Advertisement
qaqaq

Untitled

Sep 16th, 2022
45
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 32.72 KB | None | 0 0
  1.  
  2. 22:24:57 executing program 3:
  3. r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/004/009', 0x7f49, 0x2000)
  4. r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hidg1', 0x60103, 0x0)
  5. r2 = syz_open_dev$hidraw(&(0x7f0000000080)='/dev/hidraw0', 0xa23, 0x0)
  6. ioctl$BLKRRPART(r1, 0x125f, 0x0)
  7. r3 = syz_mount_image$jfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000140)="747567d1a7c03396e9407c6b128aa6b7827f7b2d50ec3ecf192d4e7d6ff1a2e52bb5fea426555e2f6b84817281e0c03878bc0ec6b3beeb087854f290d1547f8e1e442b1e4d43303f1ae1e1bd8911193d95c324112e0d42d37fbc42ec5285cfcfd8062feb36af299e2c2133c064e8c5980e5658ab1bad923870b8d97d", 0x7c, 0x2e}], 0x20000, &(0x7f0000000200)={[{@noquota}, {@nointegrity}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}, {@gid={'gid', 0x3d, 0xee01}}, {@umask={'umask', 0x3d, 0xc1d3}}, {}, {@nodiscard}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@euid_gt}, {@smackfsroot={'smackfsroot', 0x3d, '-%-$(['}}, {@euid_lt={'euid<', 0xee00}}]})
  8. r4 = dup3(r3, r0, 0x80000)
  9. ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000300)=0x2000)
  10. ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000380)={0x0, 0x38, '\x00', 0x0, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
  11. ioctl$BLKROGET(r1, 0x125e, &(0x7f00000003c0))
  12. ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000400)={{0x1, 0x1, 0x18, <r5=>r0}, './file0\x00'})
  13. fsmount(r5, 0x1, 0x4)
  14. ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000440))
  15. ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000500)={0x3, 0x7, {0xffffffffffffffff}, {<r6=>0xffffffffffffffff}, 0x4, 0x3f})
  16. mount$tmpfs(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0), 0x100000, &(0x7f0000000540)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6b]}}, {@mpol={'mpol', 0x3d, {'interleave', '=static', @void}}}, {@mpol={'mpol', 0x3d, {'prefer', '', @void}}}, {@huge_within_size}, {@size={'size', 0x3d, [0x38, 0x31, 0x35, 0x35, 0x34, 0x78]}}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}, {@uid={'uid', 0x3d, r6}}, {@gid={'gid', 0x3d, 0xee00}}, {@nr_inodes={'nr_inodes', 0x3d, [0x33, 0x5b, 0x78, 0x32]}}], [{@subj_role={'subj_role', 0x3d, 'FILE_MMAP'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x61, 0x32, 0x36, 0x37, 0x34, 0x63], 0x2d, [0x66, 0x65, 0x64, 0x64], 0x2d, [0x66, 0x64, 0x39, 0x35], 0x2d, [0x39, 0x32, 0x35, 0x31], 0x2d, [0x33, 0x32, 0x30, 0x36, 0x32, 0x63, 0x64, 0x31]}}}, {@measure}]})
  17. r7 = open_tree(r1, &(0x7f0000000640)='./file0/file0\x00', 0x1800)
  18. syz_mount_image$omfs(&(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0x1ff, 0x2, &(0x7f0000000840)=[{&(0x7f0000000700)="580c75dabc1dd5ea37958fcde36e70bd7a4025ff9523a1139fbb862a9460c90c92f4eceee2d9bb5f6d21378fd704e6a0a40b6ee9a9b99f6c7954842e51739e36784dfb360f72b42056f3a66916c7196c602879bf11eb7b41667133005b7f877f9c5663936f5455b4ae42b0e0a77a40afc914fda3a07a4905d97131c399a3d3a2fa0bd84c7a00268bddae44955067ebaa2e4a27bddd0611dd34c075f15bddb069522d949e700a9172b478bb92066bb8b90039643b3954f344a3f4a2f813b41ee62ca97ab4e403d4334dd2de73e9b320ebc6fcc1301afee47ed3f2d7fb95166361def062e2a25dce8dc6bc7b0b58", 0xed, 0x10001}, {&(0x7f0000000800)="cb013ff87abe4b9262ea604ba1253bf22c960cebecd229622e5e543520625bc9b715a5ea17ecc3f9e9d8a127457f", 0x2e, 0x4}], 0x20000, &(0x7f0000000880)={[{'tmpfs\x00'}, {'/dev/hidg1'}, {'.!%:^-/}\'\\'}], [{@dont_hash}, {@subj_type={'subj_type', 0x3d, '-%-$(['}}]})
  19. ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000008c0)={{0x1, 0x1, 0x18, <r8=>r3, {0xffffff0a}}, './file0\x00'})
  20. ioctl$BLKFRASET(r8, 0x1264, &(0x7f0000000900)=0x7)
  21. ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r7, 0xc0189374, &(0x7f0000000940)={{0x1, 0x1, 0x18, r2, {0x2}}, '\x00'})
  22. ioctl$USBDEVFS_FREE_STREAMS(r4, 0x8008551d, &(0x7f0000000980)={0xa77d, 0x3, [{0x3, 0x1}, {0xd}, {0xc, 0x1}]})
  23.  
  24. 22:24:57 executing program 4:
  25. syz_attach_gadget(&(0x7f0000000000)={0x310, 0x0, 0x0, 0x0, 0x40, 0x19d2, 0x1225, 0x5863, 0xe0, 0x6a, 0x2, [{}, {0x4, @net_null_attr}]}, 0x4)
  26.  
  27. 2022/09/14 22:24:57 ###begin to generate program
  28. 2022/09/14 22:24:57 file prog: name: /dev/bus/usb/004/009, fd: fd_usbfs
  29. 2022/09/14 22:24:57 file prog loop meta, name: syz_open_dev$usbfs, Ret: fd_usbfs
  30. 2022/09/14 22:24:57 file prog: name: /dev/hidg1, fd: fd
  31. 2022/09/14 22:24:57 file prog loop meta, name: openat$null, Ret: fd
  32. 2022/09/14 22:24:57 file prog: name: /dev/hidraw0, fd: fd_hidraw
  33. 2022/09/14 22:24:57 file prog loop meta, name: syz_open_dev$hidraw, Ret: fd_hidraw
  34. [ 1756.388425][T17692] loop3: detected capacity change from 0 to 256
  35. 22:24:57 executing program 3:
  36. r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/004/009', 0x7f49, 0x2000) (async)
  37. r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hidg1', 0x60103, 0x0)
  38. r2 = syz_open_dev$hidraw(&(0x7f0000000080)='/dev/hidraw0', 0xa23, 0x0) (async)
  39. ioctl$BLKRRPART(r1, 0x125f, 0x0) (async)
  40. r3 = syz_mount_image$jfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000140)="747567d1a7c03396e9407c6b128aa6b7827f7b2d50ec3ecf192d4e7d6ff1a2e52bb5fea426555e2f6b84817281e0c03878bc0ec6b3beeb087854f290d1547f8e1e442b1e4d43303f1ae1e1bd8911193d95c324112e0d42d37fbc42ec5285cfcfd8062feb36af299e2c2133c064e8c5980e5658ab1bad923870b8d97d", 0x7c, 0x2e}], 0x20000, &(0x7f0000000200)={[{@noquota}, {@nointegrity}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}, {@gid={'gid', 0x3d, 0xee01}}, {@umask={'umask', 0x3d, 0xc1d3}}, {}, {@nodiscard}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@euid_gt}, {@smackfsroot={'smackfsroot', 0x3d, '-%-$(['}}, {@euid_lt={'euid<', 0xee00}}]})
  41. r4 = dup3(r3, r0, 0x80000)
  42. ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000300)=0x2000)
  43. ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000380)={0x0, 0x38, '\x00', 0x0, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async)
  44. ioctl$BLKROGET(r1, 0x125e, &(0x7f00000003c0))
  45. ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000400)={{0x1, 0x1, 0x18, <r5=>r0}, './file0\x00'})
  46. fsmount(r5, 0x1, 0x4) (async)
  47. ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000440)) (async)
  48. ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000500)={0x3, 0x7, {0xffffffffffffffff}, {<r6=>0xffffffffffffffff}, 0x4, 0x3f})
  49. mount$tmpfs(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0), 0x100000, &(0x7f0000000540)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6b]}}, {@mpol={'mpol', 0x3d, {'interleave', '=static', @void}}}, {@mpol={'mpol', 0x3d, {'prefer', '', @void}}}, {@huge_within_size}, {@size={'size', 0x3d, [0x38, 0x31, 0x35, 0x35, 0x34, 0x78]}}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}, {@uid={'uid', 0x3d, r6}}, {@gid={'gid', 0x3d, 0xee00}}, {@nr_inodes={'nr_inodes', 0x3d, [0x33, 0x5b, 0x78, 0x32]}}], [{@subj_role={'subj_role', 0x3d, 'FILE_MMAP'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x61, 0x32, 0x36, 0x37, 0x34, 0x63], 0x2d, [0x66, 0x65, 0x64, 0x64], 0x2d, [0x66, 0x64, 0x39, 0x35], 0x2d, [0x39, 0x32, 0x35, 0x31], 0x2d, [0x33, 0x32, 0x30, 0x36, 0x32, 0x63, 0x64, 0x31]}}}, {@measure}]})
  50. r7 = open_tree(r1, &(0x7f0000000640)='./file0/file0\x00', 0x1800) (async)
  51. syz_mount_image$omfs(&(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0x1ff, 0x2, &(0x7f0000000840)=[{&(0x7f0000000700)="580c75dabc1dd5ea37958fcde36e70bd7a4025ff9523a1139fbb862a9460c90c92f4eceee2d9bb5f6d21378fd704e6a0a40b6ee9a9b99f6c7954842e51739e36784dfb360f72b42056f3a66916c7196c602879bf11eb7b41667133005b7f877f9c5663936f5455b4ae42b0e0a77a40afc914fda3a07a4905d97131c399a3d3a2fa0bd84c7a00268bddae44955067ebaa2e4a27bddd0611dd34c075f15bddb069522d949e700a9172b478bb92066bb8b90039643b3954f344a3f4a2f813b41ee62ca97ab4e403d4334dd2de73e9b320ebc6fcc1301afee47ed3f2d7fb95166361def062e2a25dce8dc6bc7b0b58", 0xed, 0x10001}, {&(0x7f0000000800)="cb013ff87abe4b9262ea604ba1253bf22c960cebecd229622e5e543520625bc9b715a5ea17ecc3f9e9d8a127457f", 0x2e, 0x4}], 0x20000, &(0x7f0000000880)={[{'tmpfs\x00'}, {'/dev/hidg1'}, {'.!%:^-/}\'\\'}], [{@dont_hash}, {@subj_type={'subj_type', 0x3d, '-%-$(['}}]}) (async)
  52. ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000008c0)={{0x1, 0x1, 0x18, <r8=>r3, {0xffffff0a}}, './file0\x00'})
  53. ioctl$BLKFRASET(r8, 0x1264, &(0x7f0000000900)=0x7) (async)
  54. ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r7, 0xc0189374, &(0x7f0000000940)={{0x1, 0x1, 0x18, r2, {0x2}}, '\x00'}) (async)
  55. ioctl$USBDEVFS_FREE_STREAMS(r4, 0x8008551d, &(0x7f0000000980)={0xa77d, 0x3, [{0x3, 0x1}, {0xd}, {0xc, 0x1}]})
  56.  
  57. 22:24:58 executing program 3:
  58. r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/004/009', 0x7f49, 0x2000)
  59. r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hidg1', 0x60103, 0x0)
  60. r2 = syz_open_dev$hidraw(&(0x7f0000000080)='/dev/hidraw0', 0xa23, 0x0)
  61. ioctl$BLKRRPART(r1, 0x125f, 0x0)
  62. r3 = syz_mount_image$jfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000140)="747567d1a7c03396e9407c6b128aa6b7827f7b2d50ec3ecf192d4e7d6ff1a2e52bb5fea426555e2f6b84817281e0c03878bc0ec6b3beeb087854f290d1547f8e1e442b1e4d43303f1ae1e1bd8911193d95c324112e0d42d37fbc42ec5285cfcfd8062feb36af299e2c2133c064e8c5980e5658ab1bad923870b8d97d", 0x7c, 0x2e}], 0x20000, &(0x7f0000000200)={[{@noquota}, {@nointegrity}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}, {@gid={'gid', 0x3d, 0xee01}}, {@umask={'umask', 0x3d, 0xc1d3}}, {}, {@nodiscard}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@euid_gt}, {@smackfsroot={'smackfsroot', 0x3d, '-%-$(['}}, {@euid_lt={'euid<', 0xee00}}]})
  63. r4 = dup3(r3, r0, 0x80000)
  64. ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000300)=0x2000)
  65. ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000380)={0x0, 0x38, '\x00', 0x0, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
  66. ioctl$BLKROGET(r1, 0x125e, &(0x7f00000003c0))
  67. ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000400)={{0x1, 0x1, 0x18, <r5=>r0}, './file0\x00'})
  68. fsmount(r5, 0x1, 0x4)
  69. ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000440))
  70. ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000500)={0x3, 0x7, {0xffffffffffffffff}, {<r6=>0xffffffffffffffff}, 0x4, 0x3f})
  71. mount$tmpfs(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0), 0x100000, &(0x7f0000000540)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6b]}}, {@mpol={'mpol', 0x3d, {'interleave', '=static', @void}}}, {@mpol={'mpol', 0x3d, {'prefer', '', @void}}}, {@huge_within_size}, {@size={'size', 0x3d, [0x38, 0x31, 0x35, 0x35, 0x34, 0x78]}}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}, {@uid={'uid', 0x3d, r6}}, {@gid={'gid', 0x3d, 0xee00}}, {@nr_inodes={'nr_inodes', 0x3d, [0x33, 0x5b, 0x78, 0x32]}}], [{@subj_role={'subj_role', 0x3d, 'FILE_MMAP'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x61, 0x32, 0x36, 0x37, 0x34, 0x63], 0x2d, [0x66, 0x65, 0x64, 0x64], 0x2d, [0x66, 0x64, 0x39, 0x35], 0x2d, [0x39, 0x32, 0x35, 0x31], 0x2d, [0x33, 0x32, 0x30, 0x36, 0x32, 0x63, 0x64, 0x31]}}}, {@measure}]})
  72. r7 = open_tree(r1, &(0x7f0000000640)='./file0/file0\x00', 0x1800)
  73. syz_mount_image$omfs(&(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0x1ff, 0x2, &(0x7f0000000840)=[{&(0x7f0000000700)="580c75dabc1dd5ea37958fcde36e70bd7a4025ff9523a1139fbb862a9460c90c92f4eceee2d9bb5f6d21378fd704e6a0a40b6ee9a9b99f6c7954842e51739e36784dfb360f72b42056f3a66916c7196c602879bf11eb7b41667133005b7f877f9c5663936f5455b4ae42b0e0a77a40afc914fda3a07a4905d97131c399a3d3a2fa0bd84c7a00268bddae44955067ebaa2e4a27bddd0611dd34c075f15bddb069522d949e700a9172b478bb92066bb8b90039643b3954f344a3f4a2f813b41ee62ca97ab4e403d4334dd2de73e9b320ebc6fcc1301afee47ed3f2d7fb95166361def062e2a25dce8dc6bc7b0b58", 0xed, 0x10001}, {&(0x7f0000000800)="cb013ff87abe4b9262ea604ba1253bf22c960cebecd229622e5e543520625bc9b715a5ea17ecc3f9e9d8a127457f", 0x2e, 0x4}], 0x20000, &(0x7f0000000880)={[{'tmpfs\x00'}, {'/dev/hidg1'}, {'.!%:^-/}\'\\'}], [{@dont_hash}, {@subj_type={'subj_type', 0x3d, '-%-$(['}}]})
  74. ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000008c0)={{0x1, 0x1, 0x18, <r8=>r3, {0xffffff0a}}, './file0\x00'})
  75. ioctl$BLKFRASET(r8, 0x1264, &(0x7f0000000900)=0x7)
  76. ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r7, 0xc0189374, &(0x7f0000000940)={{0x1, 0x1, 0x18, r2, {0x2}}, '\x00'})
  77. ioctl$USBDEVFS_FREE_STREAMS(r4, 0x8008551d, &(0x7f0000000980)={0xa77d, 0x3, [{0x3, 0x1}, {0xd}, {0xc, 0x1}]})
  78. syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/004/009', 0x7f49, 0x2000) (async)
  79. openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hidg1', 0x60103, 0x0) (async)
  80. syz_open_dev$hidraw(&(0x7f0000000080)='/dev/hidraw0', 0xa23, 0x0) (async)
  81. ioctl$BLKRRPART(r1, 0x125f, 0x0) (async)
  82. syz_mount_image$jfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000140)="747567d1a7c03396e9407c6b128aa6b7827f7b2d50ec3ecf192d4e7d6ff1a2e52bb5fea426555e2f6b84817281e0c03878bc0ec6b3beeb087854f290d1547f8e1e442b1e4d43303f1ae1e1bd8911193d95c324112e0d42d37fbc42ec5285cfcfd8062feb36af299e2c2133c064e8c5980e5658ab1bad923870b8d97d", 0x7c, 0x2e}], 0x20000, &(0x7f0000000200)={[{@noquota}, {@nointegrity}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}, {@gid={'gid', 0x3d, 0xee01}}, {@umask={'umask', 0x3d, 0xc1d3}}, {}, {@nodiscard}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@euid_gt}, {@smackfsroot={'smackfsroot', 0x3d, '-%-$(['}}, {@euid_lt={'euid<', 0xee00}}]}) (async)
  83. dup3(r3, r0, 0x80000) (async)
  84. ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000300)=0x2000) (async)
  85. ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000380)={0x0, 0x38, '\x00', 0x0, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async)
  86. ioctl$BLKROGET(r1, 0x125e, &(0x7f00000003c0)) (async)
  87. ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async)
  88. fsmount(r5, 0x1, 0x4) (async)
  89. ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000440)) (async)
  90. ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000500)={0x3, 0x7, {0xffffffffffffffff}, {0xffffffffffffffff}, 0x4, 0x3f}) (async)
  91. mount$tmpfs(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0), 0x100000, &(0x7f0000000540)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6b]}}, {@mpol={'mpol', 0x3d, {'interleave', '=static', @void}}}, {@mpol={'mpol', 0x3d, {'prefer', '', @void}}}, {@huge_within_size}, {@size={'size', 0x3d, [0x38, 0x31, 0x35, 0x35, 0x34, 0x78]}}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}, {@uid={'uid', 0x3d, r6}}, {@gid={'gid', 0x3d, 0xee00}}, {@nr_inodes={'nr_inodes', 0x3d, [0x33, 0x5b, 0x78, 0x32]}}], [{@subj_role={'subj_role', 0x3d, 'FILE_MMAP'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x61, 0x32, 0x36, 0x37, 0x34, 0x63], 0x2d, [0x66, 0x65, 0x64, 0x64], 0x2d, [0x66, 0x64, 0x39, 0x35], 0x2d, [0x39, 0x32, 0x35, 0x31], 0x2d, [0x33, 0x32, 0x30, 0x36, 0x32, 0x63, 0x64, 0x31]}}}, {@measure}]}) (async)
  92. open_tree(r1, &(0x7f0000000640)='./file0/file0\x00', 0x1800) (async)
  93. syz_mount_image$omfs(&(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0x1ff, 0x2, &(0x7f0000000840)=[{&(0x7f0000000700)="580c75dabc1dd5ea37958fcde36e70bd7a4025ff9523a1139fbb862a9460c90c92f4eceee2d9bb5f6d21378fd704e6a0a40b6ee9a9b99f6c7954842e51739e36784dfb360f72b42056f3a66916c7196c602879bf11eb7b41667133005b7f877f9c5663936f5455b4ae42b0e0a77a40afc914fda3a07a4905d97131c399a3d3a2fa0bd84c7a00268bddae44955067ebaa2e4a27bddd0611dd34c075f15bddb069522d949e700a9172b478bb92066bb8b90039643b3954f344a3f4a2f813b41ee62ca97ab4e403d4334dd2de73e9b320ebc6fcc1301afee47ed3f2d7fb95166361def062e2a25dce8dc6bc7b0b58", 0xed, 0x10001}, {&(0x7f0000000800)="cb013ff87abe4b9262ea604ba1253bf22c960cebecd229622e5e543520625bc9b715a5ea17ecc3f9e9d8a127457f", 0x2e, 0x4}], 0x20000, &(0x7f0000000880)={[{'tmpfs\x00'}, {'/dev/hidg1'}, {'.!%:^-/}\'\\'}], [{@dont_hash}, {@subj_type={'subj_type', 0x3d, '-%-$(['}}]}) (async)
  94. ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000008c0)={{0x1, 0x1, 0x18, r3, {0xffffff0a}}, './file0\x00'}) (async)
  95. ioctl$BLKFRASET(r8, 0x1264, &(0x7f0000000900)=0x7) (async)
  96. ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r7, 0xc0189374, &(0x7f0000000940)={{0x1, 0x1, 0x18, r2, {0x2}}, '\x00'}) (async)
  97. ioctl$USBDEVFS_FREE_STREAMS(r4, 0x8008551d, &(0x7f0000000980)={0xa77d, 0x3, [{0x3, 0x1}, {0xd}, {0xc, 0x1}]}) (async)
  98.  
  99. 2022/09/14 22:24:58 ###proc loop idx: 5
  100. 2022/09/14 22:24:58 ###begin to attach usb device
  101. 2022/09/14 22:24:58 ###begin to attach usb device
  102. [ 1756.957701][T17690] using random self ethernet address
  103. [ 1756.959648][T17690] using random host ethernet address
  104. [ 1756.999454][T17690] usb0: HOST MAC d2:c7:a8:8c:7d:e0
  105. [ 1757.000718][T17690] usb0: MAC 22:51:52:15:8d:c7
  106. [ 1757.271486][T12754] usb 5-1: new high-speed USB device number 12 using dummy_hcd
  107. [ 1757.641236][T12754] usb 5-1: Dual-Role OTG device on HNP port
  108. [ 1757.661270][T12754] usb 5-1: New USB device found, idVendor=19d2, idProduct=1225, bcdDevice=58.63
  109. [ 1757.663584][T12754] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
  110. [ 1757.664446][T12754] usb 5-1: Product: Bar Gadget
  111. [ 1757.665032][T12754] usb 5-1: Manufacturer: Foo Inc.
  112. [ 1757.665629][T12754] usb 5-1: SerialNumber: 12345678
  113. [ 1757.712667][T12754] usb-storage 5-1:1.0: USB Mass Storage device detected
  114. [ 1757.723426][T12754] usb-storage 5-1:1.0: Quirks match for vid 19d2 pid 1225: 1
  115. [ 1757.932095][T12754] usb 5-1: bad CDC descriptors
  116. [ 1757.934327][T12754] usb-storage 5-1:1.1: USB Mass Storage device detected
  117. [ 1757.945767][T12754] usb-storage 5-1:1.1: Quirks match for vid 19d2 pid 1225: 1
  118. durationWaitTime: 1.6s
  119. [ 1765.556026][ T1264] ieee802154 phy0 wpan0: encryption failed: -22
  120. [ 1765.556827][ T1264] ieee802154 phy1 wpan1: encryption failed: -22
  121. durationWaitTime: 3.2s
  122. 22:25:25 executing program 4:
  123. r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/005/012', 0xffff, 0x6)
  124. r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyGS1', 0xe000, 0x0)
  125. r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyGS2', 0x4000, 0x0)
  126. ioctl$USBDEVFS_RESET(r0, 0x5514)
  127. ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000000c0)=0x2)
  128. ioctl$USBDEVFS_RESET(r0, 0x5514)
  129. ioctl$VIDIOC_QUERYBUF_DMABUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000100)={0x6, 0x1, 0x4, 0x1000, 0x5a5, {0x0, 0xea60}, {0x4, 0x8, 0x8d, 0xcb, 0x1, 0x6, "882a51f4"}, 0xfffffffd, 0x4, {}, 0x0, 0x0, <r3=>0xffffffffffffffff})
  130. ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r3, 0x8040942d, &(0x7f0000000180))
  131. ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000001c0)=@fd={0x0, 0x2, 0x4, 0x10000, 0x7, {0x0, 0xea60}, {0x5, 0x8, 0x7, 0x15, 0xf9, 0x7f, "b2dce4f2"}, 0x7, 0x4, {}, 0xfffffd4d, 0x0, r3})
  132. ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000240)={0x8000000, 0xfffffffc})
  133. ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380)
  134. ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000280)={0x4, 0xab, 0x2})
  135. r4 = openat2(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x10040, 0x40}, 0x18)
  136. ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000003c0)=@multiplanar_mmap={0x1, 0x6, 0x4, 0x0, 0xf383, {0x0, 0xea60}, {0x5, 0x1, 0x7, 0x4, 0x2, 0xf8, "e4a10006"}, 0x2, 0x1, {&(0x7f00000002c0)=[{0x1, 0x8000000, {0x100000000}, 0xa97f}, {0x27, 0x4, {0x3f}, 0x1ff}]}, 0x4, 0x0, <r5=>r4})
  137. ioctl$USBDEVFS_SUBMITURB(r4, 0x8038550a, &(0x7f0000000500)=@urb_type_control={0x2, {0x1}, 0x6, 0xc0, &(0x7f0000000440)={0x1f, 0x30, 0x89bb, 0x2, 0x1}, 0x8, 0x1, 0x8000, 0x0, 0x342d, 0x4, &(0x7f0000000480)="d18b82e7bd9b9682da4ee5fde1b6cb50020695ed15c4fc6d03eccfa2c6efc81396c7fa0e0f8cdeae749345dea59df450a3feeaba09531ddb6936a17673d868a6e510103babb30d"})
  138. ioctl$USBDEVFS_FREE_STREAMS(r4, 0x8008551d, &(0x7f0000000540)={0x889f, 0xb, [{0xc}, {0x1}, {0x4}, {0x7, 0x1}, {0x5}, {0x9}, {0x9, 0x1}, {0xe}, {0x5, 0x1}, {0x8, 0x1}, {0x6, 0x1}]})
  139. r6 = fcntl$dupfd(r2, 0x406, r5)
  140. clock_gettime(0x0, &(0x7f0000000580)={<r7=>0x0, <r8=>0x0})
  141. r9 = openat(r4, &(0x7f00000005c0)='./file0\x00', 0x4a400, 0x2)
  142. ioctl$VIDIOC_QBUF(r6, 0xc058560f, &(0x7f0000000600)=@mmap={0xcc4, 0x7, 0x4, 0x1000, 0x21, {r7, r8/1000+10000}, {0x3, 0x1, 0x1f, 0x95, 0xcc, 0x3, "537c4fd5"}, 0x33d, 0x1, {}, 0xff, 0x0, r9})
  143.  
  144. 2022/09/14 22:25:25 fops fd map: /dev/bus/usb/005/012(012/005/usb/bus/) -> usbdev_file_operations, fd: fd_usbfs
  145. 2022/09/14 22:25:25 fops fd map: /dev/ttyGS1(ttyGS1/) -> tty_fops, fd: fd_tty
  146. 2022/09/14 22:25:25 fops fd map: /dev/ttyGS2(ttyGS2/) -> tty_fops, fd: fd_tty
  147. 2022/09/14 22:25:25 ###attach usb device success: map[/dev/bus/usb/005/012:fd_usbfs /dev/ttyGS1:fd_tty /dev/ttyGS2:fd_tty]
  148. 2022/09/14 22:25:25 ###begin to generate program
  149. 2022/09/14 22:25:25 file prog: name: /dev/bus/usb/005/012, fd: fd_usbfs
  150. 2022/09/14 22:25:25 file prog loop meta, name: syz_open_dev$usbfs, Ret: fd_usbfs
  151. 2022/09/14 22:25:25 file prog: name: /dev/ttyGS1, fd: fd_tty
  152. 2022/09/14 22:25:25 file prog loop meta, name: openat$ttyS3, Ret: fd_tty
  153. 2022/09/14 22:25:25 file prog: name: /dev/ttyGS2, fd: fd_tty
  154. 2022/09/14 22:25:25 file prog loop meta, name: syz_open_dev$tty20, Ret: fd_tty
  155. 2022/09/14 22:25:25 file prog loop meta, name: openat$ttyprintk, Ret: fd_tty
  156. [ 1783.981797][T17747] usb 5-1: reset high-speed USB device number 12 using dummy_hcd
  157. [ 1784.431770][T17748] usb 5-1: reset high-speed USB device number 12 using dummy_hcd
  158. 22:25:26 executing program 4:
  159. r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/005/012', 0xffff, 0x6)
  160. r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyGS1', 0xe000, 0x0)
  161. r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyGS2', 0x4000, 0x0) (async)
  162. ioctl$USBDEVFS_RESET(r0, 0x5514) (async, rerun: 64)
  163. ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000000c0)=0x2) (rerun: 64)
  164. ioctl$USBDEVFS_RESET(r0, 0x5514) (async)
  165. ioctl$VIDIOC_QUERYBUF_DMABUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000100)={0x6, 0x1, 0x4, 0x1000, 0x5a5, {0x0, 0xea60}, {0x4, 0x8, 0x8d, 0xcb, 0x1, 0x6, "882a51f4"}, 0xfffffffd, 0x4, {}, 0x0, 0x0, <r3=>0xffffffffffffffff})
  166. ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r3, 0x8040942d, &(0x7f0000000180)) (async, rerun: 32)
  167. ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000001c0)=@fd={0x0, 0x2, 0x4, 0x10000, 0x7, {0x0, 0xea60}, {0x5, 0x8, 0x7, 0x15, 0xf9, 0x7f, "b2dce4f2"}, 0x7, 0x4, {}, 0xfffffd4d, 0x0, r3}) (async, rerun: 32)
  168. ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000240)={0x8000000, 0xfffffffc}) (async)
  169. ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380)
  170. ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000280)={0x4, 0xab, 0x2}) (async)
  171. r4 = openat2(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x10040, 0x40}, 0x18)
  172. ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000003c0)=@multiplanar_mmap={0x1, 0x6, 0x4, 0x0, 0xf383, {0x0, 0xea60}, {0x5, 0x1, 0x7, 0x4, 0x2, 0xf8, "e4a10006"}, 0x2, 0x1, {&(0x7f00000002c0)=[{0x1, 0x8000000, {0x100000000}, 0xa97f}, {0x27, 0x4, {0x3f}, 0x1ff}]}, 0x4, 0x0, <r5=>r4})
  173. ioctl$USBDEVFS_SUBMITURB(r4, 0x8038550a, &(0x7f0000000500)=@urb_type_control={0x2, {0x1}, 0x6, 0xc0, &(0x7f0000000440)={0x1f, 0x30, 0x89bb, 0x2, 0x1}, 0x8, 0x1, 0x8000, 0x0, 0x342d, 0x4, &(0x7f0000000480)="d18b82e7bd9b9682da4ee5fde1b6cb50020695ed15c4fc6d03eccfa2c6efc81396c7fa0e0f8cdeae749345dea59df450a3feeaba09531ddb6936a17673d868a6e510103babb30d"}) (async)
  174. ioctl$USBDEVFS_FREE_STREAMS(r4, 0x8008551d, &(0x7f0000000540)={0x889f, 0xb, [{0xc}, {0x1}, {0x4}, {0x7, 0x1}, {0x5}, {0x9}, {0x9, 0x1}, {0xe}, {0x5, 0x1}, {0x8, 0x1}, {0x6, 0x1}]}) (async)
  175. r6 = fcntl$dupfd(r2, 0x406, r5) (async)
  176. clock_gettime(0x0, &(0x7f0000000580)={<r7=>0x0, <r8=>0x0}) (async)
  177. r9 = openat(r4, &(0x7f00000005c0)='./file0\x00', 0x4a400, 0x2)
  178. ioctl$VIDIOC_QBUF(r6, 0xc058560f, &(0x7f0000000600)=@mmap={0xcc4, 0x7, 0x4, 0x1000, 0x21, {r7, r8/1000+10000}, {0x3, 0x1, 0x1f, 0x95, 0xcc, 0x3, "537c4fd5"}, 0x33d, 0x1, {}, 0xff, 0x0, r9})
  179.  
  180. [ 1784.918148][T17757] general protection fault, probably for non-canonical address 0xdffffc000000001c: 0000 [#1] PREEMPT SMP KASAN
  181. [ 1784.919504][T17757] KASAN: null-ptr-deref in range [0x00000000000000e0-0x00000000000000e7]
  182. [ 1784.927089][T17757] CPU: 0 PID: 17757 Comm: syz-executor.4 Not tainted 6.0.0-rc4+ #20
  183. [ 1784.934825][T17757] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
  184. [ 1784.936141][T17757] RIP: 0010:gs_start_io+0x24d/0x2c0
  185. [ 1784.936907][T17757] Code: 03 80 3c 02 00 0f 85 85 00 00 00 48 8b 9b d8 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d bb e0 00 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 75 59 48 8b bb e0 00 00 00 41 bc fb ff ff ff 48 8b 54
  186. [ 1784.945273][T17757] RSP: 0018:ffffc90018f07838 EFLAGS: 00010012
  187. [ 1784.945946][T17757] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff88801a2f3a80
  188. [ 1784.950978][T17757] RDX: 000000000000001c RSI: ffff88801a2f3a80 RDI: 00000000000000e0
  189. [ 1784.951802][T17757] RBP: ffff88801387e3d8 R08: ffffffff85d97033 R09: fffffbfff1d34743
  190. [ 1784.952719][T17757] R10: ffffffff8e9a3a17 R11: fffffbfff1d34742 R12: 0000000000000000
  191. [ 1784.953683][T17757] R13: ffff888047e78158 R14: ffff88801387e3f0 R15: ffff88801387e404
  192. [ 1784.954708][T17757] FS: 00007f2212ea8700(0000) GS:ffff88802cc00000(0000) knlGS:0000000000000000
  193. [ 1784.965647][T17757] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  194. [ 1784.971563][T17757] CR2: 000000c004475000 CR3: 000000006746a000 CR4: 0000000000350ef0
  195. [ 1784.972532][T17757] Call Trace:
  196. [ 1784.972916][T17757] <TASK>
  197. [ 1784.973361][T17757] gs_open+0x253/0x540
  198. [ 1784.973847][T17757] ? gserial_resume+0x210/0x210
  199. [ 1784.974383][T17757] tty_open+0x2e5/0xc30
  200. [ 1784.975794][T17757] ? tty_init_dev+0x460/0x460
  201. [ 1784.976345][T17757] ? rwlock_bug.part.0+0x90/0x90
  202. [ 1784.976934][T17757] ? tty_init_dev+0x460/0x460
  203. [ 1784.982019][T17757] chrdev_open+0x219/0x5c0
  204. [ 1784.984450][T17757] ? cdev_put.part.0+0x50/0x50
  205. [ 1784.992244][T17757] ? security_file_open+0x43b/0x640
  206. [ 1784.994454][T17757] ? __sanitizer_cov_trace_pc+0x1a/0x40
  207. [ 1784.996271][T17757] ? security_file_open+0x120/0x640
  208. [ 1784.996848][T17757] do_dentry_open+0x4a4/0x13a0
  209. [ 1785.006892][T17757] ? cdev_put.part.0+0x50/0x50
  210. [ 1785.011368][T17757] ? may_open+0x1f6/0x420
  211. [ 1785.011950][T17757] path_openat+0x1c1f/0x2840
  212. [ 1785.012632][T17757] ? kprobes_inc_nmissed_count+0x110/0x110
  213. [ 1785.016005][T17757] ? path_lookupat.isra.0+0x560/0x560
  214. [ 1785.016741][T17757] do_filp_open+0x1ca/0x2a0
  215. [ 1785.017286][T17757] ? may_open_dev+0xf0/0xf0
  216. [ 1785.017825][T17757] ? find_held_lock+0x2d/0x110
  217. [ 1785.018386][T17757] ? opt_pre_handler+0xef/0x160
  218. [ 1785.019108][T17757] ? do_filp_open+0x1/0x2a0
  219. [ 1785.019605][T17757] ? do_filp_open+0x1/0x2a0
  220. [ 1785.020112][T17757] ? write_comp_data+0x1c/0x70
  221. [ 1785.020638][T17757] ? optimized_callback+0xbb/0x2b0
  222. [ 1785.021239][T17757] ? do_sys_openat2+0x60a/0x990
  223. [ 1785.021933][T17757] trace_clock_x86_tsc+0x10/0x10
  224. [ 1785.030097][T17757] ? hlock_class+0xd4/0x120
  225. [ 1785.030702][T17757] ? file_open_root+0x430/0x430
  226. [ 1785.033090][T17757] do_sys_open+0xc3/0x140
  227. [ 1785.033532][T17757] ? filp_open+0x70/0x70
  228. [ 1785.033955][T17757] ? syscall_enter_from_user_mode+0x22/0xb0
  229. [ 1785.034823][T17757] ? syscall_enter_from_user_mode+0x22/0xb0
  230. [ 1785.036906][T17757] do_syscall_64+0x35/0x80
  231. [ 1785.037419][T17757] entry_SYSCALL_64_after_hwframe+0x63/0xcd
  232. [ 1785.038077][T17757] RIP: 0033:0x7f22126a80fd
  233. [ 1785.038621][T17757] Code: 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
  234. [ 1785.040767][T17757] RSP: 002b:00007f2212ea7bf8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
  235. [ 1785.041690][T17757] RAX: ffffffffffffffda RBX: 00007f221279c340 RCX: 00007f22126a80fd
  236. [ 1785.052813][T17757] RDX: 0000000000004000 RSI: 0000000020000080 RDI: ffffffffffffff9c
  237. [ 1785.053711][T17757] RBP: 00007f221270b606 R08: 0000000000000000 R09: 0000000000000000
  238. [ 1785.056397][T17757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
  239. [ 1785.057387][T17757] R13: 00007ffd1cb1673f R14: 00007ffd1cb168e0 R15: 00007f2212ea7d80
  240. [ 1785.058338][T17757] </TASK>
  241. [ 1785.061355][T17757] Modules linked in:
  242. [ 1785.062002][T17757] ---[ end trace 0000000000000000 ]---
  243. [ 1785.064012][T17757] RIP: 0010:gs_start_io+0x24d/0x2c0
  244. [ 1785.064725][T17757] Code: 03 80 3c 02 00 0f 85 85 00 00 00 48 8b 9b d8 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d bb e0 00 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 75 59 48 8b bb e0 00 00 00 41 bc fb ff ff ff 48 8b 54
  245. [ 1785.071104][T17757] RSP: 0018:ffffc90018f07838 EFLAGS: 00010012
  246. [ 1785.071775][T17757] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff88801a2f3a80
  247. [ 1785.072681][T17757] RDX: 000000000000001c RSI: ffff88801a2f3a80 RDI: 00000000000000e0
  248. [ 1785.080138][T17757] RBP: ffff88801387e3d8 R08: ffffffff85d97033 R09: fffffbfff1d34743
  249. [ 1785.081976][T17757] R10: ffffffff8e9a3a17 R11: fffffbfff1d34742 R12: 0000000000000000
  250. [ 1785.086448][T17757] R13: ffff888047e78158 R14: ffff88801387e3f0 R15: ffff88801387e404
  251. [ 1785.091193][T17757] FS: 00007f2212ea8700(0000) GS:ffff88802cc00000(0000) knlGS:0000000000000000
  252. [ 1785.095974][T17757] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  253. [ 1785.099463][T17757] CR2: 000000c004475000 CR3: 000000006746a000 CR4: 0000000000350ef0
  254. [ 1785.103643][T17757] Kernel panic - not syncing: Fatal exception
  255. [ 1786.353516][T17757] Shutting down cpus with NMI
  256. [ 1786.354386][T17757] Kernel Offset: disabled
  257. [ 1786.354915][T17757] Rebooting in 86400 seconds..
  258.  
  259. VM DIAGNOSIS:
  260. 06:25:26 Registers:
  261. info registers vcpu 0
  262. RAX=000000000000006e RBX=0000000000000000 RCX=0000000000000000 RDX=00000000000003f8
  263. RSI=ffff88801a2f3a80 RDI=ffffffff916c1f40 RBP=ffffffff916c1f00 RSP=ffffc90018f071a0
  264. R8 =ffffffff84624951 R9 =000000000000001f R10=0000000000000001 R11=ffffed1002d62046
  265. R12=0000000000000000 R13=000000000000006e R14=0000000000000000 R15=0000000000000010
  266. RIP=ffffffff8462497b RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0
  267. ES =0000 0000000000000000 00000000 00000000
  268. CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
  269. SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
  270. DS =0000 0000000000000000 00000000 00000000
  271. FS =0000 00007f2212ea8700 00000000 00000000
  272. GS =0000 ffff88802cc00000 00000000 00000000
  273. LDT=0000 fffffe0000000000 00000000 00000000
  274. TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy
  275. GDT= fffffe0000001000 0000007f
  276. IDT= fffffe0000000000 00000fff
  277. CR0=80050033 CR2=000000c004475000 CR3=000000006746a000 CR4=00350ef0
  278. DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
  279. DR6=00000000ffff0ff0 DR7=0000000000000400
  280. EFER=0000000000000d01
  281. FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
  282. FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
  283. FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
  284. FPR4=0000000000000000 0000 FPR5=8100000000000000 4007
  285. FPR6=8740000000000000 4008 FPR7=8740000000000000 4008
  286. XMM00=ffffffffffffffffffffffffffffffff XMM01=23232323232323232323232323232323
  287. XMM02=ffffffffffffffffffffffffffffffff XMM03=ffffffffffffffffffffffffffffffff
  288. XMM04=ffffffffffffffffffffffffffffffff XMM05=00000000000000000000000000001000
  289. XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000
  290. XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000
  291. XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000
  292. XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000
  293. XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000
  294. info registers vcpu 1
  295. RAX=0000000000000003 RBX=0000000000000000 RCX=ffffffff815f314e RDX=0000000000000000
  296. RSI=0000000000000003 RDI=ffff88801387e398 RBP=ffff88801387e398 RSP=ffffc90018f371f0
  297. R8 =0000000000000000 R9 =ffffed100270fc74 R10=ffff88801387e398 R11=ffffed100270fc73
  298. R12=0000000000000000 R13=ffffed100270fc73 R14=0000000000000001 R15=ffff88807ec3ad40
  299. RIP=ffffffff813602c3 RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=1
  300. ES =0000 0000000000000000 00000000 00000000
  301. CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
  302. SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
  303. DS =0000 0000000000000000 00000000 00000000
  304. FS =0000 00007f2212e87700 00000000 00000000
  305. GS =0000 ffff88807ec00000 00000000 00000000
  306. LDT=0000 fffffe0000000000 00000000 00000000
  307. TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy
  308. GDT= fffffe0000048000 0000007f
  309. IDT= fffffe0000000000 00000fff
  310. CR0=80050033 CR2=00007f2212e65d78 CR3=000000006746a000 CR4=00350ee0
  311. DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
  312. DR6=00000000ffff0ff0 DR7=0000000000000400
  313. EFER=0000000000000d01
  314. FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
  315. FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
  316. FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
  317. FPR4=0000000000000000 0000 FPR5=8100000000000000 4007
  318. FPR6=8740000000000000 4008 FPR7=8740000000000000 4008
  319. XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000
  320. XMM02=00007f2212776b6000007f2212776b48 XMM03=00007f2212776b4000007f2212cda4c0
  321. XMM04=0000000000000000000000ff00000000 XMM05=00000000000000000000000000001000
  322. XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000
  323. XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000
  324. XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000
  325. XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000
  326. XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement