[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 33.430368] audit: type=1800 audit(1538266113.834:25): pid=5866 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 33.450373] audit: type=1800 audit(1538266113.834:26): pid=5866 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 33.477192] audit: type=1800 audit(1538266113.834:27): pid=5866 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.21' (ECDSA) to the list of known hosts. 2018/09/30 00:08:45 fuzzer started 2018/09/30 00:08:47 dialing manager at 10.128.0.26:41473 2018/09/30 00:08:47 syscalls: 1 2018/09/30 00:08:47 code coverage: enabled 2018/09/30 00:08:47 comparison tracing: enabled 2018/09/30 00:08:47 setuid sandbox: enabled 2018/09/30 00:08:47 namespace sandbox: enabled 2018/09/30 00:08:47 Android sandbox: /sys/fs/selinux/policy does not exist 2018/09/30 00:08:47 fault injection: enabled 2018/09/30 00:08:47 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/30 00:08:47 net packed injection: enabled 2018/09/30 00:08:47 net device setup: enabled 00:11:23 executing program 0: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0x2}}, 0x0, 0x0, r0, 0xb) dup2(r1, r2) syzkaller login: [ 203.247230] IPVS: ftp: loaded support on port[0] = 21 00:11:23 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00@\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00', 0xfffffffffffffffb}) write(r0, &(0x7f0000000280), 0x0) [ 203.490704] IPVS: ftp: loaded support on port[0] = 21 00:11:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x14, r1, 0xb25}, 0x14}}, 0x0) read(r0, &(0x7f0000000000)=""/203, 0xcb) [ 203.714599] IPVS: ftp: loaded support on port[0] = 21 00:11:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000000000000000000000630120"], &(0x7f0000000200)="47504c00bc2e070000004823122000000000000000000000000000", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) [ 204.121223] IPVS: ftp: loaded support on port[0] = 21 00:11:24 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x40030000000000, 0x0, r1, 0xf0ffff, 0xffffff7f}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0xff8e}}, 0x0) [ 204.405651] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.416851] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.424329] device bridge_slave_0 entered promiscuous mode [ 204.571908] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.587176] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.607317] device bridge_slave_1 entered promiscuous mode [ 204.621048] IPVS: ftp: loaded support on port[0] = 21 [ 204.780664] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 204.854543] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 204.870109] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.879505] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.897919] device bridge_slave_0 entered promiscuous mode 00:11:25 executing program 5: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000000000000400000000000000000000000000000000000000000003800030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000050000000000000000000000000000000000000000000000e865ce175af1c16e25a3ce6a3c8329676a3df53a25509ebbaa3fab09b252a495a15a4685ab5873fe848034c3c1a98ae90082485a5a221d3c000000000000000000000000000000"], 0xe8) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) [ 204.991036] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.011756] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.024156] device bridge_slave_1 entered promiscuous mode [ 205.169347] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 205.198498] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 205.223531] IPVS: ftp: loaded support on port[0] = 21 [ 205.301461] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 205.324487] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 205.333739] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.347182] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.369827] device bridge_slave_0 entered promiscuous mode [ 205.394862] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 205.417134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.449715] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.456080] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.474753] device bridge_slave_1 entered promiscuous mode [ 205.577491] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 205.664565] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 205.691836] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 205.809371] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 205.833471] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.840281] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.859873] device bridge_slave_0 entered promiscuous mode [ 205.868660] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 205.875954] team0: Port device team_slave_0 added [ 205.979038] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.997161] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.005438] device bridge_slave_1 entered promiscuous mode [ 206.018850] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 206.026654] team0: Port device team_slave_1 added [ 206.061105] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 206.084310] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 206.158716] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 206.169065] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 206.185529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.193561] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.219364] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 206.259091] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 206.266187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 206.286706] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 206.297178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.304927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.363539] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 206.379799] team0: Port device team_slave_0 added [ 206.386455] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 206.403330] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 206.422612] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.432399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.457563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 206.476263] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 206.491664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.514589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.538642] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 206.545876] team0: Port device team_slave_1 added [ 206.579116] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.588077] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.615597] device bridge_slave_0 entered promiscuous mode [ 206.632511] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.698248] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.704673] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.712033] device bridge_slave_1 entered promiscuous mode [ 206.737938] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 206.768229] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.788339] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 206.796531] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 206.837631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.851305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.862725] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 206.870089] team0: Port device team_slave_0 added [ 206.911999] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 206.926719] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 206.938347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 206.951136] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 206.968059] team0: Port device team_slave_1 added [ 206.981229] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.000935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.063161] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.165432] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 207.180351] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 207.192702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 207.203090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.217719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.242867] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 207.271091] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 207.297724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.306914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.343675] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 207.354923] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.363284] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.383325] device bridge_slave_0 entered promiscuous mode [ 207.407853] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 207.421030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.430652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.449891] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 207.473646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.500672] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.513190] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.520818] device bridge_slave_1 entered promiscuous mode [ 207.559586] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 207.588166] team0: Port device team_slave_0 added [ 207.658027] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 207.696231] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 207.728365] team0: Port device team_slave_1 added [ 207.742825] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.749246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.755874] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.762283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.777390] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 207.785224] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 207.817377] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.834050] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 207.857906] team0: Port device team_slave_0 added [ 207.887840] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.983553] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 207.999927] team0: Port device team_slave_1 added [ 208.006982] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 208.027540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.037855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.088306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.099158] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 208.139423] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.145825] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.152472] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.158843] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.167797] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 208.184723] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 208.193694] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 208.205694] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 208.231799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 208.247983] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 208.272115] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.280423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.299163] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 208.324683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.336753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.368708] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 208.431309] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 208.450103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.465349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.504448] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 208.528991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 208.605597] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 208.622558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 208.759618] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.766016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.772671] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.779081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.798142] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 208.905833] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 208.930200] team0: Port device team_slave_0 added [ 209.025303] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 209.042905] team0: Port device team_slave_1 added [ 209.111545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.127984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.158463] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 209.186645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.198003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.277661] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 209.284493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.299615] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.377397] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 209.384512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.399325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.418537] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.424890] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.431540] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.437919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.445435] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 209.517322] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 209.524483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.538073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.769762] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.776198] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.782840] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.789212] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.819496] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 210.137195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.144655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.599060] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.605443] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.612103] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.618481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.645618] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 211.150995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.123061] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.464328] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.478085] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 212.659569] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.809735] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 212.818404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.825395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.878916] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 213.052166] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 213.195324] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.216707] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 213.236245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.267593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.389540] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.473206] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 213.486739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.495435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.584412] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.717931] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.755629] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 213.891834] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.042318] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 214.124527] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 214.147271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.154252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.419082] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 214.427840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.434811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.546186] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.632536] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.749805] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.943594] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.305123] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 215.318365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.335175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.632694] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.664508] device lo entered promiscuous mode [ 215.717997] device lo left promiscuous mode 00:11:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x24, 0x2c, 0x401, 0x0, 0x0, {}, [@typed={0xc, 0x28, @u64}, @nested={0x4}]}, 0x24}}, 0x0) [ 215.847473] device lo entered promiscuous mode 00:11:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00'}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="000000000c0000000000000008000100736671004800020000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f8ffffffffffffff00000000"], 0x1}}, 0x0) 00:11:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x24, 0x2c, 0x401, 0x0, 0x0, {}, [@typed={0xc, 0x28, @u64}, @nested={0x4}]}, 0x24}}, 0x0) 00:11:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x24, 0x2c, 0x401, 0x0, 0x0, {}, [@typed={0xc, 0x28, @u64}, @nested={0x4}]}, 0x24}}, 0x0) 00:11:36 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x88d6, @mcast1, 0x4}, 0x1c) sendmmsg(r1, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="100000000000000000000000000000004c3927c5a5479566b6d152a44f6220c7af5d13c3ee0e9d7bc436b131"], 0x2c}}], 0x1, 0x0) 00:11:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x24, 0x2c, 0x401, 0x0, 0x0, {}, [@typed={0xc, 0x28, @u64}, @nested={0x4}]}, 0x24}}, 0x0) 00:11:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000040), &(0x7f0000000180)) 00:11:36 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x24, 0x2c, 0x401, 0x0, 0x0, {}, [@typed={0xc, 0x28, @u64}, @nested={0x4}]}, 0x24}}, 0x0) [ 216.249525] IPVS: ftp: loaded support on port[0] = 21 00:11:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000300000000000000000000009500020000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x11000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000000)={r0, r1}) sendto$inet(r0, &(0x7f0000000140)="17", 0x1, 0x4044001, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, 0x10) [ 216.402272] IPVS: ftp: loaded support on port[0] = 21 [ 216.455301] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:11:37 executing program 0: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x24, 0x2c, 0x401, 0x0, 0x0, {}, [@typed={0xc, 0x28, @u64}, @nested={0x4}]}, 0x24}}, 0x0) 00:11:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x40030000000000, 0x0, r1, 0xf0ffff, 0xffffff7f}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0xff8e}}, 0x0) 00:11:37 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f00000016c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000700)=[{&(0x7f00000001c0)='%', 0x1}], 0x1, &(0x7f0000000080)=[@prinfo={0x18, 0x84, 0x5, {0x10}}], 0x18}], 0x1, 0x0) 00:11:37 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=ANY=[@ANYBLOB="080045da676ece0e"], 0x1) sendto$inet6(r0, &(0x7f00000001c0)="2a22df30077fb861a961a3a8447ebf3a", 0x10, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r0, &(0x7f0000000280)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e5d37149eb0f4a333726cf6d5b7647306559155f1c69d6bfd145b83576f2df4d85f271fd4119db923e2412c66dd954eb59dddc7e1fd286a83971b2ba1c63b4f99702cf91f3d1ecffb8ae189c79b403805e83650c251a564942896f205640c23b0cf51fe9bd931f54a343794710a9cd53cef20938edddb2bfa3c1f72f8e79e41e30fb8f9d314abd999ba396521b6c10bec7bc9d0745a80299342f5cf89eb9d94044258fbb18cec1cdbbc016a773d3ae41e3e30248e716fd0873d31454902cbe7dcf7d644dfadc255d99652b5ed5a5b1a75e3ad49cf80178678402e9d3a755d009889b2e6138f81dc02eedcc353aceb2f7781aea08aa91be7e1e2416ba3d555b1f2237f68c5d7dcfcb1b917c292a35d6d7e7cf2cb1dd6dba5a50ce55c4638d7d38cb7afd8da02f281ab69392bc6531eb03eb97c1d075e3342c244861d04bcad8991b8f588e48ad7fe218d2f5e604bb31c59241245b485210fe418af3d6377b59d5ab128497efeced38cc5036b1f34cb89674b5179219f34b9e8e1849695d7c23cce77eb8f038ef9f2cd69d1c9e2d6b46610adbadbdad857a77f59d38cb5120709716b87c52a48de249b231d7e39985b8b58094c0d7b4c6d1671a8ff9d2daaca94df2adcff6420077df0ddbc66d00b141ffc6e28bed09a19056e52a905a72c99a04af56b22da83135808ba2bfe87a39753447e78500d16bdad52d97df73d4852a79e7ec6910701b712cfd58c62b3ade86cf6ff0cd78719fa1ae81640381cb33f4f6b03c913e820cf9eb9b5cf7df9c878596c9ac9444cad118673fe339b4b7287b310ecff4742bfea2612d79d418293f0dfe14bc819c466473438ad71ea3b1386d17a9038b1f5a9285481500f84f4c7eabbf2eb071a101c69cce8e7495bda4c28a4e88f6a258abf58579c290eeb742b2678daab3ecc8c2bf97d89e89472901e254dd63ca7d918f8a7523161e29b28f64b0df1a7bb4a17d0ad734c321623e246bb0b5aaa08e8e7ac42b74ba83c70a8ca80068400be6adc3f4b01ba1050b54e6e4cf72fb567fbd27b74b2bfa7b7cabc6938851c13c6df7d5aaca79afd89b5e925379b959c7929ddfa3399695343f435772d70e5cfa3550377d23f50011ad5657e94c464cd43eb85496fd3b03bcb2d9278ceb432194d9893ffa747dfe85309f256c910e31e81dcd3cd8a13744fc2874737a2ff34bf8c89f15da7cc0853434117d744e30360b38ef1a063f9ee506f048e9980054e6c5c5688d04ece6067ac55bccc9a7773a2c4e21c039d153622130faff9fd675d64ad7284bd011b9b224713a721b4b731cf342357642a1a0bb846f5be443b7e72e9825b5f3a078c6ae09e4512dd93a5be1af13a49e6a33938509d3557aecf2356ac2329871b662a99cf3fd2486b064e7e6f90c1f8d632186a8bda338b02d45da4ea9041d42a23f40b93346dddc473a9f1a3d9f0285b7e48cbb87bc34d44b090a5e2aaf4764a10a44168f1719eff0b0d9bc1ce07750af4c21d0c67eae0799e91328c8b14869e4edd255a41735a2b1818aa9d3b271ba757af010ae6dbad89aa0d8f5b6f8ef3917adcedf247ffcf9ade407dfb50948aa97077a195b5f6eeff443be20f383aa8ebbb4b0f2e888cb7cde9ec09177f4576576f088430e4a61d352607113ce7118f2d8a111469bd5e8236ac0e545cacef326fe313f33963c9a697019602fae8f8899f9862c7", 0x589, 0xc001, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="d6596ece0bc36e30d237e849", 0xc, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 00:11:37 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f4634418dd25d766070") r1 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r1, &(0x7f0000f6fff0)={0x2, 0x4e23, @dev}, 0x10) listen(r1, 0x11000000000b) r2 = accept(r1, &(0x7f0000000140)=ANY=[], &(0x7f0000123000)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0x10, "383cba1dfe8ae052a6256ada475db531"}, &(0x7f0000000000)=0x18) 00:11:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x24, 0x0, 0x401, 0x0, 0x0, {}, [@typed={0xc, 0x28, @u64}, @nested={0x4}]}, 0x24}}, 0x0) 00:11:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x40030000000000, 0x0, r1, 0xf0ffff, 0xffffff7f}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0xff8e}}, 0x0) 00:11:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x24, 0x0, 0x401, 0x0, 0x0, {}, [@typed={0xc, 0x28, @u64}, @nested={0x4}]}, 0x24}}, 0x0) [ 217.138792] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:11:37 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f4634418dd25d766070") r1 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r1, &(0x7f0000f6fff0)={0x2, 0x4e23, @dev}, 0x10) listen(r1, 0xa) r2 = accept(r1, &(0x7f0000000140)=ANY=[], &(0x7f0000123000)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6}, &(0x7f00000000c0)=0x90) 00:11:38 executing program 1: r0 = socket(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r1, &(0x7f0000000000), 0xfdb0, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) munlockall() ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 00:11:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x24, 0x0, 0x401, 0x0, 0x0, {}, [@typed={0xc, 0x28, @u64}, @nested={0x4}]}, 0x24}}, 0x0) 00:11:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x40030000000000, 0x0, r1, 0xf0ffff, 0xffffff7f}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0xff8e}}, 0x0) 00:11:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'lo\x00'}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="000000000c000000000000000800010073667100480000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 00:11:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha1)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240), 0x110) accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x6f70aed008c7a91) 00:11:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) unshare(0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') mount(&(0x7f000000a000), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000003c0)) mount(&(0x7f00000006c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)="18765468f7c38d", 0x100000, &(0x7f0000000400)) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000040), &(0x7f0000000180)) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='.'], &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='vfat\x00', 0x2801080, 0x0) 00:11:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="280000002c000104000000000000007a99455fa5527d6c0000000000000000000000000000000000890aff370b25b92f48c08dc81b9ba84042126022f1ba4f4f13c9f1d89fa9b9c7fc9ccc0dc1325d42149b1523fc808ae53f847884ab8f4f58fc71b23fcb472ffbb3fb795526ecd4c587761c00c00e788cd7b0880a746dcab208583713286505ca456f97751f3932ff21e6f6c86b"], 0x1}}, 0x40000) syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x2, 0x2) 00:11:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd4(r1, &(0x7f0000000000)={0xffff}, 0x8, 0x80800) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x4, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000300), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x20, 0xe8ca, 'bcsf0\x00', 'bond_slave_0\x00', 'gre0\x00', 'gretap0\x00', @remote, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @dev={[], 0x18}, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0xa0, 0xd0, 0x108, [@connlabel={'connlabel\x00', 0x8, {{0x4, 0x1}}}]}, [@common=@STANDARD={'\x00', 0x8}]}, @common=@mark={'mark\x00', 0x10, {{0xffffffc0, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x69, 0xe808, 'erspan0\x00', 'irlan0\x00', 'veth1_to_team\x00', 'ipddp0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0x0, 0x2ff, 0x0, 0xff], @random="b913433c9cac", [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], 0x70, 0xa8, 0xd8}, [@common=@mark={'mark\x00', 0x10, {{0xffffffd0, 0xffffffffffffffff}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{{{0x1b, 0x0, 0x0, 'syzkaller1\x00', 'nr0\x00', 'gretap0\x00', 'bridge_slave_0\x00', @dev, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @remote, [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x3a8) [ 218.222573] hrtimer: interrupt took 35114 ns 00:11:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x24, 0x2c, 0x0, 0x0, 0x0, {}, [@typed={0xc, 0x28, @u64}, @nested={0x4}]}, 0x24}}, 0x0) [ 218.294219] IPVS: ftp: loaded support on port[0] = 21 00:11:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x40030000000000, 0x0, 0x0, 0xf0ffff, 0xffffff7f}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0xff8e}}, 0x0) 00:11:38 executing program 3: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@local, @broadcast, @multicast1}, &(0x7f0000000200)=0xc) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000002c0), 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$apparmor_current(r0, &(0x7f0000000140)=@hat={'changehat '}, 0x199) [ 218.318140] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 00:11:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f00000005c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 00:11:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) 00:11:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x24, 0x2c, 0x0, 0x0, 0x0, {}, [@typed={0xc, 0x28, @u64}, @nested={0x4}]}, 0x24}}, 0x0) 00:11:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x40030000000000, 0x0, 0x0, 0xf0ffff, 0xffffff7f}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0xff8e}}, 0x0) 00:11:38 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040), 0xfb01cbdd028b9044) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x2b, &(0x7f0000000540)={{{@in6=@loopback, @in6}}, {{@in=@loopback}, 0x0, @in=@loopback}}, 0xe8) 00:11:38 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket(0x40000000002, 0x2000000000000003, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bond0\x00', 0x10) sendto$unix(r1, &(0x7f0000000080), 0x640, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x63) [ 218.469651] AppArmor: change_hat: Invalid input, NULL hat and NULL magic [ 218.501762] IPVS: ftp: loaded support on port[0] = 21 [ 218.594636] raw_sendmsg: syz-executor3 forgot to set AF_INET. Fix it! 00:11:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x24, 0x2c, 0x0, 0x0, 0x0, {}, [@typed={0xc, 0x28, @u64}, @nested={0x4}]}, 0x24}}, 0x0) 00:11:39 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x40030000000000, 0x0, 0x0, 0xf0ffff, 0xffffff7f}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0xff8e}}, 0x0) 00:11:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) unshare(0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') mount(&(0x7f000000a000), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000003c0)) mount(&(0x7f00000006c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)="18765468f7c38d", 0x100000, &(0x7f0000000400)) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000040), &(0x7f0000000180)) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='.'], &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='vfat\x00', 0x2801080, 0x0) 00:11:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x17eef720ddd9e742, &(0x7f0000000180)) 00:11:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x20, 0x2c, 0x401, 0x0, 0x0, {}, [@typed={0xc, 0x28, @u64}]}, 0x20}}, 0x0) 00:11:39 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x1c4, 0x4) recvfrom$packet(r0, &(0x7f0000000500)=""/199, 0xc7, 0x0, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x8001, 0x6, @remote}, 0x14) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000000), 0x4) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000480)={0x0, 0x0, 0x0, 0xfe}) r1 = accept4(0xffffffffffffffff, &(0x7f0000000c00)=@nfc_llcp, &(0x7f0000000c80)=0x80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000d00)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000e00)={&(0x7f0000000cc0), 0xc, &(0x7f0000000dc0)={&(0x7f0000000740)=ANY=[@ANYBLOB='H\x00\x00\x00'], 0x1}}, 0x14) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000680)={0x2, &(0x7f0000000400)=[{}, {0x0, 0x3, 0x0, 0x9}]}, 0x10) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000008c0)=""/215, &(0x7f0000000200)=0xd7) ioctl$sock_SIOCGIFINDEX(r0, 0x8906, &(0x7f0000001900)={'teql0\x00'}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000002c0)={@dev, @dev, @mcast1, 0x0, 0x0, 0x0, 0x400, 0x0, 0x2}) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000a00)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB='4\x00\x00', @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x800}, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000006c0), &(0x7f0000000700)=0x4) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x203}, 0xc, &(0x7f0000000340)={&(0x7f0000000040)=ANY=[]}, 0x1, 0x0, 0x0, 0x44010}, 0x0) [ 218.873592] IPVS: ftp: loaded support on port[0] = 21 00:11:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000140)) 00:11:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x20, 0x2c, 0x401, 0x0, 0x0, {}, [@typed={0xc, 0x28, @u64}]}, 0x20}}, 0x0) 00:11:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) sendfile(r2, r1, &(0x7f0000000140)=0x10, 0x7) 00:11:39 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x40030000000000, 0x0, r0, 0xf0ffff, 0xffffff7f}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0xff8e}}, 0x0) 00:11:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) unshare(0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') mount(&(0x7f000000a000), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000003c0)) mount(&(0x7f00000006c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)="18765468f7c38d", 0x100000, &(0x7f0000000400)) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000040), &(0x7f0000000180)) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='.'], &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='vfat\x00', 0x2801080, 0x0) 00:11:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x20, 0x2c, 0x401, 0x0, 0x0, {}, [@typed={0xc, 0x28, @u64}]}, 0x20}}, 0x0) [ 219.417052] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 00:11:39 executing program 1: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000580)) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000400)=@ipv4_getnetconf={0x14, 0x52, 0x103}, 0x14}}, 0x0) 00:11:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x40030000000000, 0x0, r1, 0xf0ffff, 0xffffff7f}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0xff8e}}, 0x0) [ 219.458174] IPVS: ftp: loaded support on port[0] = 21 00:11:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x18, 0x2c, 0x401, 0x0, 0x0, {}, [@nested={0x4}]}, 0x18}}, 0x0) 00:11:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x40030000000000, 0x0, r1, 0xf0ffff, 0xffffff7f}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0xff8e}}, 0x0) 00:11:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-clmulni\x00'}, 0x58) accept4(r0, 0x0, &(0x7f0000000040), 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384-generic\x00'}, 0x58) 00:11:40 executing program 3: pipe(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000200)='(', 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], 0x1000) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000000)=0x4, 0x4) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 00:11:40 executing program 1: r0 = socket$inet6(0xa, 0x100000002, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 00:11:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x18, 0x2c, 0x401, 0x0, 0x0, {}, [@nested={0x4}]}, 0x18}}, 0x0) 00:11:40 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000280), 0x10) recvmsg(r0, &(0x7f0000000600)={&(0x7f0000000480)=@hci, 0x80, &(0x7f0000000040)}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f00000001c0)={'bpq0\x00'}) 00:11:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x40030000000000, 0x0, r1, 0xf0ffff, 0xffffff7f}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0xff8e}}, 0x0) 00:11:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) unshare(0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') mount(&(0x7f000000a000), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000003c0)) mount(&(0x7f00000006c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)="18765468f7c38d", 0x100000, &(0x7f0000000400)) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000040), &(0x7f0000000180)) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='.'], &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='vfat\x00', 0x2801080, 0x0) 00:11:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x18, 0x2c, 0x401, 0x0, 0x0, {}, [@nested={0x4}]}, 0x18}}, 0x0) 00:11:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x24, 0x2c, 0x401, 0x0, 0x0, {}, [@typed={0xc, 0x0, @u64}, @nested={0x4}]}, 0x24}}, 0x0) 00:11:40 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x0, 0xfffffffffffffffd}, 0x4) 00:11:40 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x40030000000000, 0x0, r1, 0xf0ffff, 0xffffff7f}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0xff8e}}, 0x0) 00:11:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x24, 0x2c, 0x401, 0x0, 0x0, {}, [@typed={0xc, 0x0, @u64}, @nested={0x4}]}, 0x24}}, 0x0) 00:11:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'bridge_slave_1\x00', 0x0}) r2 = socket$inet6(0xa, 0x803, 0x10000000003) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000040)={@remote, r1}, 0x14) 00:11:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x24, 0x2c, 0x401, 0x0, 0x0, {}, [@typed={0xc, 0x0, @u64}, @nested={0x4}]}, 0x24}}, 0x0) 00:11:40 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000300)=0x116, 0x4) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) 00:11:40 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x40030000000000, 0x0, r1, 0xf0ffff, 0xffffff7f}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0xff8e}}, 0x0) 00:11:40 executing program 2: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) 00:11:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f0000012ff0)={&(0x7f0000000040)={0x24, 0x2c, 0x401, 0x0, 0x0, {}, [@typed={0xc, 0x0, @u64}, @nested={0x4}]}, 0x24}}, 0x0) [ 220.100703] IPVS: ftp: loaded support on port[0] = 21 [ 220.176287] ================================================================== [ 220.183693] BUG: KASAN: use-after-free in tcf_block_find+0x9d1/0xb90 [ 220.190192] Read of size 4 at addr ffff8801d78754f8 by task syz-executor3/7858 [ 220.197563] [ 220.199208] CPU: 0 PID: 7858 Comm: syz-executor3 Not tainted 4.19.0-rc5-next-20180928+ #84 [ 220.207616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.216969] Call Trace: [ 220.219545] dump_stack+0x1d3/0x2c4 [ 220.223160] ? dump_stack_print_info.cold.2+0x52/0x52 [ 220.228338] ? printk+0xa7/0xcf [ 220.231603] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 220.236348] print_address_description.cold.8+0x9/0x1ff [ 220.241699] kasan_report.cold.9+0x242/0x309 [ 220.246103] ? tcf_block_find+0x9d1/0xb90 [ 220.250274] __asan_report_load4_noabort+0x14/0x20 [ 220.255199] tcf_block_find+0x9d1/0xb90 [ 220.259159] tc_new_tfilter+0x497/0x1d10 [ 220.263210] ? mutex_trylock+0x2b0/0x2b0 [ 220.267259] ? tc_del_tfilter+0x1290/0x1290 [ 220.271568] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 220.277033] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 220.282582] ? apparmor_capable+0x355/0x6c0 [ 220.286902] ? __netlink_lookup+0x5b6/0xa90 [ 220.291208] ? apparmor_cred_transfer+0x590/0x590 [ 220.296054] ? rtnetlink_rcv_msg+0x3d3/0xc20 [ 220.300483] ? lock_downgrade+0x900/0x900 [ 220.304637] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 220.310160] ? rtnl_get_link+0x170/0x370 [ 220.314210] ? tc_del_tfilter+0x1290/0x1290 [ 220.318515] rtnetlink_rcv_msg+0x46a/0xc20 [ 220.322737] ? rtnetlink_put_metrics+0x690/0x690 [ 220.327481] netlink_rcv_skb+0x172/0x440 [ 220.331544] ? rtnetlink_put_metrics+0x690/0x690 [ 220.336302] ? netlink_ack+0xb80/0xb80 [ 220.340180] rtnetlink_rcv+0x1c/0x20 [ 220.343967] netlink_unicast+0x5a5/0x760 [ 220.348016] ? netlink_attachskb+0x9a0/0x9a0 [ 220.352407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.357964] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 220.362981] netlink_sendmsg+0xa18/0xfc0 [ 220.367025] ? netlink_unicast+0x760/0x760 [ 220.371244] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 220.376161] ? apparmor_socket_sendmsg+0x29/0x30 [ 220.380900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.386458] ? security_socket_sendmsg+0x94/0xc0 [ 220.391203] ? netlink_unicast+0x760/0x760 [ 220.395462] sock_sendmsg+0xd5/0x120 [ 220.399164] ___sys_sendmsg+0x7fd/0x930 [ 220.403127] ? copy_msghdr_from_user+0x580/0x580 [ 220.407872] ? __fd_install+0x2b5/0x8f0 [ 220.411832] ? __fget_light+0x2e9/0x430 [ 220.415790] ? fget_raw+0x20/0x20 [ 220.419231] ? lock_downgrade+0x900/0x900 [ 220.423362] ? lock_release+0x970/0x970 [ 220.427359] ? check_same_owner+0x330/0x330 [ 220.431670] ? posix_ktime_get_ts+0x15/0x20 [ 220.435982] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 220.441437] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 220.446980] ? sockfd_lookup_light+0xc5/0x160 [ 220.451467] __sys_sendmsg+0x11d/0x280 [ 220.455341] ? __ia32_sys_shutdown+0x80/0x80 [ 220.459739] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 220.465263] ? put_timespec64+0x10f/0x1b0 [ 220.469400] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 220.474860] __x64_sys_sendmsg+0x78/0xb0 [ 220.478934] do_syscall_64+0x1b9/0x820 [ 220.482811] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 220.488165] ? syscall_return_slowpath+0x5e0/0x5e0 [ 220.493094] ? trace_hardirqs_on_caller+0x310/0x310 [ 220.498096] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 220.503110] ? recalc_sigpending_tsk+0x180/0x180 [ 220.507851] ? kasan_check_write+0x14/0x20 [ 220.512071] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 220.516905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.522078] RIP: 0033:0x457579 [ 220.525254] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 220.544149] RSP: 002b:00007f7c6f7b2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 220.551839] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 220.559092] RDX: 0000000000000000 RSI: 0000000020005000 RDI: 0000000000000003 [ 220.566345] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 220.573595] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c6f7b36d4 [ 220.580846] R13: 00000000004c3891 R14: 00000000004d56d0 R15: 00000000ffffffff [ 220.588098] [ 220.589705] Allocated by task 7063: [ 220.593315] save_stack+0x43/0xd0 [ 220.596754] kasan_kmalloc+0xc7/0xe0 [ 220.600456] __kmalloc_node+0x47/0x70 [ 220.604240] qdisc_alloc+0x10f/0xb50 [ 220.607935] qdisc_create_dflt+0x7a/0x1e0 [ 220.612067] dev_activate+0x82f/0xcb0 [ 220.615853] __dev_open+0x2cb/0x410 [ 220.619487] __dev_change_flags+0x730/0x9b0 [ 220.623821] dev_change_flags+0x89/0x150 [ 220.627869] do_setlink+0xb5f/0x3f20 [ 220.631565] rtnl_newlink+0x136f/0x1d40 [ 220.635522] rtnetlink_rcv_msg+0x46a/0xc20 [ 220.639752] netlink_rcv_skb+0x172/0x440 [ 220.643798] rtnetlink_rcv+0x1c/0x20 [ 220.647493] netlink_unicast+0x5a5/0x760 [ 220.651538] netlink_sendmsg+0xa18/0xfc0 [ 220.655582] sock_sendmsg+0xd5/0x120 [ 220.659279] ___sys_sendmsg+0x7fd/0x930 [ 220.663239] __sys_sendmsg+0x11d/0x280 [ 220.667107] __x64_sys_sendmsg+0x78/0xb0 [ 220.671151] do_syscall_64+0x1b9/0x820 [ 220.675039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.680205] [ 220.681818] Freed by task 7846: [ 220.685103] save_stack+0x43/0xd0 [ 220.688552] __kasan_slab_free+0x102/0x150 [ 220.692771] kasan_slab_free+0xe/0x10 [ 220.696556] kfree+0xcf/0x230 [ 220.699649] qdisc_free+0x89/0x100 [ 220.703172] qdisc_free_cb+0x19/0x20 [ 220.706872] rcu_process_callbacks+0xff9/0x1ad0 [ 220.711522] __do_softirq+0x30b/0xb03 [ 220.715306] [ 220.716935] The buggy address belongs to the object at ffff8801d78754c0 [ 220.716935] which belongs to the cache kmalloc-2k of size 2048 [ 220.729587] The buggy address is located 56 bytes inside of [ 220.729587] 2048-byte region [ffff8801d78754c0, ffff8801d7875cc0) [ 220.741461] The buggy address belongs to the page: [ 220.746396] page:ffffea00075e1d00 count:1 mapcount:0 mapping:ffff8801da800c40 index:0x0 compound_mapcount: 0 [ 220.756348] flags: 0x2fffc0000010200(slab|head) [ 220.761016] raw: 02fffc0000010200 ffffea0007087088 ffffea0007366508 ffff8801da800c40 [ 220.768880] raw: 0000000000000000 ffff8801d78743c0 0000000100000003 0000000000000000 [ 220.776740] page dumped because: kasan: bad access detected [ 220.782426] [ 220.784054] Memory state around the buggy address: [ 220.788976] ffff8801d7875380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 220.796315] ffff8801d7875400: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 220.803655] >ffff8801d7875480: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 220.810992] ^ [ 220.818246] ffff8801d7875500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 220.825595] ffff8801d7875580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 220.832933] ================================================================== [ 220.857189] Kernel panic - not syncing: panic_on_warn set ... [ 220.857189] [ 220.864581] CPU: 1 PID: 7858 Comm: syz-executor3 Tainted: G B 4.19.0-rc5-next-20180928+ #84 [ 220.874350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.883682] Call Trace: [ 220.886267] dump_stack+0x1d3/0x2c4 [ 220.889894] ? dump_stack_print_info.cold.2+0x52/0x52 [ 220.895084] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 220.899850] panic+0x238/0x4e7 [ 220.903032] ? add_taint.cold.5+0x16/0x16 [ 220.907163] ? preempt_schedule+0x4d/0x60 [ 220.911299] ? ___preempt_schedule+0x16/0x18 [ 220.915694] ? trace_hardirqs_on+0xb4/0x310 [ 220.920004] kasan_end_report+0x47/0x4f [ 220.923974] kasan_report.cold.9+0x76/0x309 [ 220.928279] ? tcf_block_find+0x9d1/0xb90 [ 220.933282] __asan_report_load4_noabort+0x14/0x20 [ 220.938224] tcf_block_find+0x9d1/0xb90 [ 220.942183] tc_new_tfilter+0x497/0x1d10 [ 220.946235] ? mutex_trylock+0x2b0/0x2b0 [ 220.950285] ? tc_del_tfilter+0x1290/0x1290 [ 220.954619] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 220.960110] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 220.965657] ? apparmor_capable+0x355/0x6c0 [ 220.969981] ? __netlink_lookup+0x5b6/0xa90 [ 220.974297] ? apparmor_cred_transfer+0x590/0x590 [ 220.979128] ? rtnetlink_rcv_msg+0x3d3/0xc20 [ 220.983527] ? lock_downgrade+0x900/0x900 [ 220.987675] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 220.993219] ? rtnl_get_link+0x170/0x370 [ 220.997285] ? tc_del_tfilter+0x1290/0x1290 [ 221.001624] rtnetlink_rcv_msg+0x46a/0xc20 [ 221.005848] ? rtnetlink_put_metrics+0x690/0x690 [ 221.010604] netlink_rcv_skb+0x172/0x440 [ 221.014655] ? rtnetlink_put_metrics+0x690/0x690 [ 221.019404] ? netlink_ack+0xb80/0xb80 [ 221.023283] rtnetlink_rcv+0x1c/0x20 [ 221.026983] netlink_unicast+0x5a5/0x760 [ 221.031035] ? netlink_attachskb+0x9a0/0x9a0 [ 221.035434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 221.040967] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 221.045978] netlink_sendmsg+0xa18/0xfc0 [ 221.050029] ? netlink_unicast+0x760/0x760 [ 221.054253] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 221.059168] ? apparmor_socket_sendmsg+0x29/0x30 [ 221.063910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 221.069437] ? security_socket_sendmsg+0x94/0xc0 [ 221.074182] ? netlink_unicast+0x760/0x760 [ 221.078404] sock_sendmsg+0xd5/0x120 [ 221.082110] ___sys_sendmsg+0x7fd/0x930 [ 221.086095] ? copy_msghdr_from_user+0x580/0x580 [ 221.090849] ? __fd_install+0x2b5/0x8f0 [ 221.094816] ? __fget_light+0x2e9/0x430 [ 221.098775] ? fget_raw+0x20/0x20 [ 221.102230] ? lock_downgrade+0x900/0x900 [ 221.106364] ? lock_release+0x970/0x970 [ 221.110331] ? check_same_owner+0x330/0x330 [ 221.114638] ? posix_ktime_get_ts+0x15/0x20 [ 221.118969] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 221.124423] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 221.129957] ? sockfd_lookup_light+0xc5/0x160 [ 221.134475] __sys_sendmsg+0x11d/0x280 [ 221.138362] ? __ia32_sys_shutdown+0x80/0x80 [ 221.142761] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 221.148288] ? put_timespec64+0x10f/0x1b0 [ 221.152457] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 221.157930] __x64_sys_sendmsg+0x78/0xb0 [ 221.162043] do_syscall_64+0x1b9/0x820 [ 221.165935] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 221.171294] ? syscall_return_slowpath+0x5e0/0x5e0 [ 221.176213] ? trace_hardirqs_on_caller+0x310/0x310 [ 221.181244] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 221.186255] ? recalc_sigpending_tsk+0x180/0x180 [ 221.190999] ? kasan_check_write+0x14/0x20 [ 221.195225] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 221.200061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.205236] RIP: 0033:0x457579 [ 221.208418] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 221.227314] RSP: 002b:00007f7c6f7b2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 221.235028] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 221.242302] RDX: 0000000000000000 RSI: 0000000020005000 RDI: 0000000000000003 [ 221.249572] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 221.256841] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c6f7b36d4 [ 221.264094] R13: 00000000004c3891 R14: 00000000004d56d0 R15: 00000000ffffffff [ 221.272364] Kernel Offset: disabled [ 221.275989] Rebooting in 86400 seconds..