Warning: Permanently added '[localhost]:5906' (ECDSA) to the list of known hosts. 2019/12/05 18:00:34 fuzzer started 2019/12/05 18:00:36 dialing manager at 10.0.2.10:46477 2019/12/05 18:00:36 syscalls: 2689 2019/12/05 18:00:36 code coverage: enabled 2019/12/05 18:00:36 comparison tracing: enabled 2019/12/05 18:00:36 extra coverage: extra coverage is not supported by the kernel 2019/12/05 18:00:36 setuid sandbox: enabled 2019/12/05 18:00:36 namespace sandbox: enabled 2019/12/05 18:00:36 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/05 18:00:36 fault injection: enabled 2019/12/05 18:00:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/05 18:00:36 net packet injection: enabled 2019/12/05 18:00:36 net device setup: enabled 2019/12/05 18:00:36 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/05 18:00:36 devlink PCI setup: PCI device 0000:00:10.0 is not available 18:00:54 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'bcsf0\x00H\x00'}, 0x18) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") socket$inet(0x2b, 0x1, 0x0) 18:00:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff02c}, {0x6}]}) 18:00:55 executing program 2: socket$kcm(0x10, 0x0, 0x10) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) syzkaller login: [ 125.047476][ T8714] IPVS: ftp: loaded support on port[0] = 21 [ 125.047703][ T8713] IPVS: ftp: loaded support on port[0] = 21 [ 125.127811][ T8716] IPVS: ftp: loaded support on port[0] = 21 18:00:56 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c01062", 0x5b}], 0x4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = socket(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 125.722870][ T8713] chnl_net:caif_netlink_parms(): no params data found [ 125.770911][ T8720] IPVS: ftp: loaded support on port[0] = 21 [ 125.801235][ T8716] chnl_net:caif_netlink_parms(): no params data found [ 125.855752][ T8713] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.866039][ T8713] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.880064][ T8713] device bridge_slave_0 entered promiscuous mode [ 125.897517][ T8713] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.907424][ T8713] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.916997][ T8713] device bridge_slave_1 entered promiscuous mode [ 125.943391][ T8714] chnl_net:caif_netlink_parms(): no params data found [ 125.965452][ T8713] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 125.998218][ T8713] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 126.025111][ T8716] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.038640][ T8716] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.048328][ T8716] device bridge_slave_0 entered promiscuous mode [ 126.060933][ T8716] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.070182][ T8716] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.079631][ T8716] device bridge_slave_1 entered promiscuous mode [ 126.110659][ T8713] team0: Port device team_slave_0 added [ 126.123866][ T8713] team0: Port device team_slave_1 added [ 126.143692][ T8716] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 126.156930][ T8716] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 126.169844][ T8714] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.180547][ T8714] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.189910][ T8714] device bridge_slave_0 entered promiscuous mode [ 126.207053][ T8714] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.219406][ T8714] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.230982][ T8714] device bridge_slave_1 entered promiscuous mode [ 126.260787][ T8716] team0: Port device team_slave_0 added [ 126.273527][ T8716] team0: Port device team_slave_1 added [ 126.292195][ T8714] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 126.309106][ T8714] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 126.394949][ T8713] device hsr_slave_0 entered promiscuous mode [ 126.473058][ T8713] device hsr_slave_1 entered promiscuous mode [ 126.624027][ T8716] device hsr_slave_0 entered promiscuous mode [ 126.681606][ T8716] device hsr_slave_1 entered promiscuous mode [ 126.721501][ T8716] debugfs: Directory 'hsr0' with parent '/' already present! [ 126.734959][ T8714] team0: Port device team_slave_0 added [ 126.745241][ T8714] team0: Port device team_slave_1 added [ 126.788742][ T8720] chnl_net:caif_netlink_parms(): no params data found [ 126.863810][ T8714] device hsr_slave_0 entered promiscuous mode [ 126.911953][ T8714] device hsr_slave_1 entered promiscuous mode [ 126.971908][ T8714] debugfs: Directory 'hsr0' with parent '/' already present! [ 127.026361][ T8713] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 127.084641][ T8716] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 127.168320][ T8716] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 127.264327][ T8713] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 127.344141][ T8720] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.425237][ T8720] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.466721][ T8720] device bridge_slave_0 entered promiscuous mode [ 127.495613][ T8716] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 127.592214][ T8714] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 127.657754][ T8713] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 127.734241][ T8713] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 127.804210][ T8720] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.826366][ T8720] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.845457][ T8720] device bridge_slave_1 entered promiscuous mode [ 127.869508][ T8716] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 127.944481][ T8714] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 128.012293][ T8720] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 128.028987][ T8714] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 128.089656][ T8714] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 128.165444][ T8720] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 128.201444][ T8720] team0: Port device team_slave_0 added [ 128.211028][ T8720] team0: Port device team_slave_1 added [ 128.325715][ T8720] device hsr_slave_0 entered promiscuous mode [ 128.411888][ T8720] device hsr_slave_1 entered promiscuous mode [ 128.501412][ T8720] debugfs: Directory 'hsr0' with parent '/' already present! [ 128.584297][ T8720] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 128.633662][ T8720] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 128.693244][ T8720] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 128.756695][ T8720] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 128.868920][ T8713] 8021q: adding VLAN 0 to HW filter on device bond0 [ 128.915632][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 128.932049][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.966155][ T8716] 8021q: adding VLAN 0 to HW filter on device bond0 [ 128.988183][ T8714] 8021q: adding VLAN 0 to HW filter on device bond0 [ 129.009897][ T8713] 8021q: adding VLAN 0 to HW filter on device team0 [ 129.039671][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.060333][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.080068][ T3874] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.096387][ T3874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.130102][ T8714] 8021q: adding VLAN 0 to HW filter on device team0 [ 129.143276][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 129.154741][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.165967][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.184738][ T34] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.194339][ T34] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.212524][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 129.223185][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.233133][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 129.245347][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.256863][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 129.282306][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 129.297447][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.315888][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.335578][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.346696][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.360714][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 129.374361][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 129.390138][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 129.402278][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 129.415900][ T8716] 8021q: adding VLAN 0 to HW filter on device team0 [ 129.436106][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.451933][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.466080][ T38] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.479256][ T38] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.494124][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 129.531897][ T3381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 129.547165][ T3381] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 129.562937][ T3381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 129.578555][ T3381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.592034][ T3381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.604576][ T3381] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.614232][ T3381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.624706][ T3381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 129.636596][ T3381] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 129.648734][ T3381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 129.662881][ T3381] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 129.681130][ T3381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 129.754778][ T3381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 129.774757][ T3381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 129.800887][ T3381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 129.819832][ T3381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 129.843236][ T3381] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 129.862749][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 129.888874][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 129.915234][ T8720] 8021q: adding VLAN 0 to HW filter on device bond0 [ 129.930024][ T8714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 129.942457][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.959350][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.971038][ T28] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.981433][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.001641][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 130.014247][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.028125][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 130.044863][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 130.056295][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.077182][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 130.089462][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 130.104434][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 130.115565][ T8720] 8021q: adding VLAN 0 to HW filter on device team0 [ 130.130045][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 130.139720][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 130.163176][ T8713] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 130.175426][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 130.186347][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 130.198425][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 130.210446][ T8728] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.219281][ T8728] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.231070][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 130.242287][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 130.252962][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 130.262828][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 130.277533][ T8714] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 130.291140][ T8716] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 130.307677][ T8716] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 130.330299][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.340063][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 130.350194][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.360833][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 130.372540][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.383670][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 130.395753][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 130.407385][ T38] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.416518][ T38] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.427074][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 130.457082][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 130.485221][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 130.527823][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 130.538887][ T3874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 130.553023][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 130.563865][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 130.577566][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 130.596277][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 130.610136][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 130.634322][ T8720] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 130.653457][ T8720] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 130.745040][ T8716] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 130.771117][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 130.787596][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.802143][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 130.823098][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.842458][ T8728] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 131.036530][ T8720] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 131.075376][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 18:01:01 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'bcsf0\x00H\x00'}, 0x18) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") socket$inet(0x2b, 0x1, 0x0) [ 131.112611][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 18:01:01 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'bcsf0\x00H\x00'}, 0x18) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") socket$inet(0x2b, 0x1, 0x0) 18:01:02 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'bcsf0\x00H\x00'}, 0x18) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") socket$inet(0x2b, 0x1, 0x0) 18:01:02 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'bcsf0\x00H\x00'}, 0x18) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 18:01:02 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'bcsf0\x00H\x00'}, 0x18) socket$inet6(0xa, 0x80003, 0x80) 18:01:02 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = eventfd(0x0) r2 = dup(r1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/156, 0x9c}], 0x1) sendfile(r2, r3, 0x0, 0x8000fffffffe) write$FUSE_GETXATTR(r2, &(0x7f00000000c0)={0x18}, 0x18) [ 131.592971][ T39] kauditd_printk_skb: 3 callbacks suppressed 18:01:02 executing program 2: socket$kcm(0x10, 0x0, 0x10) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) [ 131.593055][ T39] audit: type=1804 audit(1575568862.370:31): pid=8768 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir135873825/syzkaller.1F9fX7/1/bus" dev="sda1" ino=16560 res=1 [ 132.001791][ T39] audit: type=1804 audit(1575568862.760:32): pid=8770 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir135873825/syzkaller.1F9fX7/1/bus" dev="sda1" ino=16560 res=1 18:01:04 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'bcsf0\x00H\x00'}, 0x18) 18:01:04 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = eventfd(0x0) r2 = dup(r1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/156, 0x9c}], 0x1) sendfile(r2, r3, 0x0, 0x8000fffffffe) write$FUSE_GETXATTR(r2, &(0x7f00000000c0)={0x18}, 0x18) 18:01:04 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = eventfd(0x0) r2 = dup(r1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/156, 0x9c}], 0x1) sendfile(r2, r3, 0x0, 0x8000fffffffe) write$FUSE_GETXATTR(r2, &(0x7f00000000c0)={0x18}, 0x18) 18:01:04 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = eventfd(0x0) r2 = dup(r1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/156, 0x9c}], 0x1) sendfile(r2, r3, 0x0, 0x8000fffffffe) write$FUSE_GETXATTR(r2, &(0x7f00000000c0)={0x18}, 0x18) 18:01:05 executing program 0: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'bcsf0\x00H\x00'}, 0x18) [ 134.222473][ T39] audit: type=1804 audit(1575568865.000:33): pid=8781 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir135873825/syzkaller.1F9fX7/2/bus" dev="sda1" ino=16572 res=1 [ 134.260210][ T39] audit: type=1804 audit(1575568865.010:34): pid=8783 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/syzkaller-testdir915490299/syzkaller.aMnFIw/2/bus" dev="sda1" ino=16574 res=1 18:01:05 executing program 0: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'bcsf0\x00H\x00'}, 0x18) [ 134.295394][ T39] audit: type=1804 audit(1575568865.050:35): pid=8787 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir564466176/syzkaller.Zo0E1e/1/bus" dev="sda1" ino=16575 res=1 18:01:05 executing program 0: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'bcsf0\x00H\x00'}, 0x18) 18:01:05 executing program 0: r0 = socket$inet(0x2b, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'bcsf0\x00H\x00'}, 0x18) 18:01:05 executing program 0: r0 = socket$inet(0x2b, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'bcsf0\x00H\x00'}, 0x18) 18:01:05 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = eventfd(0x0) r2 = dup(r1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/156, 0x9c}], 0x1) sendfile(r2, r3, 0x0, 0x8000fffffffe) write$FUSE_GETXATTR(r2, &(0x7f00000000c0)={0x18}, 0x18) [ 134.679111][ T39] audit: type=1804 audit(1575568865.460:36): pid=8810 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir135873825/syzkaller.1F9fX7/3/bus" dev="sda1" ino=16572 res=1 18:01:05 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = eventfd(0x0) r2 = dup(r1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/156, 0x9c}], 0x1) sendfile(r2, r3, 0x0, 0x8000fffffffe) write$FUSE_GETXATTR(r2, &(0x7f00000000c0)={0x18}, 0x18) 18:01:05 executing program 0: r0 = socket$inet(0x2b, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'bcsf0\x00H\x00'}, 0x18) 18:01:05 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = eventfd(0x0) r2 = dup(r1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/156, 0x9c}], 0x1) sendfile(r2, r3, 0x0, 0x8000fffffffe) write$FUSE_GETXATTR(r2, &(0x7f00000000c0)={0x18}, 0x18) 18:01:05 executing program 0: socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'bcsf0\x00H\x00'}, 0x18) [ 134.782609][ T39] audit: type=1804 audit(1575568865.550:37): pid=8814 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/syzkaller-testdir915490299/syzkaller.aMnFIw/3/bus" dev="sda1" ino=16577 res=1 18:01:05 executing program 0: socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'bcsf0\x00H\x00'}, 0x18) [ 134.825588][ T39] audit: type=1804 audit(1575568865.560:38): pid=8821 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir564466176/syzkaller.Zo0E1e/2/bus" dev="sda1" ino=16578 res=1 18:01:05 executing program 0: socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'bcsf0\x00H\x00'}, 0x18) 18:01:05 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, 0x0, 0x0) 18:01:05 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00', @ifru_addrs=@nl}) 18:01:06 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = eventfd(0x0) r2 = dup(r1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/156, 0x9c}], 0x1) sendfile(r2, r3, 0x0, 0x8000fffffffe) write$FUSE_GETXATTR(r2, &(0x7f00000000c0)={0x18}, 0x18) 18:01:06 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, 0x0, 0x0) 18:01:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5", 0x23}], 0x4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = socket(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:01:06 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, 0x0, 0x0) 18:01:06 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = eventfd(0x0) r2 = dup(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/156, 0x9c}], 0x1) sendfile(r2, r3, 0x0, 0x8000fffffffe) 18:01:06 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'bcsf0\x00H\x00'}, 0x18) [ 135.295836][ T39] audit: type=1804 audit(1575568866.080:39): pid=8847 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir564466176/syzkaller.Zo0E1e/3/bus" dev="sda1" ino=16577 res=1 [ 135.350149][ T39] audit: type=1804 audit(1575568866.130:40): pid=8855 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/syzkaller-testdir915490299/syzkaller.aMnFIw/5/bus" dev="sda1" ino=16578 res=1 18:01:06 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'bcsf0\x00H\x00'}, 0x18) [ 135.891411][ C0] hrtimer: interrupt took 23236 ns 18:01:07 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'bcsf0\x00H\x00'}, 0x18) 18:01:07 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = eventfd(0x0) r2 = dup(r1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/156, 0x9c}], 0x1) sendfile(r2, r3, 0x0, 0x8000fffffffe) 18:01:07 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = eventfd(0x0) r2 = dup(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/156, 0x9c}], 0x1) sendfile(r2, r3, 0x0, 0x8000fffffffe) 18:01:07 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00', @ifru_addrs=@nl}) [ 136.889332][ T39] kauditd_printk_skb: 2 callbacks suppressed [ 136.889358][ T39] audit: type=1804 audit(1575568867.670:43): pid=8873 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir564466176/syzkaller.Zo0E1e/4/bus" dev="sda1" ino=16584 res=1 18:01:07 executing program 0: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010000000000000ffffffff000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000004aa4911300f9ffffffff8000000000000000821c000001000010000000000100000000000006cb8519a9", 0x67}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 136.966082][ T39] audit: type=1804 audit(1575568867.670:44): pid=8872 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/syzkaller-testdir915490299/syzkaller.aMnFIw/6/bus" dev="sda1" ino=16550 res=1 18:01:07 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00', @ifru_addrs=@nl}) [ 137.093943][ T13] BUG: unable to handle page fault for address: fffff52005200000 [ 137.099082][ T4285] kobject: 'loop1' (00000000986dd6ca): kobject_uevent_env [ 137.101237][ T13] #PF: supervisor read access in kernel mode [ 137.101237][ T13] #PF: error_code(0x0000) - not-present page [ 137.101237][ T13] PGD 7ffcd067 P4D 7ffcd067 PUD 2cd1c067 PMD 0 [ 137.101237][ T13] Oops: 0000 [#1] PREEMPT SMP KASAN [ 137.101237][ T13] CPU: 0 PID: 13 Comm: kworker/0:1 Not tainted 5.4.0-syzkaller #0 [ 137.101237][ T13] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 137.101237][ T13] Workqueue: xfs-buf/loop0 xfs_buf_ioend_work [ 137.151986][ T4285] kobject: 'loop1' (00000000986dd6ca): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 137.135825][ T13] RIP: 0010:xfs_sb_read_verify+0xf0/0x540 [ 137.135825][ T13] Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 18 04 00 00 4d 8b ac 24 30 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e a7 03 00 00 41 8b 75 00 bf 58 [ 137.135825][ T13] RSP: 0018:ffffc9000040faf0 EFLAGS: 00010a06 [ 137.135825][ T13] RAX: dffffc0000000000 RBX: 1ffff92000081f61 RCX: ffffffff82ac0e86 [ 137.135825][ T13] RDX: 1ffff92005200000 RSI: ffffffff82a8d7ab RDI: ffff888022fb2a60 [ 137.135825][ T13] RBP: ffffc9000040fcd0 R08: ffff88802c5ec340 R09: ffffed1005a47045 [ 137.135825][ T13] R10: ffffed1005a47044 R11: ffff88802d238223 R12: ffff888022fb2940 [ 137.161289][ T13] R13: ffffc90029000000 R14: ffffc9000040fca8 R15: ffff88801f896000 [ 137.161289][ T13] FS: 0000000000000000(0000) GS:ffff88802d200000(0000) knlGS:0000000000000000 [ 137.161289][ T13] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 137.161289][ T13] CR2: fffff52005200000 CR3: 000000006cf08000 CR4: 0000000000340ef0 [ 137.161289][ T13] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 137.161289][ T13] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 137.161289][ T13] Call Trace: [ 137.161289][ T13] ? xfs_sb_write_verify+0x470/0x470 [ 137.161289][ T13] ? __kasan_check_read+0x11/0x20 [ 137.161289][ T13] ? mark_lock+0xc2/0x1220 [ 137.161289][ T13] ? __kasan_check_read+0x11/0x20 [ 137.161289][ T13] ? __lock_acquire+0x16f2/0x4a00 [ 137.161289][ T13] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 137.161289][ T13] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 137.161289][ T13] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 137.161289][ T13] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 137.161289][ T13] xfs_buf_ioend+0x3f9/0xde0 [ 137.161289][ T13] ? trace_hardirqs_on+0x67/0x240 [ 137.161289][ T13] xfs_buf_ioend_work+0x19/0x20 [ 137.161289][ T13] process_one_work+0x9af/0x1740 [ 137.161289][ T13] ? pwq_dec_nr_in_flight+0x320/0x320 [ 137.161289][ T13] ? lock_acquire+0x190/0x410 [ 137.161289][ T13] worker_thread+0x98/0xe40 [ 137.161289][ T13] ? trace_hardirqs_on+0x67/0x240 [ 137.161289][ T13] kthread+0x361/0x430 [ 137.161289][ T13] ? process_one_work+0x1740/0x1740 [ 137.161289][ T13] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 137.161289][ T13] ret_from_fork+0x24/0x30 [ 137.161289][ T13] Modules linked in: [ 137.161289][ T13] CR2: fffff52005200000 [ 137.161289][ T13] ---[ end trace f6877e8de4963b9a ]--- [ 137.161289][ T13] RIP: 0010:xfs_sb_read_verify+0xf0/0x540 [ 137.161289][ T13] Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 18 04 00 00 4d 8b ac 24 30 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e a7 03 00 00 41 8b 75 00 bf 58 [ 137.161289][ T13] RSP: 0018:ffffc9000040faf0 EFLAGS: 00010a06 [ 137.161289][ T13] RAX: dffffc0000000000 RBX: 1ffff92000081f61 RCX: ffffffff82ac0e86 [ 137.161289][ T13] RDX: 1ffff92005200000 RSI: ffffffff82a8d7ab RDI: ffff888022fb2a60 [ 137.161289][ T13] RBP: ffffc9000040fcd0 R08: ffff88802c5ec340 R09: ffffed1005a47045 [ 137.161289][ T13] R10: ffffed1005a47044 R11: ffff88802d238223 R12: ffff888022fb2940 [ 137.161289][ T13] R13: ffffc90029000000 R14: ffffc9000040fca8 R15: ffff88801f896000 [ 137.161289][ T13] FS: 0000000000000000(0000) GS:ffff88802d200000(0000) knlGS:0000000000000000 [ 137.161289][ T13] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 137.161289][ T13] CR2: fffff52005200000 CR3: 000000006cf08000 CR4: 0000000000340ef0 [ 137.161289][ T13] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 137.161289][ T13] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 137.161289][ T13] Kernel panic - not syncing: Fatal exception [ 137.161289][ T13] Kernel Offset: disabled [ 137.161289][ T13] Rebooting in 86400 seconds..