T8285] ? ksys_dup3+0x3e0/0x3e0 [ 153.083991][ T8285] ? nsecs_to_jiffies+0x30/0x30 [ 153.084014][ T8285] ? tomoyo_file_ioctl+0x23/0x30 [ 153.109695][ T8285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 153.116038][ T8285] ? security_file_ioctl+0x93/0xc0 [ 153.121173][ T8285] ksys_ioctl+0xab/0xd0 [ 153.125445][ T8285] __x64_sys_ioctl+0x73/0xb0 [ 153.130057][ T8285] do_syscall_64+0x103/0x670 [ 153.134668][ T8285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 153.140575][ T8285] RIP: 0033:0x458da9 [ 153.144486][ T8285] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 153.164098][ T8285] RSP: 002b:00007ff8f779ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 153.172528][ T8285] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 153.180524][ T8285] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 153.188599][ T8285] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 153.196848][ T8285] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff8f779b6d4 [ 153.205026][ T8285] R13: 00000000004c1d42 R14: 00000000004d4550 R15: 00000000ffffffff [ 153.213015][ T8285] Modules linked in: [ 153.217475][ T8285] ---[ end trace 2c6b88d7c87de586 ]--- [ 153.222954][ T8285] RIP: 0010:vcpu_enter_guest+0xbcd/0x5fb0 [ 153.228690][ T8285] Code: 48 c1 ea 03 80 3c 02 00 0f 85 6f 48 00 00 49 8b 9f b0 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 78 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 39 48 00 00 8b 5b 78 31 ff 89 [ 153.248484][ T8285] RSP: 0018:ffff888063ae7a00 EFLAGS: 00010006 [ 153.254572][ T8285] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90005de1000 [ 153.262559][ T8285] RDX: 000000000000000f RSI: ffffffff810cd7b2 RDI: 0000000000000078 [ 153.270815][ T8285] RBP: ffff888063ae7b10 R08: ffff888063ad8480 R09: ffffed1015d26be0 [ 153.278811][ T8285] R10: ffffed1015d26bdf R11: ffff8880ae935efb R12: ffff888063be006c [ 153.286812][ T8285] R13: 0000000000000001 R14: ffff888063be0070 R15: ffff888063be0040 [ 153.294819][ T8285] FS: 00007ff8f779b700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 153.303858][ T8285] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 153.310460][ T8285] CR2: 0000000000625208 CR3: 00000000949b1000 CR4: 00000000001426e0 [ 153.318624][ T8285] Kernel panic - not syncing: Fatal exception [ 153.325745][ T8285] Kernel Offset: disabled [ 153.330084][ T8285] Rebooting in 86400 seconds..