Warning: Permanently added '[localhost]:24146' (ECDSA) to the list of known hosts.
syzkaller login: [   63.502899][   T38] kauditd_printk_skb: 4 callbacks suppressed
[   63.502909][   T38] audit: type=1400 audit(1575030874.386:42): avc:  denied  { map } for  pid=7911 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16526 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1
2019/11/29 12:34:34 fuzzer started
2019/11/29 12:34:35 dialing manager at 10.0.2.10:36077
2019/11/29 12:34:35 syscalls: 2528
2019/11/29 12:34:35 code coverage: enabled
2019/11/29 12:34:35 comparison tracing: enabled
2019/11/29 12:34:35 extra coverage: extra coverage is not supported by the kernel
2019/11/29 12:34:35 setuid sandbox: enabled
2019/11/29 12:34:35 namespace sandbox: enabled
2019/11/29 12:34:35 Android sandbox: /sys/fs/selinux/policy does not exist
2019/11/29 12:34:35 fault injection: enabled
2019/11/29 12:34:35 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/11/29 12:34:35 net packet injection: enabled
2019/11/29 12:34:35 net device setup: enabled
2019/11/29 12:34:35 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
2019/11/29 12:34:35 devlink PCI setup: PCI device 0000:00:10.0 is not available
12:34:40 executing program 0:
syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x0)
r0 = memfd_create(0x0, 0x0)
r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0)
fallocate(r1, 0x0, 0x0, 0x2000002)
read$eventfd(r1, 0x0, 0x0)
fallocate(r0, 0x800000000000003, 0xfa9, 0x0)
r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0)
r3 = msgget$private(0x0, 0x1)
msgctl$IPC_STAT(r3, 0x2, &(0x7f00000002c0)=""/106)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4)
setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4)
timer_create(0x5, &(0x7f0000000080)={0x0, 0x3c}, &(0x7f0000000100))
bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback, 0x832}, 0x1c)
setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r7 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0)
ftruncate(r2, 0x800fe)
lstat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000380))
open(0x0, 0x14103e, 0x0)
sendfile(r5, r7, 0x0, 0x8000fffffffe)

[   69.530497][   T38] audit: type=1400 audit(1575030880.406:43): avc:  denied  { map } for  pid=7934 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=20 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
12:34:40 executing program 1:
pipe2(0x0, 0x0)
getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14)
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000000)="57fcf4aa12bbcac8199a68487aae4a71", 0x10)
perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0)
pipe(0x0)
ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000800)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x64}})

[   69.726597][ T7935] IPVS: ftp: loaded support on port[0] = 21
[   69.769458][ T7937] IPVS: ftp: loaded support on port[0] = 21
12:34:40 executing program 2:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_targets\x00')
readv(r0, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1)
ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0)
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, 0x0)
readv(r0, &(0x7f0000000580), 0x3c1)

[   69.813584][ T7935] chnl_net:caif_netlink_parms(): no params data found
[   69.863915][ T7935] bridge0: port 1(bridge_slave_0) entered blocking state
[   69.872192][ T7935] bridge0: port 1(bridge_slave_0) entered disabled state
[   69.881372][ T7935] device bridge_slave_0 entered promiscuous mode
[   69.892481][ T7935] bridge0: port 2(bridge_slave_1) entered blocking state
[   69.899911][ T7935] bridge0: port 2(bridge_slave_1) entered disabled state
[   69.907820][ T7935] device bridge_slave_1 entered promiscuous mode
[   69.935010][ T7940] IPVS: ftp: loaded support on port[0] = 21
12:34:40 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sysfs$2(0x2, 0x7, &(0x7f0000000580)=""/237)
prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d6000/0x1000)=nil)
syz_open_procfs(0x0, &(0x7f00000000c0)='environ\x00[\xaaZ\xaf\xc0\x8c\xaa\xaf\xc1DP\xf0_\'\xaf\xeb\x19s\xf3\xafp\xcam\x14\x9cR\x8d\xefh\xbb\xca\xfc\xdeF4\xbbc\x93\xae\xbf\xe6\x7fJL]\xb7\xc0#;,F\xc2\xc8\x93<\x0f7\xe4\x01\xc0\xa6#\x82\x02\xcdT\x02l\x80\xff\xf8\xd8YQL\x06\xdexu!\xb32$\x04&e\\^\xe0nZ')
r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
r1 = socket$inet6(0xa, 0x3, 0x6)
r2 = syz_open_procfs(0x0, 0x0)
sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc)
syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00')
sendmsg$IPVS_CMD_GET_SERVICE(r2, 0x0, 0x40)
ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000200)={0x0, 0xfffffffffffffffd, 0x3})
sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000001400)=[{0x0}], 0x1, 0x0)
r3 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$netlink(r3, 0x0, 0x0)
dup(0xffffffffffffffff)
prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0)
r4 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x0, 0x7f, 0x7, 0x80, 0x0, 0x0, 0x80000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x40004}, 0x2206, 0x400, 0x9, 0x0, 0x9, 0x9}, 0x0, 0xa, r4, 0x8)
r5 = socket$inet6(0xa, 0x3, 0x6)
r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7')
sendfile(r5, r6, &(0x7f0000000240)=0x202, 0x4000000000dc)
ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={0x2, 'ipddp0\x00', {0x15f70769}, 0x7})
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000))
setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000180)={0x29, @loopback, 0x4e22, 0x0, 'ovf\x00', 0x20}, 0x2c)
r7 = open(&(0x7f0000000000)='./bus\x00', 0x4000000000141042, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x28001, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, 0x0)
ioctl$BLKSECDISCARD(r7, 0x127d, &(0x7f0000000140)=0x8)
fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000280)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x1)
socket$inet6(0xa, 0x0, 0x0)

[   69.962620][ T7935] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   69.978330][ T7935] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   70.004131][ T7937] chnl_net:caif_netlink_parms(): no params data found
[   70.023503][ T7935] team0: Port device team_slave_0 added
[   70.036715][ T7935] team0: Port device team_slave_1 added
[   70.051272][ T7944] IPVS: ftp: loaded support on port[0] = 21
[   70.070445][ T7937] bridge0: port 1(bridge_slave_0) entered blocking state
[   70.077587][ T7937] bridge0: port 1(bridge_slave_0) entered disabled state
[   70.084934][ T7937] device bridge_slave_0 entered promiscuous mode
[   70.093502][ T7937] bridge0: port 2(bridge_slave_1) entered blocking state
[   70.100281][ T7937] bridge0: port 2(bridge_slave_1) entered disabled state
[   70.107708][ T7937] device bridge_slave_1 entered promiscuous mode
[   70.164050][ T7935] device hsr_slave_0 entered promiscuous mode
[   70.252218][ T7935] device hsr_slave_1 entered promiscuous mode
[   70.383669][ T7937] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   70.397926][ T7937] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   70.430715][ T7937] team0: Port device team_slave_0 added
[   70.439796][ T7937] team0: Port device team_slave_1 added
[   70.449939][   T38] audit: type=1400 audit(1575030881.326:44): avc:  denied  { create } for  pid=7935 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[   70.473894][   T38] audit: type=1400 audit(1575030881.326:45): avc:  denied  { write } for  pid=7935 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[   70.498936][   T38] audit: type=1400 audit(1575030881.326:46): avc:  denied  { read } for  pid=7935 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[   70.540432][ T7935] netdevsim netdevsim0 netdevsim0: renamed from eth0
[   70.614407][ T7935] netdevsim netdevsim0 netdevsim1: renamed from eth1
[   70.685343][ T7935] netdevsim netdevsim0 netdevsim2: renamed from eth2
[   70.775697][ T7935] netdevsim netdevsim0 netdevsim3: renamed from eth3
[   70.848852][ T7940] chnl_net:caif_netlink_parms(): no params data found
[   70.924133][ T7937] device hsr_slave_0 entered promiscuous mode
[   70.962302][ T7937] device hsr_slave_1 entered promiscuous mode
[   71.002035][ T7937] debugfs: Directory 'hsr0' with parent '/' already present!
[   71.042121][ T7940] bridge0: port 1(bridge_slave_0) entered blocking state
[   71.049235][ T7940] bridge0: port 1(bridge_slave_0) entered disabled state
[   71.057051][ T7940] device bridge_slave_0 entered promiscuous mode
[   71.066188][ T7940] bridge0: port 2(bridge_slave_1) entered blocking state
[   71.073244][ T7940] bridge0: port 2(bridge_slave_1) entered disabled state
[   71.080758][ T7940] device bridge_slave_1 entered promiscuous mode
[   71.106705][ T7940] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   71.119624][ T7940] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   71.169402][ T7940] team0: Port device team_slave_0 added
[   71.176653][ T7940] team0: Port device team_slave_1 added
[   71.182633][ T7937] netdevsim netdevsim1 netdevsim0: renamed from eth0
[   71.265117][ T7937] netdevsim netdevsim1 netdevsim1: renamed from eth1
[   71.333961][ T7937] netdevsim netdevsim1 netdevsim2: renamed from eth2
[   71.394073][ T7937] netdevsim netdevsim1 netdevsim3: renamed from eth3
[   71.454312][ T7944] chnl_net:caif_netlink_parms(): no params data found
[   71.514263][ T7940] device hsr_slave_0 entered promiscuous mode
[   71.572361][ T7940] device hsr_slave_1 entered promiscuous mode
[   71.652085][ T7940] debugfs: Directory 'hsr0' with parent '/' already present!
[   71.694205][ T7944] bridge0: port 1(bridge_slave_0) entered blocking state
[   71.701132][ T7944] bridge0: port 1(bridge_slave_0) entered disabled state
[   71.709143][ T7944] device bridge_slave_0 entered promiscuous mode
[   71.717469][ T7944] bridge0: port 2(bridge_slave_1) entered blocking state
[   71.724482][ T7944] bridge0: port 2(bridge_slave_1) entered disabled state
[   71.732114][ T7944] device bridge_slave_1 entered promiscuous mode
[   71.752752][ T7940] netdevsim netdevsim2 netdevsim0: renamed from eth0
[   71.797538][ T7940] netdevsim netdevsim2 netdevsim1: renamed from eth1
[   71.890094][ T7944] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   71.900760][ T7940] netdevsim netdevsim2 netdevsim2: renamed from eth2
[   71.954055][ T7940] netdevsim netdevsim2 netdevsim3: renamed from eth3
[   71.995002][ T7944] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   72.029347][ T7944] team0: Port device team_slave_0 added
[   72.041466][ T7944] team0: Port device team_slave_1 added
[   72.052785][ T7935] 8021q: adding VLAN 0 to HW filter on device bond0
[   72.060226][ T7940] bridge0: port 2(bridge_slave_1) entered blocking state
[   72.067290][ T7940] bridge0: port 2(bridge_slave_1) entered forwarding state
[   72.074814][ T7940] bridge0: port 1(bridge_slave_0) entered blocking state
[   72.081647][ T7940] bridge0: port 1(bridge_slave_0) entered forwarding state
[   72.093143][ T2940] bridge0: port 1(bridge_slave_0) entered disabled state
[   72.100523][ T2940] bridge0: port 2(bridge_slave_1) entered disabled state
[   72.184555][ T7944] device hsr_slave_0 entered promiscuous mode
[   72.243934][ T7944] device hsr_slave_1 entered promiscuous mode
[   72.322099][ T7944] debugfs: Directory 'hsr0' with parent '/' already present!
[   72.358095][   T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   72.366142][   T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   72.375674][ T7935] 8021q: adding VLAN 0 to HW filter on device team0
[   72.384509][ T7944] netdevsim netdevsim3 netdevsim0: renamed from eth0
[   72.443980][ T7944] netdevsim netdevsim3 netdevsim1: renamed from eth1
[   72.498514][ T7944] netdevsim netdevsim3 netdevsim2: renamed from eth2
[   72.556434][ T7937] 8021q: adding VLAN 0 to HW filter on device bond0
[   72.566852][ T7944] netdevsim netdevsim3 netdevsim3: renamed from eth3
[   72.617540][ T3147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   72.626142][ T3147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   72.634413][ T3147] bridge0: port 1(bridge_slave_0) entered blocking state
[   72.641574][ T3147] bridge0: port 1(bridge_slave_0) entered forwarding state
[   72.659163][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   72.666847][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   72.675207][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   72.683349][ T7949] bridge0: port 2(bridge_slave_1) entered blocking state
[   72.690247][ T7949] bridge0: port 2(bridge_slave_1) entered forwarding state
[   72.698530][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   72.706555][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   72.717752][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   72.731843][ T7937] 8021q: adding VLAN 0 to HW filter on device team0
[   72.738857][   T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   72.753801][ T3147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   72.762655][ T3147] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   72.770805][ T3147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   72.780092][ T3147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   72.788833][ T3147] bridge0: port 1(bridge_slave_0) entered blocking state
[   72.796064][ T3147] bridge0: port 1(bridge_slave_0) entered forwarding state
[   72.804884][ T3147] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   72.812733][ T3147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   72.825877][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   72.834835][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   72.849215][   T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   72.857896][   T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   72.866225][   T36] bridge0: port 2(bridge_slave_1) entered blocking state
[   72.873253][   T36] bridge0: port 2(bridge_slave_1) entered forwarding state
[   72.880678][   T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   72.888884][   T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   72.902375][ T7940] 8021q: adding VLAN 0 to HW filter on device bond0
[   72.915657][ T3147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   72.931016][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   72.939129][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   72.947211][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   72.958499][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   72.967299][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   72.978465][ T7940] 8021q: adding VLAN 0 to HW filter on device team0
[   72.989214][ T7935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   73.000238][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   73.009382][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   73.018903][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   73.027057][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   73.036133][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   73.044858][ T3840] bridge0: port 1(bridge_slave_0) entered blocking state
[   73.052190][ T3840] bridge0: port 1(bridge_slave_0) entered forwarding state
[   73.074936][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   73.085397][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   73.093892][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   73.101996][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   73.109943][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   73.118556][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   73.126819][   T28] bridge0: port 2(bridge_slave_1) entered blocking state
[   73.134322][   T28] bridge0: port 2(bridge_slave_1) entered forwarding state
[   73.142092][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   73.151967][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   73.174696][ T7944] 8021q: adding VLAN 0 to HW filter on device bond0
[   73.186738][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   73.194460][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   73.201593][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   73.214700][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   73.222732][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   73.230184][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   73.240815][ T7935] 8021q: adding VLAN 0 to HW filter on device batadv0
[   73.254500][   T38] audit: type=1400 audit(1575030884.136:47): avc:  denied  { associate } for  pid=7935 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1
[   73.256114][ T7944] 8021q: adding VLAN 0 to HW filter on device team0
[   73.286384][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   73.295774][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   73.304209][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   73.311781][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   73.320083][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   73.333229][ T7937] 8021q: adding VLAN 0 to HW filter on device batadv0
[   73.348615][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   73.358036][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   73.366304][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   73.374867][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   73.381734][ T7953] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
[   73.383192][ T1194] bridge0: port 1(bridge_slave_0) entered blocking state
[   73.404958][   T38] audit: type=1400 audit(1575030884.286:48): avc:  denied  { open } for  pid=7952 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1
[   73.409064][ T1194] bridge0: port 1(bridge_slave_0) entered forwarding state
[   73.441424][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   73.449956][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   73.458294][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   73.466564][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   73.474761][ T1194] bridge0: port 2(bridge_slave_1) entered blocking state
[   73.481582][ T1194] bridge0: port 2(bridge_slave_1) entered forwarding state
[   73.490148][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   73.506727][   T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   73.515798][   T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   73.524529][   T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   73.533054][   T36] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   73.542110][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   73.557639][ T7944] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[   73.568329][ T7944] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[   73.586574][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   73.595166][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   73.605445][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   73.614421][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   73.622877][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   73.630958][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   73.638876][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   73.647142][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   73.655379][ T3840] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   73.666713][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   73.682493][   T60] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   73.690616][   T60] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   73.704873][ T7944] 8021q: adding VLAN 0 to HW filter on device batadv0
[   73.714573][ T7940] 8021q: adding VLAN 0 to HW filter on device batadv0
[   73.722694][   T60] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   73.730657][   T60] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   73.736547][    C3] hrtimer: interrupt took 23705 ns
[   74.178632][ T7956] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7956 comm=syz-executor.0
[   74.191427][ T7956] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7956 comm=syz-executor.0
[   74.204849][ T7956] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7956 comm=syz-executor.0
[   74.217746][ T7956] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7956 comm=syz-executor.0
[   74.230337][ T7956] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7956 comm=syz-executor.0
[   74.245249][ T7956] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7956 comm=syz-executor.0
[   74.258204][ T7956] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7956 comm=syz-executor.0
[   74.271625][ T7956] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7956 comm=syz-executor.0
[   74.284597][ T7956] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7956 comm=syz-executor.0
[   74.297665][ T7956] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7956 comm=syz-executor.0
[  178.541862][    C3] rcu: INFO: rcu_preempt self-detected stall on CPU
[  178.542006][    C3] rcu: 	3-....: (10500 ticks this GP) idle=ff2/1/0x4000000000000004 softirq=7203/7203 fqs=4857 
[  178.552060][    C3] 	(t=10502 jiffies g=4809 q=1334)
[  178.565644][    C3] NMI backtrace for cpu 3
[  178.565644][    C3] CPU: 3 PID: 7953 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0
[  178.572042][    C3] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014
[  178.572042][    C3] Call Trace:
[  178.572042][    C3]  <IRQ>
[  178.572042][    C3]  dump_stack+0x197/0x210
[  178.572042][    C3]  nmi_cpu_backtrace.cold+0x70/0xb2
[  178.572042][    C3]  ? lapic_can_unplug_cpu.cold+0x3a/0x3a
[  178.572042][    C3]  nmi_trigger_cpumask_backtrace+0x23b/0x28b
[  178.572042][    C3]  arch_trigger_cpumask_backtrace+0x14/0x20
[  178.572042][    C3]  rcu_dump_cpu_stacks+0x183/0x1cf
[  178.572042][    C3]  ? find_next_bit+0x107/0x130
[  178.572042][    C3]  rcu_sched_clock_irq.cold+0x509/0xc02
[  178.572042][    C3]  ? raise_softirq+0x138/0x340
[  178.572042][    C3]  update_process_times+0x2d/0x70
[  178.572042][    C3]  tick_sched_handle+0xa2/0x190
[  178.572042][    C3]  tick_sched_timer+0x53/0x140
[  178.572042][    C3]  __hrtimer_run_queues+0x364/0xe40
[  178.572042][    C3]  ? tick_sched_do_timer+0x1b0/0x1b0
[  178.572042][    C3]  ? hrtimer_init+0x330/0x330
[  178.572042][    C3]  ? __sanitizer_cov_trace_cmp4+0x16/0x20
[  178.572042][    C3]  ? ktime_get_update_offsets_now+0x2ce/0x430
[  178.572042][    C3]  hrtimer_interrupt+0x314/0x770
[  178.572042][    C3]  smp_apic_timer_interrupt+0x160/0x610
[  178.572042][    C3]  apic_timer_interrupt+0xf/0x20
[  178.572042][    C3] RIP: 0010:update_stack_state+0x38/0x5f0
[  178.572042][    C3] Code: 41 57 41 56 4c 8d b5 78 ff ff ff 49 c1 ee 03 41 55 49 89 fd 41 54 49 8d 0c 06 53 48 81 ec a0 00 00 00 48 c7 45 80 e2 83 cb 88 <48> c7 85 78 ff ff ff b3 8a b5 41 48 c7 45 88 50 22 33 81 48 89 b5
[  178.572042][    C3] RSP: 0018:ffff88802d509540 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13
[  178.572042][    C3] RAX: dffffc0000000000 RBX: ffff88802d5096f0 RCX: ffffed1005aa12b0
[  178.572042][    C3] RDX: 1ffff1100d9d3f8b RSI: ffff88806ce9fd30 RDI: ffff88802d5096f0
[  178.572042][    C3] RBP: ffff88802d509608 R08: ffff88806ce90040 R09: ffff88802d509748
[  178.572042][    C3] R10: ffff88802d509718 R11: ffff88802d509728 R12: 1ffff11005aa12c8
[  178.572042][    C3] R13: ffff88802d5096f0 R14: 1ffff11005aa12b0 R15: ffff88806ce9fd30
[  178.572042][    C3]  ? apic_timer_interrupt+0xa/0x20
[  178.572042][    C3]  ? __read_once_size_nocheck.constprop.0+0x10/0x10
[  178.572042][    C3]  unwind_next_frame.part.0+0x1a9/0xa20
[  178.572042][    C3]  ? unwind_dump+0x100/0x100
[  178.572042][    C3]  ? unwind_dump+0x100/0x100
[  178.572042][    C3]  ? profile_setup.cold+0xbb/0xbb
[  178.572042][    C3]  unwind_next_frame+0x3b/0x50
[  178.572042][    C3]  arch_stack_walk+0x81/0xf0
[  178.572042][    C3]  ? perf_install_in_context+0x308/0x5a0
[  178.572042][    C3]  stack_trace_save+0xac/0xe0
[  178.572042][    C3]  ? stack_trace_consume_entry+0x190/0x190
[  178.572042][    C3]  ? kasan_kmalloc+0x9/0x10
[  178.572042][    C3]  ? kmem_cache_alloc_node_trace+0x15a/0x750
[  178.572042][    C3]  ? __kmalloc_node_track_caller+0x3d/0x70
[  178.572042][    C3]  ? __kmalloc_reserve.isra.0+0x40/0xf0
[  178.572042][    C3]  ? __alloc_skb+0x10b/0x5e0
[  178.572042][    C3]  ? new_skb+0x28/0x1d0
[  178.572042][    C3]  ? aoecmd_cfg+0x1b5/0x640
[  178.572042][    C3]  ? discover_timer+0x4e/0x60
[  178.572042][    C3]  save_stack+0x23/0x90
[  178.572042][    C3]  ? save_stack+0x23/0x90
[  178.572042][    C3]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  178.572042][    C3]  ? kasan_kmalloc+0x9/0x10
[  178.572042][    C3]  ? __kmalloc_node_track_caller+0x4e/0x70
[  178.572042][    C3]  ? __kmalloc_reserve.isra.0+0x40/0xf0
[  178.572042][    C3]  ? __alloc_skb+0x10b/0x5e0
[  178.572042][    C3]  ? new_skb+0x28/0x1d0
[  178.572042][    C3]  ? aoecmd_cfg+0x1b5/0x640
[  178.572042][    C3]  ? discover_timer+0x4e/0x60
[  178.572042][    C3]  ? call_timer_fn+0x1ac/0x780
[  178.572042][    C3]  ? run_timer_softirq+0x6c3/0x1790
[  178.572042][    C3]  ? __do_softirq+0x262/0x98c
[  178.572042][    C3]  ? irq_exit+0x19b/0x1e0
[  178.572042][    C3]  ? smp_apic_timer_interrupt+0x1a3/0x610
[  178.572042][    C3]  ? apic_timer_interrupt+0xf/0x20
[  178.572042][    C3]  ? generic_exec_single+0x33a/0x4c0
[  178.572042][    C3]  ? smp_call_function_single+0x17c/0x480
[  178.572042][    C3]  ? task_function_call+0xe9/0x180
[  178.572042][    C3]  ? perf_install_in_context+0x308/0x5a0
[  178.572042][    C3]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  178.572042][    C3]  ? __x64_sys_perf_event_open+0xbe/0x150
[  178.572042][    C3]  ? __kasan_check_read+0x11/0x20
[  178.572042][    C3]  ? rcu_lockdep_current_cpu_online+0xe3/0x130
[  178.572042][    C3]  ? __kmalloc_node_track_caller+0x3d/0x70
[  178.572042][    C3]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  178.572042][    C3]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  178.572042][    C3]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  178.572042][    C3]  ? kmem_cache_alloc_node_trace+0x398/0x750
[  178.572042][    C3]  ? kasan_unpoison_shadow+0x35/0x50
[  178.572042][    C3]  __kasan_kmalloc.constprop.0+0xcf/0xe0
[  178.572042][    C3]  kasan_kmalloc+0x9/0x10
[  178.572042][    C3]  __kmalloc_node_track_caller+0x4e/0x70
[  178.572042][    C3]  __kmalloc_reserve.isra.0+0x40/0xf0
[  178.572042][    C3]  __alloc_skb+0x10b/0x5e0
[  178.572042][    C3]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  178.572042][    C3]  new_skb+0x28/0x1d0
[  178.572042][    C3]  aoecmd_cfg+0x1b5/0x640
[  178.572042][    C3]  ? aoecmd_ata_rsp+0x13a0/0x13a0
[  178.572042][    C3]  ? __this_cpu_preempt_check+0x35/0x190
[  178.572042][    C3]  discover_timer+0x4e/0x60
[  178.572042][    C3]  call_timer_fn+0x1ac/0x780
[  178.572042][    C3]  ? aoedev_by_aoeaddr.cold+0x83/0x83
[  178.572042][    C3]  ? msleep_interruptible+0x150/0x150
[  178.572042][    C3]  ? run_timer_softirq+0x6b1/0x1790
[  178.572042][    C3]  ? trace_hardirqs_on+0x67/0x240
[  178.572042][    C3]  ? aoedev_by_aoeaddr.cold+0x83/0x83
[  178.572042][    C3]  ? aoedev_by_aoeaddr.cold+0x83/0x83
[  178.572042][    C3]  run_timer_softirq+0x6c3/0x1790
[  178.572042][    C3]  ? add_timer+0x930/0x930
[  178.572042][    C3]  ? rcu_lockdep_current_cpu_online+0xe3/0x130
[  178.572042][    C3]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  178.572042][    C3]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  178.572042][    C3]  __do_softirq+0x262/0x98c
[  178.572042][    C3]  ? sched_clock_cpu+0x14e/0x1b0
[  178.572042][    C3]  irq_exit+0x19b/0x1e0
[  178.572042][    C3]  smp_apic_timer_interrupt+0x1a3/0x610
[  178.572042][    C3]  apic_timer_interrupt+0xf/0x20
[  178.572042][    C3]  </IRQ>
[  178.572042][    C3] RIP: 0010:generic_exec_single+0x33a/0x4c0
[  178.572042][    C3] Code: 00 fc ff df 48 c1 e8 03 80 3c 10 00 0f 85 68 01 00 00 48 83 3d 2e 81 a9 07 00 0f 84 e0 00 00 00 e8 eb 2a 0b 00 48 89 df 57 9d <0f> 1f 44 00 00 45 31 ed e9 39 fe ff ff e8 d4 2a 0b 00 0f 0b e9 23
[  178.572042][    C3] RSP: 0018:ffff88806ce9fa80 EFLAGS: 00000216 ORIG_RAX: ffffffffffffff13
[  178.572042][    C3] RAX: 0000000000040000 RBX: 0000000000000216 RCX: ffffc9000409c000
[  178.572042][    C3] RDX: 000000000002a241 RSI: ffffffff8169b335 RDI: 0000000000000216
[  178.572042][    C3] RBP: ffff88806ce9fab0 R08: 1ffffffff15377ba R09: fffffbfff15377bb
[  178.572042][    C3] R10: fffffbfff15377ba R11: ffffffff8a9bbdd7 R12: 0000000000000200
[  178.572042][    C3] R13: ffff88806ce9fb00 R14: ffff88806ce9fbd0 R15: ffffffff818bd170
[  178.572042][    C3]  ? perf_duration_warn+0x40/0x40
[  178.572042][    C3]  ? generic_exec_single+0x335/0x4c0
[  178.572042][    C3]  ? __perf_event_enable+0x930/0x930
[  178.572042][    C3]  smp_call_function_single+0x17c/0x480
[  178.572042][    C3]  ? perf_duration_warn+0x40/0x40
[  178.572042][    C3]  ? generic_exec_single+0x4c0/0x4c0
[  178.572042][    C3]  ? __do_sys_perf_event_open+0x174c/0x2c70
[  178.572042][    C3]  ? __perf_event_enable+0x930/0x930
[  178.572042][    C3]  task_function_call+0xe9/0x180
[  178.572042][    C3]  ? perf_event_addr_filters_exec+0x310/0x310
[  178.572042][    C3]  ? __do_sys_perf_event_open+0x174c/0x2c70
[  178.572042][    C3]  ? __perf_event_enable+0x930/0x930
[  178.572042][    C3]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  178.572042][    C3]  ? exclusive_event_installable+0x257/0x320
[  178.572042][    C3]  perf_install_in_context+0x308/0x5a0
[  178.572042][    C3]  ? list_add_event+0xed0/0xed0
[  178.572042][    C3]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  178.572042][    C3]  ? __perf_event_header_size.isra.0+0x166/0x1c0
[  178.572042][    C3]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  178.572042][    C3]  __do_sys_perf_event_open+0x1cbc/0x2c70
[  178.572042][    C3]  ? perf_event_set_output+0x4e0/0x4e0
[  178.572042][    C3]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  178.572042][    C3]  ? put_timespec64+0xda/0x140
[  178.572042][    C3]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  178.572042][    C3]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  178.572042][    C3]  ? do_syscall_64+0x26/0x790
[  178.572042][    C3]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  178.572042][    C3]  ? do_syscall_64+0x26/0x790
[  178.572042][    C3]  __x64_sys_perf_event_open+0xbe/0x150
[  178.572042][    C3]  do_syscall_64+0xfa/0x790
[  178.572042][    C3]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  178.572042][    C3] RIP: 0033:0x45a759
[  178.572042][    C3] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  178.572042][    C3] RSP: 002b:00007fb3a051ac88 EFLAGS: 00000246 ORIG_RAX: 000000000000012a
[  178.572042][    C3] RAX: ffffffffffffffda RBX: 000000000071bf00 RCX: 000000000045a759
[  178.572042][    C3] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 000000002001d000
[  178.572042][    C3] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000
[  178.572042][    C3] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007fb3a051b6d4
[  178.572042][    C3] R13: 00000000004aec17 R14: 00000000006f1cb0 R15: 00000000ffffffff