[ 76.843574][ T26] audit: type=1400 audit(1576797486.925:38): avc: denied { watch } for pid=9970 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 77.036788][ T26] audit: type=1800 audit(1576797487.165:39): pid=9878 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 77.058399][ T26] audit: type=1800 audit(1576797487.165:40): pid=9878 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 77.817496][ T26] audit: type=1400 audit(1576797487.955:41): avc: denied { map } for pid=10056 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.115' (ECDSA) to the list of known hosts. 2019/12/19 23:18:14 fuzzer started syzkaller login: [ 84.401201][ T26] audit: type=1400 audit(1576797494.535:42): avc: denied { map } for pid=10065 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/12/19 23:18:16 dialing manager at 10.128.0.26:44381 2019/12/19 23:18:16 syscalls: 2706 2019/12/19 23:18:16 code coverage: enabled 2019/12/19 23:18:16 comparison tracing: enabled 2019/12/19 23:18:16 extra coverage: enabled 2019/12/19 23:18:16 setuid sandbox: enabled 2019/12/19 23:18:16 namespace sandbox: enabled 2019/12/19 23:18:16 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/19 23:18:16 fault injection: enabled 2019/12/19 23:18:16 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/19 23:18:16 net packet injection: enabled 2019/12/19 23:18:16 net device setup: enabled 2019/12/19 23:18:16 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/19 23:18:16 devlink PCI setup: PCI device 0000:00:10.0 is not available 23:20:56 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80084502, &(0x7f0000000100)=""/253) [ 246.548208][ T26] audit: type=1400 audit(1576797656.685:43): avc: denied { map } for pid=10080 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=22174 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 23:20:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="61cb"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 246.752241][T10082] IPVS: ftp: loaded support on port[0] = 21 [ 246.960192][T10082] chnl_net:caif_netlink_parms(): no params data found 23:20:57 executing program 2: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000003c0)='./bus/file1\x00', 0x0) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') [ 247.004349][T10082] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.012966][T10082] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.021430][T10082] device bridge_slave_0 entered promiscuous mode [ 247.051291][T10082] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.059708][T10082] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.073421][T10082] device bridge_slave_1 entered promiscuous mode [ 247.079601][T10085] IPVS: ftp: loaded support on port[0] = 21 [ 247.111536][T10082] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 247.124552][T10082] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 247.169895][T10082] team0: Port device team_slave_0 added [ 247.201728][T10082] team0: Port device team_slave_1 added 23:20:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000001200)={0x0, 0x9, 0x0, 0x0}) keyctl$update(0x2, 0x0, 0x0, 0x0) [ 247.310768][T10082] device hsr_slave_0 entered promiscuous mode [ 247.368327][T10082] device hsr_slave_1 entered promiscuous mode [ 247.424651][T10087] IPVS: ftp: loaded support on port[0] = 21 [ 247.510415][ T26] audit: type=1400 audit(1576797657.645:44): avc: denied { create } for pid=10082 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 247.539579][ T26] audit: type=1400 audit(1576797657.675:45): avc: denied { write } for pid=10082 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 247.592778][ T26] audit: type=1400 audit(1576797657.675:46): avc: denied { read } for pid=10082 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 247.625910][T10082] netdevsim netdevsim0 netdevsim0: renamed from eth0 23:20:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010008, 0xffffffffffffffff}) [ 247.690884][T10085] chnl_net:caif_netlink_parms(): no params data found [ 247.704124][T10089] IPVS: ftp: loaded support on port[0] = 21 [ 247.716791][T10082] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 247.805318][T10082] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 247.862307][T10082] netdevsim netdevsim0 netdevsim3: renamed from eth3 23:20:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000001200)={0x0, 0x9, 0x0, 0x0}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 247.970255][T10092] IPVS: ftp: loaded support on port[0] = 21 [ 247.998417][T10082] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.005629][T10082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.013689][T10082] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.020816][T10082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.035338][T10085] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.047373][T10085] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.055785][T10085] device bridge_slave_0 entered promiscuous mode [ 248.080771][T10085] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.092335][T10085] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.101768][T10085] device bridge_slave_1 entered promiscuous mode [ 248.113874][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.123431][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.163814][T10085] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 248.206576][T10085] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 248.248635][T10095] IPVS: ftp: loaded support on port[0] = 21 [ 248.292840][T10085] team0: Port device team_slave_0 added [ 248.300822][T10087] chnl_net:caif_netlink_parms(): no params data found [ 248.338235][T10085] team0: Port device team_slave_1 added [ 248.433337][T10082] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.479512][T10085] device hsr_slave_0 entered promiscuous mode [ 248.517333][T10085] device hsr_slave_1 entered promiscuous mode [ 248.567246][T10085] debugfs: Directory 'hsr0' with parent '/' already present! [ 248.583974][T10087] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.591740][T10087] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.599595][T10087] device bridge_slave_0 entered promiscuous mode [ 248.607601][T10087] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.614895][T10087] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.623233][T10087] device bridge_slave_1 entered promiscuous mode [ 248.668812][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.676993][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.686666][T10087] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 248.700065][T10089] chnl_net:caif_netlink_parms(): no params data found [ 248.712731][T10082] 8021q: adding VLAN 0 to HW filter on device team0 [ 248.745972][T10087] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 248.778620][T10087] team0: Port device team_slave_0 added [ 248.812741][T10087] team0: Port device team_slave_1 added [ 248.841910][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.851259][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.860924][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.867986][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.929694][T10092] chnl_net:caif_netlink_parms(): no params data found [ 248.949022][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.957962][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.966265][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.973410][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.985037][T10095] chnl_net:caif_netlink_parms(): no params data found [ 248.994106][T10085] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 249.039361][T10089] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.047324][T10089] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.055099][T10089] device bridge_slave_0 entered promiscuous mode [ 249.113846][T10085] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 249.169388][T10089] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.176483][T10089] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.184594][T10089] device bridge_slave_1 entered promiscuous mode [ 249.240421][T10087] device hsr_slave_0 entered promiscuous mode [ 249.287504][T10087] device hsr_slave_1 entered promiscuous mode [ 249.337158][T10087] debugfs: Directory 'hsr0' with parent '/' already present! [ 249.344798][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 249.356755][T10092] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.367215][T10092] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.375095][T10092] device bridge_slave_0 entered promiscuous mode [ 249.383352][T10085] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 249.445510][T10085] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 249.494958][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 249.511797][T10092] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.519035][T10092] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.526769][T10092] device bridge_slave_1 entered promiscuous mode [ 249.542608][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.552222][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.576233][T10095] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.584515][T10095] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.593940][T10095] device bridge_slave_0 entered promiscuous mode [ 249.611806][T10089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 249.622356][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 249.632155][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 249.640784][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.656337][T10095] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.665689][T10095] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.673697][T10095] device bridge_slave_1 entered promiscuous mode [ 249.693433][T10089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 249.707488][T10092] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 249.721996][T10092] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 249.755428][T10095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 249.782587][T10092] team0: Port device team_slave_0 added [ 249.791664][T10100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 249.800335][T10100] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 249.810517][T10089] team0: Port device team_slave_0 added [ 249.821084][T10089] team0: Port device team_slave_1 added [ 249.830294][T10095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 249.854190][T10092] team0: Port device team_slave_1 added [ 249.896274][T10087] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 249.942480][T10095] team0: Port device team_slave_0 added [ 249.951422][T10095] team0: Port device team_slave_1 added [ 249.959291][T10082] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 249.974059][T10082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 249.986670][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 249.995042][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.004157][T10087] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 250.110611][T10092] device hsr_slave_0 entered promiscuous mode [ 250.167842][T10092] device hsr_slave_1 entered promiscuous mode [ 250.227207][T10092] debugfs: Directory 'hsr0' with parent '/' already present! [ 250.280850][T10089] device hsr_slave_0 entered promiscuous mode [ 250.337471][T10089] device hsr_slave_1 entered promiscuous mode [ 250.377139][T10089] debugfs: Directory 'hsr0' with parent '/' already present! [ 250.400149][T10087] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 250.519165][T10095] device hsr_slave_0 entered promiscuous mode [ 250.587885][T10095] device hsr_slave_1 entered promiscuous mode [ 250.627254][T10095] debugfs: Directory 'hsr0' with parent '/' already present! [ 250.639806][T10087] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 250.761542][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 250.771798][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 250.783470][T10082] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 250.796124][T10089] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 250.843245][T10089] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 250.926725][T10085] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.933802][T10089] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 250.994396][ T26] audit: type=1400 audit(1576797661.125:47): avc: denied { associate } for pid=10082 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 251.030548][T10095] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 251.105001][T10089] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 251.168359][T10092] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 251.218662][T10095] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 251.278878][T10095] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 251.356739][T10085] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.372193][T10092] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 251.450392][T10095] netdevsim netdevsim5 netdevsim3: renamed from eth3 23:21:01 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0xf, &(0x7f00001c9fff)="03", 0x1) [ 251.499669][T10100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.517821][T10100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.552588][T10092] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 251.600912][T10092] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 251.643204][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 251.652204][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.660740][T10094] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.667805][T10094] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.676207][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 251.685256][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.693712][T10094] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.700810][T10094] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.730673][T10100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 23:21:01 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000001200)={0x0, 0x9, 0x0, 0x0}) keyctl$reject(0x13, 0x0, 0x8000, 0x0, 0xfffffffffffffffc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x4) [ 251.738679][T10100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.749551][T10100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.758707][T10100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 251.768130][T10100] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 251.828629][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.836437][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 251.858444][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 251.866948][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.868424][ T26] audit: type=1400 audit(1576797661.995:48): avc: denied { open } for pid=10111 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 251.887299][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.906897][ T26] audit: type=1400 audit(1576797662.035:49): avc: denied { kernel } for pid=10111 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 251.908267][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 251.939199][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.953687][T10112] md: md0 has zero or unknown size, marking faulty! [ 251.960649][T10112] md: md_import_device returned -22 [ 251.969894][T10085] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 251.993920][T10087] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.026760][T10089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.059494][ T26] audit: type=1400 audit(1576797662.195:50): avc: denied { write } for pid=10111 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 252.085246][T10087] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.098831][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 23:21:02 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000001200)={0x0, 0x9, 0x0, 0x0}) keyctl$reject(0x13, 0x0, 0x8000, 0x0, 0xfffffffffffffffc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x4) [ 252.106576][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.115391][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 252.123079][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 252.189891][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.210298][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.226227][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.233320][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.247431][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.255299][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.258327][T10119] md: md0 has zero or unknown size, marking faulty! [ 252.273026][T10119] md: md_import_device returned -22 [ 252.273161][T10085] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 252.285462][ C0] hrtimer: interrupt took 43203 ns [ 252.302338][T10089] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.324984][T10101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.333046][T10101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.345076][T10101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.353503][T10101] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.360546][T10101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.369395][T10101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 252.378057][T10101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 252.388802][T10101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.397482][T10101] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.431676][T10101] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 252.440667][T10101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.450138][T10101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.458622][T10101] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.465679][T10101] bridge0: port 1(bridge_slave_0) entered forwarding state 23:21:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)=""/194, 0xc2}], 0x1000000000000168}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000024c0)=""/8, 0x8}], 0x1}, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x10000000005, 0x84) recvmsg(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000002d80)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) [ 252.474360][T10101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.486867][T10101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.495412][T10101] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.502484][T10101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.503676][T10101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.541530][T10092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.559493][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.578950][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.603176][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 252.625584][T10126] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 252.642355][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 252.661318][T10095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.681640][T10087] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 252.692810][T10087] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 252.705871][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 252.715516][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.730963][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 252.743251][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.764193][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.780374][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.806184][T10095] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.834554][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 252.845316][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 23:21:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) [ 252.861984][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.874589][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.890975][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 252.903990][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.922260][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.932803][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.949694][T10089] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 23:21:03 executing program 0: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r1 = memfd_create(&(0x7f0000000080)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{0x0}], 0x0, 0x0) [ 252.996619][T10089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 253.028022][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 253.036498][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.053616][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.064764][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 23:21:03 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r3, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8") getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r4, 0x4000000043) socket$inet6(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 253.098888][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.122049][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.132681][ T26] audit: type=1400 audit(1576797663.265:51): avc: denied { map } for pid=10142 comm="syz-executor.0" path=2F6D656D66643A24BB657468306E6F6465762A202864656C6574656429 dev="tmpfs" ino=36553 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 253.167639][ T3053] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.174709][ T3053] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.196606][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 253.206160][ T26] audit: type=1400 audit(1576797663.305:52): avc: denied { map } for pid=10145 comm="syz-executor.1" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=37195 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 [ 253.235957][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 253.243511][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.249151][ T26] audit: type=1804 audit(1576797663.305:53): pid=10146 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir236835927/syzkaller.WK9N0l/2/memory.events" dev="sda1" ino=16523 res=1 [ 253.252360][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.281130][ T26] audit: type=1800 audit(1576797663.305:54): pid=10146 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16523 res=0 [ 253.305215][ T3053] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.313883][ T26] audit: type=1804 audit(1576797663.305:55): pid=10146 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir236835927/syzkaller.WK9N0l/2/memory.events" dev="sda1" ino=16523 res=1 [ 253.319569][ T3053] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.348828][T10087] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 253.356034][ T26] audit: type=1804 audit(1576797663.335:56): pid=10146 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir236835927/syzkaller.WK9N0l/2/memory.events" dev="sda1" ino=16523 res=1 [ 253.394521][T10092] 8021q: adding VLAN 0 to HW filter on device team0 [ 253.397244][ T26] audit: type=1804 audit(1576797663.525:57): pid=10148 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir236835927/syzkaller.WK9N0l/2/memory.events" dev="sda1" ino=16523 res=1 23:21:03 executing program 0: bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0xdda4998986363d47, @perf_config_ext={0x1}, 0x40, 0x1, 0x80000000, 0x3, 0x9, 0x7f}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) [ 253.458308][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.473263][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 253.483018][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 253.510870][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.541846][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.550997][T10094] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.558144][T10094] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.584090][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.638131][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.646568][T10094] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.653667][T10094] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.717819][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.754271][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.769825][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.788301][T10094] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.806864][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.814821][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 253.823286][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.832681][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.855236][T10089] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 253.923790][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.948035][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.960937][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.979807][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 23:21:04 executing program 2: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$char_usb(r1, &(0x7f0000000100), 0x0) fallocate(r2, 0x0, 0x0, 0x1000f3) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003200)=[{{&(0x7f00000000c0)={0x2, 0x0, @local}, 0x10, 0x0}}, {{&(0x7f00000012c0)={0x2, 0x0, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_tos_int={{0x14}}], 0x18}}], 0x2, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000280)={0x0, 0x0, @ioapic={0x729d0213259a469e, 0x0, 0x0, 0x0, 0x0, [{}, {0x0, 0x0, 0x0, [], 0x2}, {}, {}, {0x2, 0x0, 0x3}, {}, {}, {0x0, 0x3}, {}, {}, {}, {}, {}, {0x1}, {0x0, 0x1}, {}, {}, {0x1}]}}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000380)={0x0, 0x0, @pic={0x0, 0x81}}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='\x00\x00\x00\x01\xfb\xff\xff\xff\xb3', 0x284001, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r4, 0x8208ae63, &(0x7f0000000380)={0x1, 0x0, @pic={0x0, 0x81}}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x294ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xdf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) [ 254.030352][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 254.047511][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 254.086141][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 254.103875][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.125402][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.140595][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.163316][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.171903][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.192108][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.201964][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.210722][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.222081][T10095] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 254.234778][T10092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 254.295632][T10095] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 254.330969][T10100] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 254.347305][T10100] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.362444][T10173] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 254.394781][T10173] File: /root/syzkaller-testdir960754572/syzkaller.iq3gty/1/bus PID: 10173 Comm: syz-executor.2 [ 254.414899][T10177] md: md0 has zero or unknown size, marking faulty! [ 254.428154][T10101] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 254.435583][T10101] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.455164][T10177] md: md_import_device returned -22 [ 254.496264][T10092] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 254.605764][T10183] md: md0 has zero or unknown size, marking faulty! [ 254.632132][T10183] md: md_import_device returned -22 [ 254.673836][T10174] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 254.697396][T10174] File: /root/syzkaller-testdir960754572/syzkaller.iq3gty/1/bus PID: 10174 Comm: syz-executor.2 23:21:04 executing program 0: bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0xdda4998986363d47, @perf_config_ext={0x1}, 0x40, 0x1, 0x80000000, 0x3, 0x9, 0x7f}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) [ 254.976106][T10205] md: md0 has zero or unknown size, marking faulty! [ 254.997545][T10205] md: md_import_device returned -22 [ 255.113030][T10205] md: md0 has zero or unknown size, marking faulty! [ 255.137866][T10205] md: md_import_device returned -22 [ 255.359010][ T3671] BUG: unable to handle page fault for address: fffff52002d00000 [ 255.366769][ T3671] #PF: supervisor read access in kernel mode [ 255.372759][ T3671] #PF: error_code(0x0000) - not-present page [ 255.378738][ T3671] PGD 21ffee067 P4D 21ffee067 PUD aa51c067 PMD 5c4f7067 PTE 0 [ 255.386214][ T3671] Oops: 0000 [#1] PREEMPT SMP KASAN [ 255.391420][ T3671] CPU: 1 PID: 3671 Comm: ion_system_heap Not tainted 5.5.0-rc2-syzkaller #0 [ 255.400175][ T3671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.410295][ T3671] RIP: 0010:check_memory_region+0x9c/0x1a0 [ 255.416088][ T3671] Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 10 01 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 a7 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 53 80 [ 255.435692][ T3671] RSP: 0018:ffffc9000c5f7ab8 EFLAGS: 00010216 [ 255.441746][ T3671] RAX: fffff52002d00000 RBX: fffff52002d04000 RCX: ffffffff85de6a29 [ 255.449702][ T3671] RDX: 0000000000000001 RSI: 0000000000020000 RDI: ffffc90016800000 [ 255.457669][ T3671] RBP: ffffc9000c5f7ad0 R08: fffff52002d04000 R09: 0000000000004000 [ 255.465634][ T3671] R10: fffff52002d03fff R11: ffffc9001681ffff R12: fffff52002d00000 [ 255.473590][ T3671] R13: 0000000000020000 R14: 0000000000000000 R15: ffffc9000c5f7d08 [ 255.481558][ T3671] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 255.490467][ T3671] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 255.497032][ T3671] CR2: fffff52002d00000 CR3: 000000005f22a000 CR4: 00000000001406e0 [ 255.504989][ T3671] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 255.512938][ T3671] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 255.520889][ T3671] Call Trace: [ 255.524161][ T3671] memset+0x24/0x40 [ 255.527996][ T3671] ion_heap_clear_pages+0x49/0x70 [ 255.533003][ T3671] ion_heap_sglist_zero+0x210/0x270 [ 255.538181][ T3671] ? ion_heap_deferred_free+0x630/0x630 [ 255.543731][ T3671] ? mark_lock+0xc2/0x1220 [ 255.548290][ T3671] ? pgprot_writecombine+0x5e/0xf0 [ 255.553400][ T3671] ? pagerange_is_ram_callback+0x130/0x130 [ 255.559196][ T3671] ? ion_heap_deferred_free+0x295/0x630 [ 255.564769][ T3671] ion_heap_buffer_zero+0xf5/0x150 [ 255.569864][ T3671] ion_system_heap_free+0x1eb/0x250 [ 255.575139][ T3671] ion_buffer_destroy+0x159/0x2d0 [ 255.580145][ T3671] ion_heap_deferred_free+0x29d/0x630 [ 255.585510][ T3671] ? ion_heap_shrink_scan+0x1d0/0x1d0 [ 255.590911][ T3671] ? trace_hardirqs_on+0x67/0x240 [ 255.595933][ T3671] ? finish_wait+0x260/0x260 [ 255.600535][ T3671] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 255.606789][ T3671] ? __kthread_parkme+0x108/0x1c0 [ 255.611807][ T3671] ? __kasan_check_read+0x11/0x20 [ 255.616812][ T3671] kthread+0x361/0x430 [ 255.620861][ T3671] ? ion_heap_shrink_scan+0x1d0/0x1d0 [ 255.626214][ T3671] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 255.631955][ T3671] ret_from_fork+0x24/0x30 [ 255.636350][ T3671] Modules linked in: [ 255.640222][ T3671] CR2: fffff52002d00000 [ 255.644362][ T3671] ---[ end trace 332740453067ead9 ]--- [ 255.649831][ T3671] RIP: 0010:check_memory_region+0x9c/0x1a0 [ 255.655626][ T3671] Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 10 01 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 a7 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 53 80 [ 255.675220][ T3671] RSP: 0018:ffffc9000c5f7ab8 EFLAGS: 00010216 [ 255.681272][ T3671] RAX: fffff52002d00000 RBX: fffff52002d04000 RCX: ffffffff85de6a29 [ 255.689237][ T3671] RDX: 0000000000000001 RSI: 0000000000020000 RDI: ffffc90016800000 [ 255.697188][ T3671] RBP: ffffc9000c5f7ad0 R08: fffff52002d04000 R09: 0000000000004000 [ 255.706011][ T3671] R10: fffff52002d03fff R11: ffffc9001681ffff R12: fffff52002d00000 [ 255.713976][ T3671] R13: 0000000000020000 R14: 0000000000000000 R15: ffffc9000c5f7d08 [ 255.722036][ T3671] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 255.730959][ T3671] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 255.737524][ T3671] CR2: fffff52002d00000 CR3: 000000005f22a000 CR4: 00000000001406e0 [ 255.745486][ T3671] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 255.753438][ T3671] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 255.761391][ T3671] Kernel panic - not syncing: Fatal exception [ 255.768536][ T3671] Kernel Offset: disabled [ 255.772908][ T3671] Rebooting in 86400 seconds..