[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 65.072486][ T27] audit: type=1800 audit(1575085963.269:25): pid=8736 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 65.105321][ T27] audit: type=1800 audit(1575085963.269:26): pid=8736 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 65.161813][ T27] audit: type=1800 audit(1575085963.279:27): pid=8736 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.127' (ECDSA) to the list of known hosts. 2019/11/30 03:52:55 fuzzer started 2019/11/30 03:52:57 dialing manager at 10.128.0.26:36687 2019/11/30 03:52:57 syscalls: 2592 2019/11/30 03:52:57 code coverage: enabled 2019/11/30 03:52:57 comparison tracing: enabled 2019/11/30 03:52:57 extra coverage: enabled 2019/11/30 03:52:57 setuid sandbox: enabled 2019/11/30 03:52:57 namespace sandbox: enabled 2019/11/30 03:52:57 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/30 03:52:57 fault injection: enabled 2019/11/30 03:52:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/30 03:52:57 net packet injection: enabled 2019/11/30 03:52:57 net device setup: enabled 2019/11/30 03:52:57 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/30 03:52:57 devlink PCI setup: PCI device 0000:00:10.0 is not available 03:54:23 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:54:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x100000006) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, 0x0, 0x0) syzkaller login: [ 165.127349][ T8902] IPVS: ftp: loaded support on port[0] = 21 03:54:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8000000004) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000000c0)=0x87, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) [ 165.339023][ T8902] chnl_net:caif_netlink_parms(): no params data found [ 165.357367][ T8905] IPVS: ftp: loaded support on port[0] = 21 [ 165.426082][ T8902] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.437203][ T8902] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.446972][ T8902] device bridge_slave_0 entered promiscuous mode [ 165.471824][ T8902] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.479992][ T8902] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.489474][ T8902] device bridge_slave_1 entered promiscuous mode [ 165.545655][ T8902] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 165.601792][ T8902] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 165.622123][ T8908] IPVS: ftp: loaded support on port[0] = 21 03:54:23 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0xa}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60) [ 165.671321][ T8902] team0: Port device team_slave_0 added [ 165.694949][ T8905] chnl_net:caif_netlink_parms(): no params data found [ 165.706321][ T8902] team0: Port device team_slave_1 added [ 165.843331][ T8902] device hsr_slave_0 entered promiscuous mode [ 165.898306][ T8902] device hsr_slave_1 entered promiscuous mode 03:54:24 executing program 4: r0 = timerfd_create(0x10000000000008, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, 0x0) [ 166.040453][ T8910] IPVS: ftp: loaded support on port[0] = 21 [ 166.051021][ T8905] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.058493][ T8905] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.066268][ T8905] device bridge_slave_0 entered promiscuous mode [ 166.151249][ T8905] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.162128][ T8905] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.170443][ T8905] device bridge_slave_1 entered promiscuous mode [ 166.228055][ T8914] IPVS: ftp: loaded support on port[0] = 21 [ 166.239784][ T8902] netdevsim netdevsim0 netdevsim0: renamed from eth0 03:54:24 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001640), 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=@profile={'permprofile ', '\"\"//em0ppp1vboxnet0-user\x00'}, 0x25) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000240)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 166.350760][ T8908] chnl_net:caif_netlink_parms(): no params data found [ 166.364629][ T8902] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 166.422479][ T8902] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 166.522706][ T8902] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 166.601685][ T8905] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 166.641110][ T8905] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 166.668502][ T8916] IPVS: ftp: loaded support on port[0] = 21 [ 166.691180][ T8905] team0: Port device team_slave_0 added [ 166.703481][ T8908] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.711544][ T8908] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.719309][ T8908] device bridge_slave_0 entered promiscuous mode [ 166.739167][ T8905] team0: Port device team_slave_1 added [ 166.745352][ T8908] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.752971][ T8908] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.762519][ T8908] device bridge_slave_1 entered promiscuous mode [ 166.789023][ T8908] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 166.815133][ T8908] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 166.942752][ T8905] device hsr_slave_0 entered promiscuous mode [ 166.998326][ T8905] device hsr_slave_1 entered promiscuous mode [ 167.048032][ T8905] debugfs: Directory 'hsr0' with parent '/' already present! [ 167.070194][ T8908] team0: Port device team_slave_0 added [ 167.095766][ T8908] team0: Port device team_slave_1 added [ 167.166032][ T8910] chnl_net:caif_netlink_parms(): no params data found [ 167.191723][ T8914] chnl_net:caif_netlink_parms(): no params data found [ 167.250937][ T8908] device hsr_slave_0 entered promiscuous mode [ 167.288294][ T8908] device hsr_slave_1 entered promiscuous mode [ 167.337997][ T8908] debugfs: Directory 'hsr0' with parent '/' already present! [ 167.421596][ T8905] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 167.497589][ T8910] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.504941][ T8910] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.513262][ T8910] device bridge_slave_0 entered promiscuous mode [ 167.523169][ T8905] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 167.596376][ T8910] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.604087][ T8910] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.612251][ T8910] device bridge_slave_1 entered promiscuous mode [ 167.626421][ T8905] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 167.662562][ T8905] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 167.710478][ T8916] chnl_net:caif_netlink_parms(): no params data found [ 167.721871][ T8914] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.729178][ T8914] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.736812][ T8914] device bridge_slave_0 entered promiscuous mode [ 167.783169][ T8914] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.791066][ T8914] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.801199][ T8914] device bridge_slave_1 entered promiscuous mode [ 167.811269][ T8910] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 167.820478][ T8908] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 167.875410][ T8908] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 167.943659][ T8910] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 167.964003][ T8908] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 168.030337][ T8908] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 168.097765][ T8914] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 168.113484][ T8914] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 168.125148][ T8916] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.132862][ T8916] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.142101][ T8916] device bridge_slave_0 entered promiscuous mode [ 168.150904][ T8916] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.158401][ T8916] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.166229][ T8916] device bridge_slave_1 entered promiscuous mode [ 168.185475][ T8902] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.200462][ T8910] team0: Port device team_slave_0 added [ 168.219405][ T8916] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 168.231584][ T8916] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 168.244093][ T8910] team0: Port device team_slave_1 added [ 168.276079][ T8914] team0: Port device team_slave_0 added [ 168.321699][ T8910] device hsr_slave_0 entered promiscuous mode [ 168.380882][ T8910] device hsr_slave_1 entered promiscuous mode [ 168.428070][ T8910] debugfs: Directory 'hsr0' with parent '/' already present! [ 168.437652][ T8914] team0: Port device team_slave_1 added [ 168.445174][ T8916] team0: Port device team_slave_0 added [ 168.458795][ T8916] team0: Port device team_slave_1 added [ 168.541983][ T8916] device hsr_slave_0 entered promiscuous mode [ 168.588424][ T8916] device hsr_slave_1 entered promiscuous mode [ 168.627980][ T8916] debugfs: Directory 'hsr0' with parent '/' already present! [ 168.641838][ T8902] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.672814][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.681296][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.689936][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.698602][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.707073][ T3193] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.714301][ T3193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.789427][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 168.797622][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.806458][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.815049][ T3193] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.822111][ T3193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.831308][ T8916] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 168.890674][ T8916] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 168.931859][ T8916] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 169.051169][ T8914] device hsr_slave_0 entered promiscuous mode [ 169.098603][ T8914] device hsr_slave_1 entered promiscuous mode [ 169.138079][ T8914] debugfs: Directory 'hsr0' with parent '/' already present! [ 169.162308][ T8916] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 169.221786][ T8910] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 169.271438][ T8910] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 169.319772][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.333672][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.342251][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.351539][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.360073][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.387076][ T8908] 8021q: adding VLAN 0 to HW filter on device bond0 [ 169.422956][ T8910] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 169.474678][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.485272][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.494211][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.504033][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.513103][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.521699][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.533357][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 169.544418][ T8914] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 169.571239][ T8914] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 169.640687][ T8910] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 169.718454][ T8914] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 169.753631][ T8914] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 169.809281][ T8905] 8021q: adding VLAN 0 to HW filter on device bond0 [ 169.823594][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.831749][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.856130][ T8908] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.869107][ T8905] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.890880][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.899363][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.947455][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.956565][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.965423][ T3193] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.972499][ T3193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.980172][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 169.987578][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 169.995838][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.004650][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.013178][ T3193] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.020262][ T3193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.027982][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.036601][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.045147][ T3193] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.052201][ T3193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.060066][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.068928][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.077255][ T3193] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.084431][ T3193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.093192][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.101222][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.136824][ T8902] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.146075][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.155075][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.164004][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.173010][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.223675][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.233027][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.241667][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.250536][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.259048][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.267420][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.276190][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.284625][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.294227][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.305370][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.313981][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.321931][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.340920][ T8916] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.353975][ T8905] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 170.365716][ T8905] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.380623][ T8910] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.395433][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.404297][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.415934][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.429421][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.444285][ T8908] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 170.455886][ T8908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.479427][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.487716][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.499499][ T8914] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.516430][ T8916] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.536613][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.544615][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.552876][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.572646][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.601326][ T8910] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.637606][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:54:28 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 170.645938][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 170.655273][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 03:54:28 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 170.694556][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.721742][ T3193] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.728870][ T3193] bridge0: port 1(bridge_slave_0) entered forwarding state 03:54:28 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 170.745636][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.777208][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 03:54:29 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000280)) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) shmget(0x2, 0x1000, 0x0, &(0x7f000096d000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x2) socket$alg(0x26, 0x5, 0x0) ioctl(0xffffffffffffffff, 0x40084149, &(0x7f0000000000)) inotify_init1(0x0) [ 170.792215][ T3193] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.799330][ T3193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.816433][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.824978][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.836469][ T8905] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.871988][ T8914] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.881606][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.891057][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.901188][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.911165][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 03:54:29 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000280)) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) shmget(0x2, 0x1000, 0x0, &(0x7f000096d000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x2) socket$alg(0x26, 0x5, 0x0) ioctl(0xffffffffffffffff, 0x40084149, &(0x7f0000000000)) inotify_init1(0x0) [ 170.920553][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.927620][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.936813][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.958944][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.967653][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.989901][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.996961][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.004629][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 171.012228][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 171.020137][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.052845][ T8908] 8021q: adding VLAN 0 to HW filter on device batadv0 03:54:29 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000280)) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) shmget(0x2, 0x1000, 0x0, &(0x7f000096d000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x2) socket$alg(0x26, 0x5, 0x0) ioctl(0xffffffffffffffff, 0x40084149, &(0x7f0000000000)) inotify_init1(0x0) [ 171.082195][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 171.092090][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 171.105577][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.114629][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 171.124655][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.134147][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 171.144512][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.153679][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.162387][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.172004][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.180943][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.190088][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.198865][ T8912] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.205923][ T8912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.213702][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.222850][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.231351][ T8912] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.238562][ T8912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.246774][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.256326][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.264358][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 03:54:29 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000280)) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) shmget(0x2, 0x1000, 0x0, &(0x7f000096d000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x2) socket$alg(0x26, 0x5, 0x0) ioctl(0xffffffffffffffff, 0x40084149, &(0x7f0000000000)) inotify_init1(0x0) [ 171.305109][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.324394][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.334388][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.347513][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 03:54:29 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x100000006) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, 0x0, 0x0) [ 171.377445][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.430737][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 171.442617][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.455011][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.467125][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.481454][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.492867][ T8916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.512001][ T8910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.528519][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.538781][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 171.547360][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.581697][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.650048][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.659170][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.667561][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.676639][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.685148][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.701344][ T8914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.715399][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 171.723079][ T8912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 171.734486][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:54:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8000000004) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000000c0)=0x87, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) [ 171.746107][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 171.757555][ T8916] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 171.806473][ T8910] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 171.838000][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 171.845443][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 171.886568][ T8914] 8021q: adding VLAN 0 to HW filter on device batadv0 03:54:30 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0xa}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60) 03:54:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x100000006) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, 0x0, 0x0) [ 172.223886][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 172.223900][ T27] audit: type=1400 audit(1575086070.419:31): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=22222F2F656D307070703176626F786E6574302D75736572 pid=8981 comm="syz-executor.5" 03:54:30 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001640), 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=@profile={'permprofile ', '\"\"//em0ppp1vboxnet0-user\x00'}, 0x25) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000240)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 03:54:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8000000004) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000000c0)=0x87, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) 03:54:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0), &(0x7f0000000040)=0x14) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_GET_CAPABILITIES(r1, 0x8008551c, &(0x7f00000000c0)) 03:54:30 executing program 4: r0 = timerfd_create(0x10000000000008, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, 0x0) 03:54:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x100000006) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, 0x0, 0x0) [ 172.302794][ T27] audit: type=1400 audit(1575086070.479:32): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=22222F2F656D307070703176626F786E6574302D75736572 pid=8981 comm="syz-executor.5" 03:54:30 executing program 4: r0 = timerfd_create(0x10000000000008, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, 0x0) 03:54:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8000000004) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000000c0)=0x87, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) 03:54:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0), &(0x7f0000000040)=0x14) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_GET_CAPABILITIES(r1, 0x8008551c, &(0x7f00000000c0)) [ 172.462770][ T27] audit: type=1400 audit(1575086070.659:33): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=22222F2F656D307070703176626F786E6574302D75736572 pid=8997 comm="syz-executor.5" 03:54:30 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001640), 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=@profile={'permprofile ', '\"\"//em0ppp1vboxnet0-user\x00'}, 0x25) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000240)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 03:54:30 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0), &(0x7f0000000040)=0x14) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_GET_CAPABILITIES(r1, 0x8008551c, &(0x7f00000000c0)) 03:54:30 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0xa}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60) 03:54:30 executing program 4: r0 = timerfd_create(0x10000000000008, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, 0x0) [ 172.747909][ C0] hrtimer: interrupt took 46145 ns 03:54:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0), &(0x7f0000000040)=0x14) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_GET_CAPABILITIES(r1, 0x8008551c, &(0x7f00000000c0)) 03:54:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001640), 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=@profile={'permprofile ', '\"\"//em0ppp1vboxnet0-user\x00'}, 0x25) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000240)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 172.794184][ T27] audit: type=1400 audit(1575086070.989:34): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=22222F2F656D307070703176626F786E6574302D75736572 pid=9011 comm="syz-executor.5" 03:54:31 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001640), 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=@profile={'permprofile ', '\"\"//em0ppp1vboxnet0-user\x00'}, 0x25) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000240)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 03:54:31 executing program 4: r0 = timerfd_create(0x10000000000008, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, 0x0) [ 173.004344][ T27] audit: type=1400 audit(1575086071.199:35): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=22222F2F656D307070703176626F786E6574302D75736572 pid=9031 comm="syz-executor.2" 03:54:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0), &(0x7f0000000040)=0x14) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_GET_CAPABILITIES(r1, 0x8008551c, &(0x7f00000000c0)) 03:54:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001640), 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=@profile={'permprofile ', '\"\"//em0ppp1vboxnet0-user\x00'}, 0x25) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000240)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 03:54:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0), &(0x7f0000000040)=0x14) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_GET_CAPABILITIES(r1, 0x8008551c, &(0x7f00000000c0)) 03:54:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000000c0)=0x87, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) [ 173.220028][ T27] audit: type=1400 audit(1575086071.349:36): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=22222F2F656D307070703176626F786E6574302D75736572 pid=9036 comm="syz-executor.5" 03:54:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0), &(0x7f0000000040)=0x14) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_GET_CAPABILITIES(r1, 0x8008551c, &(0x7f00000000c0)) 03:54:31 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0xa}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60) 03:54:31 executing program 4: r0 = timerfd_create(0x10000000000008, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, 0x0) 03:54:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000000c0)=0x87, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) [ 173.414070][ T27] audit: type=1400 audit(1575086071.609:37): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=22222F2F656D307070703176626F786E6574302D75736572 pid=9046 comm="syz-executor.2" 03:54:31 executing program 0: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x2) writev(r0, &(0x7f0000002380)=[{&(0x7f0000000300)='~', 0x1}], 0x1) 03:54:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001640), 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=@profile={'permprofile ', '\"\"//em0ppp1vboxnet0-user\x00'}, 0x25) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000240)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 03:54:31 executing program 4: r0 = timerfd_create(0x10000000000008, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, 0x0) [ 173.652766][ T27] audit: type=1400 audit(1575086071.849:38): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=22222F2F656D307070703176626F786E6574302D75736572 pid=9064 comm="syz-executor.2" 03:54:31 executing program 3: r0 = socket(0x1e, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt(r0, 0x800000010f, 0x81, &(0x7f00004ad000), &(0x7f0000a3c000)=0xfffffffffffffc40) 03:54:31 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/fib_trie\x00') seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 03:54:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000004c0)=""/4096) 03:54:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000000c0)=0x87, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) 03:54:32 executing program 0: setrlimit(0x7, &(0x7f0000000000)) epoll_create(0x398) [ 173.844014][ T27] audit: type=1326 audit(1575086072.039:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9075 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d4ba code=0x0 03:54:32 executing program 3: r0 = socket(0x1e, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt(r0, 0x800000010f, 0x81, &(0x7f00004ad000), &(0x7f0000a3c000)=0xfffffffffffffc40) 03:54:32 executing program 4: r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000140), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0xf7962dfeff881bdc, 0x80fe}, 0x23, &(0x7f00000001c0), 0xc}, 0x0) 03:54:32 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="1b0000004a009b8814e5f407000904000a00"/27, 0x1b) 03:54:32 executing program 0: rt_sigaction(0x11, &(0x7f0000000140)={0x0, {}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000240)) 03:54:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000004c0)=""/4096) 03:54:32 executing program 3: r0 = socket(0x1e, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt(r0, 0x800000010f, 0x81, &(0x7f00004ad000), &(0x7f0000a3c000)=0xfffffffffffffc40) 03:54:32 executing program 4: r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000140), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0xf7962dfeff881bdc, 0x80fe}, 0x23, &(0x7f00000001c0), 0xc}, 0x0) 03:54:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000004c0)=""/4096) 03:54:32 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/fib_trie\x00') seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 03:54:32 executing program 0: rt_sigaction(0x11, &(0x7f0000000140)={0x0, {}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000240)) 03:54:32 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="1b0000004a009b8814e5f407000904000a00"/27, 0x1b) 03:54:32 executing program 3: r0 = socket(0x1e, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt(r0, 0x800000010f, 0x81, &(0x7f00004ad000), &(0x7f0000a3c000)=0xfffffffffffffc40) 03:54:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000004c0)=""/4096) 03:54:32 executing program 4: r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000140), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0xf7962dfeff881bdc, 0x80fe}, 0x23, &(0x7f00000001c0), 0xc}, 0x0) [ 174.606479][ T27] audit: type=1326 audit(1575086072.799:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9075 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d4ba code=0x0 03:54:32 executing program 0: rt_sigaction(0x11, &(0x7f0000000140)={0x0, {}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000240)) 03:54:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000004c0)=""/4096) 03:54:33 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="1b0000004a009b8814e5f407000904000a00"/27, 0x1b) 03:54:33 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x17642c4) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) r2 = dup2(r0, r0) preadv(r2, &(0x7f00000000c0)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000140)=""/212, 0xd4}], 0x2, 0x0) sendfile(r0, r1, 0x0, 0x102002700) 03:54:33 executing program 4: r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000140), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0xf7962dfeff881bdc, 0x80fe}, 0x23, &(0x7f00000001c0), 0xc}, 0x0) 03:54:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000004c0)=""/4096) 03:54:33 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="1b0000004a009b8814e5f407000904000a00"/27, 0x1b) 03:54:33 executing program 0: rt_sigaction(0x11, &(0x7f0000000140)={0x0, {}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000240)) 03:54:33 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/fib_trie\x00') seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 03:54:33 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='mode=7']) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, &(0x7f00000000c0)) 03:54:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000004c0)=""/4096) 03:54:33 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x17642c4) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) r2 = dup2(r0, r0) preadv(r2, &(0x7f00000000c0)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000140)=""/212, 0xd4}], 0x2, 0x0) sendfile(r0, r1, 0x0, 0x102002700) 03:54:33 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) close(r1) 03:54:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1fb}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20003c7a, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) 03:54:33 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='mode=7']) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, &(0x7f00000000c0)) 03:54:33 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0xfffffffffffffe5f}, 0x1b}}, 0x0) sendmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback={0xff00000000000000}}, 0x80, 0x0}}], 0x8, 0x0) 03:54:34 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='mode=7']) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, &(0x7f00000000c0)) 03:54:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1fb}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20003c7a, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) 03:54:34 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0xfffffffffffffe5f}, 0x1b}}, 0x0) sendmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback={0xff00000000000000}}, 0x80, 0x0}}], 0x8, 0x0) 03:54:34 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) close(r1) 03:54:34 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/fib_trie\x00') seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 03:54:34 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0xfffffffffffffe5f}, 0x1b}}, 0x0) sendmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback={0xff00000000000000}}, 0x80, 0x0}}], 0x8, 0x0) 03:54:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1fb}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20003c7a, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) 03:54:34 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='mode=7']) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, &(0x7f00000000c0)) 03:54:34 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) close(r1) 03:54:34 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x17642c4) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) r2 = dup2(r0, r0) preadv(r2, &(0x7f00000000c0)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000140)=""/212, 0xd4}], 0x2, 0x0) sendfile(r0, r1, 0x0, 0x102002700) 03:54:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1fb}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20003c7a, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) 03:54:34 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0xfffffffffffffe5f}, 0x1b}}, 0x0) sendmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback={0xff00000000000000}}, 0x80, 0x0}}], 0x8, 0x0) 03:54:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$unix(0x1, 0x10004000000002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_int(r3, 0x6, 0x1, &(0x7f0000000100), 0x4) 03:54:34 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) close(r1) 03:54:34 executing program 3: creat(&(0x7f0000000380)='./bus\x00', 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="756269215fd64f9e9210024aef906d1bf7783418b94cd2f980075d27fb46a0a0ff90013e8c13e96f33db619eb0046ced5aa786926c73d620ac523fc39862b124e3108798b8f445efc8b08141b074505f59f25c114cd3dce85af7ec5135a20b8d64cf50e88a52a46c6d71a8382ea8f150702e43428f112cb1454d846d473c0cc1b05ac4c6"], &(0x7f00000000c0)='./bus\x00', &(0x7f0000000400)='ubifs\x00', 0x0, 0x0) 03:54:34 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffc038563c, &(0x7f0000000000)) [ 176.861067][ T9243] UBIFS error (pid: 9243): cannot open "ubi!_OJmx4L]'F>o3alZls R?Øb$EȰAtP_Y\LZQ5 dPRlmq8.Pp.CB,EMmG< Z", error -22 03:54:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b37, &(0x7f0000000040)='wlan0\x00') 03:54:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$unix(0x1, 0x10004000000002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_int(r3, 0x6, 0x1, &(0x7f0000000100), 0x4) 03:54:35 executing program 3: creat(&(0x7f0000000380)='./bus\x00', 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="756269215fd64f9e9210024aef906d1bf7783418b94cd2f980075d27fb46a0a0ff90013e8c13e96f33db619eb0046ced5aa786926c73d620ac523fc39862b124e3108798b8f445efc8b08141b074505f59f25c114cd3dce85af7ec5135a20b8d64cf50e88a52a46c6d71a8382ea8f150702e43428f112cb1454d846d473c0cc1b05ac4c6"], &(0x7f00000000c0)='./bus\x00', &(0x7f0000000400)='ubifs\x00', 0x0, 0x0) 03:54:35 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffc038563c, &(0x7f0000000000)) 03:54:35 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x17642c4) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) r2 = dup2(r0, r0) preadv(r2, &(0x7f00000000c0)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000140)=""/212, 0xd4}], 0x2, 0x0) sendfile(r0, r1, 0x0, 0x102002700) 03:54:35 executing program 2: clock_settime(0xa, 0x0) 03:54:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$unix(0x1, 0x10004000000002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_int(r3, 0x6, 0x1, &(0x7f0000000100), 0x4) 03:54:35 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffc038563c, &(0x7f0000000000)) 03:54:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b37, &(0x7f0000000040)='wlan0\x00') 03:54:35 executing program 3: creat(&(0x7f0000000380)='./bus\x00', 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="756269215fd64f9e9210024aef906d1bf7783418b94cd2f980075d27fb46a0a0ff90013e8c13e96f33db619eb0046ced5aa786926c73d620ac523fc39862b124e3108798b8f445efc8b08141b074505f59f25c114cd3dce85af7ec5135a20b8d64cf50e88a52a46c6d71a8382ea8f150702e43428f112cb1454d846d473c0cc1b05ac4c6"], &(0x7f00000000c0)='./bus\x00', &(0x7f0000000400)='ubifs\x00', 0x0, 0x0) 03:54:35 executing program 2: clock_settime(0xa, 0x0) [ 177.422526][ T9256] UBIFS error (pid: 9256): cannot open "ubi!_OJmx4L]'F>o3alZls R?Øb$EȰAtP_Y\LZQ5 dPRlmq8.Pp.CB,EMmG< Z", error -22 03:54:35 executing program 2: clock_settime(0xa, 0x0) 03:54:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$unix(0x1, 0x10004000000002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_int(r3, 0x6, 0x1, &(0x7f0000000100), 0x4) 03:54:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b37, &(0x7f0000000040)='wlan0\x00') 03:54:35 executing program 2: clock_settime(0xa, 0x0) [ 177.707455][ T9279] UBIFS error (pid: 9279): cannot open "ubi!_OJmx4L]'F>o3alZls R?Øb$EȰAtP_Y\LZQ5 dPRlmq8.Pp.CB,EMmG< Z", error -22 03:54:35 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffc038563c, &(0x7f0000000000)) 03:54:36 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000000c0)) 03:54:36 executing program 3: creat(&(0x7f0000000380)='./bus\x00', 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="756269215fd64f9e9210024aef906d1bf7783418b94cd2f980075d27fb46a0a0ff90013e8c13e96f33db619eb0046ced5aa786926c73d620ac523fc39862b124e3108798b8f445efc8b08141b074505f59f25c114cd3dce85af7ec5135a20b8d64cf50e88a52a46c6d71a8382ea8f150702e43428f112cb1454d846d473c0cc1b05ac4c6"], &(0x7f00000000c0)='./bus\x00', &(0x7f0000000400)='ubifs\x00', 0x0, 0x0) 03:54:36 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) epoll_create(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 03:54:36 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b37, &(0x7f0000000040)='wlan0\x00') 03:54:36 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000440), &(0x7f0000000480)=0x4) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f00000002c0)={0x1}) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3, &(0x7f0000000280)=0x80) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='keyring\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r6, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r6, 0x5402, &(0x7f0000000000)) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x0) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfffffc8f) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, {}, {0x2, 0x0, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x3, 0x0, 0x8}) splice(r3, 0x0, r5, 0x0, 0x100000000ffe0, 0x0) fcntl$setpipe(r4, 0x407, 0x8000000) write$eventfd(r4, &(0x7f0000000040), 0x8) 03:54:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xd96e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x4001fe}) 03:54:36 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000000c0)) 03:54:36 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) [ 178.116107][ T9305] UBIFS error (pid: 9305): cannot open "ubi!_OJmx4L]'F>o3alZls R?Øb$EȰAtP_Y\LZQ5 dPRlmq8.Pp.CB,EMmG< Z", error -22 03:54:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="2000000000000000840000000100fdffffff0000000200008000000000000000"], 0x20}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 03:54:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="2000000000000000840000000100fdffffff0000000200008000000000000000"], 0x20}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 03:54:36 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000000c0)) 03:54:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="2000000000000000840000000100fdffffff0000000200008000000000000000"], 0x20}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 178.322060][ T9306] XFS (loop2): Mounting V4 Filesystem [ 178.406138][ T9306] XFS (loop2): totally zeroed log [ 178.412988][ T9306] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x397/0x570, xfs_agi block 0x2 [ 178.423900][ T9306] XFS (loop2): Unmount and run xfs_repair [ 178.430682][ T9306] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 178.438752][ T9306] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 178.447809][ T9306] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 178.458674][ T9306] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 178.467775][ T9306] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 178.476913][ T9306] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 178.486028][ T9306] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 178.495144][ T9306] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03:54:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xd96e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x4001fe}) 03:54:36 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) [ 178.504261][ T9306] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 178.513411][ T9306] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 178.523796][ T9306] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 178.533471][ T9306] XFS (loop2): Failed to read root inode 0xd88, error 117 [ 178.893295][ T9356] XFS (loop2): Mounting V4 Filesystem [ 178.935545][ T9356] ================================================================== [ 178.943879][ T9356] BUG: KASAN: use-after-free in xlog_alloc_log+0x1386/0x14b0 [ 178.951260][ T9356] Read of size 8 at addr ffff88809690a890 by task syz-executor.2/9356 [ 178.959603][ T9356] [ 178.961948][ T9356] CPU: 0 PID: 9356 Comm: syz-executor.2 Not tainted 5.4.0-next-20191129-syzkaller #0 [ 178.971426][ T9356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.981602][ T9356] Call Trace: [ 178.984884][ T9356] dump_stack+0x197/0x210 [ 178.989197][ T9356] ? xlog_alloc_log+0x1386/0x14b0 [ 178.994206][ T9356] print_address_description.constprop.0.cold+0xd4/0x30b [ 179.001223][ T9356] ? xlog_alloc_log+0x1386/0x14b0 [ 179.006251][ T9356] ? xlog_alloc_log+0x1386/0x14b0 [ 179.011280][ T9356] __kasan_report.cold+0x1b/0x41 [ 179.016227][ T9356] ? kvfree+0x20/0x70 [ 179.020214][ T9356] ? xlog_alloc_log+0x1386/0x14b0 [ 179.025244][ T9356] kasan_report+0x12/0x20 [ 179.029580][ T9356] __asan_report_load8_noabort+0x14/0x20 [ 179.035216][ T9356] xlog_alloc_log+0x1386/0x14b0 [ 179.040084][ T9356] xfs_log_mount+0xdc/0x780 [ 179.044588][ T9356] xfs_mountfs+0xc35/0x1ca0 [ 179.049097][ T9356] ? xfs_default_resblks+0x60/0x60 [ 179.054189][ T9356] ? init_timer_key+0x13b/0x3a0 [ 179.059031][ T9356] ? xfs_mru_cache_create+0x4a0/0x5b0 [ 179.064478][ T9356] ? xfs_filestream_get_ag+0x60/0x60 [ 179.069752][ T9356] xfs_fc_fill_super+0x84e/0x11c0 [ 179.074765][ T9356] get_tree_bdev+0x414/0x650 [ 179.079436][ T9356] ? xfs_mount_free+0x80/0x80 [ 179.084097][ T9356] xfs_fc_get_tree+0x1d/0x30 [ 179.088690][ T9356] vfs_get_tree+0x8e/0x300 [ 179.093158][ T9356] do_mount+0x135a/0x1b50 [ 179.097469][ T9356] ? __this_cpu_preempt_check+0x35/0x190 [ 179.103087][ T9356] ? copy_mount_string+0x40/0x40 [ 179.108011][ T9356] ? copy_mount_options+0x263/0x3f0 [ 179.113199][ T9356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 179.119430][ T9356] ? copy_mount_options+0x2e8/0x3f0 [ 179.124629][ T9356] ksys_mount+0xdb/0x150 [ 179.128858][ T9356] __x64_sys_mount+0xbe/0x150 [ 179.133520][ T9356] do_syscall_64+0xfa/0x790 [ 179.138008][ T9356] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.143880][ T9356] RIP: 0033:0x45d0ca [ 179.147760][ T9356] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 179.167359][ T9356] RSP: 002b:00007eff99969a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 179.175812][ T9356] RAX: ffffffffffffffda RBX: 00007eff99969b40 RCX: 000000000045d0ca [ 179.183769][ T9356] RDX: 00007eff99969ae0 RSI: 0000000020000140 RDI: 00007eff99969b00 [ 179.191838][ T9356] RBP: 0000000000000001 R08: 00007eff99969b40 R09: 00007eff99969ae0 [ 179.200030][ T9356] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 179.207987][ T9356] R13: 00000000004ca26c R14: 00000000004e28a8 R15: 00000000ffffffff [ 179.215950][ T9356] [ 179.218261][ T9356] Allocated by task 9356: [ 179.222748][ T9356] save_stack+0x23/0x90 [ 179.226889][ T9356] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 179.232504][ T9356] kasan_kmalloc+0x9/0x10 [ 179.236820][ T9356] __kmalloc+0x163/0x770 [ 179.241114][ T9356] kmem_alloc+0x15b/0x4d0 [ 179.245485][ T9356] xlog_alloc_log+0xcc3/0x14b0 [ 179.250241][ T9356] xfs_log_mount+0xdc/0x780 [ 179.254743][ T9356] xfs_mountfs+0xc35/0x1ca0 [ 179.259237][ T9356] xfs_fc_fill_super+0x84e/0x11c0 [ 179.264377][ T9356] get_tree_bdev+0x414/0x650 [ 179.268946][ T9356] xfs_fc_get_tree+0x1d/0x30 [ 179.273517][ T9356] vfs_get_tree+0x8e/0x300 [ 179.277918][ T9356] do_mount+0x135a/0x1b50 [ 179.282233][ T9356] ksys_mount+0xdb/0x150 [ 179.286538][ T9356] __x64_sys_mount+0xbe/0x150 [ 179.291296][ T9356] do_syscall_64+0xfa/0x790 [ 179.295793][ T9356] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.301670][ T9356] [ 179.303977][ T9356] Freed by task 9356: [ 179.307953][ T9356] save_stack+0x23/0x90 [ 179.312098][ T9356] __kasan_slab_free+0x102/0x150 [ 179.317016][ T9356] kasan_slab_free+0xe/0x10 [ 179.321496][ T9356] kfree+0x10a/0x2c0 [ 179.325371][ T9356] kvfree+0x61/0x70 [ 179.329168][ T9356] xlog_alloc_log+0xeaa/0x14b0 [ 179.333906][ T9356] xfs_log_mount+0xdc/0x780 [ 179.338389][ T9356] xfs_mountfs+0xc35/0x1ca0 [ 179.342867][ T9356] xfs_fc_fill_super+0x84e/0x11c0 [ 179.347872][ T9356] get_tree_bdev+0x414/0x650 [ 179.352458][ T9356] xfs_fc_get_tree+0x1d/0x30 [ 179.357027][ T9356] vfs_get_tree+0x8e/0x300 [ 179.361425][ T9356] do_mount+0x135a/0x1b50 [ 179.365744][ T9356] ksys_mount+0xdb/0x150 [ 179.369965][ T9356] __x64_sys_mount+0xbe/0x150 [ 179.374620][ T9356] do_syscall_64+0xfa/0x790 [ 179.379103][ T9356] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.384967][ T9356] [ 179.387274][ T9356] The buggy address belongs to the object at ffff88809690a800 [ 179.387274][ T9356] which belongs to the cache kmalloc-1k of size 1024 [ 179.401309][ T9356] The buggy address is located 144 bytes inside of [ 179.401309][ T9356] 1024-byte region [ffff88809690a800, ffff88809690ac00) [ 179.414667][ T9356] The buggy address belongs to the page: [ 179.420315][ T9356] page:ffffea00025a4280 refcount:1 mapcount:0 mapping:ffff8880aa000c40 index:0x0 [ 179.429416][ T9356] raw: 00fffe0000000200 ffffea00022c6208 ffffea00028ca508 ffff8880aa000c40 [ 179.437982][ T9356] raw: 0000000000000000 ffff88809690a000 0000000100000002 0000000000000000 [ 179.446540][ T9356] page dumped because: kasan: bad access detected [ 179.452927][ T9356] [ 179.455248][ T9356] Memory state around the buggy address: [ 179.460856][ T9356] ffff88809690a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 179.468894][ T9356] ffff88809690a800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 179.476947][ T9356] >ffff88809690a880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 179.484983][ T9356] ^ [ 179.489549][ T9356] ffff88809690a900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 179.497588][ T9356] ffff88809690a980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 179.505631][ T9356] ================================================================== [ 179.513672][ T9356] Disabling lock debugging due to kernel taint [ 179.520937][ T9356] Kernel panic - not syncing: panic_on_warn set ... [ 179.527534][ T9356] CPU: 0 PID: 9356 Comm: syz-executor.2 Tainted: G B 5.4.0-next-20191129-syzkaller #0 [ 179.538357][ T9356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.548399][ T9356] Call Trace: [ 179.551670][ T9356] dump_stack+0x197/0x210 [ 179.555979][ T9356] panic+0x2e3/0x75c [ 179.559864][ T9356] ? add_taint.cold+0x16/0x16 [ 179.564530][ T9356] ? xlog_alloc_log+0x1386/0x14b0 [ 179.569547][ T9356] ? preempt_schedule+0x4b/0x60 [ 179.574386][ T9356] ? ___preempt_schedule+0x16/0x18 [ 179.579491][ T9356] ? trace_hardirqs_on+0x5e/0x240 [ 179.584503][ T9356] ? xlog_alloc_log+0x1386/0x14b0 [ 179.589509][ T9356] end_report+0x47/0x4f [ 179.593641][ T9356] ? xlog_alloc_log+0x1386/0x14b0 [ 179.598651][ T9356] __kasan_report.cold+0xe/0x41 [ 179.603492][ T9356] ? kvfree+0x20/0x70 [ 179.607451][ T9356] ? xlog_alloc_log+0x1386/0x14b0 [ 179.612452][ T9356] kasan_report+0x12/0x20 [ 179.616760][ T9356] __asan_report_load8_noabort+0x14/0x20 [ 179.622372][ T9356] xlog_alloc_log+0x1386/0x14b0 [ 179.627202][ T9356] xfs_log_mount+0xdc/0x780 [ 179.631696][ T9356] xfs_mountfs+0xc35/0x1ca0 [ 179.636184][ T9356] ? xfs_default_resblks+0x60/0x60 [ 179.641284][ T9356] ? init_timer_key+0x13b/0x3a0 [ 179.646132][ T9356] ? xfs_mru_cache_create+0x4a0/0x5b0 [ 179.651491][ T9356] ? xfs_filestream_get_ag+0x60/0x60 [ 179.656764][ T9356] xfs_fc_fill_super+0x84e/0x11c0 [ 179.661797][ T9356] get_tree_bdev+0x414/0x650 [ 179.666362][ T9356] ? xfs_mount_free+0x80/0x80 [ 179.671018][ T9356] xfs_fc_get_tree+0x1d/0x30 [ 179.675588][ T9356] vfs_get_tree+0x8e/0x300 [ 179.679994][ T9356] do_mount+0x135a/0x1b50 [ 179.684311][ T9356] ? __this_cpu_preempt_check+0x35/0x190 [ 179.689920][ T9356] ? copy_mount_string+0x40/0x40 [ 179.694833][ T9356] ? copy_mount_options+0x263/0x3f0 [ 179.700016][ T9356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 179.706353][ T9356] ? copy_mount_options+0x2e8/0x3f0 [ 179.711532][ T9356] ksys_mount+0xdb/0x150 [ 179.715765][ T9356] __x64_sys_mount+0xbe/0x150 [ 179.720434][ T9356] do_syscall_64+0xfa/0x790 [ 179.725074][ T9356] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.730948][ T9356] RIP: 0033:0x45d0ca [ 179.734829][ T9356] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 179.754505][ T9356] RSP: 002b:00007eff99969a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 179.762966][ T9356] RAX: ffffffffffffffda RBX: 00007eff99969b40 RCX: 000000000045d0ca [ 179.770964][ T9356] RDX: 00007eff99969ae0 RSI: 0000000020000140 RDI: 00007eff99969b00 [ 179.778919][ T9356] RBP: 0000000000000001 R08: 00007eff99969b40 R09: 00007eff99969ae0 [ 179.786938][ T9356] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 179.794905][ T9356] R13: 00000000004ca26c R14: 00000000004e28a8 R15: 00000000ffffffff [ 179.804359][ T9356] Kernel Offset: disabled [ 179.808680][ T9356] Rebooting in 86400 seconds..