Warning: Permanently added '10.128.0.206' (ECDSA) to the list of known hosts. 2019/09/30 09:24:21 fuzzer started [ 51.819270] audit: type=1400 audit(1569835461.795:36): avc: denied { map } for pid=7565 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/09/30 09:24:23 dialing manager at 10.128.0.105:33829 2019/09/30 09:24:23 syscalls: 2489 2019/09/30 09:24:23 code coverage: enabled 2019/09/30 09:24:23 comparison tracing: enabled 2019/09/30 09:24:23 extra coverage: extra coverage is not supported by the kernel 2019/09/30 09:24:23 setuid sandbox: enabled 2019/09/30 09:24:23 namespace sandbox: enabled 2019/09/30 09:24:23 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/30 09:24:23 fault injection: enabled 2019/09/30 09:24:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/30 09:24:23 net packet injection: enabled 2019/09/30 09:24:23 net device setup: enabled 09:27:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="1c0000005e001f0214584707f9f4ffffff000000000000001f000000", 0x1c) [ 226.498260] audit: type=1400 audit(1569835636.475:37): avc: denied { map } for pid=7584 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=3963 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 226.588763] IPVS: ftp: loaded support on port[0] = 21 09:27:16 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="1c0000005e001f0214584707f9f4ffffff000000000000001f000000", 0x1c) [ 226.702441] chnl_net:caif_netlink_parms(): no params data found [ 226.805511] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.830004] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.837832] device bridge_slave_0 entered promiscuous mode [ 226.858107] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.866212] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.874310] device bridge_slave_1 entered promiscuous mode [ 226.898060] bond0: Enslaving bond_slave_0 as an active interface with an up link 09:27:16 executing program 2: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = memfd_create(&(0x7f0000000080)='\xae\'\xd1\x93E=i\x86\a\xf1\x17\xfa\x861\x13uc\xb2\x06\x93i\x878\xb1\xf0\x8c\xae\xd6\xdb*\xcf7\xc7\\^\xcb(\xb1L\x1f!\x16\xd3D;\bh\xb0\xce\x15Y\x8d\x9f\xad\x87C\xc6A\x03.\xd8\nH\x9f0\x00\x00\x00\x00\x00\x00\xde+^\xc4\x90QA\x94\xda\nbS\xc8\xd5 bx\xe7\x11r@\x94\xffb0\xbe\x1e3\xc6\xab\xa8\x1b', 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)=ANY=[], 0x291) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) write$P9_RWRITE(r0, &(0x7f00000000c0)={0xfffffffffffffe37}, 0xb) [ 226.900452] IPVS: ftp: loaded support on port[0] = 21 [ 226.912356] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 226.945357] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 226.970681] team0: Port device team_slave_0 added [ 226.977994] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 226.995096] team0: Port device team_slave_1 added [ 227.013895] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 227.037283] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 227.051569] IPVS: ftp: loaded support on port[0] = 21 09:27:17 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 227.144170] device hsr_slave_0 entered promiscuous mode [ 227.201845] device hsr_slave_1 entered promiscuous mode [ 227.273356] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 227.280793] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 227.318307] IPVS: ftp: loaded support on port[0] = 21 [ 227.339034] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.345849] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.353084] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.359943] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.376591] chnl_net:caif_netlink_parms(): no params data found 09:27:17 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\xae\'\xd1\x93E=i\x86\a\xf1\x17\xfa\x861\x13uc\xb2\x06\x93i\x878\xb1\xf0\x8c\xae\xd6\xdb*\xcf7\xc7\\^\xcb(\xb1L\x1f!\x16\xd3D;\bh\xb0\xce\x15Y\x8d\x9f\xad\x87C\xc6A\x03.\xd8\nH\x9f0\x00\x00\x00\x00\x00\x00\xde+^\xc4\x90QA\x94\xda\nbS\xc8\xd5 bx\xe7\x11r@\x94\xffb0\xbe\x1e3\xc6\xab\xa8\x1b', 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000080)=ANY=[], 0x291) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000100)) [ 227.484525] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.491018] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.499567] device bridge_slave_0 entered promiscuous mode [ 227.545361] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.554857] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.562549] device bridge_slave_1 entered promiscuous mode [ 227.593559] chnl_net:caif_netlink_parms(): no params data found [ 227.699829] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.709605] IPVS: ftp: loaded support on port[0] = 21 [ 227.723284] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 227.729420] 8021q: adding VLAN 0 to HW filter on device bond0 09:27:17 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8001103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="afa6d9dbf025faeae83b657c24d55953e90019", 0x13}, {0x0}, {0x0}, {0x0}], 0x4, 0x2) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0) [ 227.763534] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.773129] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.782478] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 227.807875] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 227.837446] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 227.878449] chnl_net:caif_netlink_parms(): no params data found [ 227.896042] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 227.914540] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.921448] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.928834] device bridge_slave_0 entered promiscuous mode [ 227.939303] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.946700] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.953816] device bridge_slave_1 entered promiscuous mode [ 227.960349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.967453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.975885] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 227.984234] team0: Port device team_slave_0 added [ 228.006391] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 228.012777] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.019693] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 228.027711] team0: Port device team_slave_1 added [ 228.033976] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 228.062854] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 228.075041] IPVS: ftp: loaded support on port[0] = 21 [ 228.090640] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 228.100108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 228.124915] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.132010] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.139212] device bridge_slave_0 entered promiscuous mode [ 228.147029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.156178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.164400] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.170830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.179016] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 228.232940] device hsr_slave_0 entered promiscuous mode [ 228.270436] device hsr_slave_1 entered promiscuous mode [ 228.310616] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 228.319633] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 228.327839] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.334358] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.342131] device bridge_slave_1 entered promiscuous mode [ 228.366437] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 228.383104] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.394265] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 228.402556] team0: Port device team_slave_0 added [ 228.409580] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 228.426439] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.435295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.443332] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.449674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.464443] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 228.472022] team0: Port device team_slave_1 added [ 228.488922] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 228.497082] team0: Port device team_slave_0 added [ 228.505030] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 228.512652] team0: Port device team_slave_1 added [ 228.520488] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 228.529982] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 228.539305] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 228.546855] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 228.573231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.587851] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 228.595598] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 228.608559] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 228.647183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.692637] device hsr_slave_0 entered promiscuous mode [ 228.750241] device hsr_slave_1 entered promiscuous mode [ 228.792918] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 228.852945] device hsr_slave_0 entered promiscuous mode [ 228.900290] device hsr_slave_1 entered promiscuous mode [ 228.941020] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 228.947815] chnl_net:caif_netlink_parms(): no params data found [ 228.959769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.968285] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.976694] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.984296] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 228.995586] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 229.003411] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 229.017033] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 229.027239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.035777] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.043776] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.051469] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.059747] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 229.092737] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 229.118336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.126497] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.137858] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 229.144467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.183139] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.189610] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.197920] device bridge_slave_0 entered promiscuous mode [ 229.205944] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.212878] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.220736] device bridge_slave_1 entered promiscuous mode [ 229.231606] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 229.238915] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 229.262489] chnl_net:caif_netlink_parms(): no params data found [ 229.282033] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 229.292001] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 229.338333] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 229.358214] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 229.368317] team0: Port device team_slave_0 added [ 229.395914] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.402913] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.410268] device bridge_slave_0 entered promiscuous mode [ 229.417272] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 229.425248] team0: Port device team_slave_1 added [ 229.432400] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.438959] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 229.453693] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.461602] audit: type=1400 audit(1569835639.455:38): avc: denied { associate } for pid=7585 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 229.470926] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.492628] device bridge_slave_1 entered promiscuous mode [ 229.499803] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 229.552111] device hsr_slave_0 entered promiscuous mode [ 229.600399] device hsr_slave_1 entered promiscuous mode [ 229.650773] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 229.667747] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 229.685222] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.709103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.727509] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.737051] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 229.747094] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 229.763993] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.773459] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.782639] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.795536] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 229.803660] team0: Port device team_slave_0 added [ 229.812778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.820629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.828283] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.839365] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 229.851032] 8021q: adding VLAN 0 to HW filter on device team0 09:27:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000049c0)=[{{0x0, 0x0, &(0x7f0000003300)=[{&(0x7f0000003040)=""/181, 0xb5}], 0x1}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f0000000540), 0x10000000000002f4) socket$packet(0x11, 0x0, 0x300) [ 229.864048] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.871574] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 229.879298] team0: Port device team_slave_1 added [ 229.886608] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.895778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.904362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.917950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.926956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.946223] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 229.954929] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.955968] hrtimer: interrupt took 25937 ns [ 229.962234] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 229.978817] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 229.987921] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 230.000300] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.008179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 09:27:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000c07e98)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@remote, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@replay_esn_val={0x1c}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x154}}, 0x0) [ 230.016284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.024604] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.031036] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.041101] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 230.064905] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 09:27:20 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000049c0)=[{{0x0, 0x0, &(0x7f0000003300)=[{&(0x7f0000003040)=""/181, 0xb5}], 0x1}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f0000000540), 0x10000000000002f4) 09:27:20 executing program 0: mkdir(&(0x7f0000000500)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file0\x00', &(0x7f0000000380)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r0, &(0x7f00000001c0)='.//ile0\x00', r0, &(0x7f0000000280)='./file2\x00') fchmodat(r0, &(0x7f0000000240)='./file2\x00', 0x0) [ 230.097308] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 230.123087] device hsr_slave_0 entered promiscuous mode 09:27:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000049c0)=[{{0x0, 0x0, &(0x7f0000003300)=[{&(0x7f0000003040)=""/181, 0xb5}], 0x1}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f0000000540), 0x10000000000002f4) socket$packet(0x11, 0x0, 0x300) bind$packet(0xffffffffffffffff, 0x0, 0x0) [ 230.190404] device hsr_slave_1 entered promiscuous mode [ 230.197049] overlayfs: conflicting lowerdir path [ 230.207179] overlayfs: conflicting lowerdir path [ 230.230860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.238308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.255865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.264463] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.270912] bridge0: port 1(bridge_slave_0) entered forwarding state 09:27:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) unlink(0x0) r4 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x54) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r4, &(0x7f0000000480), 0x2e9, 0xffd8) getsockopt$inet6_mreq(r4, 0x29, 0x0, 0x0, 0x0) getuid() [ 230.278548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.286711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.295748] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.304714] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.321575] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 230.331636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.338907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.352060] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.360328] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.366993] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.376275] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 230.385017] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.394256] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 230.402332] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 230.412102] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 230.420657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.428914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.437347] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.444806] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.452415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.460922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.468983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.492705] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 230.561985] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 230.595112] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 230.622683] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 230.639409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.655862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.670174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.680578] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.687344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.697846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.783788] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 230.794719] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 230.804656] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 230.815942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.824654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.833179] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.841970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.850123] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.858239] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 230.866206] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 230.879004] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 230.894302] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 230.903180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.911819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.919785] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.931215] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 230.941558] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 230.953888] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 230.961726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.969737] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.978128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.986699] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.995153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.003150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.011523] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.020731] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 231.034105] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 231.050264] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 231.058815] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 231.067508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.076349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.084784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.093746] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.102303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.110319] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.120541] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 231.132384] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 231.144206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.154581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.163849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.173607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 09:27:21 executing program 0: socket$inet_sctp(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x2b8}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe80, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa29a16f291d36a48e93100ffff81", 0x0, 0x100, 0xf2ffffff}, 0x28) [ 231.186972] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 231.193786] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 231.209361] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 231.227364] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 231.236103] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 231.249004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 231.270008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.277738] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.305256] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.322325] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 231.334149] audit: type=1400 audit(1569835641.315:39): avc: denied { prog_load } for pid=7644 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 231.372589] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 231.378702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 231.391034] audit: type=1400 audit(1569835641.375:40): avc: denied { prog_run } for pid=7644 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 231.394584] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.436368] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.459833] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.481715] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 231.498713] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 231.523427] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 231.535223] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 231.558758] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.573516] audit: type=1400 audit(1569835641.555:41): avc: denied { map } for pid=7652 comm="syz-executor.2" path=2F6D656D66643AAE27D193453D698607F117FA8631137563B20693698738B1F08CAED6DB2ACF37C75C5ECB28B14C1F2116D3443B0868B0CE15598D9FAD8743C641032ED80A489F30202864656C6574656429 dev="tmpfs" ino=28098 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 231.614864] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 231.622580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.631445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.651500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.664002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.678602] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 231.686663] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.698761] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 231.713626] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 231.720985] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.727714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.737458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.746248] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.752752] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.760854] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.770593] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 231.783688] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 231.798382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.817165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.826963] bridge0: port 2(bridge_slave_1) entered blocking state 09:27:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0xa, 0x1e52}]}]}}, &(0x7f0000000080)=""/236, 0x32, 0xec, 0x1}, 0x20) 09:27:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0x0, 0x2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x8) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) [ 231.833404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.846669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.854385] input: syz1 as /devices/virtual/input/input5 [ 231.855675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.868793] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.875487] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.932860] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 231.942970] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 231.956519] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 231.964247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.973047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 231.983669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.993593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.002521] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.009053] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.016310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.028366] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 232.038792] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 232.047582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.057314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.068986] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 232.076625] input: syz1 as /devices/virtual/input/input6 [ 232.083731] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 232.091680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.106911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.116505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.125255] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.136990] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 232.146986] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 232.154437] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 232.162502] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 232.170337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.178872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.186780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.195450] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.208139] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 232.218491] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready 09:27:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) open(0x0, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) socket$key(0xf, 0x3, 0x2) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) unlink(0x0) r3 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x54) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r3, &(0x7f0000000480), 0x2e9, 0xffd8) [ 232.233208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 232.241793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.257025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 232.265942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.283028] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 232.293150] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 232.319131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.332913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.341949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.350006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.360620] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 232.368751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.386923] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 232.396893] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.419812] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 232.426842] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 232.448135] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 232.460512] 8021q: adding VLAN 0 to HW filter on device batadv0 09:27:22 executing program 4: [ 232.663143] audit: type=1400 audit(1569835642.635:42): avc: denied { create } for pid=7678 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 09:27:22 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) open(0x0, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x54) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r3, &(0x7f0000000480), 0x2e9, 0xffd8) 09:27:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x5, 0x8002) openat$cgroup_type(r0, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x9, 0x8, [0x2f, 0x8, 0x3, 0x3, 0xcd, 0x3, 0xffffffff00000000, 0x3c]}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x7, 0x20}, &(0x7f00000001c0)=0x8) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x826, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0xffffe27}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1a043, 0x0) bind$inet(r1, &(0x7f0000000300)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000280)=0x1, 0x4) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 09:27:22 executing program 5: 09:27:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xff7d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000080)="66b829018ec0b9800000c00f3235002000000f3066baf80cb8c8f61a8eef66bafc0ced0f787e0036400fc75a00c4e1f9e601c4018575504f0f87d485a71b64440f01c43e662666470f38804185", 0x4d}], 0x1, 0x0, 0x0, 0xfffffffffffffe96) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x40, 0x0, 0xfffffffffffffdd4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:27:22 executing program 4: 09:27:22 executing program 4: [ 232.849180] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 09:27:22 executing program 4: 09:27:22 executing program 5: [ 232.896102] audit: type=1400 audit(1569835642.875:43): avc: denied { create } for pid=7687 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 09:27:22 executing program 4: [ 233.026772] audit: type=1400 audit(1569835642.905:44): avc: denied { write } for pid=7687 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 09:27:23 executing program 4: 09:27:23 executing program 3: 09:27:23 executing program 5: [ 233.117351] audit: type=1400 audit(1569835642.905:45): avc: denied { read } for pid=7687 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 09:27:23 executing program 2: 09:27:23 executing program 4: 09:27:23 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) socket$kcm(0xa, 0x20000000000003, 0x11) socket$kcm(0x10, 0x2, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, 0x0, 0x0) 09:27:23 executing program 1: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="010000000028"], 0x1, 0x0) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/28}, 0x24, 0x1, 0x2000) 09:27:23 executing program 5: socket$key(0xf, 0x3, 0x2) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000140)=0x7, 0xfffffffffffffee7) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_int(r0, 0x29, 0x42, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) wait4(0x0, 0x0, 0x0, 0x0) 09:27:23 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000040), &(0x7f00000000c0)=0x80) 09:27:23 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4064, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:27:23 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x100000000000012) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2, 0x4e23, @loopback=0xac1414e0}]}, &(0x7f0000000080)=0x10) 09:27:23 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RLERRORu(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="19"], 0x1) 09:27:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg$nl_generic(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000000)={0x14, 0x17, 0x101, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 09:27:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x800000000000803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="240000001a00010000000000000000000a000000000000000000000008000900", @ANYRES32], 0x24}}, 0x0) 09:27:23 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4064, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:23 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") 09:27:24 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) getegid() perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000480)={0x0, 0x0, 0x1, 0x0, [], [{}, {0xffffffff}], [[]]}) 09:27:24 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fstat(r0, 0x0) setgid(0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) r3 = syz_open_procfs(0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000480)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x278, 0x388, 0x140, 0x490, 0x0, 0x5f8, 0x5f8, 0x5f8, 0x5f8, 0x5f8, 0x6, &(0x7f0000000240), {[{{@ipv6={@mcast2, @local, [0x0, 0xff, 0x203146b8e4259381, 0x7f], [0xff00007f, 0x1fe, 0x0, 0xffffff00], 'tunl0\x00', 'bcsf0\x00', {}, {0xff}, 0x5c, 0x1, 0x0, 0xc4}, 0x0, 0x118, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @inet=@DSCP={0x28, 'DSCP\x00'}}, {{@ipv6={@ipv4={[], [], @loopback}, @empty, [0xff000000, 0xffffff00, 0x0, 0xafb958f2c91f676e], [0x0, 0xffffff00], 'ifb0\x00', 'rose0\x00', {}, {}, 0xe055b25aed13a117, 0x2, 0x1, 0x10}, 0x0, 0x110, 0x138, 0x0, {}, [@common=@hbh={0x48, 'hbh\x00', 0x0, {0x8, 0x3, 0x1, [0x0, 0x0, 0x0, 0x200, 0x1, 0x4, 0x3ff, 0x0, 0x9, 0xff7f, 0x0, 0x6, 0x800, 0x0, 0x200, 0x7fff], 0xb}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xc8, 0x110}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2c, 0x36}}}, {{@uncond, 0x0, 0xc8, 0x108}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x9, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@mcast1, @ipv4=@empty, 0x0, 0x23}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6f8) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) 09:27:24 executing program 3: creat(&(0x7f0000000000)='./bus\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000240)='./bus\x00', &(0x7f0000000280)='iso9660\x00', 0x0, 0x0) [ 234.184099] print_req_error: I/O error, dev loop3, sector 64 [ 234.191573] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 09:27:26 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0x80404518, 0x0) setsockopt$inet_buf(r0, 0x0, 0x16, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 09:27:26 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x249, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz1\x00', 0x1ff) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0) listen(0xffffffffffffffff, 0x4) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000140)=0xffffffffffffffff) sched_setaffinity(0x0, 0x3, &(0x7f0000000600)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x7, @dev={[], 0x25}}, 0x22, {0x2, 0x4e20, @empty}, 'caif0\x00'}) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x500) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00', 0x4}, 0x68) fstat(0xffffffffffffffff, &(0x7f0000000440)) 09:27:26 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") 09:27:26 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@resize_auto='resize=auto'}, {@usrjquota='usrjquota'}]}) 09:27:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() process_vm_readv(r2, &(0x7f0000000180)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f0000002800)=[{&(0x7f00000025c0)=""/148, 0x94}, {&(0x7f00000000c0)=""/15, 0xf}, {&(0x7f0000001340)=""/47, 0x2f}, {&(0x7f0000002680)=""/162, 0xa2}], 0x4, 0x0) 09:27:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000004900)={0x0, 0x0, &(0x7f00000048c0)={&(0x7f0000004840)={0x68, r1, 0x601, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3200820}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r1, 0x0, 0x70bd2a, 0x25dfdbfd, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x7, @link='broadcast-link\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x7) 09:27:26 executing program 2: pipe(&(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f00000002c0)='net/if_inet6\x00') openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/if_inet6\x00') socket(0x10, 0x20001000000003, 0x0) unshare(0x400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 09:27:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000003639405cb4aed14eb950b20000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd8e3f91", 0x3b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 236.875855] REISERFS warning (device loop4): super-6504 reiserfs_getopt: the option "usrjquota" requires an argument [ 236.875855] 09:27:26 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = dup2(r0, 0xffffffffffffff9c) lseek(r1, 0x0, 0x0) 09:27:27 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) close(r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4}, 0xc) [ 237.055208] REISERFS warning (device loop4): super-6504 reiserfs_getopt: the option "usrjquota" requires an argument [ 237.055208] 09:27:27 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") 09:27:27 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r1) dup3(r0, r1, 0x0) 09:27:27 executing program 4: 09:27:27 executing program 3: 09:27:27 executing program 2: 09:27:27 executing program 4: 09:27:27 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") 09:27:27 executing program 5: 09:27:27 executing program 2: 09:27:29 executing program 0: 09:27:29 executing program 5: 09:27:29 executing program 4: 09:27:29 executing program 2: 09:27:29 executing program 3: 09:27:29 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 09:27:30 executing program 5: 09:27:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xff7d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000080)="66b829018ec0b9800000c00f3235002000000f3066baf80cb8c8f61a8eef66bafc0ced0f787e0036400fc75a00c4e1f9e601c4018575504f0f87d485a71b64440f01c43e662666470f38804185", 0x4d}], 0x1, 0x0, 0x0, 0xfffffffffffffe96) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x40, 0x0, 0xfffffffffffffdd4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:27:30 executing program 2: 09:27:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000880)={0x20, 0x16, 0x400000000000005, 0x0, 0x0, {0x2}, [@nested={0xc, 0x1, [@typed={0x8, 0x0, @u32}]}]}, 0x20}}, 0x0) 09:27:30 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000000)) 09:27:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 09:27:30 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#!'], 0x2) prctl$PR_SET_PTRACER(0x59616d61, r0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:27:30 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 09:27:30 executing program 4: 09:27:30 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000000)) [ 240.321180] sp0: Synchronizing with TNC 09:27:30 executing program 5: [ 240.395081] ================================================================== [ 240.403083] BUG: KASAN: null-ptr-deref in kvm_write_guest_virt_system+0x64/0x90 [ 240.403099] Write of size 24 at addr 0000000000000000 by task syz-executor.3/7900 [ 240.403103] [ 240.403119] CPU: 1 PID: 7900 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 240.403129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.403134] Call Trace: 09:27:30 executing program 0: [ 240.403174] dump_stack+0x172/0x1f0 [ 240.403193] ? kvm_write_guest_virt_system+0x64/0x90 [ 240.403238] kasan_report.cold+0x199/0x2ba [ 240.419647] check_memory_region+0x123/0x190 [ 240.419664] memset+0x24/0x40 [ 240.419692] kvm_write_guest_virt_system+0x64/0x90 [ 240.419786] handle_vmread+0x7fe/0xa10 [ 240.428431] ? handle_invpcid+0xa80/0xa80 [ 240.428532] ? __lock_is_held+0xb6/0x140 [ 240.480052] ? __lock_is_held+0xb6/0x140 [ 240.480077] ? handle_invpcid+0xa80/0xa80 [ 240.480093] vmx_handle_exit+0x276/0x16b0 [ 240.480111] ? lock_acquire+0x16f/0x3f0 [ 240.501009] ? vcpu_enter_guest+0xf15/0x5ed0 [ 240.501032] vcpu_enter_guest+0x10ca/0x5ed0 [ 240.509835] ? kvm_vcpu_ioctl+0x181/0xf90 [ 240.514018] ? emulator_read_emulated+0x50/0x50 [ 240.518795] ? lock_acquire+0x16f/0x3f0 [ 240.518810] ? kvm_check_async_pf_completion+0x2d8/0x440 [ 240.518831] kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 240.528450] ? kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 240.528473] kvm_vcpu_ioctl+0x4dc/0xf90 09:27:30 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 240.528488] ? kvm_vcpu_block+0xcc0/0xcc0 [ 240.528506] ? mark_held_locks+0x100/0x100 [ 240.546716] ? __might_fault+0x12b/0x1e0 [ 240.546769] ? __fget+0x340/0x540 [ 240.559232] ? find_held_lock+0x35/0x130 [ 240.563517] ? __fget+0x340/0x540 [ 240.566999] ? kvm_vcpu_block+0xcc0/0xcc0 [ 240.571286] do_vfs_ioctl+0xd5f/0x1380 [ 240.575245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.575327] ? selinux_file_ioctl+0x125/0x5e0 [ 240.585992] ? ioctl_preallocate+0x210/0x210 [ 240.590913] ? selinux_file_mprotect+0x620/0x620 [ 240.590938] ? iterate_fd+0x360/0x360 [ 240.591015] ? nsecs_to_jiffies+0x30/0x30 [ 240.591037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.600061] ? security_file_ioctl+0x8d/0xc0 [ 240.600081] ksys_ioctl+0xab/0xd0 [ 240.600097] __x64_sys_ioctl+0x73/0xb0 [ 240.600178] do_syscall_64+0xfd/0x620 [ 240.626574] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.631865] RIP: 0033:0x459a29 [ 240.635073] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 240.635080] RSP: 002b:00007fd00a5dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 240.635094] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 240.635102] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 240.635110] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 240.635118] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd00a5db6d4 [ 240.635126] R13: 00000000004c2ddb R14: 00000000004d6618 R15: 00000000ffffffff [ 240.635151] ================================================================== [ 240.635163] Disabling lock debugging due to kernel taint [ 240.716920] Kernel panic - not syncing: panic_on_warn set ... [ 240.716920] [ 240.724373] CPU: 1 PID: 7900 Comm: syz-executor.3 Tainted: G B 4.19.75 #0 [ 240.732606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.734581] kobject: 'loop4' (000000008eb2cbb1): kobject_uevent_env [ 240.742477] Call Trace: [ 240.742497] dump_stack+0x172/0x1f0 [ 240.742513] ? kvm_write_guest_virt_system+0x64/0x90 [ 240.742577] panic+0x263/0x507 [ 240.742593] ? __warn_printk+0xf3/0xf3 [ 240.767654] ? kvm_write_guest_virt_system+0x64/0x90 [ 240.772371] kobject: 'loop4' (000000008eb2cbb1): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 240.773569] ? preempt_schedule+0x4b/0x60 [ 240.787240] ? ___preempt_schedule+0x16/0x18 [ 240.792607] ? trace_hardirqs_on+0x5e/0x220 [ 240.797200] ? kvm_write_guest_virt_system+0x64/0x90 [ 240.802316] kasan_end_report+0x47/0x4f [ 240.803791] kobject: 'loop1' (000000007d8a0eca): kobject_uevent_env [ 240.806323] kasan_report.cold+0xa9/0x2ba [ 240.806337] check_memory_region+0x123/0x190 [ 240.806349] memset+0x24/0x40 [ 240.806363] kvm_write_guest_virt_system+0x64/0x90 [ 240.806377] handle_vmread+0x7fe/0xa10 [ 240.806392] ? handle_invpcid+0xa80/0xa80 [ 240.815258] kobject: 'loop1' (000000007d8a0eca): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 240.817217] ? __lock_is_held+0xb6/0x140 [ 240.817234] ? __lock_is_held+0xb6/0x140 [ 240.823922] kobject: 'tx-0' (00000000924a4a4a): kobject_cleanup, parent 00000000101a6641 [ 240.824728] ? handle_invpcid+0xa80/0xa80 [ 240.835600] kobject: 'loop5' (000000006722f088): kobject_uevent_env [ 240.837953] vmx_handle_exit+0x276/0x16b0 [ 240.837969] ? lock_acquire+0x16f/0x3f0 [ 240.847575] kobject: 'tx-0' (00000000924a4a4a): auto cleanup 'remove' event [ 240.851451] ? vcpu_enter_guest+0xf15/0x5ed0 [ 240.851467] vcpu_enter_guest+0x10ca/0x5ed0 [ 240.851480] ? kvm_vcpu_ioctl+0x181/0xf90 [ 240.851494] ? emulator_read_emulated+0x50/0x50 [ 240.859921] kobject: 'tx-0' (00000000924a4a4a): kobject_uevent_env [ 240.863771] ? lock_acquire+0x16f/0x3f0 [ 240.863784] ? kvm_check_async_pf_completion+0x2d8/0x440 [ 240.863802] kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 240.879998] kobject: 'tx-0' (00000000924a4a4a): fill_kobj_path: path = '/devices/virtual/net/sp0/queues/tx-0' [ 240.882537] ? kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 240.882557] kvm_vcpu_ioctl+0x4dc/0xf90 [ 240.889737] kobject: 'loop5' (000000006722f088): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 240.894059] ? kvm_vcpu_block+0xcc0/0xcc0 [ 240.894072] ? mark_held_locks+0x100/0x100 [ 240.894088] ? __might_fault+0x12b/0x1e0 [ 240.894103] ? __fget+0x340/0x540 [ 240.898516] kobject: 'tx-0' (00000000924a4a4a): auto cleanup kobject_del [ 240.902540] ? find_held_lock+0x35/0x130 [ 240.902552] ? __fget+0x340/0x540 [ 240.902565] ? kvm_vcpu_block+0xcc0/0xcc0 [ 240.902581] do_vfs_ioctl+0xd5f/0x1380 [ 240.929585] kobject: 'tx-0' (00000000924a4a4a): calling ktype release [ 240.939230] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.939244] ? selinux_file_ioctl+0x125/0x5e0 [ 240.939256] ? ioctl_preallocate+0x210/0x210 [ 240.939268] ? selinux_file_mprotect+0x620/0x620 [ 240.939284] ? iterate_fd+0x360/0x360 [ 240.939302] ? nsecs_to_jiffies+0x30/0x30 [ 240.968585] kobject: 'tx-0': free name [ 240.970952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.970964] ? security_file_ioctl+0x8d/0xc0 [ 240.970980] ksys_ioctl+0xab/0xd0 [ 240.979989] kobject: 'queues' (00000000101a6641): kobject_cleanup, parent (null) [ 240.981359] __x64_sys_ioctl+0x73/0xb0 [ 240.981378] do_syscall_64+0xfd/0x620 [ 240.989996] kobject: 'queues' (00000000101a6641): calling ktype release [ 240.993759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.993769] RIP: 0033:0x459a29 [ 240.993783] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 240.993794] RSP: 002b:00007fd00a5dac78 EFLAGS: 00000246 [ 241.009936] kobject: 'queues' (00000000101a6641): kset_release [ 241.014347] ORIG_RAX: 0000000000000010 [ 241.014354] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 241.014360] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 241.014368] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 241.014374] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd00a5db6d4 [ 241.014385] R13: 00000000004c2ddb R14: 00000000004d6618 R15: 00000000ffffffff [ 241.018848] kobject: 'queues': free name [ 241.025869] Kernel Offset: disabled [ 241.167466] Rebooting in 86400 seconds..