Warning: Permanently added '[localhost]:22699' (ECDSA) to the list of known hosts. [ 177.287496][ T40] audit: type=1400 audit(1593606055.370:42): avc: denied { map } for pid=11043 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16525 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2020/07/01 12:20:55 fuzzer started 2020/07/01 12:20:56 dialing manager at 10.0.2.10:41169 2020/07/01 12:20:57 syscalls: 3122 2020/07/01 12:20:57 code coverage: enabled 2020/07/01 12:20:57 comparison tracing: enabled 2020/07/01 12:20:57 extra coverage: enabled 2020/07/01 12:20:57 setuid sandbox: enabled 2020/07/01 12:20:57 namespace sandbox: enabled 2020/07/01 12:20:57 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/01 12:20:57 fault injection: enabled 2020/07/01 12:20:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/01 12:20:57 net packet injection: enabled 2020/07/01 12:20:57 net device setup: enabled 2020/07/01 12:20:57 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/07/01 12:20:57 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/01 12:20:57 USB emulation: enabled [ 178.875189][ T40] audit: type=1400 audit(1593606056.950:43): avc: denied { integrity } for pid=11060 comm="syz-executor" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 12:21:36 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbc, 0xbc, 0x4, [@int, @typedef, @var, @func, @typedef, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0xd8}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102392, 0x18ff8}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 218.665685][ T40] audit: type=1400 audit(1593606096.740:44): avc: denied { map } for pid=11063 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=2099 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 12:21:36 executing program 1: r0 = memfd_create(&(0x7f0000000340), 0x0) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x0, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 12:21:37 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') dup3(r0, r1, 0x0) [ 219.835512][T11067] IPVS: ftp: loaded support on port[0] = 21 [ 219.835573][T11065] IPVS: ftp: loaded support on port[0] = 21 12:21:38 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) [ 220.318197][T11069] IPVS: ftp: loaded support on port[0] = 21 [ 220.453526][T11065] chnl_net:caif_netlink_parms(): no params data found [ 220.615168][T11067] chnl_net:caif_netlink_parms(): no params data found [ 220.703376][T11072] IPVS: ftp: loaded support on port[0] = 21 [ 220.863321][T11065] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.889648][T11065] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.932077][T11065] device bridge_slave_0 entered promiscuous mode [ 220.991337][T11067] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.015614][T11067] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.041486][T11067] device bridge_slave_0 entered promiscuous mode [ 221.067558][T11065] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.091866][T11065] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.119730][T11065] device bridge_slave_1 entered promiscuous mode [ 221.172893][T11067] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.199215][T11067] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.218801][T11067] device bridge_slave_1 entered promiscuous mode [ 221.262372][T11065] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 221.293613][T11065] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 221.335218][T11067] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 221.394678][T11067] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 221.467715][T11065] team0: Port device team_slave_0 added [ 221.527478][T11065] team0: Port device team_slave_1 added [ 221.547908][T11067] team0: Port device team_slave_0 added [ 221.571644][T11069] chnl_net:caif_netlink_parms(): no params data found [ 221.623327][T11067] team0: Port device team_slave_1 added [ 221.671184][T11065] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 221.694900][T11065] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 221.756844][T11065] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 221.784373][T11067] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 221.799969][T11067] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 221.863707][T11067] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 221.926862][T11065] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 221.958835][T11065] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 222.083979][T11065] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 222.118666][T11067] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 222.140592][T11067] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 222.243850][T11067] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 222.338551][T11072] chnl_net:caif_netlink_parms(): no params data found [ 222.400259][T11069] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.416726][T11069] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.431935][T11069] device bridge_slave_0 entered promiscuous mode [ 222.521199][T11065] device hsr_slave_0 entered promiscuous mode [ 222.599669][T11065] device hsr_slave_1 entered promiscuous mode [ 222.759016][T11067] device hsr_slave_0 entered promiscuous mode [ 222.836810][T11067] device hsr_slave_1 entered promiscuous mode [ 222.907439][T11067] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 222.939087][T11067] Cannot create hsr debugfs directory [ 222.958583][T11069] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.987465][T11069] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.020372][T11069] device bridge_slave_1 entered promiscuous mode [ 223.113760][T11069] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 223.179991][T11069] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 223.354402][T11069] team0: Port device team_slave_0 added [ 223.422134][T11072] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.446577][T11072] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.472919][T11072] device bridge_slave_0 entered promiscuous mode [ 223.495758][T11069] team0: Port device team_slave_1 added [ 223.530842][T11072] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.552890][T11072] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.574942][T11072] device bridge_slave_1 entered promiscuous mode [ 223.648258][T11069] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 223.670230][T11069] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 223.752688][T11069] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 223.807720][T11069] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 223.841146][T11069] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 223.977725][T11069] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 224.068128][T11072] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 224.134812][T11072] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 224.374438][T11069] device hsr_slave_0 entered promiscuous mode [ 224.468832][T11069] device hsr_slave_1 entered promiscuous mode [ 224.556810][T11069] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 224.579813][T11069] Cannot create hsr debugfs directory [ 224.649755][T11072] team0: Port device team_slave_0 added [ 224.699288][T11072] team0: Port device team_slave_1 added [ 224.783400][ T40] audit: type=1400 audit(1593606102.860:45): avc: denied { create } for pid=11065 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 224.791622][T11072] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 224.883143][ T40] audit: type=1400 audit(1593606102.860:46): avc: denied { write } for pid=11065 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 224.886642][T11072] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 224.955258][ T40] audit: type=1400 audit(1593606102.870:47): avc: denied { read } for pid=11065 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 225.012570][T11072] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 225.018763][T11072] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 225.154871][T11072] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 225.212595][T11072] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 225.248927][T11065] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 225.309967][T11065] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 225.396098][T11065] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 225.489325][T11065] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 225.643289][T11067] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 225.714432][T11067] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 225.923256][T11072] device hsr_slave_0 entered promiscuous mode [ 226.006857][T11072] device hsr_slave_1 entered promiscuous mode [ 226.086578][T11072] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 226.109496][T11072] Cannot create hsr debugfs directory [ 226.151879][T11067] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 226.223339][T11067] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 226.433614][T11069] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 226.505203][T11069] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 226.561775][T11069] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 226.634027][T11069] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 226.827836][T11072] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 226.890944][T11072] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 226.995450][T11072] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 227.089501][T11072] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 227.244761][T11065] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.310321][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.331235][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.352404][T11065] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.399187][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.420134][ T3823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.439317][ T3823] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.452008][ T3823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.489516][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.518045][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.539154][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.555292][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.572765][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.607214][T11067] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.633896][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 227.659423][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 227.684635][T11067] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.718173][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.740604][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.757225][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 227.775145][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.796955][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 227.840307][T11069] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.867867][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 227.890185][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.911060][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.937293][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.965250][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.987342][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.236154][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.290646][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.313841][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.330003][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.362339][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.464705][T11080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.502203][T11080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.575769][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.607362][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.624346][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.647747][T11069] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.674351][T11072] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.689633][T11065] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.710209][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.734601][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.754428][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.881329][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.903966][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.929128][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.947991][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.970792][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.989428][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.009187][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.030115][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.047325][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.067194][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.083166][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.104852][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.125927][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.145782][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.167237][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.213889][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.275228][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.307078][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 229.322595][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 229.368900][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.387717][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.422705][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.440188][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.457282][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.473503][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.489224][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.508982][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.539124][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 229.568027][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.596771][T11072] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.615000][T11069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.638623][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.655103][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.687416][T11065] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.728655][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.755861][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.777367][ T3148] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.800657][ T3148] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.825354][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.848755][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.870354][ T3148] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.890157][ T3148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.912342][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.942261][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.988348][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.047581][ T3827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.083869][ T3827] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 230.103482][ T3827] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 230.159479][T11069] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 230.177513][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.202307][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.236982][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.270050][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 230.307541][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.333038][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.359326][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 230.385888][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.443077][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 230.467097][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.489659][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 230.510459][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 230.533752][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 230.559763][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.599270][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.636964][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.662089][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.679839][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.705318][T11072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 230.740925][T11065] device veth0_vlan entered promiscuous mode [ 230.785306][T11067] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 230.805078][T11080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 230.822118][T11080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.851144][T11065] device veth1_vlan entered promiscuous mode [ 230.895228][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 230.927537][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 230.964795][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 230.991049][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.030771][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 231.079299][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 231.121285][T11069] device veth0_vlan entered promiscuous mode [ 231.157474][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.188961][T11091] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.221567][T11072] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.253673][T11069] device veth1_vlan entered promiscuous mode [ 231.291425][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 231.318297][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.379224][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 231.423561][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.481607][T11065] device veth0_macvtap entered promiscuous mode [ 231.521457][ T3827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 231.565058][ T3827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 231.620944][ T3827] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 231.693164][T11065] device veth1_macvtap entered promiscuous mode [ 231.748468][T11080] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 231.790006][T11080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 231.833685][T11080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.874095][T11080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 231.909661][T11080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 231.959058][T11080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 232.004882][T11080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 232.054022][T11067] device veth0_vlan entered promiscuous mode [ 232.095554][T11072] device veth0_vlan entered promiscuous mode [ 232.139291][T11080] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.177990][T11080] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.209691][T11080] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.246830][T11080] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.297158][T11067] device veth1_vlan entered promiscuous mode [ 232.321499][T11069] device veth0_macvtap entered promiscuous mode [ 232.361145][T11069] device veth1_macvtap entered promiscuous mode [ 232.402393][T11065] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 232.440333][T11072] device veth1_vlan entered promiscuous mode [ 232.515074][T11080] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 232.564665][T11080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.634590][T11065] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 232.678502][ T3827] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 232.712605][ T3827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 232.822970][T11069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 232.902700][T11069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.965851][T11069] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 233.005640][T11069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 233.035699][T11069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.079154][T11069] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 233.217756][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 233.253579][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 233.271516][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 233.291924][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 233.315365][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 233.344665][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 233.410925][T11067] device veth0_macvtap entered promiscuous mode [ 233.426055][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 233.465762][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 233.604418][T11072] device veth0_macvtap entered promiscuous mode [ 233.784235][ T40] audit: type=1400 audit(1593606111.850:48): avc: denied { associate } for pid=11065 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 234.107576][T11067] device veth1_macvtap entered promiscuous mode [ 234.182790][T11072] device veth1_macvtap entered promiscuous mode [ 234.330403][T11065] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 234.344911][T11067] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.462428][T11067] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.533663][T11067] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.613941][T11067] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.744652][T11067] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 234.821984][T11072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.921213][T11072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.074968][T11072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 235.110666][ T40] audit: type=1400 audit(1593606113.180:49): avc: denied { bpf } for pid=11096 comm="syz-executor.0" capability=39 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 235.159630][T11072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 12:21:53 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbc, 0xbc, 0x4, [@int, @typedef, @var, @func, @typedef, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0xd8}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102392, 0x18ff8}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 235.331258][T11072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 235.398320][T11072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.473903][T11072] batman_adv: batadv0: Interface activated: batadv_slave_0 12:21:53 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860073ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x1120, 0x11, 0x0, 0x27) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 235.549623][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 235.602052][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 235.704247][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 235.765151][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 235.799105][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 235.835032][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 235.935609][T11067] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.001362][T11067] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.040888][T11067] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.072253][T11067] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.131050][T11067] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 236.163779][T11072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.199877][T11072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.241112][T11072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.279530][T11072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.321473][T11072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.354690][T11072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.387323][T11072] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 236.410780][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 236.445372][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 12:21:54 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860073ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x1120, 0x11, 0x0, 0x27) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 236.478795][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 236.512883][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 12:21:54 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c27bc01ff003639405cb4aec12f0000001500ae47a825d86800278dcff47d010000805acf4f8f364602344324adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebfdf70faa53367f05f4affffffffffff800031e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563af083476882296a9660f14d11db401a5dd7f3356f46386ea5580575f1cef3b8a0fc872356a9415d9e6e1", 0xcf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:21:54 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x3, 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') [ 237.158748][ T40] audit: type=1400 audit(1593606115.230:50): avc: denied { map } for pid=11128 comm="syz-executor.1" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=39449 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 12:21:55 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x3, 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') 12:21:55 executing program 3: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) open$dir(0x0, 0x40000400000002c2, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000000), 0x10000000000003c2, 0x0) 12:21:55 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x3, 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') 12:21:55 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860073ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x1120, 0x11, 0x0, 0x27) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 12:21:56 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x3, 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') 12:21:56 executing program 1: r0 = memfd_create(&(0x7f0000000340), 0x0) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x0, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) [ 237.987033][ T40] audit: type=1804 audit(1593606116.060:51): pid=11147 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir185643333/syzkaller.1ufVyq/1/file0" dev="sda1" ino=16560 res=1 12:21:56 executing program 3: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) open$dir(0x0, 0x40000400000002c2, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000000), 0x10000000000003c2, 0x0) 12:21:56 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') [ 238.362161][ T40] audit: type=1804 audit(1593606116.440:52): pid=11158 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir185643333/syzkaller.1ufVyq/2/file0" dev="sda1" ino=16567 res=1 12:21:56 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') 12:21:56 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000402d2, 0x0) writev(r0, &(0x7f0000000340)=[{0x0}], 0x1) 12:21:56 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') 12:21:56 executing program 3: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) open$dir(0x0, 0x40000400000002c2, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000000), 0x10000000000003c2, 0x0) 12:21:56 executing program 1: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) open$dir(0x0, 0x0, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000000), 0x2cfea}], 0x1000000000000013) 12:21:56 executing program 0: socketpair$unix(0x1, 0x200000000000002, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket(0x1f, 0x10000005, 0x2) listen(r1, 0x0) fcntl$dupfd(r0, 0xa, 0xffffffffffffffff) 12:21:56 executing program 2: mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x3, 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') 12:21:56 executing program 1: r0 = socket(0x1f, 0x1, 0x0) listen(r0, 0x0) 12:21:57 executing program 2: mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x3, 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') 12:21:57 executing program 0: socketpair$unix(0x1, 0x200000000000002, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket(0x1f, 0x10000005, 0x2) listen(r1, 0x0) fcntl$dupfd(r0, 0xa, 0xffffffffffffffff) 12:21:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/164, 0xa4}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x0) [ 238.931763][ T40] audit: type=1804 audit(1593606117.010:53): pid=11173 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir185643333/syzkaller.1ufVyq/3/file0" dev="sda1" ino=16560 res=1 12:21:57 executing program 3: shmget$private(0x0, 0xd000, 0x0, &(0x7f0000ff2000/0xd000)=nil) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000000), 0x10000000000003c2, 0x0) 12:21:57 executing program 2: mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x3, 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') 12:21:57 executing program 0: socketpair$unix(0x1, 0x200000000000002, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket(0x1f, 0x10000005, 0x2) listen(r1, 0x0) fcntl$dupfd(r0, 0xa, 0xffffffffffffffff) 12:21:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/164, 0xa4}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x0) 12:21:57 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x3, 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') 12:21:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/164, 0xa4}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x0) [ 239.588235][ T40] audit: type=1804 audit(1593606117.670:54): pid=11199 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir185643333/syzkaller.1ufVyq/4/file0" dev="sda1" ino=16567 res=1 12:21:57 executing program 0: socketpair$unix(0x1, 0x200000000000002, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket(0x1f, 0x10000005, 0x2) listen(r1, 0x0) fcntl$dupfd(r0, 0xa, 0xffffffffffffffff) 12:21:57 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x3, 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') [ 239.672731][ T40] audit: type=1804 audit(1593606117.670:55): pid=11199 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir185643333/syzkaller.1ufVyq/4/file0" dev="sda1" ino=16567 res=1 12:21:57 executing program 0: socketpair$unix(0x1, 0x200000000000002, 0x0, &(0x7f0000000140)) r0 = socket(0x1f, 0x10000005, 0x2) listen(r0, 0x0) 12:21:57 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x3, 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') 12:21:57 executing program 3: shmget$private(0x0, 0xd000, 0x0, &(0x7f0000ff2000/0xd000)=nil) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000000), 0x10000000000003c2, 0x0) 12:21:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/164, 0xa4}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x0) 12:21:57 executing program 0: socketpair$unix(0x1, 0x200000000000002, 0x0, &(0x7f0000000140)) socket(0x1f, 0x10000005, 0x2) 12:21:57 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x3, 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') 12:21:58 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/164, 0xa4}], 0x1}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) [ 239.894677][ T40] audit: type=1804 audit(1593606117.970:56): pid=11231 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir185643333/syzkaller.1ufVyq/5/file0" dev="sda1" ino=16571 res=1 12:21:58 executing program 0: socket(0x1f, 0x10000005, 0x2) 12:21:58 executing program 3: r0 = socket$inet6(0x10, 0x2, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000000240)="4c00000012001f15b9409b849ac00a00a5784002000000000000030038c88cc055c5ac27a6c5b068d0bf46d323456536005ad94a461cdbfee9bdb9423523598451d1ec0cffc8792cd8000080", 0x4c, 0x0, 0x0, 0x0) 12:21:58 executing program 0: socket(0x0, 0x10000005, 0x2) 12:21:58 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/164, 0xa4}], 0x1}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 12:21:58 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x3, 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') [ 240.033420][ T40] audit: type=1804 audit(1593606117.970:57): pid=11231 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir185643333/syzkaller.1ufVyq/5/file0" dev="sda1" ino=16571 res=1 12:21:58 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/164, 0xa4}], 0x1}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) 12:21:58 executing program 0: socket(0x0, 0x0, 0x2) 12:21:58 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$cont(0x20, r0, 0x0, 0x1) 12:21:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x0) 12:21:58 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x3, 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') 12:21:58 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) sendfile(r1, r0, 0x0, 0x4000000000dc) 12:21:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x0) [ 240.305536][ T40] audit: type=1400 audit(1593606118.380:58): avc: denied { open } for pid=11277 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 12:21:58 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000880)='./file0\x00', 0x0, 0x3, 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') 12:21:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x0) [ 240.381756][ T40] audit: type=1400 audit(1593606118.430:59): avc: denied { confidentiality } for pid=11277 comm="syz-executor.3" lockdown_reason="unsafe use of perf" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 12:21:58 executing program 0: socket(0x0, 0x0, 0x2) 12:21:58 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x0) 12:21:58 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000880)='./file0\x00', 0x0, 0x3, 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') 12:21:58 executing program 0: socket(0x0, 0x0, 0x2) 12:21:58 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000880)='./file0\x00', 0x0, 0x3, 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') 12:21:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="665f07000005eb6b41432273bc33760036f300000000007dc0c6b18f7f8050617cbed5f8000400001500a9020b22e0a6f1a3eb874a677aa3135cedf8ccd329bc01008574d5e657b05159ee5c70493f3b7dd6396c5d8324315ac7297dbe008d2b09a73ce283d6cbcf356cb3d234a1e989abe98668b7d94139bf66fd6ff92caea1475fc8344e664c5943d47876cecf83a12d1dbb23b48f89d108dd05d9e0bdfd561a58c7aaa0474ca4305ff2006a9617356062ec901e02841eae8594f5553523b3787280fa630b25c26d79870c0e7ed83d6dad3408961f980c3059b22a72fa0e8d1af70f0064ff10c306ac8b997861d56531", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 12:21:58 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x0) 12:21:58 executing program 0: socket(0x0, 0x10000005, 0x0) 12:21:59 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) unlink(&(0x7f0000000540)='./file0/file0\x00') 12:21:59 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x0) [ 240.926601][ C2] traps: PANIC: double fault, error_code: 0x0 [ 240.926601][ C2] double fault: 0000 [#1] PREEMPT SMP KASAN [ 240.926601][ C2] CPU: 2 PID: 11319 Comm: syz-executor.3 Not tainted 5.8.0-rc2-syzkaller #0 [ 240.926601][ C2] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 240.926601][ C2] RIP: 0010:fixup_bad_iret+0x24/0x170 [ 240.926601][ C2] Code: eb cb 0f 1f 40 00 41 55 49 bd 00 00 00 00 00 fc ff df 41 54 55 48 89 fd 48 c7 c7 80 85 45 88 53 48 81 ec 40 01 00 00 48 89 e3 <48> c7 04 24 b3 8a b5 41 48 c7 44 24 08 cf 25 6b 89 48 c1 eb 03 48 [ 240.926601][ C2] RSP: 0018:fffffe000006bfb8 EFLAGS: 00010086 [ 240.926601][ C2] RAX: fffffffffffffffe RBX: fffffe000006bfb8 RCX: ffffffff88000e87 [ 240.926601][ C2] RDX: 0000000000000000 RSI: ffffffff880009a8 RDI: ffffffff88458580 [ 240.926601][ C2] RBP: fffffe000006c120 R08: 0000000000000000 R09: 0000000000000000 [ 240.926601][ C2] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 240.926601][ C2] R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 [ 240.926601][ C2] FS: 00007f1172cd9700(0000) GS:ffff88802d000000(0000) knlGS:0000000000000000 [ 240.926601][ C2] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 240.926601][ C2] CR2: fffffe000006bfa8 CR3: 00000000756c0000 CR4: 0000000000340ee0 [ 240.926601][ C2] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 240.926601][ C2] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 240.926601][ C2] Call Trace: [ 240.926601][ C2] [ 240.926601][ C2] error_entry+0xb8/0xc0 [ 240.926601][ C2] RIP: 0010:native_irq_return_iret+0x0/0x2 [ 240.926601][ C2] Code: 5a 41 59 41 58 58 59 5a 5e 5f 48 83 c4 08 e9 10 00 00 00 90 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 00 00 00 f6 44 24 20 04 75 02 <48> cf 57 0f 01 f8 0f 1f 00 65 48 8b 3c 25 00 90 01 00 48 89 07 48 [ 240.926601][ C2] RSP: 0018:fffffe000006c1d8 EFLAGS: 00010046 ORIG_RAX: 0000000000000000 [ 240.926601][ C2] RAX: fffffffffffffffe RBX: 0000000000000000 RCX: 0000000000000000 [ 240.926601][ C2] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000100 [ 240.926601][ C2] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 240.926601][ C2] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 240.926601][ C2] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 240.926601][ C2] ? asm_exc_general_protection+0x8/0x30 [ 240.926601][ C2] RIP: 0033:0x6beb050000075f66 [ 240.926601][ C2] Code: Bad RIP value. [ 240.926601][ C2] RSP: 002b:00007f1172cd8c78 EFLAGS: 00000246 [ 240.926601][ C2] Modules linked in: [ 241.847777][ C2] ---[ end trace bc1db60d35f59644 ]--- [ 241.847777][ C2] RIP: 0010:fixup_bad_iret+0x24/0x170 [ 241.847777][ C2] Code: eb cb 0f 1f 40 00 41 55 49 bd 00 00 00 00 00 fc ff df 41 54 55 48 89 fd 48 c7 c7 80 85 45 88 53 48 81 ec 40 01 00 00 48 89 e3 <48> c7 04 24 b3 8a b5 41 48 c7 44 24 08 cf 25 6b 89 48 c1 eb 03 48 [ 241.847777][ C2] RSP: 0018:fffffe000006bfb8 EFLAGS: 00010086 [ 241.847777][ C2] RAX: fffffffffffffffe RBX: fffffe000006bfb8 RCX: ffffffff88000e87 [ 241.847777][ C2] RDX: 0000000000000000 RSI: ffffffff880009a8 RDI: ffffffff88458580 [ 241.847777][ C2] RBP: fffffe000006c120 R08: 0000000000000000 R09: 0000000000000000 [ 241.847777][ C2] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 241.847777][ C2] R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 [ 241.847777][ C2] FS: 00007f1172cd9700(0000) GS:ffff88802d000000(0000) knlGS:0000000000000000 [ 241.847777][ C2] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 241.847777][ C2] CR2: fffffe000006bfa8 CR3: 00000000756c0000 CR4: 0000000000340ee0 [ 241.847777][ C2] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 241.847777][ C2] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 241.847777][ C2] Kernel panic - not syncing: Fatal exception in interrupt [ 241.847777][ C2] Kernel Offset: disabled