[ 68.178136][ T26] audit: type=1400 audit(1571133093.829:37): avc: denied { watch } for pid=9563 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 68.210769][ T26] audit: type=1400 audit(1571133093.829:38): avc: denied { watch } for pid=9563 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 68.416385][ T26] audit: type=1800 audit(1571133094.069:39): pid=9472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 68.438818][ T26] audit: type=1800 audit(1571133094.069:40): pid=9472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 69.979526][ T26] audit: type=1400 audit(1571133095.629:41): avc: denied { map } for pid=9648 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.184' (ECDSA) to the list of known hosts. 2019/10/15 09:51:42 fuzzer started [ 76.479273][ T26] audit: type=1400 audit(1571133102.129:42): avc: denied { map } for pid=9657 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/10/15 09:51:43 dialing manager at 10.128.0.26:36669 2019/10/15 09:51:44 syscalls: 2546 2019/10/15 09:51:44 code coverage: enabled 2019/10/15 09:51:44 comparison tracing: enabled 2019/10/15 09:51:44 extra coverage: extra coverage is not supported by the kernel 2019/10/15 09:51:44 setuid sandbox: enabled 2019/10/15 09:51:44 namespace sandbox: enabled 2019/10/15 09:51:44 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/15 09:51:44 fault injection: enabled 2019/10/15 09:51:44 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/15 09:51:44 net packet injection: enabled 2019/10/15 09:51:44 net device setup: enabled 2019/10/15 09:51:44 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 09:54:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x30, 0x0) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$user(0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) gettid() pipe(&(0x7f0000000280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@empty, @in=@broadcast}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) pipe(0x0) pipe(&(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) setresuid(0x0, 0x0, 0x0) pipe(&(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000000780)) pipe(&(0x7f0000000340)={0xffffffffffffffff}) fstat(r3, 0x0) pipe(0x0) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) [ 231.798887][ T26] audit: type=1400 audit(1571133257.449:43): avc: denied { map } for pid=9673 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16475 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 09:54:17 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x2000000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000040)=ANY=[@ANYRES64], 0x8) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 232.039508][ T9674] IPVS: ftp: loaded support on port[0] = 21 [ 232.154282][ T9676] IPVS: ftp: loaded support on port[0] = 21 09:54:17 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='projid_map\x00') readv(r0, &(0x7f0000000440)=[{&(0x7f0000000240)=""/21, 0x15}, {&(0x7f0000000280)=""/120, 0x78}], 0x2) [ 232.218551][ T9674] chnl_net:caif_netlink_parms(): no params data found [ 232.336875][ T9674] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.346094][ T9674] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.354993][ T9674] device bridge_slave_0 entered promiscuous mode [ 232.405097][ T9674] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.412289][ T9674] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.420578][ T9674] device bridge_slave_1 entered promiscuous mode [ 232.452178][ T9680] IPVS: ftp: loaded support on port[0] = 21 [ 232.491009][ T9674] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.501890][ T9676] chnl_net:caif_netlink_parms(): no params data found [ 232.525151][ T9674] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 09:54:18 executing program 3: syz_open_procfs(0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 232.595873][ T9674] team0: Port device team_slave_0 added [ 232.608519][ T9676] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.619413][ T9676] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.644298][ T9676] device bridge_slave_0 entered promiscuous mode [ 232.664855][ T9674] team0: Port device team_slave_1 added [ 232.671686][ T9676] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.691936][ T9676] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.700349][ T9676] device bridge_slave_1 entered promiscuous mode 09:54:18 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f00009b9000)=ANY=[@ANYBLOB="02090000020000000000000000080000"], 0x10}}, 0x0) [ 232.845942][ T9674] device hsr_slave_0 entered promiscuous mode [ 232.976172][ T9674] device hsr_slave_1 entered promiscuous mode [ 233.024849][ T9676] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 233.037252][ T9682] IPVS: ftp: loaded support on port[0] = 21 [ 233.045671][ T9676] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 09:54:18 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2000000000002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20000005001}) r4 = socket$nl_route(0x10, 0x3, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1481200247000007002566060000040000000059d60a41dc486881ed287ad65398b30100000035523ac2e05e2605584103777e93f6b5485a10cdf39c473931ff736bfb00000000000b538b099d836bf400"/92], 0xfffffcb7) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x308, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 233.081981][ T9674] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.089247][ T9674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.097186][ T9674] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.104345][ T9674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.173949][ T9684] IPVS: ftp: loaded support on port[0] = 21 [ 233.186327][ T9676] team0: Port device team_slave_0 added [ 233.195277][ T9676] team0: Port device team_slave_1 added [ 233.284734][ T9676] device hsr_slave_0 entered promiscuous mode [ 233.313132][ T9676] device hsr_slave_1 entered promiscuous mode [ 233.362952][ T9676] debugfs: Directory 'hsr0' with parent '/' already present! [ 233.396236][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.405115][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.406287][ T9688] IPVS: ftp: loaded support on port[0] = 21 [ 233.456406][ T9680] chnl_net:caif_netlink_parms(): no params data found [ 233.529555][ T9680] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.536876][ T9680] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.545031][ T9680] device bridge_slave_0 entered promiscuous mode [ 233.578531][ T9680] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.586519][ T9680] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.594753][ T9680] device bridge_slave_1 entered promiscuous mode [ 233.712065][ T9680] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 233.730769][ T9674] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.740601][ T9682] chnl_net:caif_netlink_parms(): no params data found [ 233.761860][ T9684] chnl_net:caif_netlink_parms(): no params data found [ 233.772522][ T9680] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 233.829757][ T9680] team0: Port device team_slave_0 added [ 233.839635][ T9680] team0: Port device team_slave_1 added [ 233.886228][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.895251][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.910290][ T9674] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.917856][ T9682] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.925207][ T9682] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.933007][ T9682] device bridge_slave_0 entered promiscuous mode [ 233.948169][ T9688] chnl_net:caif_netlink_parms(): no params data found [ 233.972048][ T9684] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.982567][ T9684] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.990524][ T9684] device bridge_slave_0 entered promiscuous mode [ 233.998565][ T9684] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.005824][ T9684] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.013640][ T9684] device bridge_slave_1 entered promiscuous mode [ 234.065791][ T9680] device hsr_slave_0 entered promiscuous mode [ 234.105604][ T9680] device hsr_slave_1 entered promiscuous mode [ 234.142871][ T9680] debugfs: Directory 'hsr0' with parent '/' already present! [ 234.150798][ T9682] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.157943][ T9682] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.168521][ T9682] device bridge_slave_1 entered promiscuous mode [ 234.187471][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.196943][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.205596][ T3010] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.212823][ T3010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.220440][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.229157][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.238092][ T3010] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.245204][ T3010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.264365][ T9676] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.282506][ T9684] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 234.305976][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.314832][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.327778][ T9684] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 234.344715][ T9682] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 234.357898][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.367807][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.393002][ T9682] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 234.410723][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 234.418758][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.427599][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.436012][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.445015][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.453768][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.461455][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.494785][ T9676] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.511369][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.520617][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.530222][ T9674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 234.539340][ T9688] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.547323][ T9688] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.555186][ T9688] device bridge_slave_0 entered promiscuous mode [ 234.567364][ T9688] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.574608][ T9688] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.582272][ T9688] device bridge_slave_1 entered promiscuous mode [ 234.595502][ T9684] team0: Port device team_slave_0 added [ 234.610930][ T9688] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 234.635198][ T9682] team0: Port device team_slave_0 added [ 234.642445][ T9688] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 234.652990][ T9684] team0: Port device team_slave_1 added [ 234.677026][ T9682] team0: Port device team_slave_1 added [ 234.694431][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.705486][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.715069][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.722141][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.756005][ T9684] device hsr_slave_0 entered promiscuous mode [ 234.793133][ T9684] device hsr_slave_1 entered promiscuous mode [ 234.832928][ T9684] debugfs: Directory 'hsr0' with parent '/' already present! [ 234.896131][ T9682] device hsr_slave_0 entered promiscuous mode [ 234.953296][ T9682] device hsr_slave_1 entered promiscuous mode [ 235.002983][ T9682] debugfs: Directory 'hsr0' with parent '/' already present! [ 235.015190][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.023712][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.032253][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.041253][ T3010] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.048352][ T3010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.063947][ T9688] team0: Port device team_slave_0 added [ 235.077155][ T9674] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 235.110751][ T9688] team0: Port device team_slave_1 added [ 235.127038][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 235.139851][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.164525][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.174847][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.183747][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.192396][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.201866][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.245833][ T26] audit: type=1400 audit(1571133260.899:44): avc: denied { associate } for pid=9674 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 235.271776][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.281939][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.294664][ T9680] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.360649][ T9688] device hsr_slave_0 entered promiscuous mode [ 235.413382][ T9688] device hsr_slave_1 entered promiscuous mode [ 235.420434][ C0] hrtimer: interrupt took 42871 ns [ 235.452901][ T9688] debugfs: Directory 'hsr0' with parent '/' already present! [ 235.462045][ T9676] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 235.491881][ T9676] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 235.500964][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.512380][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.558295][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.573449][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.597102][ T9680] 8021q: adding VLAN 0 to HW filter on device team0 09:54:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x30, 0x0) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$user(0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) gettid() pipe(&(0x7f0000000280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@empty, @in=@broadcast}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) pipe(0x0) pipe(&(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) setresuid(0x0, 0x0, 0x0) pipe(&(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000000780)) pipe(&(0x7f0000000340)={0xffffffffffffffff}) fstat(r3, 0x0) pipe(0x0) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) [ 235.611848][ T9676] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 235.681930][ T9684] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.707916][ T9689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.723520][ T9689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.735854][ T9689] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.743029][ T9689] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.765545][ T9689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.787796][ T9689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.798181][ T9689] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.805316][ T9689] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.817617][ T9689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 09:54:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x30, 0x0) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$user(0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) gettid() pipe(&(0x7f0000000280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@empty, @in=@broadcast}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) pipe(0x0) pipe(&(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) setresuid(0x0, 0x0, 0x0) pipe(&(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000000780)) pipe(&(0x7f0000000340)={0xffffffffffffffff}) fstat(r3, 0x0) pipe(0x0) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) [ 235.838720][ T9682] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.888078][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.907758][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.925430][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.961054][ T9682] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.977123][ T9684] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.990457][ T9689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 236.000476][ T9689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 09:54:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() inotify_init1(0x0) r0 = gettid() tkill(r0, 0x33) add_key$user(0x0, 0x0, &(0x7f0000000600), 0x0, 0xfffffffffffffffe) umount2(&(0x7f0000000640)='./file0\x00', 0x4) [ 236.010155][ T9689] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.019104][ T9689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.028409][ T9689] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.042152][ T9689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.050160][ T9689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.114283][ T9680] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 236.129616][ T9680] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 236.143520][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 236.151561][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 236.164296][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 236.178216][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 236.186775][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.195370][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.204181][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:54:21 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @multicast1}, @udp={0x0, 0x4e21, 0x10c}}}}}, 0x0) [ 236.212468][ T3010] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.219601][ T3010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.227896][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.236702][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.245209][ T3010] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.252278][ T3010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.261525][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 236.270536][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 236.279850][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.300018][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:54:21 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @multicast1}, @udp={0x0, 0x4e21, 0x10c}}}}}, 0x0) [ 236.309065][ T3010] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.316205][ T3010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.330222][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.339157][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.355336][ T3010] bridge0: port 2(bridge_slave_1) entered blocking state 09:54:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) [ 236.362470][ T3010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.379235][ T9688] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.463376][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 236.471233][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 09:54:22 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000007fd, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") dup3(r1, r0, 0x0) [ 236.510434][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 236.525702][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 236.548079][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.558293][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.567208][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.583530][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 236.592336][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 236.605616][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 236.615051][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.630669][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 236.639412][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 236.660331][ T9682] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 236.672230][ T9682] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 236.701300][ T9685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.718110][ T9685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.740157][ T9685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 236.788208][ T9685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 236.804210][ T9685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 236.839121][ T9685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.847680][ T9685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.865306][ T9685] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.880594][ T9685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 236.889505][ T9685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 236.904313][ T9685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 236.918866][ T9688] 8021q: adding VLAN 0 to HW filter on device team0 09:54:22 executing program 1: perf_event_open(&(0x7f0000001280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket(0x1000000010, 0x400000400080803, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0xfffffffffffffff2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x81ffff, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b6558", 0x0, 0x100, 0xf2ffffff}, 0x28) [ 236.931611][ T9684] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 236.944972][ T9684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 236.997894][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.012247][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.022014][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.033893][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.044617][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.051731][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.060206][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.069083][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.078331][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.085474][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.092965][ T26] audit: type=1400 audit(1571133262.729:45): avc: denied { prog_load } for pid=9740 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 237.117332][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.126387][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.134503][ T26] audit: type=1400 audit(1571133262.779:46): avc: denied { prog_run } for pid=9740 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 237.165810][ T9680] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 237.185036][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.193866][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.203003][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.211787][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.228549][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.239826][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 237.258496][ T9684] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 237.286439][ T9682] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 237.318882][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.328778][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.341300][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.354088][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.369756][ T9688] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 237.432194][ T9688] 8021q: adding VLAN 0 to HW filter on device batadv0 09:54:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) dup(r0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x1000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 237.841522][ T9779] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 237.856056][ T9779] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 237.913634][ T9779] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 09:54:23 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f00009b9000)=ANY=[@ANYBLOB="02090000020000000000000000080000"], 0x10}}, 0x0) 09:54:23 executing program 0: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) write$P9_RLINK(r0, &(0x7f0000000040)={0xffffffffffffffda, 0x47, 0x1}, 0x7) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setitimer(0x1, 0x0, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) r2 = open(0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000180)='.//ile0\x00', 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) r4 = epoll_create1(0x0) fcntl$dupfd(r4, 0x0, r4) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, 0x0) write$cgroup_pid(r3, &(0x7f0000000240), 0xffffffffffffffd5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000380)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000001c0)) geteuid() r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x9, 0x400201) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\xff\xff\xff\xff\xa0\x00Q\xfc\x03\x00', 0x141}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a73ff0)='/dev/sequencer2\x00', 0x8002, 0x0) [ 238.290943][ T9784] syz-executor.0 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 238.328114][ T26] audit: type=1400 audit(1571133263.979:47): avc: denied { create } for pid=9783 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 238.393162][ T26] audit: type=1400 audit(1571133263.979:48): avc: denied { write } for pid=9783 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 238.425550][ T26] audit: type=1400 audit(1571133264.039:49): avc: denied { read } for pid=9783 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 238.564706][ T9784] device sit0 entered promiscuous mode [ 238.954751][ T9784] device sit0 left promiscuous mode 09:54:24 executing program 5: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) r6 = openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r6, 0x40e, &(0x7f0000000340)=0x2) getrusage(0x0, &(0x7f0000000500)) pipe(&(0x7f0000000640)={0xffffffffffffffff}) readv(r7, &(0x7f0000000400)=[{&(0x7f00000003c0)=""/26, 0x3}], 0x100000000000025c) ioctl$EVIOCGPHYS(r7, 0x80404507, &(0x7f0000000400)=""/254) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x40, &(0x7f0000000e40)=ANY=[@ANYRES64=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="90678e75a3ac03548a43d0c2944d90652d3c8519ba67deffb5ae38696512c379bff27658a4a7f90ce9981e458cc06d76b728e3260a79aa368a0c7c873b9a1b644b7a2f7f94de81c8ffe3dd8fb47349449500ed6408ee1eac42b2043b1db09270685d84481c145b3bf4789a84658e0c29b6eecdef415b238959dcc5425f23e7d785a71bce33d60b776b93a6692e84e207da8b6fe28db9e8af99cec3f08ce5cb467679e8ffbe2d68b8387d19477585b4a9dd4402bd883f3b1b92e854ab02668eaa27"]) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643dca01750b66b2edf23fb4ea3a37f3483117ad75ac79afea59b8664f65aac03ec13dbc336a771c8194bca19f95ce14591d237995f4ca9e69a28dceb3378f6deef565c720d44d4f", @ANYRESDEC=0x0]) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, 0x0) setuid(r10) r11 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r12 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000, 0x4) sendfile(r11, r12, 0x0, 0x7fffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r13, 0x0) r14 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r14, 0x0) setresgid(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r16, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r17) r18 = getegid() setresgid(r18, r15, 0x0) getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) 09:54:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x0, 0x81ffff, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b6558", 0x0, 0x7fff, 0xf2ffffff}, 0x28) 09:54:24 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f00009b9000)=ANY=[@ANYBLOB="02090000020000000000000000080000"], 0x10}}, 0x0) 09:54:24 executing program 3: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) r6 = openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r6, 0x40e, &(0x7f0000000340)=0x2) getrusage(0x0, &(0x7f0000000500)) pipe(&(0x7f0000000640)={0xffffffffffffffff}) readv(r7, &(0x7f0000000400)=[{&(0x7f00000003c0)=""/26, 0x3}], 0x100000000000025c) ioctl$EVIOCGPHYS(r7, 0x80404507, &(0x7f0000000400)=""/254) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x40, &(0x7f0000000e40)=ANY=[@ANYRES64=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="90678e75a3ac03548a43d0c2944d90652d3c8519ba67deffb5ae38696512c379bff27658a4a7f90ce9981e458cc06d76b728e3260a79aa368a0c7c873b9a1b644b7a2f7f94de81c8ffe3dd8fb47349449500ed6408ee1eac42b2043b1db09270685d84481c145b3bf4789a84658e0c29b6eecdef415b238959dcc5425f23e7d785a71bce33d60b776b93a6692e84e207da8b6fe28db9e8af99cec3f08ce5cb467679e8ffbe2d68b8387d19477585b4a9dd4402bd883f3b1b92e854ab02668eaa27"]) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643dca01750b66b2edf23fb4ea3a37f3483117ad75ac79afea59b8664f65aac03ec13dbc336a771c8194bca19f95ce14591d237995f4ca9e69a28dceb3378f6deef565c720d44d4f", @ANYRESDEC=0x0]) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, 0x0) setuid(r10) r11 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r12 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000, 0x4) sendfile(r11, r12, 0x0, 0x7fffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000000)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r13, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r14, 0x0) r15 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r15, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r16, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r18 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r18, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r19) r20 = getegid() setresgid(r20, r17, 0x0) 09:54:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) dup(r0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x1000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:54:24 executing program 0: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) write$P9_RLINK(r0, &(0x7f0000000040)={0xffffffffffffffda, 0x47, 0x1}, 0x7) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setitimer(0x1, 0x0, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) r2 = open(0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000180)='.//ile0\x00', 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) r4 = epoll_create1(0x0) fcntl$dupfd(r4, 0x0, r4) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, 0x0) write$cgroup_pid(r3, &(0x7f0000000240), 0xffffffffffffffd5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000380)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000001c0)) geteuid() r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x9, 0x400201) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\xff\xff\xff\xff\xa0\x00Q\xfc\x03\x00', 0x141}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a73ff0)='/dev/sequencer2\x00', 0x8002, 0x0) [ 239.116286][ T9802] devpts: called with bogus options 09:54:24 executing program 3: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) r6 = openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r6, 0x40e, &(0x7f0000000340)=0x2) getrusage(0x0, &(0x7f0000000500)) pipe(&(0x7f0000000640)={0xffffffffffffffff}) readv(r7, &(0x7f0000000400)=[{&(0x7f00000003c0)=""/26, 0x3}], 0x100000000000025c) ioctl$EVIOCGPHYS(r7, 0x80404507, &(0x7f0000000400)=""/254) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x40, &(0x7f0000000e40)=ANY=[@ANYRES64=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="90678e75a3ac03548a43d0c2944d90652d3c8519ba67deffb5ae38696512c379bff27658a4a7f90ce9981e458cc06d76b728e3260a79aa368a0c7c873b9a1b644b7a2f7f94de81c8ffe3dd8fb47349449500ed6408ee1eac42b2043b1db09270685d84481c145b3bf4789a84658e0c29b6eecdef415b238959dcc5425f23e7d785a71bce33d60b776b93a6692e84e207da8b6fe28db9e8af99cec3f08ce5cb467679e8ffbe2d68b8387d19477585b4a9dd4402bd883f3b1b92e854ab02668eaa27"]) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643dca01750b66b2edf23fb4ea3a37f3483117ad75ac79afea59b8664f65aac03ec13dbc336a771c8194bca19f95ce14591d237995f4ca9e69a28dceb3378f6deef565c720d44d4f", @ANYRESDEC=0x0]) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, 0x0) setuid(r10) r11 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r12 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000, 0x4) sendfile(r11, r12, 0x0, 0x7fffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000000)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r13, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r14, 0x0) r15 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r15, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r16, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000000)) r17 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) getegid() getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) [ 239.175125][ T9805] devpts: called with bogus options 09:54:24 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) dup(r0) pipe(&(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 09:54:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000001300)='map_files\x00') fchdir(r4) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000001300)='map_files\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_RD_TIME(r5, 0x80247009, &(0x7f0000000180)) ioprio_set$pid(0x3, 0x0, 0x0) [ 239.314023][ T9815] devpts: called with bogus options [ 239.373811][ T9823] device sit0 entered promiscuous mode [ 239.414085][ T26] audit: type=1800 audit(1571133265.069:50): pid=9828 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16553 res=0 [ 239.489516][ T9833] fuse: Bad value for 'group_id' [ 239.644175][ T9836] fuse: Bad value for 'group_id' [ 239.828949][ T26] audit: type=1804 audit(1571133265.199:51): pid=9837 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir111897525/syzkaller.KIDTnE/1/file0" dev="sda1" ino=16553 res=1 [ 239.920198][ T9828] devpts: called with bogus options 09:54:25 executing program 1: symlink(0x0, &(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000400)) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x101}}, 0x30) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) r3 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x294, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000100)='./file1\x00', &(0x7f0000000340)) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 09:54:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) dup(r0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x1000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 239.953075][ T26] audit: type=1800 audit(1571133265.239:52): pid=9839 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16547 res=0 [ 240.011928][ T26] audit: type=1804 audit(1571133265.359:53): pid=9843 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir299671130/syzkaller.tIzJ43/3/file0" dev="sda1" ino=16547 res=1 09:54:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000001c0)=@sg0='/dev/sg0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x23080, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000340)=@md5={0x1, "3a782dadae70734efd17d2f2a803e20a"}, 0x11, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() r0 = inotify_init1(0x0) r1 = gettid() fcntl$setown(r0, 0x8, r1) tkill(r1, 0x33) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x5010, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, 0x0) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f00000005c0)={'syz', 0x1}, &(0x7f0000000600)="1e96250479b9c60907b076c083b58acc7c921e4e74d56c0ad25e19e0639d760fddfba8", 0x23, 0xfffffffffffffffe) umount2(&(0x7f0000000640)='./file0\x00', 0x0) [ 240.070023][ T9830] devpts: called with bogus options [ 240.221450][ T26] audit: type=1800 audit(1571133265.779:54): pid=9839 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16547 res=0 09:54:26 executing program 0: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) write$P9_RLINK(r0, &(0x7f0000000040)={0xffffffffffffffda, 0x47, 0x1}, 0x7) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setitimer(0x1, 0x0, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) r2 = open(0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000180)='.//ile0\x00', 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) r4 = epoll_create1(0x0) fcntl$dupfd(r4, 0x0, r4) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, 0x0) write$cgroup_pid(r3, &(0x7f0000000240), 0xffffffffffffffd5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000380)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000001c0)) geteuid() r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x9, 0x400201) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\xff\xff\xff\xff\xa0\x00Q\xfc\x03\x00', 0x141}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a73ff0)='/dev/sequencer2\x00', 0x8002, 0x0) 09:54:26 executing program 3: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) r6 = openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r6, 0x40e, &(0x7f0000000340)=0x2) getrusage(0x0, &(0x7f0000000500)) pipe(&(0x7f0000000640)={0xffffffffffffffff}) readv(r7, &(0x7f0000000400)=[{&(0x7f00000003c0)=""/26, 0x3}], 0x100000000000025c) ioctl$EVIOCGPHYS(r7, 0x80404507, &(0x7f0000000400)=""/254) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x40, &(0x7f0000000e40)=ANY=[@ANYRES64=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="90678e75a3ac03548a43d0c2944d90652d3c8519ba67deffb5ae38696512c379bff27658a4a7f90ce9981e458cc06d76b728e3260a79aa368a0c7c873b9a1b644b7a2f7f94de81c8ffe3dd8fb47349449500ed6408ee1eac42b2043b1db09270685d84481c145b3bf4789a84658e0c29b6eecdef415b238959dcc5425f23e7d785a71bce33d60b776b93a6692e84e207da8b6fe28db9e8af99cec3f08ce5cb467679e8ffbe2d68b8387d19477585b4a9dd4402bd883f3b1b92e854ab02668eaa27"]) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643dca01750b66b2edf23fb4ea3a37f3483117ad75ac79afea59b8664f65aac03ec13dbc336a771c8194bca19f95ce14591d237995f4ca9e69a28dceb3378f6deef565c720d44d4f", @ANYRESDEC=0x0]) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, 0x0) setuid(r10) r11 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r12 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000, 0x4) sendfile(r11, r12, 0x0, 0x7fffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000000)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r13, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r14, 0x0) r15 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r15, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r16, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000000)) r17 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) getegid() getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) 09:54:26 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x200, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000140)={0x4}) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000922100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001580)=ANY=[], 0x0) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000004, 0x10, r1, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) chdir(0x0) unshare(0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) ftruncate(0xffffffffffffffff, 0x6a) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$netlink(0x10, 0x3, 0x0) unshare(0x8000400) [ 241.229065][ T9871] device sit0 left promiscuous mode 09:54:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) dup(r0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x1000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 241.511867][ T9880] devpts: called with bogus options 09:54:27 executing program 3: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) r6 = openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r6, 0x40e, &(0x7f0000000340)=0x2) getrusage(0x0, &(0x7f0000000500)) pipe(&(0x7f0000000640)={0xffffffffffffffff}) readv(r7, &(0x7f0000000400)=[{&(0x7f00000003c0)=""/26, 0x3}], 0x100000000000025c) ioctl$EVIOCGPHYS(r7, 0x80404507, &(0x7f0000000400)=""/254) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x40, &(0x7f0000000e40)=ANY=[@ANYRES64=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303080523030303030343030e21184d483e2ee87865f0905dd094aa96ce3a17e6c821057cb893962c91444d6334dd454362073dba2f6ac6ee8257fdf0e75a94cbff9499f7e7ebb69fa2fa0e9ac96a90f2ab9f218e7c3118e347d736ab3dde335cde7ccf40481ee226db0c065852923f704b2dc6a4e20275aa2630c02695d0c0782f7e4d646678ea3ccb1a7871c6ce8b730049d670a2f7352ea761db0a7a52e03d6746ff5d2270dd4e932ec6292aef08cd7fcd7c27094d73a4d0000003f1957d753884669d84ad2321507a2bec30a574fd574843522ac687d4896194b6003676be99a51ff8b41e498101754b9fe04e8f43459acbe305537cd66a53b667e84f499531d15f0cd4c1016", @ANYRESDEC=0x0, @ANYBLOB="90678e75a3ac03548a43d0c2944d90652d3c8519ba67deffb5ae38696512c379bff27658a4a7f90ce9981e458cc06d76b728e3260a79aa368a0c7c873b9a1b644b7a2f7f94de81c8ffe3dd8fb47349449500ed6408ee1eac42b2043b1db09270685d84481c145b3bf4789a84658e0c29b6eecdef415b238959dcc5425f23e7d785a71bce33d60b776b93a6692e84e207da8b6fe28db9e8af99cec3f08ce5cb467679e8ffbe2d68b8387d19477585b4a9dd4402bd883f3b1b92e854ab02668eaa27"]) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643dca01750b66b2edf23fb4ea3a37f3483117ad75ac79afea59b8664f65aac03ec13dbc336a771c8194bca19f95ce14591d237995f4ca9e69a28dceb3378f6deef565c720d44d4f", @ANYRESDEC=0x0]) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, 0x0) setuid(r10) r11 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r12 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000, 0x4) sendfile(r11, r12, 0x0, 0x7fffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000000)) r13 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r13, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r14, 0x0) r15 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r15, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r16, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000000)) r17 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) getegid() getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) [ 241.669794][ T9890] devpts: called with bogus options [ 241.961462][ T9899] fuse: Bad value for 'group_id' [ 242.087218][ T9873] device sit0 entered promiscuous mode 09:54:27 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x200, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000140)={0x4}) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000922100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001580)=ANY=[], 0x0) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000004, 0x10, r1, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) chdir(0x0) unshare(0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) ftruncate(0xffffffffffffffff, 0x6a) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$netlink(0x10, 0x3, 0x0) unshare(0x8000400) 09:54:27 executing program 0: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) write$P9_RLINK(r0, &(0x7f0000000040)={0xffffffffffffffda, 0x47, 0x1}, 0x7) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setitimer(0x1, 0x0, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) r2 = open(0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000180)='.//ile0\x00', 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) r4 = epoll_create1(0x0) fcntl$dupfd(r4, 0x0, r4) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, 0x0) write$cgroup_pid(r3, &(0x7f0000000240), 0xffffffffffffffd5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000380)={'team0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000001c0)) geteuid() r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00@\xd6\x00'}) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x9, 0x400201) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\xff\xff\xff\xff\xa0\x00Q\xfc\x03\x00', 0x141}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a73ff0)='/dev/sequencer2\x00', 0x8002, 0x0) 09:54:28 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) io_setup(0x9, &(0x7f0000000240)=0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x145002) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000000), 0x81800}]) 09:54:28 executing program 1: io_setup(0x9, &(0x7f0000000240)=0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x145002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000), 0x81800}]) 09:54:28 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fchdir(r0) r4 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fstatfs(r4, &(0x7f0000000400)=""/128) [ 243.003278][ T9912] device sit0 left promiscuous mode [ 243.279014][ T9906] device sit0 entered promiscuous mode 09:54:29 executing program 4: 09:54:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000001c0)=@sg0='/dev/sg0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x23080, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000340)=@md5={0x1, "3a782dadae70734efd17d2f2a803e20a"}, 0x11, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() r0 = inotify_init1(0x0) r1 = gettid() fcntl$setown(r0, 0x8, r1) tkill(r1, 0x33) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x5010, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, 0x0) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f00000005c0)={'syz', 0x1}, &(0x7f0000000600)="1e96250479b9c60907b076c083b58acc7c921e4e74d56c0ad25e19e0639d760fddfba8", 0x23, 0xfffffffffffffffe) umount2(&(0x7f0000000640)='./file0\x00', 0x0) 09:54:30 executing program 3: 09:54:30 executing program 2: 09:54:30 executing program 0: 09:54:30 executing program 4: 09:54:30 executing program 1: 09:54:30 executing program 3: 09:54:30 executing program 0: 09:54:30 executing program 2: 09:54:30 executing program 4: 09:54:30 executing program 1: 09:54:30 executing program 1: 09:54:30 executing program 5: 09:54:30 executing program 3: 09:54:30 executing program 0: 09:54:30 executing program 2: 09:54:30 executing program 4: 09:54:30 executing program 1: 09:54:30 executing program 0: 09:54:30 executing program 3: 09:54:30 executing program 2: 09:54:30 executing program 4: 09:54:30 executing program 5: 09:54:30 executing program 1: 09:54:30 executing program 3: 09:54:30 executing program 0: 09:54:30 executing program 2: 09:54:30 executing program 5: 09:54:30 executing program 4: 09:54:30 executing program 3: 09:54:30 executing program 1: 09:54:30 executing program 0: 09:54:31 executing program 2: 09:54:31 executing program 5: 09:54:31 executing program 1: 09:54:31 executing program 3: 09:54:31 executing program 0: 09:54:31 executing program 2: 09:54:31 executing program 4: 09:54:31 executing program 5: 09:54:31 executing program 3: 09:54:31 executing program 4: 09:54:31 executing program 1: 09:54:31 executing program 2: 09:54:31 executing program 0: 09:54:31 executing program 5: 09:54:31 executing program 1: 09:54:31 executing program 3: 09:54:31 executing program 4: 09:54:31 executing program 2: 09:54:31 executing program 3: 09:54:31 executing program 5: 09:54:31 executing program 0: 09:54:31 executing program 4: 09:54:31 executing program 1: 09:54:31 executing program 2: 09:54:31 executing program 3: 09:54:31 executing program 5: 09:54:32 executing program 0: 09:54:32 executing program 4: 09:54:32 executing program 1: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) mkdirat$cgroup(r0, &(0x7f0000000200)='syz1\x00', 0x1ff) 09:54:32 executing program 2: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000005c0)=[{{&(0x7f0000000040)=@ipx, 0x80, &(0x7f0000000440)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000400)=""/28, 0x1c}], 0x5}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/igmp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) pipe(&(0x7f0000000040)) clone(0x7f8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r1, &(0x7f00000051c0)="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", 0xfffffffffffffc4a, 0x80, 0x0, 0xffffffffffffff11) 09:54:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="5500000018007f6000fe01b2403b7bbb0a60000004a84302910000003900090035000c00020000000d000500000000000000c78b800823090000009d566885b167320b00dc1338d54400009b84136ef75afb83de44", 0x226}], 0x1}, 0x0) 09:54:32 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x100000001, 0x1, 0x200000000000009}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) gettid() r2 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x7f, 0x7f16156b7124dbaf) r3 = gettid() syz_open_procfs(r3, &(0x7f0000000300)='cmdline\x00') ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000180)={[], 0x1, 0x1, 0x2, 0x35, 0x6, r3}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000200)="b32866d1885f9e481a8020baaba13af0699a4b1fb87c27e568273394f41350eb3ba40bdb29700405911b5d7b7ef2a0ff79c4c35960334b27b9597161c1215e459c2ca4b091754a433d0273278f6706de"}, 0x20) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x802, 0x0) r5 = gettid() r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') r7 = syz_open_procfs(r5, &(0x7f0000000300)='cmdline\x00') sendfile(r6, r7, 0x0, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f00000003c0)=ANY=[@ANYRESOCT=r6]) r8 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) r9 = gettid() syz_open_procfs(r9, &(0x7f0000000300)='cmdline\x00') r10 = getpid() ptrace$setopts(0x4206, r10, 0x9, 0xb722bbcd2102d338) ptrace$getenv(0x4201, r9, 0x4, &(0x7f00000000c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r8, 0x5, &(0x7f0000000040)={0x0, 0x0}}, 0xffffffca) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r11, 0xffff}, 0xc) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) 09:54:32 executing program 4: 09:54:32 executing program 0: [ 246.657504][T10058] IPv6: NLM_F_CREATE should be specified when creating new route [ 246.670451][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 246.670465][ T26] audit: type=1400 audit(1571133272.319:57): avc: denied { map_create } for pid=10057 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 246.703972][T10058] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 246.711535][T10058] IPv6: NLM_F_CREATE should be set when creating new route [ 246.718816][T10058] IPv6: NLM_F_CREATE should be set when creating new route 09:54:32 executing program 1: perf_event_open(&(0x7f0000001280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e00000000000000000000000000000000001c513fc63c09d159a19f1f82018d6557a71e4cd05feaceec46a8184c131095144bbe8dcdd846688dc20a932245157b05f63500123c9dc579af8487c64ac508c4f2bc1382e1750d37e63afd4ca4144e13e619db35175b2e77e348becee14e7eb1900add605f3dde762d070ca73dc9c6f4fe5074d2c75701552ad43c4bef8ebdfe5e07d7"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) dup(0xffffffffffffffff) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x20, 0x0, 0x0, 0x1e, 0x9, 0x1, 0x0, 0x1a, 0x1}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x81ffff, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b6558", 0x0, 0x100, 0xf2ffffff}, 0x28) 09:54:32 executing program 2: faccessat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, 0x0) socket$rxrpc(0x21, 0x2, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffc000/0x4000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) [ 246.808036][T10070] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 246.812082][ T26] audit: type=1400 audit(1571133272.319:58): avc: denied { map_read map_write } for pid=10057 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 09:54:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x20, 0x0, 0x4, 0x1e, 0x9, 0x1, 0x0, 0x1a, 0x1}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x81ffff, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b6558", 0x0, 0x100, 0xf2ffffff}, 0x28) 09:54:32 executing program 3: perf_event_open(&(0x7f0000001280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e00000000000000000000000000000000001c513fc63c09d159a19f1f82018d6557a71e4cd05feaceec46a8184c131095144bbe8dcdd846688dc20a932245157b05f63500123c9dc579af8487c64ac508c4f2bc1382e1750d37e63afd4ca4144e13e619db35175b2e77e348becee14e7eb1900add605f3dde762d070ca73dc9c6f4fe5074d2c75701552ad43c4bef8ebdfe5e07d7"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0xfffffffffffffff2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x81ffff, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b6558", 0x0, 0x100, 0xf2ffffff}, 0x28) 09:54:32 executing program 4: bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffd88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x101, 0x0) write$vhci(r1, &(0x7f0000000100)=@HCI_ACLDATA_PKT={0x2, "dc90d2f668ef66b55bc0836ac38cc57faa5001525f6b9b187a1546abf547677e"}, 0x21) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000240)) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'batadv0\x00'}) socket$caif_stream(0x25, 0x1, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 09:54:32 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 09:54:32 executing program 4: bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffd88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x101, 0x0) write$vhci(r1, &(0x7f0000000100)=@HCI_ACLDATA_PKT={0x2, "dc90d2f668ef66b55bc0836ac38cc57faa5001525f6b9b187a1546abf547677e"}, 0x21) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000240)) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'batadv0\x00'}) socket$caif_stream(0x25, 0x1, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 09:54:32 executing program 1: perf_event_open(&(0x7f0000001280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) dup(0xffffffffffffffff) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x20, 0x0, 0x0, 0x1e, 0x9, 0x1, 0x0, 0x1a, 0x1}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x81ffff, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b6558", 0x0, 0x100, 0xf2ffffff}, 0x28) 09:54:32 executing program 3: bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffd88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x101, 0x0) write$vhci(r1, &(0x7f0000000100)=@HCI_ACLDATA_PKT={0x2, "dc90d2f668ef66b55bc0836ac38cc57faa5001525f6b9b187a1546abf547677e"}, 0x21) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000240)) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'batadv0\x00'}) socket$caif_stream(0x25, 0x1, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 09:54:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) 09:54:33 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000240)="b156d417452c8f6d46edb3b1077f2abaa85e3489c66107abcc617d9aeb42aa515f23c9150bfdba5fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7e", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 247.391513][T10085] IPVS: ftp: loaded support on port[0] = 21 09:54:33 executing program 4: write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000580)={0x8, "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", 0x1000}, 0x10000005c) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000004c0)={r2, @local, @broadcast}, 0xc) r3 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r3, r4, 0x0, 0x80000003) write$UHID_CREATE2(r4, &(0x7f0000001900)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000031000400800000000600000008000000ec0500009432d7846dacb05a5ecf43c8f367389580a455bc2abeb1d884b0700810ceb9886f80cd11cfdf4955b70e5f0a4a09e1cad22fb1d1a9090c4097898a9c1f5d5e23302c73350116bb0b284b7018911657ea0ac2437b59ce5ecbbf281e7bd6ec84038e31d6f7e3589bee132efba7cdde3f85c0"], 0x149) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x7, 0x10000) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) getdents64(r5, &(0x7f00000005c0)=""/4096, 0x1000) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0), 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x1001, 0x0) 09:54:33 executing program 3: bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffd88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x101, 0x0) write$vhci(r1, &(0x7f0000000100)=@HCI_ACLDATA_PKT={0x2, "dc90d2f668ef66b55bc0836ac38cc57faa5001525f6b9b187a1546abf547677e"}, 0x21) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000240)) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'batadv0\x00'}) socket$caif_stream(0x25, 0x1, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 247.535500][ T26] audit: type=1400 audit(1571133273.169:59): avc: denied { map } for pid=10115 comm="syz-executor.5" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=31535 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 247.886781][T10126] ------------[ cut here ]------------ [ 247.892543][T10126] WARNING: CPU: 0 PID: 10126 at fs/readdir.c:110 verify_dirent_name+0x67/0x80 [ 247.895462][T10085] kobject: 'ip6_vti0' (00000000312799c6): kobject_uevent_env [ 247.901391][T10126] Kernel panic - not syncing: panic_on_warn set ... [ 247.901418][T10126] CPU: 0 PID: 10126 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 247.901434][T10126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.901439][T10126] Call Trace: [ 247.901541][T10126] dump_stack+0x172/0x1f0 [ 247.916960][T10085] kobject: 'ip6_vti0' (00000000312799c6): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 247.923393][T10126] ? iterate_dir+0x5e0/0x5e0 [ 247.923406][T10126] panic+0x2e3/0x75c [ 247.923418][T10126] ? add_taint.cold+0x16/0x16 [ 247.923435][T10126] ? printk+0xba/0xed [ 247.923448][T10126] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 247.923464][T10126] ? __warn.cold+0x14/0x35 [ 247.923483][T10126] ? verify_dirent_name+0x67/0x80 [ 247.923494][T10126] __warn.cold+0x2f/0x35 [ 247.923509][T10126] ? report_bug.cold+0x63/0xad [ 247.923525][T10126] ? verify_dirent_name+0x67/0x80 [ 247.923538][T10126] report_bug+0x289/0x300 [ 247.923560][T10126] do_error_trap+0x11b/0x200 [ 247.939774][T10085] kobject: 'queues' (00000000f04e6dfc): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 247.941239][T10126] do_invalid_op+0x37/0x50 [ 247.941253][T10126] ? verify_dirent_name+0x67/0x80 [ 247.941361][T10126] invalid_op+0x23/0x30 [ 247.952023][T10085] kobject: 'queues' (00000000f04e6dfc): kobject_uevent_env [ 247.956335][T10126] RIP: 0010:verify_dirent_name+0x67/0x80 [ 247.956350][T10126] Code: 14 b6 ff 44 89 e0 5b 41 5c 5d c3 e8 43 14 b6 ff 0f 0b e8 3c 14 b6 ff 41 bc fb ff ff ff 5b 44 89 e0 41 5c 5d c3 e8 29 14 b6 ff <0f> 0b 41 bc fb ff ff ff eb ca 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 [ 247.956357][T10126] RSP: 0018:ffff88805c5cfad0 EFLAGS: 00010212 [ 247.956369][T10126] RAX: 0000000000040000 RBX: 000000000000000c RCX: ffffc9000ebf7000 [ 247.956378][T10126] RDX: 0000000000003c09 RSI: ffffffff81bcfe67 RDI: ffff88805c5cfcd3 [ 247.956385][T10126] RBP: ffff88805c5cfae0 R08: ffff8880a0dc4380 R09: 0000000000000004 [ 247.956392][T10126] R10: fffffbfff120da14 R11: ffffffff8906d0a3 R12: 0000000000000000 [ 247.956400][T10126] R13: 0000000000000000 R14: 0000000000000004 R15: ffff88805c5cfe50 [ 247.956424][T10126] ? verify_dirent_name+0x67/0x80 [ 247.956442][T10126] filldir64+0x40/0x670 [ 247.956459][T10126] ? _raw_spin_unlock+0x2d/0x50 [ 247.956473][T10126] ? iunique+0x19f/0x1e0 [ 247.956490][T10126] __fat_readdir+0xd9e/0x1cb0 [ 247.956509][T10126] ? __lock_acquire+0x293a/0x4a00 [ 247.969069][T10085] kobject: 'queues' (00000000f04e6dfc): kobject_uevent_env: filter function caused the event to drop! [ 247.969105][T10085] kobject: 'rx-0' (00000000f887104a): kobject_add_internal: parent: 'queues', set: 'queues' [ 247.974636][T10126] ? fat_search_long+0x1350/0x1350 [ 247.974659][T10126] ? lock_acquire+0x190/0x410 [ 247.974674][T10126] ? iterate_dir+0xd8/0x5e0 [ 247.974695][T10126] ? __kasan_check_write+0x14/0x20 [ 247.974709][T10126] ? down_read_killable+0x10c/0x490 [ 247.974725][T10126] ? selinux_file_permission+0x9b/0x580 [ 247.974745][T10126] ? rwsem_down_read_slowpath+0xfb0/0xfb0 [ 247.974763][T10126] fat_readdir+0x44/0x60 [ 247.974777][T10126] iterate_dir+0x47f/0x5e0 [ 247.974795][T10126] ksys_getdents64+0x1ce/0x320 [ 247.985062][ T3893] kobject: 'loop4' (000000006c78dac6): kobject_uevent_env [ 247.989217][T10126] ? __ia32_sys_getdents+0x3b0/0x3b0 [ 247.989234][T10126] ? compat_filldir+0x3a0/0x3a0 [ 247.999643][T10085] kobject: 'rx-0' (00000000f887104a): kobject_uevent_env [ 248.003405][T10126] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 248.003419][T10126] ? do_syscall_64+0x26/0x760 [ 248.003435][T10126] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.003447][T10126] ? do_syscall_64+0x26/0x760 [ 248.003476][T10126] __x64_sys_getdents64+0x73/0xb0 [ 248.010576][ T3893] kobject: 'loop4' (000000006c78dac6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 248.018833][T10126] do_syscall_64+0xfa/0x760 [ 248.018859][T10126] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.018869][T10126] RIP: 0033:0x459a59 [ 248.018885][T10126] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 248.018892][T10126] RSP: 002b:00007fe572ac3c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 248.018903][T10126] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 248.018910][T10126] RDX: 0000000000001000 RSI: 00000000200005c0 RDI: 000000000000000a [ 248.018917][T10126] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 248.018929][T10126] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe572ac46d4 [ 248.018938][T10126] R13: 00000000004c0535 R14: 00000000004d2c58 R15: 00000000ffffffff [ 248.025092][T10126] Kernel Offset: disabled [ 248.357438][T10126] Rebooting in 86400 seconds..