[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 56.424040][ T26] audit: type=1800 audit(1566897864.803:25): pid=8613 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 56.465483][ T26] audit: type=1800 audit(1566897864.803:26): pid=8613 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 56.514126][ T26] audit: type=1800 audit(1566897864.803:27): pid=8613 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.17' (ECDSA) to the list of known hosts. 2019/08/27 09:24:35 fuzzer started 2019/08/27 09:24:38 dialing manager at 10.128.0.26:45029 2019/08/27 09:24:38 syscalls: 2487 2019/08/27 09:24:38 code coverage: enabled 2019/08/27 09:24:38 comparison tracing: enabled 2019/08/27 09:24:38 extra coverage: extra coverage is not supported by the kernel 2019/08/27 09:24:38 setuid sandbox: enabled 2019/08/27 09:24:38 namespace sandbox: enabled 2019/08/27 09:24:38 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/27 09:24:38 fault injection: enabled 2019/08/27 09:24:38 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/27 09:24:38 net packet injection: enabled 2019/08/27 09:24:38 net device setup: enabled 09:27:12 executing program 0: 09:27:13 executing program 1: syzkaller login: [ 224.689221][ T8780] IPVS: ftp: loaded support on port[0] = 21 09:27:13 executing program 2: [ 224.848032][ T8780] chnl_net:caif_netlink_parms(): no params data found [ 224.849738][ T8782] IPVS: ftp: loaded support on port[0] = 21 [ 224.919425][ T8780] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.943087][ T8780] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.967710][ T8780] device bridge_slave_0 entered promiscuous mode [ 224.981799][ T8780] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.006536][ T8780] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.027047][ T8780] device bridge_slave_1 entered promiscuous mode [ 225.069515][ T8785] IPVS: ftp: loaded support on port[0] = 21 [ 225.080626][ T8780] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 225.113043][ T8780] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 09:27:13 executing program 3: [ 225.205116][ T8780] team0: Port device team_slave_0 added [ 225.227681][ T8780] team0: Port device team_slave_1 added [ 225.318498][ T8780] device hsr_slave_0 entered promiscuous mode 09:27:13 executing program 4: [ 225.416809][ T8780] device hsr_slave_1 entered promiscuous mode 09:27:13 executing program 5: [ 225.538290][ T8780] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.545911][ T8780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.553840][ T8780] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.561013][ T8780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.573295][ T8782] chnl_net:caif_netlink_parms(): no params data found [ 225.629666][ T8788] IPVS: ftp: loaded support on port[0] = 21 [ 225.651696][ T8790] IPVS: ftp: loaded support on port[0] = 21 [ 225.739981][ T8782] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.747639][ T8782] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.755463][ T8782] device bridge_slave_0 entered promiscuous mode [ 225.763252][ T8782] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.770464][ T8782] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.778097][ T8782] device bridge_slave_1 entered promiscuous mode [ 225.800333][ T8782] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 225.810600][ T8785] chnl_net:caif_netlink_parms(): no params data found [ 225.842627][ T8782] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 225.890642][ T8794] IPVS: ftp: loaded support on port[0] = 21 [ 225.898931][ T8785] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.906425][ T8785] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.914194][ T8785] device bridge_slave_0 entered promiscuous mode [ 225.927569][ T8782] team0: Port device team_slave_0 added [ 225.936666][ T3706] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.955778][ T3706] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.968268][ T8785] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.975537][ T8785] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.983172][ T8785] device bridge_slave_1 entered promiscuous mode [ 226.003494][ T8782] team0: Port device team_slave_1 added [ 226.024783][ T8785] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 226.035607][ T8785] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 226.073697][ T8780] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.082216][ T8785] team0: Port device team_slave_0 added [ 226.089362][ T8785] team0: Port device team_slave_1 added [ 226.147937][ T8782] device hsr_slave_0 entered promiscuous mode [ 226.195869][ T8782] device hsr_slave_1 entered promiscuous mode [ 226.245700][ T8782] debugfs: Directory 'hsr0' with parent '/' already present! [ 226.267923][ T8780] 8021q: adding VLAN 0 to HW filter on device team0 [ 226.299502][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.308217][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.368119][ T8785] device hsr_slave_0 entered promiscuous mode [ 226.406047][ T8785] device hsr_slave_1 entered promiscuous mode [ 226.445623][ T8785] debugfs: Directory 'hsr0' with parent '/' already present! [ 226.518914][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.528060][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.536782][ T2999] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.543831][ T2999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.565918][ T8790] chnl_net:caif_netlink_parms(): no params data found [ 226.578578][ T3707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.589613][ T3707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.598500][ T3707] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.605606][ T3707] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.629999][ T8788] chnl_net:caif_netlink_parms(): no params data found [ 226.675479][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 226.702693][ T8794] chnl_net:caif_netlink_parms(): no params data found [ 226.751703][ T8790] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.759546][ T8790] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.767971][ T8790] device bridge_slave_0 entered promiscuous mode [ 226.787502][ T8788] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.794678][ T8788] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.802919][ T8788] device bridge_slave_0 entered promiscuous mode [ 226.810893][ T8788] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.818039][ T8788] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.826001][ T8788] device bridge_slave_1 entered promiscuous mode [ 226.841623][ T8790] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.848901][ T8790] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.868735][ T8790] device bridge_slave_1 entered promiscuous mode [ 226.896492][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 226.905212][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 226.914296][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.922788][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.933165][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.941808][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 226.955708][ T8794] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.962799][ T8794] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.971523][ T8794] device bridge_slave_0 entered promiscuous mode [ 226.986942][ T8788] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 226.998173][ T8788] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 227.014836][ T8790] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 227.027533][ T8790] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 227.038978][ T8794] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.046663][ T8794] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.055819][ T8794] device bridge_slave_1 entered promiscuous mode [ 227.074085][ T8788] team0: Port device team_slave_0 added [ 227.102283][ T8792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 227.111143][ T8792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 227.123035][ T8788] team0: Port device team_slave_1 added [ 227.135925][ T8790] team0: Port device team_slave_0 added [ 227.143174][ T8790] team0: Port device team_slave_1 added [ 227.157771][ T8782] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.173117][ T8794] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 227.237814][ T8788] device hsr_slave_0 entered promiscuous mode [ 227.275903][ T8788] device hsr_slave_1 entered promiscuous mode [ 227.345698][ T8788] debugfs: Directory 'hsr0' with parent '/' already present! [ 227.369531][ T8780] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 227.381699][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 227.391180][ T8794] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 227.420516][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.429423][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.437794][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 227.446265][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 227.457454][ T8782] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.474550][ T8785] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.489817][ T8794] team0: Port device team_slave_0 added [ 227.500758][ T8794] team0: Port device team_slave_1 added [ 227.557458][ T8790] device hsr_slave_0 entered promiscuous mode [ 227.606065][ T8790] device hsr_slave_1 entered promiscuous mode [ 227.645653][ T8790] debugfs: Directory 'hsr0' with parent '/' already present! [ 227.670724][ T3706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.678751][ T3706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.687069][ T3706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.695758][ T3706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.704098][ T3706] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.711227][ T3706] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.719045][ T3706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.727794][ T3706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.736195][ T3706] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.743232][ T3706] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.753133][ T8785] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.761703][ T8780] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 227.807660][ T8794] device hsr_slave_0 entered promiscuous mode [ 227.845759][ T8794] device hsr_slave_1 entered promiscuous mode [ 227.886090][ T8794] debugfs: Directory 'hsr0' with parent '/' already present! [ 227.894844][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.944551][ T8792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.953592][ T8792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.962547][ T8792] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.970193][ T8792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.978256][ T8792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.987394][ T8792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.995959][ T8792] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.003018][ T8792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.046615][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.054629][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.064652][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.073529][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.085244][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.093864][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.103451][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.112269][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.121009][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.129454][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.138526][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.147060][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.155332][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.164232][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.172346][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.214594][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.232022][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 09:27:16 executing program 0: bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49d1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, 0x0}) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) getresuid(0x0, &(0x7f0000000140), 0x0) r0 = socket$inet6(0xa, 0x80000000080003, 0x20000000003c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x249, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc48cde18ed5ea1d) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8010}, 0x40000) [ 228.266448][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.276156][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.292029][ T8785] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 228.318978][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.332151][ T8782] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 228.345947][ T8782] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.362267][ T8788] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.367861][ C1] hrtimer: interrupt took 34311 ns [ 228.378466][ T3707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.398108][ T3707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.407363][ T3707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.422249][ T3707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.471093][ T8788] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.501100][ T8794] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.524149][ T8794] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.556058][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.563931][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.571905][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.580700][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.589221][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.596328][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.604114][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.612928][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.622334][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.676153][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.684846][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.693731][ T2999] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.700845][ T2999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.709046][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.717930][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.727121][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.735910][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.744374][ T2999] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.751507][ T2999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.759234][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.768369][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.776904][ T2999] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.783971][ T2999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.792338][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.802389][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.853691][ T8790] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.881601][ T8785] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 228.903570][ T8782] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 228.934309][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.954624][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.992596][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.033043][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.051219][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.062903][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.079729][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.092906][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.109740][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.151659][ T8790] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.180269][ T8788] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 229.202972][ T8788] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.218833][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 09:27:17 executing program 0: bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49d1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, 0x0}) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) getresuid(0x0, &(0x7f0000000140), 0x0) r0 = socket$inet6(0xa, 0x80000000080003, 0x20000000003c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x249, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc48cde18ed5ea1d) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8010}, 0x40000) [ 229.249229][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 229.273200][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.322514][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.330526][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.345845][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.354632][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.370242][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.421164][ T8792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.436806][ T8792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.445496][ T8792] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.452617][ T8792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.461152][ T8792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.470952][ T8792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.483774][ T8792] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.490943][ T8792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.498792][ T8792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.508639][ T8792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.517658][ T8792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.526709][ T8792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.542893][ T8794] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 229.560069][ T8794] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 229.596904][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.604966][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 09:27:18 executing program 1: [ 229.676623][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.685102][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 09:27:18 executing program 1: [ 229.766603][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.806807][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.829243][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 09:27:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x12}, &(0x7f0000044000)) r1 = gettid() r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r2, 0x0, r3, 0x0, 0xffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x13) read$FUSE(r3, &(0x7f0000007380), 0x1000) [ 229.866205][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.874809][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.936139][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.944661][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.954278][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.968129][ T8788] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.977671][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.989294][ T8790] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 09:27:18 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000100)={0x20}, 0x20) close(r0) [ 230.093646][ T8794] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 230.149663][ T8790] 8021q: adding VLAN 0 to HW filter on device batadv0 09:27:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mknod(&(0x7f0000000180)='./file0\x00', 0x8001420, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x12}, &(0x7f0000044000)) r1 = gettid() open$dir(&(0x7f0000000100)='./file0\x00', 0xff00, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x13) 09:27:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) close(r0) syz_genetlink_get_family_id$tipc(0xffffffffffffffff) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000100001bfa963ecf4ff000000030000"], 0x14}}, 0x0) 09:27:18 executing program 3: 09:27:18 executing program 2: 09:27:19 executing program 4: 09:27:19 executing program 2: 09:27:19 executing program 0: 09:27:19 executing program 5: 09:27:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0xffffffffffffffff) sendmmsg$unix(r0, &(0x7f000000a4c0)=[{&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}], 0x1, 0x0) 09:27:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) dup3(r0, r2, 0x0) 09:27:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4140045e}, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x22ffffffff}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0x8a3ce36c98623bb5}) 09:27:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="20321700c481b3a038cbc11e0f60214fe6b83a6bcc7172f87c76e0e158a92e0900000000000000dcc0ba45e71e121eefa2c57a8651cb0300a9"], 0x1}}, 0x0) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 231.178545][ T8897] device lo entered promiscuous mode 09:27:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000440)=0x5) r1 = syz_open_pts(r0, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0xffffffffffffff54) ioctl$TCFLSH(r1, 0x540b, 0x1) 09:27:19 executing program 2: 09:27:19 executing program 3: 09:27:19 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000140)=""/89, &(0x7f0000000200)=0x59) 09:27:19 executing program 0: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) 09:27:19 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x3f, 0x4) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x2a484c6d28f0f002, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00\xde\xf8j\x82`\xbb\x15\xf8m\x00{2\xd6\xb3y\xfc\xc2\xf80\xf9\x1dN\x14\x87\x1d\xaa\x1f\x9fM\x1d\xb8\xb0\"\xd1=~\bDy]\x93=\xea\x95\xdc\x1b\xf0#\xb7\xc46\x05\xe7\xad\xdc\x1f\xccIB\xb2R\xc6q\xb7\xc1\x80v\x1e\x987\x94\xd1\x94p\x847\xa5mDp\xc5\xa8\xee\x80\xdb\xb3i7\x93\xc0\xd4o\xdaQ\xb1\x83\"\xd8N\xba\t\x97\x1b}\xe4a\x9f[y|\x9d8\x8c\"v\x00\xed\xd7\xef\xa6&') 09:27:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) set_mempolicy(0x2, &(0x7f0000000040)=0x3f, 0x4) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x2a484c6d28f0f002, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/protocols\x00\xde\xf8j\x82`\xbb\x15\xf8m\x00{2\xd6\xb3y\xfc\xc2\xf80\xf9\x1dN\x14\x87\x1d\xaa\x1f\x9fM\x1d\xb8\xb0\"\xd1=~\bDy]\x93=\xea\x95\xdc\x1b\xf0#\xb7\xc46\x05\xe7\xad\xdc\x1f\xccIB\xb2R\xc6q\xb7\xc1\x80v\x1e\x987\x94\xd1\x94p\x847\xa5mDp\xc5\xa8\xee\x80\xdb\xb3i7\x93\xc0\xd4o\xdaQ\xb1\x83\"\xd8N\xba\t\x97\x1b}\xe4a\x9f[y|\x9d8\x8c\"v\x00\xed\xd7\xef\xa6&') 09:27:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000140)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x168, 0x0) 09:27:19 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="804000001009594b85c63c1cbd217c1befb0bb7a37993f6570e7e16ce3ec50bfc5ef8a02d2d09d533bdb902162bd8a34bd99f1433849e30002000015c7903df39cd3cec7fd016a7d19f90d050474571be52defa8b3180d89ea2486a44400000000000000000000000000b60ceceb46f90c68c46c5ad8340b1ce369fbab83", 0x7e}], 0x1}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) personality(0x1bb2baf3005ac137) open$dir(0x0, 0x0, 0x110) accept4(0xffffffffffffffff, &(0x7f0000000100)=@can, &(0x7f0000000200)=0x34, 0x800) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000240)='self\x00'}, 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x10', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\x10rist\xe3cusgrVid:De', 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}, 0x1c) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @dev}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x38) [ 231.509512][ T8892] device lo left promiscuous mode 09:27:20 executing program 5: clone(0x0, 0x0, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 231.744348][ T8908] device lo entered promiscuous mode 09:27:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4140045e}, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x22ffffffff}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0x8a3ce36c98623bb5}) 09:27:20 executing program 5: r0 = memfd_create(&(0x7f0000000080)='cgroup\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x1) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) dup2(r1, r0) recvmsg(0xffffffffffffffff, &(0x7f0000008900)={0x0, 0x0, &(0x7f0000008840)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f00000085c0)=""/214, 0xd6}], 0x5}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) [ 232.003702][ T8951] device lo left promiscuous mode [ 232.114331][ T8953] device lo entered promiscuous mode 09:27:20 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) getpeername$inet(r1, 0x0, 0x0) 09:27:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) r2 = dup(r1) read(r2, &(0x7f00000001c0)=""/69, 0x45) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 09:27:20 executing program 3: r0 = socket(0x1, 0x1, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) epoll_create1(0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, &(0x7f0000001340)) 09:27:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[], 0x2b5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 09:27:20 executing program 5: r0 = memfd_create(&(0x7f0000000080)='cgroup\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x1) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) dup2(r1, r0) recvmsg(0xffffffffffffffff, &(0x7f0000008900)={0x0, 0x0, &(0x7f0000008840)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f00000085c0)=""/214, 0xd6}], 0x5}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 09:27:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4140045e}, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x22ffffffff}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0x8a3ce36c98623bb5}) 09:27:20 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0x10000007c) creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) [ 232.302653][ T8964] device lo left promiscuous mode 09:27:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000240)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) inotify_init1(0x0) 09:27:20 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0x10000007c) creat(&(0x7f0000000040)='./file0\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) 09:27:20 executing program 5: r0 = memfd_create(&(0x7f0000000080)='cgroup\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}) recvmsg(0xffffffffffffffff, &(0x7f0000008900)={0x0, 0x0, &(0x7f0000008840)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f00000085c0)=""/214, 0xd6}], 0x5}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 09:27:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000240)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 232.686283][ T8974] device lo entered promiscuous mode 09:27:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000240)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendfile(r0, r0, 0x0, 0x0) 09:27:21 executing program 5: r0 = memfd_create(&(0x7f0000000f00)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xe1\xa2\xba\xe5\xf4\x97\xac#*\x1f\x17\xeb\x06\xed\xe5\xdb\x8dr\xa3@!\x16\xc4\xf4\x85\xa7N\xd0*U\xa7\xed\xe1\x8a5tl\xec\xda~l\xbd]\r\xfaI\xa9\xf9\x10\xc8;\xef\xce\xfe\v\xa0(\x8fx\x03\xf1\xf2\x8bh\xd4\xdd\xbc\x1d\x8e', 0x0) r1 = dup(r0) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) 09:27:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4140045e}, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x22ffffffff}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0x8a3ce36c98623bb5}) 09:27:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000880)='mounts\x00') ppoll(&(0x7f0000000000)=[{r0, 0xa440}], 0x1, 0x0, 0x0, 0x0) [ 233.113127][ T9011] device lo left promiscuous mode [ 233.230911][ T8961] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 233.264281][ T8961] FAT-fs (loop2): Filesystem has been set read-only [ 233.316229][ T9016] syz-executor.2 (9016) used greatest stack depth: 22904 bytes left 09:27:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000240)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) lookup_dcookie(0x0, 0x0, 0x0) 09:27:21 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) 09:27:21 executing program 1: r0 = memfd_create(&(0x7f0000000080)='cgroup\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000000c0)) [ 233.524194][ T9015] device lo entered promiscuous mode 09:27:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = eventfd2(0x0, 0x0) readv(r0, &(0x7f0000000480)=[{&(0x7f0000000440)=""/19, 0x13}], 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="ff454c4600000000"], 0x8) 09:27:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/23, 0x17}], 0x1, 0xe) 09:27:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) close(r1) 09:27:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000240)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) 09:27:23 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8001420, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x12}, &(0x7f0000044000)) r0 = gettid() open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x13) 09:27:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4140045e}, 0xc) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0x8a3ce36c98623bb5}) [ 235.170095][ T9043] device lo left promiscuous mode 09:27:23 executing program 0: seccomp(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) 09:27:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d060000007bf070") umount2(0x0, 0x0) 09:27:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000240)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) 09:27:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000240)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) inotify_init1(0x5b679eeca0d8e42a) socket$packet(0x11, 0x0, 0x300) [ 235.323762][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 235.323777][ T26] audit: type=1326 audit(1566898043.703:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9058 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c6ba code=0x0 09:27:23 executing program 3: unshare(0xa71f8167e5c9dd75) 09:27:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000240)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:27:24 executing program 3: r0 = memfd_create(&(0x7f0000000080)='cgroup\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x1) dup2(r1, r0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)={0x6, 0x7ff, 0x0, 0x7f, 0x1, 0x1f}) recvmsg(0xffffffffffffffff, &(0x7f0000008900)={0x0, 0x0, &(0x7f0000008840)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f00000085c0)=""/214, 0xd6}], 0x5}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) [ 235.608318][ T9054] device lo entered promiscuous mode 09:27:24 executing program 5: poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x800400000004a) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x4fe7196, 0x0, 0x0, 0x800e00549) ppoll(&(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) r1 = dup(r0) shutdown(r1, 0x0) 09:27:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4140045e}, 0xc) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0x8a3ce36c98623bb5}) 09:27:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x400001006, &(0x7f0000000000)={0x0, 0x10008}, 0x10) recvmsg(r0, &(0x7f00000000c0)={0x0, 0xffffffffffffff32, &(0x7f0000000280)=[{&(0x7f0000000180)=""/229, 0xfffffe71}, {0x0}], 0x2}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x63d2, 0x0, 0x0, 0x800e005f0) ppoll(&(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x0) [ 235.955120][ T9086] device lo left promiscuous mode 09:27:24 executing program 2: r0 = eventfd2(0x0, 0x0) readv(r0, &(0x7f0000000480)=[{&(0x7f0000000440)=""/19, 0x13}], 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="ff454c4600000000"], 0x8) 09:27:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x400001006, &(0x7f0000000000)={0x0, 0x10008}, 0x10) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/229, 0xe5}], 0x1}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x63d2, 0x0, 0x0, 0x800e005f0) ppoll(&(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x0) [ 236.116451][ T9089] device lo entered promiscuous mode [ 236.301718][ T26] audit: type=1326 audit(1566898044.683:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9058 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c6ba code=0x0 09:27:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000240)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) pipe(0x0) mremap(&(0x7f00001c6000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000689000/0x3000)=nil) 09:27:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4140045e}, 0xc) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0x8a3ce36c98623bb5}) 09:27:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000240)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) waitid(0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) rename(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') [ 236.604727][ T9120] device lo left promiscuous mode 09:27:25 executing program 2: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000040)='./file0\x00', 0x1142, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff515) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000580)='./file0\x00', 0x0) prctl$PR_GET_TIMERSLACK(0x1e) ptrace(0x11, r0) 09:27:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) 09:27:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000540)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:27:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) poll(&(0x7f0000000200)=[{r0, 0x15}], 0x1, 0x0) poll(&(0x7f00000001c0)=[{}, {r0}, {}], 0x3, 0x4e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xcfb3abb5, 0x0, 0x0, 0x800e00a4f) shutdown(r1, 0x0) [ 236.896387][ T9123] device lo entered promiscuous mode [ 236.934989][ T9142] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 09:27:25 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) poll(&(0x7f00000000c0), 0x1, 0x800400000004a) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x4fe7196, 0x0, 0x0, 0x800e00549) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup(r0) shutdown(r1, 0x0) 09:27:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4140045e}, 0xc) bind$netlink(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x22ffffffff}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0x8a3ce36c98623bb5}) 09:27:25 executing program 0: dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f00000024c0)=""/8, 0x8}], 0x6}, 0x40002) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/1, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xa}, 0x2) shutdown(r2, 0x0) 09:27:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000240)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) sysfs$2(0x2, 0x0, 0x0) [ 237.194362][ T9158] device lo left promiscuous mode 09:27:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) setitimer(0x0, 0x0, 0x0) 09:27:25 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 237.361752][ T9171] syz-executor.1 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 09:27:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) r0 = epoll_create1(0x0) flistxattr(r0, 0x0, 0xfffffffffffffe8a) [ 237.456358][ T9164] device lo entered promiscuous mode 09:27:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4140045e}, 0xc) bind$netlink(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x22ffffffff}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0x8a3ce36c98623bb5}) 09:27:26 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x20000000) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sysfs$2(0x2, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000480)="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", 0xfdef}], 0x1) 09:27:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) setregid(0x0, 0x0) 09:27:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) 09:27:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000240)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) lstat(&(0x7f0000003400)='./file0\x00', &(0x7f0000003440)) [ 237.798252][ T9183] device lo left promiscuous mode 09:27:26 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40, 0x0) socket$inet6(0xa, 0x800, 0xfffffffffffffffc) socket$nl_route(0x10, 0x3, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000700)={0x0, 0x80000}) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000740)='/proc/self\x00', 0x10000, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)) signalfd4(0xffffffffffffffff, &(0x7f00000007c0)={0x8}, 0x8, 0x80000) socket$nl_xfrm(0x10, 0x3, 0x6) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in6, @in=@dev}}, {{}, 0x0, @in=@broadcast}}, 0x0) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000bc0)={{{@in, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000cc0)=0xe8) getresgid(0x0, &(0x7f0000000d40), &(0x7f0000000d80)) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000000dc0), 0x0, &(0x7f0000000e40)) getegid() openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000e80)='memory.swap.max\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000ec0)='cgroup.procs\x00', 0x2, 0x0) open(0x0, 0x0, 0x91) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000001240)) stat(0x0, &(0x7f00000012c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000001880), &(0x7f00000018c0), &(0x7f0000001900)) fstat(0xffffffffffffffff, &(0x7f0000001940)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000019c0)) getresuid(&(0x7f0000001a00), &(0x7f0000001a40), &(0x7f0000001a80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b40)={{{@in=@local, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000001c40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001c80)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@ipv4}, 0x0, @in=@dev}}, &(0x7f0000001e00)=0xe8) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001e40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001e80)={{{@in6=@initdev, @in6}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000001f80)=0xe8) getgid() accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001fc0)) getresuid(&(0x7f0000002000), &(0x7f0000002040), &(0x7f0000002080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000020c0), &(0x7f0000002100)=0xc) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002140)='/dev/loop-control\x00', 0x400000, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000002180)='/proc/self/attr/exec\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f00000021c0)='/dev/input/event#\x00', 0x6001, 0x1) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000002200)='cgroup.procs\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002240)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000022c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000025c0)) getresgid(&(0x7f00000026c0), 0x0, &(0x7f0000002740)) openat$fuse(0xffffffffffffff9c, &(0x7f0000002780)='/dev/fuse\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000027c0)) geteuid() getgroups(0x2, &(0x7f0000002800)=[0xffffffffffffffff, 0xffffffffffffffff]) signalfd4(0xffffffffffffffff, &(0x7f0000002840), 0x8, 0x80000) openat$random(0xffffffffffffff9c, &(0x7f0000002900)='/dev/urandom\x00', 0x200, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000002940)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000002980)='/dev/hwrng\x00', 0x200000, 0x0) openat$usbmon(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/usbmon0\x00', 0x80, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000002a00)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002a40)) geteuid() ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000002ac0)={0x0, 0x80000}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000002b00)='net/raw6\x00') ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000002b40)={0x0, 0xee10f06235a2ba32}) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000002b80)={0x7, 0x1a, 0x1}) socket$unix(0x1, 0x1, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000002bc0)='/proc/self/attr/exec\x00', 0x2, 0x0) syz_open_dev$dri(&(0x7f0000002c00)='/dev/dri/card#\x00', 0x2, 0x401) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000002c40)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$key(0xf, 0x3, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) accept4$unix(0xffffffffffffffff, &(0x7f0000003200), &(0x7f0000003280)=0x6e, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000004b40)='/dev/vhci\x00', 0x0) socket$unix(0x1, 0x1, 0x0) socket$packet(0x11, 0x0, 0x300) getpgid(0x0) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000005000)) geteuid() getgroups(0x0, &(0x7f0000005040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000051c0), &(0x7f0000005200)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000006bc0), 0x0, &(0x7f0000006c40)) lstat(&(0x7f0000006c80)='./file0\x00', &(0x7f0000006cc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006d40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006d80)={{{@in=@empty, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000006e80)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006ec0)={{{@in=@multicast1}}, {{}, 0x0, @in=@initdev}}, 0x0) lstat(&(0x7f0000007000)='./file0\x00', &(0x7f0000007040)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000070c0)={{{@in=@remote, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000071c0)=0xe8) getresgid(&(0x7f0000007200), &(0x7f0000007240), &(0x7f0000007280)) epoll_create(0x401) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000072c0)='/proc/self/attr/current\x00', 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000007300)='/dev/null\x00', 0x400080, 0x0) epoll_create(0x3f) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007580)={{{@in=@local, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000007680)=0xe8) stat(&(0x7f00000076c0)='./file0\x00', &(0x7f0000007700)) syz_open_procfs$namespace(0x0, &(0x7f0000007780)='ns/user\x00') eventfd(0x7) syz_open_dev$dri(&(0x7f0000007a80)='/dev/dri/card#\x00', 0x3, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 09:27:26 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) writev(r0, &(0x7f0000000700)=[{0x0}, {0x0}, {&(0x7f00000003c0)="e4", 0x1}], 0x3) 09:27:26 executing program 0: msgsnd(0x0, &(0x7f0000000080)={0x1, "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"}, 0xf79, 0x0) 09:27:26 executing program 5: r0 = open(&(0x7f0000000280)='./file0\x00', 0x40000, 0x100010100) r1 = accept$inet(r0, &(0x7f0000000200)={0x2, 0x0, @empty}, &(0x7f0000000240)=0x10) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) bind$netlink(r2, 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001100)='/dev/kvm\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="14bc420000000056b5000000000800004000080100000000000000020500ac14341b080003000800050f01"], 0x1}}, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x18}) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0xaaaaaaaaaaaace6, 0x0, 0x0, 0xeb) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)={0xffffffffffffc14e, 0x0, 0x6}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) connect$netlink(r2, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) 09:27:26 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x20000000) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sysfs$2(0x2, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000480)="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", 0xfdef}], 0x1) 09:27:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d060000007bf070") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f00000002c0)=0x7, 0x4) recvmmsg(r1, &(0x7f0000000200)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd56}}], 0xd9, 0x0, 0x0) 09:27:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000003dc0)=""/169) [ 238.187452][ T9190] device lo entered promiscuous mode 09:27:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4140045e}, 0xc) bind$netlink(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x22ffffffff}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0x8a3ce36c98623bb5}) [ 238.361808][ T9224] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 238.502602][ T9233] device lo left promiscuous mode 09:27:26 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) gettid() getpgid(0x0) sendmmsg$unix(r1, &(0x7f0000001d00)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 09:27:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') 09:27:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x11, 0x4) 09:27:27 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r0, 0x31, 0x0, 0x9) 09:27:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000240)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) fchmod(r0, 0x0) [ 238.758872][ T9234] device lo entered promiscuous mode 09:27:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d060000007bf070") open_by_handle_at(r0, &(0x7f0000000040)={0x8}, 0x0) 09:27:27 executing program 1: creat(&(0x7f00000001c0)='./file0\x00', 0x0) timerfd_create(0x0, 0x0) pipe(&(0x7f00000000c0)) setrlimit(0x7, &(0x7f00000002c0)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 09:27:27 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x6, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioprio_get$uid(0x3, 0x0) 09:27:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x22ffffffff}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0x8a3ce36c98623bb5}) 09:27:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_matches\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/23, 0x17}], 0x1, 0xe) 09:27:27 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) r2 = dup(r1) read(r2, &(0x7f00000001c0)=""/69, 0x45) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 09:27:27 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @link_local, @loopback, @dev}}}}, 0x0) 09:27:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) ppoll(0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 239.153187][ T9269] device lo left promiscuous mode 09:27:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000002cc0)={0x1, &(0x7f0000002d00)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:27:27 executing program 1: r0 = memfd_create(&(0x7f0000000080)='cgroup\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) recvmsg(0xffffffffffffffff, &(0x7f0000008900)={0x0, 0x0, &(0x7f0000008840)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f00000085c0)=""/214, 0xd6}], 0x5}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f00000000c0)={0x400, 0x4f07, 0x7, 'queue0\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 09:27:27 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x20002) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) 09:27:27 executing program 3: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x4) 09:27:27 executing program 5: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x344, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="600300000c035231a6c0301dcaaddf250500000a0800", @ANYBLOB="740081008ca31de4df3b54c91df8a31be46a014d8ae8f40fc22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929efb1d46d38b6a6b6c3285bb01e4d5d627b9d0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1678c06eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 09:27:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0xffffffdd, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) gettid() setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, &(0x7f0000000280)=ANY=[], 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 239.686247][ T9274] device lo entered promiscuous mode 09:27:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x22ffffffff}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0x8a3ce36c98623bb5}) 09:27:28 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x20002) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0xe000000000000000) 09:27:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x800000000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) rt_sigprocmask(0x0, &(0x7f0000001500), 0x0, 0x8) [ 239.931222][ T9306] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 239.943918][ T9314] device lo left promiscuous mode [ 239.999015][ T9306] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 240.015814][ T9306] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 09:27:28 executing program 2: 09:27:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000000), 0x0, 0xe0a87e7d1943d6df, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) 09:27:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) write$P9_RWSTAT(r2, 0x0, 0x0) 09:27:28 executing program 1: [ 240.085336][ T9306] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 09:27:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)="d73d88a59a1b4f021d24f24a8a91199f", 0x10) 09:27:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") timer_create(0x0, &(0x7f0000000240)={0x0, 0x12}, &(0x7f0000044000)) futex(&(0x7f0000000040)=0x2, 0x8b, 0x2, 0x0, &(0x7f0000000140), 0x0) gettid() timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) tkill(0x0, 0x13) 09:27:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xfffffffffffffd7f) 09:27:28 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x10) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x2850, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) unshare(0x40040c00) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000700)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)={0x0, 0x88, "bb6ce0788dc7f743329824df7f7e64eb23c9cb76fda4551ae9bea1c21e7c93c0ab1ed71e6e4560cc0cc7907fd9dc94a0eadd767d18abda430a4bd37c1bf51afcfa5005bfcd82bb3aae59dc47a2fe6cd7c6b90af4bd067d507058c9aec2d95a7fe0ecf2a07a60015098446c1257e11d036e5322e68cbc3cae236e8b0aa371549c0d177bf753b5d777"}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r1, @in={{0x2, 0x4e22, @multicast2}}}, &(0x7f0000000140)=0x84) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') stat(0x0, &(0x7f0000000600)) getresuid(&(0x7f00000004c0), &(0x7f0000000680), &(0x7f00000006c0)) [ 240.438315][ T9322] device lo entered promiscuous mode [ 240.454877][ T9347] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:27:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x22ffffffff}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0x8a3ce36c98623bb5}) [ 240.536233][ T8794] [ 240.543663][ T8794] ============================= [ 240.566881][ T8794] WARNING: suspicious RCU usage [ 240.589599][ T8794] 5.3.0-rc6-next-20190826 #73 Not tainted [ 240.621612][ T8794] ----------------------------- 09:27:29 executing program 3: [ 240.635714][ T8794] fs/ext4/block_validity.c:333 suspicious rcu_dereference_check() usage! [ 240.644192][ T8794] [ 240.644192][ T8794] other info that might help us debug this: [ 240.644192][ T8794] [ 240.664858][ T9360] device lo left promiscuous mode [ 240.685487][ T8794] [ 240.685487][ T8794] rcu_scheduler_active = 2, debug_locks = 1 [ 240.693883][ T8794] 1 lock held by syz-executor.5/8794: [ 240.714770][ T8794] #0: ffff8880a3394ed8 (&type->s_umount_key#32){++++}, at: deactivate_super+0x1aa/0x1d0 [ 240.745619][ T8794] [ 240.745619][ T8794] stack backtrace: [ 240.753295][ T8794] CPU: 1 PID: 8794 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190826 #73 [ 240.762336][ T8794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.772390][ T8794] Call Trace: [ 240.775758][ T8794] dump_stack+0x172/0x1f0 [ 240.780097][ T8794] lockdep_rcu_suspicious+0x153/0x15d [ 240.785471][ T8794] ext4_release_system_zone+0x166/0x1a0 [ 240.791022][ T8794] ext4_put_super+0x954/0xd70 [ 240.795708][ T8794] ? ext4_quota_write+0x5a0/0x5a0 [ 240.800736][ T8794] generic_shutdown_super+0x14c/0x370 [ 240.806109][ T8794] kill_block_super+0xa0/0x100 [ 240.810907][ T8794] deactivate_locked_super+0x95/0x100 [ 240.816286][ T8794] deactivate_super+0x1b2/0x1d0 [ 240.821155][ T8794] ? mount_bdev+0x3c0/0x3c0 [ 240.825657][ T8794] ? dput+0x38/0xe10 [ 240.826095][ T9362] device lo entered promiscuous mode [ 240.829562][ T8794] ? dput+0x1f2/0xe10 [ 240.829586][ T8794] ? mnt_get_writers.isra.0+0xf9/0x150 [ 240.829611][ T8794] cleanup_mnt+0x351/0x4c0 [ 240.848731][ T8794] ? trace_hardirqs_on+0x67/0x240 [ 240.853768][ T8794] ? __kasan_check_read+0x11/0x20 [ 240.858807][ T8794] __cleanup_mnt+0x16/0x20 [ 240.863225][ T8794] task_work_run+0x145/0x1c0 [ 240.867828][ T8794] exit_to_usermode_loop+0x316/0x380 [ 240.873128][ T8794] do_syscall_64+0x65f/0x760 [ 240.877803][ T8794] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.883696][ T8794] RIP: 0033:0x45c2a7 [ 240.887589][ T8794] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 240.907192][ T8794] RSP: 002b:00007ffe0a2d8168 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 240.915600][ T8794] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000045c2a7 [ 240.923571][ T8794] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffe0a2d8210 [ 240.933040][ T8794] RBP: 000000000000003c R08: 0000000000000000 R09: 0000000000000006 09:27:29 executing program 3: 09:27:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) bind$netlink(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4140045e}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x22ffffffff}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0x8a3ce36c98623bb5}) [ 240.941020][ T8794] R10: 0000000000000001 R11: 0000000000000202 R12: 00007ffe0a2d92a0 [ 240.948993][ T8794] R13: 0000555555ba1940 R14: 0000000000000000 R15: 00007ffe0a2d92a0 [ 240.975581][ T8794] ------------[ cut here ]------------ [ 240.981080][ T8794] ODEBUG: free active (active state 0) object type: percpu_counter hint: 0x0 [ 240.990145][ T8794] WARNING: CPU: 1 PID: 8794 at lib/debugobjects.c:481 debug_print_object+0x168/0x250 [ 240.999605][ T8794] Kernel panic - not syncing: panic_on_warn set ... [ 241.006234][ T8794] CPU: 1 PID: 8794 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190826 #73 [ 241.015259][ T8794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.019361][ T3891] kobject: 'loop4' (00000000a2128e60): kobject_uevent_env [ 241.025333][ T8794] Call Trace: [ 241.025355][ T8794] dump_stack+0x172/0x1f0 [ 241.025374][ T8794] ? debug_print_object+0x90/0x250 [ 241.025387][ T8794] panic+0x2dc/0x755 [ 241.025400][ T8794] ? add_taint.cold+0x16/0x16 [ 241.025422][ T8794] ? __kasan_check_write+0x14/0x20 [ 241.025433][ T8794] ? __warn.cold+0x14/0x3c [ 241.025444][ T8794] ? __warn+0xd9/0x1d0 [ 241.025463][ T8794] ? debug_print_object+0x168/0x250 [ 241.054500][ T3891] kobject: 'loop4' (00000000a2128e60): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 241.058916][ T8794] __warn.cold+0x2f/0x3c [ 241.058934][ T8794] ? debug_print_object+0x168/0x250 [ 241.058950][ T8794] report_bug+0x289/0x300 [ 241.058972][ T8794] do_error_trap+0x11b/0x200 [ 241.058990][ T8794] do_invalid_op+0x37/0x50 [ 241.059003][ T8794] ? debug_print_object+0x168/0x250 [ 241.059017][ T8794] invalid_op+0x23/0x30 [ 241.059035][ T8794] RIP: 0010:debug_print_object+0x168/0x250 [ 241.090650][ T3891] kobject: 'loop0' (00000000dcbbc889): kobject_uevent_env [ 241.092312][ T8794] Code: dd 60 6c e6 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 60 6c e6 87 48 c7 c7 c0 61 e6 87 e8 20 31 01 fe <0f> 0b 83 05 f3 67 83 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 241.092321][ T8794] RSP: 0018:ffff888060767b80 EFLAGS: 00010086 [ 241.092333][ T8794] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 241.092342][ T8794] RDX: 0000000000000000 RSI: ffffffff815bd606 RDI: ffffed100c0ecf62 [ 241.092350][ T8794] RBP: ffff888060767bc0 R08: ffff88806075a500 R09: ffffed1015d24109 [ 241.092359][ T8794] R10: ffffed1015d24108 R11: ffff8880ae920847 R12: 0000000000000001 [ 241.092367][ T8794] R13: ffffffff8935e800 R14: 0000000000000000 R15: ffff888091700850 [ 241.092402][ T8794] ? vprintk_func+0x86/0x189 [ 241.111584][ T3891] kobject: 'loop0' (00000000dcbbc889): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 241.115050][ T8794] debug_check_no_obj_freed+0x2d4/0x43f [ 241.115069][ T8794] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 241.115092][ T8794] kfree+0xf8/0x2c0 [ 241.115110][ T8794] ext4_put_super+0x8e0/0xd70 [ 241.227298][ T3891] kobject: 'loop1' (00000000950b2807): kobject_uevent_env [ 241.227876][ T8794] ? ext4_quota_write+0x5a0/0x5a0 [ 241.234987][ T3891] kobject: 'loop1' (00000000950b2807): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 241.239966][ T8794] generic_shutdown_super+0x14c/0x370 [ 241.239980][ T8794] kill_block_super+0xa0/0x100 [ 241.239995][ T8794] deactivate_locked_super+0x95/0x100 [ 241.240009][ T8794] deactivate_super+0x1b2/0x1d0 [ 241.240024][ T8794] ? mount_bdev+0x3c0/0x3c0 [ 241.240035][ T8794] ? dput+0x38/0xe10 [ 241.240050][ T8794] ? dput+0x1f2/0xe10 [ 241.282848][ T8794] ? mnt_get_writers.isra.0+0xf9/0x150 [ 241.288331][ T8794] cleanup_mnt+0x351/0x4c0 [ 241.292764][ T8794] ? trace_hardirqs_on+0x67/0x240 [ 241.297797][ T8794] ? __kasan_check_read+0x11/0x20 [ 241.302852][ T8794] __cleanup_mnt+0x16/0x20 [ 241.307281][ T8794] task_work_run+0x145/0x1c0 [ 241.311895][ T8794] exit_to_usermode_loop+0x316/0x380 [ 241.317204][ T8794] do_syscall_64+0x65f/0x760 [ 241.321816][ T8794] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.327722][ T8794] RIP: 0033:0x45c2a7 [ 241.331626][ T8794] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 241.351237][ T8794] RSP: 002b:00007ffe0a2d8168 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 241.359659][ T8794] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000045c2a7 [ 241.367641][ T8794] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffe0a2d8210 [ 241.375624][ T8794] RBP: 000000000000003c R08: 0000000000000000 R09: 0000000000000006 [ 241.383606][ T8794] R10: 0000000000000001 R11: 0000000000000202 R12: 00007ffe0a2d92a0 [ 241.391585][ T8794] R13: 0000555555ba1940 R14: 0000000000000000 R15: 00007ffe0a2d92a0 [ 241.400891][ T8794] Kernel Offset: disabled [ 241.405291][ T8794] Rebooting in 86400 seconds..