[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 54.473385][ T25] audit: type=1800 audit(1572487196.563:25): pid=8556 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 54.494028][ T25] audit: type=1800 audit(1572487196.573:26): pid=8556 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 54.533301][ T25] audit: type=1800 audit(1572487196.573:27): pid=8556 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.195' (ECDSA) to the list of known hosts. 2019/10/31 02:00:04 fuzzer started 2019/10/31 02:00:06 dialing manager at 10.128.0.26:32889 2019/10/31 02:00:06 syscalls: 2541 2019/10/31 02:00:06 code coverage: enabled 2019/10/31 02:00:06 comparison tracing: enabled 2019/10/31 02:00:06 extra coverage: extra coverage is not supported by the kernel 2019/10/31 02:00:06 setuid sandbox: enabled 2019/10/31 02:00:06 namespace sandbox: enabled 2019/10/31 02:00:06 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/31 02:00:06 fault injection: enabled 2019/10/31 02:00:06 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/31 02:00:06 net packet injection: enabled 2019/10/31 02:00:06 net device setup: enabled 2019/10/31 02:00:06 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 02:02:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x801, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x7ffff, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaa94aaaa08004800021c63be463d0a1b84a59e1392f5b2c90000ee05e00da430ca7843a6c8eae4000000009078ac141400ac1423bb830a909ff20a748f8778ffffffff0000000000d2643836000000bfd59553a3f9583cd0b9b87e2016a843de9121726194dc052efa3dab9b961c9d914a9b3c09aae7ff85e4cb"], &(0x7f0000000040)) sendmsg$inet6(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000340)="c4", 0x1}], 0x1}, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x44) ftruncate(r3, 0x2007fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) 02:02:02 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, &(0x7f00000004c0)=ANY=[], 0x0, 0x0, 0x0) msgsnd(r1, &(0x7f0000000180)={0x3}, 0x8, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x16d) syzkaller login: [ 180.094034][ T8722] IPVS: ftp: loaded support on port[0] = 21 [ 180.275622][ T8722] chnl_net:caif_netlink_parms(): no params data found [ 180.318865][ T8722] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.328168][ T8722] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.337768][ T8722] device bridge_slave_0 entered promiscuous mode [ 180.338775][ T8725] IPVS: ftp: loaded support on port[0] = 21 [ 180.350819][ T8722] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.358050][ T8722] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.367337][ T8722] device bridge_slave_1 entered promiscuous mode 02:02:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x0, r3}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000000c0)={r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket(0x0, 0x0, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r6 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 180.395412][ T8722] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 180.409955][ T8722] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 180.451077][ T8722] team0: Port device team_slave_0 added [ 180.487190][ T8722] team0: Port device team_slave_1 added 02:02:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYBLOB="6d047c005d52994c0afc21be2900000047e2252cb7882b9abb2a2f9fb9399e0400c33f00102b0200000089da006a001499b2d1b3a4952f36def66e54e4c909c01e8c4e61f8a0e814f7e2acdd0063c7caa49d5c0600000000000000dc10000000000096b966422ac67e307a1c75f954035ac283ff9d10305309658b8e060038e8941f9e1653e46a428257a686295981d565ed8b40b8382c58a17e2ee72ddd8e12402a08de7a022be9d4c732feee4ed546ef9724dfe29117673acfa22a2230ad43936500de7c065b8cc0b53b7f78e7505d8e2b53d167eeff070000000000000000ff01e55f38dcab4b2f704f43"], 0x2) [ 180.588342][ T8722] device hsr_slave_0 entered promiscuous mode [ 180.627419][ T8722] device hsr_slave_1 entered promiscuous mode [ 180.726932][ T8727] IPVS: ftp: loaded support on port[0] = 21 02:02:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x2761, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 180.909882][ T8725] chnl_net:caif_netlink_parms(): no params data found [ 180.948880][ T8722] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.956181][ T8722] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.964070][ T8722] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.971234][ T8722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.049892][ T8730] IPVS: ftp: loaded support on port[0] = 21 02:02:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 181.129366][ T8725] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.138696][ T8725] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.148949][ T8725] device bridge_slave_0 entered promiscuous mode [ 181.181003][ T8725] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.189497][ T8725] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.198443][ T8725] device bridge_slave_1 entered promiscuous mode [ 181.238076][ T8733] IPVS: ftp: loaded support on port[0] = 21 [ 181.260151][ T2880] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.281238][ T2880] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.298959][ T8727] chnl_net:caif_netlink_parms(): no params data found [ 181.327944][ T8725] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 181.340349][ T8722] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.360481][ T8725] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 181.384887][ T8736] IPVS: ftp: loaded support on port[0] = 21 [ 181.428119][ T8722] 8021q: adding VLAN 0 to HW filter on device team0 [ 181.437033][ T8725] team0: Port device team_slave_0 added [ 181.444046][ T8725] team0: Port device team_slave_1 added [ 181.450091][ T8727] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.457534][ T8727] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.465985][ T8727] device bridge_slave_0 entered promiscuous mode [ 181.474184][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 181.483046][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.514886][ T8727] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.525229][ T8727] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.532983][ T8727] device bridge_slave_1 entered promiscuous mode [ 181.558067][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.567474][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.576032][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.583087][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.707297][ T8725] device hsr_slave_0 entered promiscuous mode [ 181.755760][ T8725] device hsr_slave_1 entered promiscuous mode [ 181.825371][ T8725] debugfs: Directory 'hsr0' with parent '/' already present! [ 181.869275][ T8730] chnl_net:caif_netlink_parms(): no params data found [ 181.890778][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 181.900522][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.909197][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.916451][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.923950][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 181.944119][ T8722] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 181.954827][ T8722] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 181.968017][ T8727] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 181.986567][ T8727] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 182.019717][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.029030][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.037968][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.046639][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.055322][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.063774][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 182.072545][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.081276][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 182.091177][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.099484][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.107299][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 182.123775][ T8722] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 182.142346][ T8727] team0: Port device team_slave_0 added [ 182.181741][ T8727] team0: Port device team_slave_1 added [ 182.210802][ T8730] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.218395][ T8730] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.226614][ T8730] device bridge_slave_0 entered promiscuous mode [ 182.234316][ T8730] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.241447][ T8730] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.249520][ T8730] device bridge_slave_1 entered promiscuous mode [ 182.347573][ T8727] device hsr_slave_0 entered promiscuous mode [ 182.385610][ T8727] device hsr_slave_1 entered promiscuous mode [ 182.425160][ T8727] debugfs: Directory 'hsr0' with parent '/' already present! [ 182.438134][ T8730] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 182.473610][ T8733] chnl_net:caif_netlink_parms(): no params data found [ 182.486074][ T8730] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 182.549589][ T8736] chnl_net:caif_netlink_parms(): no params data found [ 182.581680][ T8730] team0: Port device team_slave_0 added [ 182.593700][ T8730] team0: Port device team_slave_1 added [ 182.632804][ T8733] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.641594][ T8733] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.659383][ T8733] device bridge_slave_0 entered promiscuous mode [ 182.701116][ T8733] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.708566][ T8748] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 182.712951][ T8733] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.735796][ T8733] device bridge_slave_1 entered promiscuous mode [ 182.752247][ T8736] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.761781][ T8736] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.771094][ T8736] device bridge_slave_0 entered promiscuous mode [ 182.784428][ T8725] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.817376][ T8733] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 182.858292][ T8730] device hsr_slave_0 entered promiscuous mode [ 182.894411][ T25] kauditd_printk_skb: 3 callbacks suppressed [ 182.894420][ T25] audit: type=1800 audit(1572487324.983:31): pid=8750 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16520 res=0 [ 182.905497][ T8730] device hsr_slave_1 entered promiscuous mode [ 182.975163][ T8730] debugfs: Directory 'hsr0' with parent '/' already present! [ 182.982925][ T8736] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.990283][ T8736] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.998189][ T8736] device bridge_slave_1 entered promiscuous mode 02:02:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x801, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x7ffff, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaa94aaaa08004800021c63be463d0a1b84a59e1392f5b2c90000ee05e00da430ca7843a6c8eae4000000009078ac141400ac1423bb830a909ff20a748f8778ffffffff0000000000d2643836000000bfd59553a3f9583cd0b9b87e2016a843de9121726194dc052efa3dab9b961c9d914a9b3c09aae7ff85e4cb"], &(0x7f0000000040)) sendmsg$inet6(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000340)="c4", 0x1}], 0x1}, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x44) ftruncate(r3, 0x2007fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 183.025389][ T8733] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 183.051989][ T8736] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 183.086813][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.094736][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.129736][ T8725] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.154716][ T8736] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 02:02:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x801, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x7ffff, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaa94aaaa08004800021c63be463d0a1b84a59e1392f5b2c90000ee05e00da430ca7843a6c8eae4000000009078ac141400ac1423bb830a909ff20a748f8778ffffffff0000000000d2643836000000bfd59553a3f9583cd0b9b87e2016a843de9121726194dc052efa3dab9b961c9d914a9b3c09aae7ff85e4cb"], &(0x7f0000000040)) sendmsg$inet6(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000340)="c4", 0x1}], 0x1}, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x44) ftruncate(r3, 0x2007fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 183.225461][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.234387][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.257421][ T8737] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.264514][ T8737] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.283124][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.292069][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.300684][ T8737] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.307783][ T8737] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.315481][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.326129][ T8736] team0: Port device team_slave_0 added [ 183.334662][ T8733] team0: Port device team_slave_0 added [ 183.360274][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.368748][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.380095][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.389193][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.398445][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.407502][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.416359][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.429770][ T8736] team0: Port device team_slave_1 added 02:02:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x801, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x7ffff, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaa94aaaa08004800021c63be463d0a1b84a59e1392f5b2c90000ee05e00da430ca7843a6c8eae4000000009078ac141400ac1423bb830a909ff20a748f8778ffffffff0000000000d2643836000000bfd59553a3f9583cd0b9b87e2016a843de9121726194dc052efa3dab9b961c9d914a9b3c09aae7ff85e4cb"], &(0x7f0000000040)) sendmsg$inet6(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000340)="c4", 0x1}], 0x1}, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x44) ftruncate(r3, 0x2007fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 183.443770][ T8733] team0: Port device team_slave_1 added [ 183.482346][ T8727] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.541968][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.556042][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.564270][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 02:02:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x801, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x7ffff, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaa94aaaa08004800021c63be463d0a1b84a59e1392f5b2c90000ee05e00da430ca7843a6c8eae4000000009078ac141400ac1423bb830a909ff20a748f8778ffffffff0000000000d2643836000000bfd59553a3f9583cd0b9b87e2016a843de9121726194dc052efa3dab9b961c9d914a9b3c09aae7ff85e4cb"], &(0x7f0000000040)) sendmsg$inet6(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000340)="c4", 0x1}], 0x1}, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x44) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 183.586739][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.599179][ T8725] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.616232][ T8727] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.673983][ T8736] device hsr_slave_0 entered promiscuous mode [ 183.715319][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 183.721220][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 183.727522][ T8736] device hsr_slave_1 entered promiscuous mode [ 183.775239][ T8736] debugfs: Directory 'hsr0' with parent '/' already present! [ 183.835239][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 183.841090][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 183.849096][ T8733] device hsr_slave_0 entered promiscuous mode [ 183.905528][ T8733] device hsr_slave_1 entered promiscuous mode [ 183.945140][ T8733] debugfs: Directory 'hsr0' with parent '/' already present! [ 183.955231][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 183.961028][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 183.967928][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.976153][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 02:02:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x801, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x7ffff, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaa94aaaa08004800021c63be463d0a1b84a59e1392f5b2c90000ee05e00da430ca7843a6c8eae4000000009078ac141400ac1423bb830a909ff20a748f8778ffffffff0000000000d2643836000000bfd59553a3f9583cd0b9b87e2016a843de9121726194dc052efa3dab9b961c9d914a9b3c09aae7ff85e4cb"], &(0x7f0000000040)) sendmsg$inet6(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000340)="c4", 0x1}], 0x1}, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x44) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 184.009407][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.025989][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.034642][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.041789][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.050404][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.059177][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.067706][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.074764][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.082593][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.092096][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.138438][ T8725] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 184.162663][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.172566][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.190201][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.224761][ T8727] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 02:02:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x801, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x7ffff, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaa94aaaa08004800021c63be463d0a1b84a59e1392f5b2c90000ee05e00da430ca7843a6c8eae4000000009078ac141400ac1423bb830a909ff20a748f8778ffffffff0000000000d2643836000000bfd59553a3f9583cd0b9b87e2016a843de9121726194dc052efa3dab9b961c9d914a9b3c09aae7ff85e4cb"], &(0x7f0000000040)) sendmsg$inet6(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000340)="c4", 0x1}], 0x1}, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x44) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 184.235742][ T8727] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 184.248756][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.267684][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.278029][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.286554][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.296048][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.304600][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.313153][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.322401][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 184.342897][ T8730] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.388894][ T8777] kasan: CONFIG_KASAN_INLINE enabled [ 184.394404][ T8777] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 184.402582][ T8777] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 184.405138][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 184.409518][ T8777] CPU: 0 PID: 8777 Comm: syz-executor.0 Not tainted 5.4.0-rc5-next-20191030 #0 [ 184.415281][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 184.424242][ T8777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.439993][ T8777] RIP: 0010:ip_sublist_rcv+0x5c0/0x940 [ 184.445459][ T8777] Code: 0f 85 2f 01 00 00 e8 3f 5d 59 fb 48 8b 85 00 ff ff ff 48 8d b8 e8 0e 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 64 03 00 00 48 8b 85 00 ff ff ff 4c 8b a0 e8 0e [ 184.465064][ T8777] RSP: 0018:ffff8880610af3c8 EFLAGS: 00010206 [ 184.471133][ T8777] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90005f3d000 [ 184.473857][ T8727] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 184.479108][ T8777] RDX: 00000000000001dd RSI: ffffffff861a0711 RDI: 0000000000000ee8 [ 184.479116][ T8777] RBP: ffff8880610af4f0 R08: ffff8880610a2500 R09: ffffed1015d06b7d [ 184.479122][ T8777] R10: ffffed1015d06b7c R11: ffff8880ae835be3 R12: 0000000000000001 [ 184.479129][ T8777] R13: ffff8880932d0000 R14: ffff8880610af558 R15: ffff8880610af4c8 [ 184.479139][ T8777] FS: 00007f776c1c9700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 184.479146][ T8777] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 184.479153][ T8777] CR2: 0000001b2cd29000 CR3: 000000008ee24000 CR4: 00000000001406f0 [ 184.479163][ T8777] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 184.479169][ T8777] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 184.479174][ T8777] Call Trace: [ 184.479194][ T8777] ? ip_rcv_finish+0x2f0/0x2f0 [ 184.479213][ T8777] ? kfree_skbmem+0xca/0x150 [ 184.489039][ T8727] kobject: 'vlan0' (00000000504eab04): kobject_add_internal: parent: 'mesh', set: '' [ 184.493926][ T8777] ? kfree_skb+0x10e/0x3c0 [ 184.493944][ T8777] ? ip_rcv_core.isra.0+0x878/0xc80 [ 184.508397][ T8730] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.509885][ T8777] ip_list_rcv+0x370/0x4ac [ 184.535323][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 184.541299][ T8777] ? ip_rcv+0x3f0/0x3f0 [ 184.549307][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 184.557220][ T8777] ? ip_rcv+0x3f0/0x3f0 [ 184.557240][ T8777] __netif_receive_skb_list_core+0x5fc/0x9d0 [ 184.562967][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.565247][ T8777] ? ktime_get_with_offset+0x135/0x360 [ 184.565261][ T8777] ? ktime_get_with_offset+0x135/0x360 [ 184.565274][ T8777] ? process_backlog+0x750/0x750 [ 184.565292][ T8777] ? lock_acquire+0x190/0x410 [ 184.570331][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.579815][ T8777] ? __kasan_check_read+0x11/0x20 [ 184.579829][ T8777] netif_receive_skb_list_internal+0x7eb/0xe50 [ 184.579844][ T8777] ? __netif_receive_skb_list_core+0x9d0/0x9d0 [ 184.579866][ T8777] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 184.579881][ T8777] ? eth_type_trans+0x3a5/0x760 [ 184.579893][ T8777] gro_normal_list.part.0+0x1e/0xb0 [ 184.579905][ T8777] gro_normal_one+0x184/0x1d0 [ 184.579915][ T8777] napi_gro_frags+0x915/0xd00 [ 184.579930][ T8777] tun_get_user+0x2eba/0x4010 [ 184.579941][ T8777] ? __kasan_check_read+0x11/0x20 [ 184.579960][ T8777] ? tun_build_skb.isra.0+0x1380/0x1380 [ 184.579980][ T8777] ? rcu_read_lock_held+0x9c/0xb0 [ 184.579993][ T8777] ? __kasan_check_read+0x11/0x20 [ 184.580009][ T8777] tun_chr_write_iter+0xbd/0x156 [ 184.580023][ T8777] do_iter_readv_writev+0x5f8/0x8f0 [ 184.580038][ T8777] ? no_seek_end_llseek_size+0x70/0x70 [ 184.580052][ T8777] ? apparmor_file_permission+0x25/0x30 [ 184.580068][ T8777] ? rw_verify_area+0x126/0x360 [ 184.631962][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.633480][ T8777] do_iter_write+0x184/0x610 [ 184.633497][ T8777] ? dup_iter+0x260/0x260 [ 184.640340][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.644515][ T8777] vfs_writev+0x1b3/0x2f0 [ 184.644532][ T8777] ? vfs_iter_write+0xb0/0xb0 [ 184.660800][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.661290][ T8777] ? __kasan_check_read+0x11/0x20 [ 184.666684][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.672777][ T8777] ? ksys_dup3+0x3e0/0x3e0 [ 184.688036][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.690038][ T8777] ? __kasan_check_read+0x11/0x20 [ 184.690055][ T8777] ? __fget_light+0x1a9/0x230 [ 184.698049][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.699899][ T8777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 184.699916][ T8777] do_writev+0x15b/0x330 [ 184.704908][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.709238][ T8777] ? vfs_writev+0x2f0/0x2f0 [ 184.709253][ T8777] ? do_syscall_64+0x26/0x760 [ 184.709266][ T8777] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.709283][ T8777] ? do_syscall_64+0x26/0x760 [ 184.714293][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.719799][ T8777] __x64_sys_writev+0x75/0xb0 [ 184.719812][ T8777] do_syscall_64+0xfa/0x760 [ 184.719829][ T8777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.728109][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.729842][ T8777] RIP: 0033:0x459e01 [ 184.729862][ T8777] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 184.735495][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.739968][ T8777] RSP: 002b:00007f776c1c8ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 184.739981][ T8777] RAX: ffffffffffffffda RBX: 000000000007ffff RCX: 0000000000459e01 [ 184.739993][ T8777] RDX: 0000000000000001 RSI: 00007f776c1c8c00 RDI: 00000000000000f0 [ 184.748255][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.750945][ T8777] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 184.750953][ T8777] R10: 0000000000000000 R11: 0000000000000293 R12: 00007f776c1c96d4 [ 184.750959][ T8777] R13: 00000000004c936a R14: 00000000004e0c48 R15: 00000000ffffffff [ 184.750972][ T8777] Modules linked in: [ 184.756799][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.763911][ T8777] ---[ end trace 7c0de001cb9b16fd ]--- [ 184.771607][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.772793][ T8777] RIP: 0010:ip_sublist_rcv+0x5c0/0x940 [ 184.772809][ T8777] Code: 0f 85 2f 01 00 00 e8 3f 5d 59 fb 48 8b 85 00 ff ff ff 48 8d b8 e8 0e 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 64 03 00 00 48 8b 85 00 ff ff ff 4c 8b a0 e8 0e [ 184.783082][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.785119][ T8777] RSP: 0018:ffff8880610af3c8 EFLAGS: 00010206 [ 184.785131][ T8777] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90005f3d000 [ 184.785138][ T8777] RDX: 00000000000001dd RSI: ffffffff861a0711 RDI: 0000000000000ee8 [ 184.785146][ T8777] RBP: ffff8880610af4f0 R08: ffff8880610a2500 R09: ffffed1015d06b7d [ 184.785153][ T8777] R10: ffffed1015d06b7c R11: ffff8880ae835be3 R12: 0000000000000001 [ 184.785161][ T8777] R13: ffff8880932d0000 R14: ffff8880610af558 R15: ffff8880610af4c8 [ 184.785173][ T8777] FS: 00007f776c1c9700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 184.785181][ T8777] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 184.785188][ T8777] CR2: 0000001b2cd29000 CR3: 000000008ee24000 CR4: 00000000001406f0 [ 184.785198][ T8777] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 184.785205][ T8777] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 184.785213][ T8777] Kernel panic - not syncing: Fatal exception in interrupt [ 184.786460][ T8777] Kernel Offset: disabled [ 185.150602][ T8777] Rebooting in 86400 seconds..