syzkaller login: [ 65.523076][ T38] audit: type=1400 audit(1575029925.875:41): avc: denied { map } for pid=7904 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '[localhost]:4679' (ECDSA) to the list of known hosts. [ 67.414973][ T38] audit: type=1400 audit(1575029927.765:42): avc: denied { map } for pid=7914 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16525 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2019/11/29 12:18:47 fuzzer started 2019/11/29 12:18:48 dialing manager at 10.0.2.10:36077 2019/11/29 12:18:48 syscalls: 2528 2019/11/29 12:18:48 code coverage: enabled 2019/11/29 12:18:48 comparison tracing: enabled 2019/11/29 12:18:48 extra coverage: extra coverage is not supported by the kernel 2019/11/29 12:18:48 setuid sandbox: enabled 2019/11/29 12:18:48 namespace sandbox: enabled 2019/11/29 12:18:48 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/29 12:18:48 fault injection: enabled 2019/11/29 12:18:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/29 12:18:48 net packet injection: enabled 2019/11/29 12:18:48 net device setup: enabled 2019/11/29 12:18:48 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/29 12:18:48 devlink PCI setup: PCI device 0000:00:10.0 is not available 12:18:53 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x5, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 72.999304][ T38] audit: type=1400 audit(1575029933.345:43): avc: denied { map } for pid=7936 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=56 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 12:18:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22de", 0xc3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 73.231026][ T7937] IPVS: ftp: loaded support on port[0] = 21 [ 73.245432][ T7939] IPVS: ftp: loaded support on port[0] = 21 12:18:53 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff}) tee(r2, r1, 0x3, 0xe) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r3, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000002800210400"/20, @ANYRES32, @ANYBLOB="ac0c000000008b44900e00000c0080eb8600000075700000200002001c0002000000000000000800010062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792aafde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f"], 0x50}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00'}) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000140), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0xd10c) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f00000001c0)=0x5, 0x4) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 73.448663][ T7939] chnl_net:caif_netlink_parms(): no params data found 12:18:53 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net\x00') getdents64(r0, 0x0, 0x18) [ 73.490543][ T7942] IPVS: ftp: loaded support on port[0] = 21 [ 73.501317][ T7937] chnl_net:caif_netlink_parms(): no params data found [ 73.519622][ T7939] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.528034][ T7939] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.536396][ T7939] device bridge_slave_0 entered promiscuous mode [ 73.552839][ T7939] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.560174][ T7939] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.568291][ T7939] device bridge_slave_1 entered promiscuous mode [ 73.570491][ T7945] IPVS: ftp: loaded support on port[0] = 21 [ 73.609430][ T7937] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.616951][ T7937] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.624808][ T7937] device bridge_slave_0 entered promiscuous mode [ 73.633984][ T7937] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.641198][ T7937] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.648682][ T7937] device bridge_slave_1 entered promiscuous mode [ 73.661918][ T7939] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.673598][ T7939] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.705137][ T7939] team0: Port device team_slave_0 added [ 73.712687][ T7937] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.727621][ T7939] team0: Port device team_slave_1 added [ 73.735320][ T7937] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.802938][ T7939] device hsr_slave_0 entered promiscuous mode [ 73.871529][ T7939] device hsr_slave_1 entered promiscuous mode [ 73.943618][ T7937] team0: Port device team_slave_0 added [ 73.957958][ T7937] team0: Port device team_slave_1 added [ 74.113090][ T7937] device hsr_slave_0 entered promiscuous mode [ 74.171667][ T7937] device hsr_slave_1 entered promiscuous mode [ 74.211375][ T7937] debugfs: Directory 'hsr0' with parent '/' already present! [ 74.219233][ T7942] chnl_net:caif_netlink_parms(): no params data found [ 74.238927][ T38] audit: type=1400 audit(1575029934.585:44): avc: denied { create } for pid=7939 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 74.266308][ T38] audit: type=1400 audit(1575029934.585:45): avc: denied { write } for pid=7939 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 74.291517][ T38] audit: type=1400 audit(1575029934.585:46): avc: denied { read } for pid=7939 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 74.321009][ T7939] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 74.385978][ T7939] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 74.453191][ T7939] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 74.573395][ T7939] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 74.646259][ T7942] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.653598][ T7942] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.661317][ T7942] device bridge_slave_0 entered promiscuous mode [ 74.670134][ T7942] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.677468][ T7942] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.685246][ T7942] device bridge_slave_1 entered promiscuous mode [ 74.700100][ T7945] chnl_net:caif_netlink_parms(): no params data found [ 74.724661][ T7937] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 74.772880][ T7937] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 74.842124][ T7942] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.855767][ T7942] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.865418][ T7937] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 74.923142][ T7945] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.931402][ T7945] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.939850][ T7945] device bridge_slave_0 entered promiscuous mode [ 74.952839][ T7945] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.961040][ T7945] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.970019][ T7945] device bridge_slave_1 entered promiscuous mode [ 74.987113][ T7937] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 75.088521][ T7942] team0: Port device team_slave_0 added [ 75.095430][ T7945] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.106630][ T7945] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.117105][ T7942] team0: Port device team_slave_1 added [ 75.138235][ T7945] team0: Port device team_slave_0 added [ 75.145798][ T7945] team0: Port device team_slave_1 added [ 75.213253][ T7942] device hsr_slave_0 entered promiscuous mode [ 75.281728][ T7942] device hsr_slave_1 entered promiscuous mode [ 75.331511][ T7942] debugfs: Directory 'hsr0' with parent '/' already present! [ 75.413021][ T7945] device hsr_slave_0 entered promiscuous mode [ 75.451434][ T7945] device hsr_slave_1 entered promiscuous mode [ 75.491325][ T7945] debugfs: Directory 'hsr0' with parent '/' already present! [ 75.537700][ T7942] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 75.602831][ T7942] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 75.652677][ T7945] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 75.723312][ T7945] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 75.763794][ T7945] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 75.818171][ T7942] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 75.882727][ T7942] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 75.946312][ T7945] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 76.042786][ T7939] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.070262][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.080496][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.096821][ T7939] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.116265][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.124924][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.133428][ T18] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.140657][ T18] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.161653][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 76.173256][ T7937] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.191317][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.201375][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.211565][ T1194] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.219729][ T1194] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.229383][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.239012][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.263806][ T7945] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.272367][ T7937] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.283039][ T7942] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.295042][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 76.314048][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.322884][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.331375][ T18] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.338529][ T18] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.347188][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 76.356236][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.364313][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.372875][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 76.386686][ T3297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.394534][ T3297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.402737][ T3297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.412076][ T3297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.420445][ T3297] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.427599][ T3297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.439735][ T7945] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.447721][ T7942] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.458727][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 76.467373][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.475907][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.487288][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.496044][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.503364][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.511018][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 76.518653][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 76.533701][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 76.542522][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 76.550733][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 76.559690][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.568178][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 76.581944][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.590426][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.598994][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.608721][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.616796][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.623926][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.631793][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.640440][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.657217][ T7939] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 76.667997][ T7939] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 76.683333][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.691957][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.700203][ T18] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.707220][ T18] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.714781][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 76.723428][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.731607][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.740157][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.748616][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.755547][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.763064][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 76.770719][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.779031][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 76.787817][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 76.795745][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 76.812015][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 76.819947][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.828243][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 76.836724][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 76.844960][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.853177][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 76.863174][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 76.878403][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 76.887602][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 76.896143][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.904588][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 76.911938][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 76.919336][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.930122][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.938134][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 76.946226][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.957810][ T7939] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 76.972209][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 76.979758][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 76.988261][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.997068][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 77.012521][ T38] audit: type=1400 audit(1575029937.355:47): avc: denied { associate } for pid=7939 comm="syz-executor.1" name="syz1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 77.013627][ T7942] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 77.047408][ T7942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 77.056716][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 77.067780][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.076397][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 77.085176][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.093361][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 77.101584][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.109547][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 77.117197][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 77.127868][ T7945] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 77.138899][ T7945] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 77.157549][ T7942] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.165736][ T3339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 77.174056][ T3339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.182991][ T3339] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 77.191342][ T3339] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 12:18:57 executing program 1: perf_event_open(0x0, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) bind(0xffffffffffffffff, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140), 0x19d) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440)='/dev/hwrng\x00', 0x80, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r2, &(0x7f0000000280)=""/135, 0x74f) pread64(r2, &(0x7f00000001c0)=""/252, 0xfc, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="fef6212e5daaef8acf333900ccea4159cd57f5784b6812a0ed5ef4d69d0b9cfd17237599d64041cd522f0f7334859208ef8bb366515ca4f3434c9f900bbf4a5f6ffc88b98727e713347f55169ba91e044a840753c809597f"], 0x58) r3 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x101, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = eventfd2(0x200, 0x0) tee(r4, r5, 0x9eb7, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000580)={{0xfff, 0x1487, 0x2, 0x4}, 'syz0\x00', 0x1c}) bind$inet(0xffffffffffffffff, 0x0, 0x5e) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0xa3c8640967c914a8) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000600)={0x0, 0x7, 0x1000}, 0xfffffffffffffe58) ioctl$EVIOCGSND(r6, 0x8040451a, &(0x7f0000000500)=""/110) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000340)=""/3, 0x3}], 0x1, 0x5) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x85, 0x0, 0x2, 0x46a}) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r7 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc0045878, 0x0) unlinkat(r7, &(0x7f0000000480)='./file0\x00', 0x200) getrandom(&(0x7f0000000640)=""/252, 0xfc, 0x3) ioctl$FS_IOC_SETVERSION(r6, 0x40087602, &(0x7f00000004c0)=0x8000) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) [ 77.209589][ T38] audit: type=1400 audit(1575029937.555:48): avc: denied { open } for pid=7958 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 77.212611][ T7937] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.259044][ T7945] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.267722][ T3297] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 77.277047][ T38] audit: type=1400 audit(1575029937.615:49): avc: denied { kernel } for pid=7960 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 77.302917][ T3297] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 77.325009][ T7966] IPVS: ftp: loaded support on port[0] = 21 12:18:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x5, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 12:18:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x5, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 12:18:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x5, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 77.430580][ C0] hrtimer: interrupt took 24577 ns [ 182.321120][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 182.323455][ C0] rcu: 0-....: (10500 ticks this GP) idle=a5a/1/0x4000000000000004 softirq=6931/6936 fqs=5222 [ 182.323455][ C0] (t=10500 jiffies g=4921 q=1910) [ 182.323455][ C0] NMI backtrace for cpu 0 [ 182.323455][ C0] CPU: 0 PID: 7959 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 182.323455][ C0] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 182.323455][ C0] Call Trace: [ 182.323455][ C0] [ 182.323455][ C0] dump_stack+0x197/0x210 [ 182.323455][ C0] nmi_cpu_backtrace.cold+0x70/0xb2 [ 182.323455][ C0] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 182.323455][ C0] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 182.323455][ C0] arch_trigger_cpumask_backtrace+0x14/0x20 [ 182.323455][ C0] rcu_dump_cpu_stacks+0x183/0x1cf [ 182.323455][ C0] ? find_next_bit+0x107/0x130 [ 182.323455][ C0] rcu_sched_clock_irq.cold+0x509/0xc02 [ 182.323455][ C0] ? raise_softirq+0x138/0x340 [ 182.323455][ C0] update_process_times+0x2d/0x70 [ 182.323455][ C0] tick_sched_handle+0xa2/0x190 [ 182.323455][ C0] tick_sched_timer+0x53/0x140 [ 182.323455][ C0] __hrtimer_run_queues+0x364/0xe40 [ 182.323455][ C0] ? tick_sched_do_timer+0x1b0/0x1b0 [ 182.323455][ C0] ? hrtimer_init+0x330/0x330 [ 182.323455][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 182.323455][ C0] ? ktime_get_update_offsets_now+0x2ce/0x430 [ 182.323455][ C0] hrtimer_interrupt+0x314/0x770 [ 182.323455][ C0] smp_apic_timer_interrupt+0x160/0x610 [ 182.323455][ C0] apic_timer_interrupt+0xf/0x20 [ 182.323455][ C0] RIP: 0010:kfree+0x239/0x2c0 [ 182.323455][ C0] Code: 50 7e 0f 85 20 fe ff ff e8 d5 a5 4e ff e9 16 fe ff ff e8 3a a6 c8 ff 48 83 3d 8a 72 61 07 00 0f 84 85 00 00 00 48 89 df 57 9d <0f> 1f 44 00 00 5b 41 5c 41 5d 41 5e 5d c3 e8 14 a6 c8 ff 48 83 3d [ 182.323455][ C0] RSP: 0018:ffff88802d209a40 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 182.323455][ C0] RAX: 0000000000000007 RBX: 0000000000000282 RCX: 0000000000000002 [ 182.323455][ C0] RDX: 0000000000000000 RSI: ffff888018854a38 RDI: 0000000000000282 [ 182.323455][ C0] RBP: ffff88802d209a60 R08: 1ffffffff15377b5 R09: fffffbfff15377b6 [ 182.323455][ C0] R10: fffffbfff15377b5 R11: ffffffff8a9bbdaf R12: ffff88802aede000 [ 182.323455][ C0] R13: ffff88802cc00c40 R14: ffffffff85c6a5a3 R15: ffff8880246e3000 [ 182.323455][ C0] ? apic_timer_interrupt+0xa/0x20 [ 182.323455][ C0] ? skb_free_head+0x93/0xb0 [ 182.323455][ C0] skb_free_head+0x93/0xb0 [ 182.323455][ C0] skb_release_data+0x551/0x8d0 [ 182.323455][ C0] skb_release_all+0x4d/0x60 [ 182.323455][ C0] consume_skb+0xfb/0x410 [ 182.323455][ C0] netlink_broadcast_filtered+0x34e/0xd20 [ 182.323455][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 182.323455][ C0] ? br_fill_ifinfo+0x75b/0x1860 [ 182.323455][ C0] nlmsg_notify+0x93/0x250 [ 182.323455][ C0] rtnl_notify+0xc5/0xf0 [ 182.323455][ C0] br_ifinfo_notify+0x102/0x1d0 [ 182.323455][ C0] br_forward_delay_timer_expired+0x11e/0x410 [ 182.323455][ C0] call_timer_fn+0x1ac/0x780 [ 182.323455][ C0] ? br_hold_timer_expired+0xe0/0xe0 [ 182.323455][ C0] ? msleep_interruptible+0x150/0x150 [ 182.323455][ C0] ? run_timer_softirq+0x6b1/0x1790 [ 182.323455][ C0] ? trace_hardirqs_on+0x67/0x240 [ 182.323455][ C0] ? br_hold_timer_expired+0xe0/0xe0 [ 182.323455][ C0] ? br_hold_timer_expired+0xe0/0xe0 [ 182.323455][ C0] run_timer_softirq+0x6c3/0x1790 [ 182.323455][ C0] ? add_timer+0x930/0x930 [ 182.323455][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 182.323455][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 182.323455][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 182.323455][ C0] __do_softirq+0x262/0x98c [ 182.323455][ C0] ? sched_clock_cpu+0x14e/0x1b0 [ 182.323455][ C0] irq_exit+0x19b/0x1e0 [ 182.323455][ C0] smp_apic_timer_interrupt+0x1a3/0x610 [ 182.323455][ C0] apic_timer_interrupt+0xf/0x20 [ 182.323455][ C0] [ 182.323455][ C0] RIP: 0010:generic_exec_single+0x33a/0x4c0 [ 182.323455][ C0] Code: 00 fc ff df 48 c1 e8 03 80 3c 10 00 0f 85 68 01 00 00 48 83 3d 2e 81 a9 07 00 0f 84 e0 00 00 00 e8 eb 2a 0b 00 48 89 df 57 9d <0f> 1f 44 00 00 45 31 ed e9 39 fe ff ff e8 d4 2a 0b 00 0f 0b e9 23 [ 182.323455][ C0] RSP: 0018:ffff88801885fa80 EFLAGS: 00000216 ORIG_RAX: ffffffffffffff13 [ 182.323455][ C0] RAX: 0000000000040000 RBX: 0000000000000216 RCX: ffffc900062ad000 [ 182.323455][ C0] RDX: 0000000000008567 RSI: ffffffff8169b335 RDI: 0000000000000216 [ 182.323455][ C0] RBP: ffff88801885fab0 R08: 1ffffffff15377ba R09: fffffbfff15377bb [ 182.323455][ C0] R10: fffffbfff15377ba R11: ffffffff8a9bbdd7 R12: 0000000000000200 [ 182.323455][ C0] R13: ffff88801885fb00 R14: ffff88801885fbd0 R15: ffffffff818bd170 [ 182.323455][ C0] ? perf_duration_warn+0x40/0x40 [ 182.323455][ C0] ? generic_exec_single+0x335/0x4c0 [ 182.323455][ C0] ? __perf_event_enable+0x930/0x930 [ 182.323455][ C0] smp_call_function_single+0x17c/0x480 [ 182.323455][ C0] ? perf_duration_warn+0x40/0x40 [ 182.323455][ C0] ? generic_exec_single+0x4c0/0x4c0 [ 182.323455][ C0] ? __do_sys_perf_event_open+0x174c/0x2c70 [ 182.323455][ C0] ? __perf_event_enable+0x930/0x930 [ 182.323455][ C0] task_function_call+0xe9/0x180 [ 182.323455][ C0] ? perf_event_addr_filters_exec+0x310/0x310 [ 182.323455][ C0] ? __do_sys_perf_event_open+0x174c/0x2c70 [ 182.323455][ C0] ? __perf_event_enable+0x930/0x930 [ 182.323455][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 182.323455][ C0] ? exclusive_event_installable+0x257/0x320 [ 182.323455][ C0] perf_install_in_context+0x308/0x5a0 [ 182.323455][ C0] ? list_add_event+0xed0/0xed0 [ 182.323455][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 182.323455][ C0] ? __perf_event_header_size.isra.0+0x166/0x1c0 [ 182.323455][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 182.323455][ C0] __do_sys_perf_event_open+0x1cbc/0x2c70 [ 182.323455][ C0] ? perf_event_set_output+0x4e0/0x4e0 [ 182.323455][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 182.323455][ C0] ? put_timespec64+0xda/0x140 [ 182.323455][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 182.323455][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 182.323455][ C0] ? do_syscall_64+0x26/0x790 [ 182.323455][ C0] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.323455][ C0] ? do_syscall_64+0x26/0x790 [ 182.323455][ C0] __x64_sys_perf_event_open+0xbe/0x150 [ 182.323455][ C0] do_syscall_64+0xfa/0x790 [ 182.323455][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.323455][ C0] RIP: 0033:0x45a759 [ 182.323455][ C0] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 182.323455][ C0] RSP: 002b:00007f076c852c88 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 182.323455][ C0] RAX: ffffffffffffffda RBX: 000000000071bf00 RCX: 000000000045a759 [ 182.323455][ C0] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 000000002001d000 [ 182.323455][ C0] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 182.323455][ C0] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f076c8536d4 [ 182.323455][ C0] R13: 00000000004aec17 R14: 00000000006f1cb0 R15: 00000000ffffffff