[ 42.389453] audit: type=1800 audit(1564198363.682:30): pid=7737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 46.900995] kauditd_printk_skb: 4 callbacks suppressed [ 46.901010] audit: type=1400 audit(1564198368.232:35): avc: denied { map } for pid=7912 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.7' (ECDSA) to the list of known hosts. 2019/07/27 03:32:54 fuzzer started [ 53.458882] audit: type=1400 audit(1564198374.792:36): avc: denied { map } for pid=7921 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/07/27 03:32:57 dialing manager at 10.128.0.105:41033 2019/07/27 03:32:57 syscalls: 2477 2019/07/27 03:32:57 code coverage: enabled 2019/07/27 03:32:57 comparison tracing: enabled 2019/07/27 03:32:57 extra coverage: extra coverage is not supported by the kernel 2019/07/27 03:32:57 setuid sandbox: enabled 2019/07/27 03:32:57 namespace sandbox: enabled 2019/07/27 03:32:57 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/27 03:32:57 fault injection: enabled 2019/07/27 03:32:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/27 03:32:57 net packet injection: enabled 2019/07/27 03:32:57 net device setup: enabled 03:34:10 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 129.511257] audit: type=1400 audit(1564198450.842:37): avc: denied { map } for pid=7938 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=23 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 129.610630] IPVS: ftp: loaded support on port[0] = 21 03:34:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000240)=""/233, 0xe9}, {&(0x7f0000000380)=""/202, 0xca}, {&(0x7f0000000480)=""/238, 0xee}, {&(0x7f0000000600)=""/159, 0x9f}], 0x4) readv(r0, &(0x7f0000000000)=[{&(0x7f0000242000)=""/2560, 0xa00}], 0x1) [ 129.719598] chnl_net:caif_netlink_parms(): no params data found [ 129.807600] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.833332] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.841238] device bridge_slave_0 entered promiscuous mode [ 129.865127] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.871580] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.894423] device bridge_slave_1 entered promiscuous mode [ 129.923391] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 129.934683] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 129.959538] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 129.968046] team0: Port device team_slave_0 added 03:34:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000000)={0x0, 0x1ff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000002) dup3(r2, r0, 0x0) write$P9_RREAD(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0b1000007501000010000082c559c128b11671aab518d4d7aa03aed8130f7f96539be3863b0cc2f730d367ae11b459eec61117b3f5e9d4a90c0a"], 0x3a) [ 129.975564] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 129.992788] team0: Port device team_slave_1 added [ 130.008664] IPVS: ftp: loaded support on port[0] = 21 [ 130.014194] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 130.026139] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 03:34:11 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lookup_dcookie(0x0, 0x0, 0x0) [ 130.135653] device hsr_slave_0 entered promiscuous mode [ 130.172704] device hsr_slave_1 entered promiscuous mode [ 130.225384] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 130.235476] IPVS: ftp: loaded support on port[0] = 21 [ 130.264726] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 130.367712] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.374622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.381643] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.388094] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.446255] chnl_net:caif_netlink_parms(): no params data found [ 130.456912] IPVS: ftp: loaded support on port[0] = 21 03:34:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) preadv(r2, &(0x7f0000000480)=[{&(0x7f00000000c0)=""/35, 0x23}], 0x1, 0x0) [ 130.622598] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.628988] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.656107] device bridge_slave_0 entered promiscuous mode [ 130.686231] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.693028] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.714373] device bridge_slave_1 entered promiscuous mode [ 130.721107] chnl_net:caif_netlink_parms(): no params data found [ 130.739557] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 130.748146] 8021q: adding VLAN 0 to HW filter on device bond0 [ 130.758651] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.770007] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.778686] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 03:34:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000480)=[{&(0x7f00000000c0)=""/35, 0x23}], 0x1, 0x0) [ 130.819034] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 130.857498] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 130.873096] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 130.876214] IPVS: ftp: loaded support on port[0] = 21 [ 130.881853] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 130.890888] 8021q: adding VLAN 0 to HW filter on device team0 [ 130.910330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 130.918245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.933592] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 131.006067] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 131.040349] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 131.049942] team0: Port device team_slave_0 added [ 131.056163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 131.064629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.072521] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.078866] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.088609] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 131.092621] IPVS: ftp: loaded support on port[0] = 21 [ 131.095898] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.110880] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.118155] device bridge_slave_0 entered promiscuous mode [ 131.139962] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 131.147315] team0: Port device team_slave_1 added [ 131.152955] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 131.160628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 131.168884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.176722] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.183100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.192027] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.199929] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.207167] device bridge_slave_1 entered promiscuous mode [ 131.215009] chnl_net:caif_netlink_parms(): no params data found [ 131.231313] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 131.248514] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 131.286122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 131.354138] device hsr_slave_0 entered promiscuous mode [ 131.412521] device hsr_slave_1 entered promiscuous mode [ 131.454275] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 131.462642] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 131.475668] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 131.494387] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 131.519632] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 131.527794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 131.549029] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.555999] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.563244] device bridge_slave_0 entered promiscuous mode [ 131.600751] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.607336] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.614797] device bridge_slave_1 entered promiscuous mode [ 131.640220] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 131.648516] team0: Port device team_slave_0 added [ 131.656632] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 131.666415] team0: Port device team_slave_1 added [ 131.671528] chnl_net:caif_netlink_parms(): no params data found [ 131.680379] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 131.691062] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 131.699901] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 131.711354] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 131.723595] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 131.739354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 131.747850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 131.756019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 131.763799] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 131.771668] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 131.788467] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 131.813421] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 131.823556] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 131.836045] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 131.844782] team0: Port device team_slave_0 added [ 131.861836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 131.870768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 131.878509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 131.886194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.903881] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 131.909924] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 131.917479] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 131.926263] team0: Port device team_slave_1 added [ 131.932591] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 131.939107] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 131.995265] device hsr_slave_0 entered promiscuous mode [ 132.032676] device hsr_slave_1 entered promiscuous mode [ 132.077381] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 132.084887] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 132.114927] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 132.152085] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.159002] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.166854] device bridge_slave_0 entered promiscuous mode [ 132.174108] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.180479] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.188773] device bridge_slave_1 entered promiscuous mode [ 132.234071] device hsr_slave_0 entered promiscuous mode [ 132.272619] device hsr_slave_1 entered promiscuous mode [ 132.316115] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 132.340034] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 132.350220] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 132.358567] chnl_net:caif_netlink_parms(): no params data found [ 132.380546] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 132.398921] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 132.418086] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 132.478404] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 132.493991] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 132.501499] team0: Port device team_slave_0 added [ 132.516532] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 132.527597] audit: type=1400 audit(1564198453.862:38): avc: denied { associate } for pid=7939 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 132.537880] 8021q: adding VLAN 0 to HW filter on device bond0 [ 132.578917] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 132.586933] team0: Port device team_slave_1 added [ 132.594408] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 132.602978] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 132.635617] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 132.643575] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.649938] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.670654] device bridge_slave_0 entered promiscuous mode [ 132.684302] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.690749] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.698534] device bridge_slave_1 entered promiscuous mode [ 132.726642] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 132.740534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.757901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 03:34:14 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) [ 132.814156] device hsr_slave_0 entered promiscuous mode [ 132.852750] device hsr_slave_1 entered promiscuous mode [ 132.901367] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 132.923089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 132.932083] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 03:34:14 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) [ 132.946282] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 132.952775] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.976501] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 132.995982] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 133.014274] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 133.024174] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 133.031803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 133.044569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 03:34:14 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) [ 133.056758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.065417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.073855] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.080212] bridge0: port 1(bridge_slave_0) entered forwarding state 03:34:14 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) [ 133.105725] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 133.111860] 8021q: adding VLAN 0 to HW filter on device team0 [ 133.129083] bond0: Enslaving bond_slave_1 as an active interface with an up link 03:34:14 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) [ 133.174319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.183784] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 133.194478] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 133.230260] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 133.237253] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 133.248963] team0: Port device team_slave_0 added [ 133.255756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.264538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.272690] bridge0: port 1(bridge_slave_0) entered blocking state 03:34:14 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) [ 133.279070] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.286595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 133.294844] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.303074] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.309436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.319340] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 03:34:14 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) [ 133.353951] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 133.361746] team0: Port device team_slave_1 added [ 133.371029] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 133.382136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.391115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 133.405828] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.414373] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.420738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.428506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 133.440186] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 133.452683] 8021q: adding VLAN 0 to HW filter on device bond0 [ 133.463408] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 133.474834] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 133.484315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 133.493736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 133.506291] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 133.515224] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 133.528112] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 133.536345] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 133.546968] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 133.553449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 133.561437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 133.570475] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 133.578351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 133.585593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.592797] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 133.608036] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 133.619118] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 133.638514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 133.647858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 133.655647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.663798] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.671376] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 133.682823] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 133.691299] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 133.697504] 8021q: adding VLAN 0 to HW filter on device team0 [ 133.745439] device hsr_slave_0 entered promiscuous mode [ 133.782512] device hsr_slave_1 entered promiscuous mode [ 133.825860] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 133.836560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.844622] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.852428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.860127] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.873131] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 133.881780] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 133.895031] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 133.901978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.910334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.918261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.926089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.937593] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 133.945798] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 133.955369] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 133.965940] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 133.971974] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 133.979980] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 133.990797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.999583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.007272] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.013706] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.020630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 134.028314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.038310] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 134.047552] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 134.054489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 134.074177] 8021q: adding VLAN 0 to HW filter on device bond0 [ 134.080356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.087614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.095639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.103234] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.109569] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.120999] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 134.129399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 134.140259] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 134.155744] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 134.174249] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 134.184123] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 134.200475] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 134.209929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 134.217918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 134.226074] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 134.236585] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 134.248905] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 134.258838] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 134.266896] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 134.274711] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 134.281878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 134.289744] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 134.297754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 134.305952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.313905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.320928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.331097] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 134.343324] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 134.349423] 8021q: adding VLAN 0 to HW filter on device team0 [ 134.366815] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 134.376010] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 134.387941] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 134.394236] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 134.405568] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 134.413267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 134.421220] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.430387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.438542] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.446679] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.453117] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.461771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.472077] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 134.496061] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 134.524704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.539979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.555261] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.561651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.574989] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 134.583648] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 134.614459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 134.649676] 8021q: adding VLAN 0 to HW filter on device batadv0 03:34:16 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) [ 134.666209] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 134.688306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 134.696061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 134.724592] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 134.745785] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 134.752317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 134.760336] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 03:34:16 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000100)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x3a, 0x0, @dev, @mcast2, {[], @icmpv6=@pkt_toobig={0xffffff80, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback, @dev}}}}}}}, 0x0) [ 134.779895] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 134.789766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 134.805184] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 134.812762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 134.820709] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 134.845199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.863095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.882955] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 134.891965] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 134.898752] 8021q: adding VLAN 0 to HW filter on device team0 [ 134.913003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 134.930964] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.962657] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 134.973334] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 134.987281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 134.999527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.010283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 135.024609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.035820] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.042698] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.053517] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready 03:34:16 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000100)) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x4922de1, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x8d5af}], 0x1000000000000159, 0x0) [ 135.060188] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 135.070295] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 135.078568] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 135.087720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 135.104991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 135.113337] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.119714] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.137557] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 135.151682] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 135.163073] hrtimer: interrupt took 27607 ns [ 135.169275] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 135.179107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 135.186997] audit: type=1400 audit(1564198456.512:39): avc: denied { map } for pid=8011 comm="syz-executor.3" path="/dev/nullb0" dev="devtmpfs" ino=15346 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=blk_file permissive=1 [ 135.220437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 135.236451] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 135.251865] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 135.275791] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 135.295670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 135.307700] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 135.319081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 135.349147] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 135.357145] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 135.370594] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 135.378531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 135.393372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.405379] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 135.420781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 135.429965] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.443631] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 135.456556] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 135.480247] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 135.491524] 8021q: adding VLAN 0 to HW filter on device batadv0 03:34:16 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) 03:34:17 executing program 0: bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000080)) 03:34:17 executing program 5: 03:34:17 executing program 4: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f00000001c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000004b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001e80)=""/22, 0x16}}], 0x700, 0x0, 0x0) 03:34:17 executing program 3: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f00000001c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$netlink(r0, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) 03:34:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000004b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:34:17 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) 03:34:17 executing program 5: 03:34:17 executing program 0: bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000080)) 03:34:17 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) 03:34:17 executing program 2: 03:34:17 executing program 5: 03:34:17 executing program 4: 03:34:17 executing program 0: bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000080)) 03:34:17 executing program 5: 03:34:17 executing program 2: 03:34:17 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) 03:34:17 executing program 3: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f00000001c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$netlink(r0, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) 03:34:17 executing program 4: 03:34:17 executing program 5: 03:34:17 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) 03:34:17 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) 03:34:17 executing program 2: 03:34:17 executing program 4: 03:34:17 executing program 5: 03:34:17 executing program 2: 03:34:17 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) 03:34:17 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) 03:34:17 executing program 2: 03:34:17 executing program 3: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f00000001c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$netlink(r0, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) 03:34:18 executing program 5: 03:34:18 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) 03:34:18 executing program 4: 03:34:18 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) 03:34:18 executing program 5: 03:34:18 executing program 2: 03:34:18 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) 03:34:18 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) 03:34:18 executing program 4: 03:34:18 executing program 3: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f00000001c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$netlink(r0, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) 03:34:18 executing program 5: 03:34:18 executing program 2: 03:34:18 executing program 4: 03:34:18 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) 03:34:18 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) 03:34:18 executing program 4: 03:34:18 executing program 2: 03:34:18 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) 03:34:18 executing program 5: 03:34:18 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) 03:34:18 executing program 3: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f00000001c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:34:18 executing program 4: 03:34:18 executing program 2: 03:34:18 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) 03:34:18 executing program 4: 03:34:18 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) 03:34:18 executing program 2: 03:34:18 executing program 5: 03:34:19 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) 03:34:19 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) 03:34:19 executing program 5: 03:34:19 executing program 4: 03:34:19 executing program 3: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f00000001c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) 03:34:19 executing program 2: 03:34:19 executing program 5: 03:34:19 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) 03:34:19 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) 03:34:19 executing program 4: 03:34:19 executing program 2: 03:34:19 executing program 4: 03:34:19 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) 03:34:19 executing program 5: 03:34:19 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000), 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) 03:34:19 executing program 2: 03:34:19 executing program 3: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f00000001c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) 03:34:19 executing program 4: 03:34:19 executing program 5: 03:34:19 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) 03:34:19 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000), 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) 03:34:19 executing program 2: 03:34:19 executing program 4: 03:34:19 executing program 5: 03:34:19 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) 03:34:19 executing program 2: 03:34:19 executing program 4: 03:34:19 executing program 5: 03:34:19 executing program 3: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f00000001c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) 03:34:19 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000), 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) 03:34:19 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) 03:34:20 executing program 4: 03:34:20 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000080)) 03:34:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 03:34:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) sendmmsg$inet(r0, &(0x7f0000002000)=[{{&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000280)='U', 0x1}], 0x1}}, {{&(0x7f0000000740)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001780)=[{&(0x7f0000000780)="ae", 0x1}], 0x1}}], 0x2, 0x0) 03:34:20 executing program 3: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f00000001c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:34:20 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000080)) 03:34:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000000)={'vcan0\x00', @ifru_ivalue}) 03:34:20 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1002}}, 0xa) 03:34:20 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000010010000010000000000003d84000000"], 0x18}}], 0x1, 0x0) 03:34:20 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, 0x0, 0x0) 03:34:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$sock(r0, &(0x7f0000000800)={&(0x7f0000000100)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000840)='I', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000180)=0x5, 0x4) 03:34:20 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000080)) 03:34:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000000)={'vcan0\x00', @ifru_ivalue}) 03:34:20 executing program 3: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f00000001c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 139.114478] kasan: CONFIG_KASAN_INLINE enabled [ 139.187535] kasan: GPF could be caused by NULL-ptr deref or user memory access 03:34:20 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, 0x0, 0x0) 03:34:20 executing program 3: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f00000001c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 139.254428] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 139.260709] CPU: 0 PID: 8303 Comm: syz-executor.2 Not tainted 4.19.61 #35 [ 139.267646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.277023] RIP: 0010:rxrpc_connect_call+0xe0/0x48d0 [ 139.282142] Code: 03 80 3c 18 00 0f 85 a9 40 00 00 48 8b 85 08 ff ff ff 48 8b 18 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 76 40 00 00 48 8b 5b 18 48 8d bb f0 01 00 00 48 [ 139.293178] kobject: 'loop0' (000000003e0a121f): kobject_uevent_env [ 139.301064] RSP: 0018:ffff88806160f660 EFLAGS: 00010206 [ 139.312848] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000a693000 [ 139.320651] RDX: 0000000000000003 RSI: ffffffff86557ea0 RDI: 0000000000000018 [ 139.327936] RBP: ffff88806160f7d0 R08: 00000000006000c0 R09: ffff8880616068e0 [ 139.330841] kobject: 'loop0' (000000003e0a121f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 139.335213] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888061611b40 [ 139.335223] R13: ffff8880906c06a0 R14: ffff8880906c0690 R15: ffff88806160f8f8 [ 139.335235] FS: 00007fa724d13700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 139.335242] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 139.335250] CR2: 0000000000738008 CR3: 0000000083de1000 CR4: 00000000001406f0 [ 139.335259] Call Trace: [ 139.335281] ? release_sock+0x156/0x1c0 [ 139.335299] ? find_held_lock+0x35/0x130 [ 139.335324] ? rxrpc_discard_expired_client_conns+0x8b0/0x8b0 [ 139.372383] kobject: 'loop4' (00000000df7de78b): kobject_uevent_env 03:34:20 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, 0x0) 03:34:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000000)={'vcan0\x00', @ifru_ivalue}) 03:34:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000000)={'vcan0\x00', @ifru_ivalue}) [ 139.373581] ? lockdep_hardirqs_on+0x415/0x5d0 [ 139.373598] ? release_sock+0x156/0x1c0 [ 139.373618] ? trace_hardirqs_on+0x67/0x220 [ 139.385690] kobject: 'loop4' (00000000df7de78b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 139.387968] ? release_sock+0x156/0x1c0 [ 139.387992] ? __local_bh_enable_ip+0x15a/0x270 [ 139.435243] ? _raw_spin_unlock_bh+0x31/0x40 [ 139.439666] rxrpc_new_client_call+0x8e7/0x1880 [ 139.444351] ? rxrpc_do_sendmsg+0xfbe/0x1c8f [ 139.448774] rxrpc_do_sendmsg+0xfbe/0x1c8f 03:34:20 executing program 4: ioctl$sock_ifreq(0xffffffffffffffff, 0x8922, &(0x7f0000000000)={'vcan0\x00', @ifru_ivalue}) [ 139.450679] kobject: 'loop1' (00000000c0799e5f): kobject_uevent_env [ 139.453110] ? rxrpc_kernel_send_data+0x4b0/0x4b0 [ 139.453127] ? __local_bh_enable_ip+0x15a/0x270 [ 139.453146] ? lockdep_hardirqs_on+0x415/0x5d0 [ 139.473094] kobject: 'loop1' (00000000c0799e5f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 139.473751] ? lock_sock_nested+0x9a/0x120 [ 139.487439] ? __local_bh_enable_ip+0x15a/0x270 [ 139.492139] rxrpc_sendmsg+0x4b8/0x5f0 [ 139.496048] ? rxrpc_sock_destructor+0x150/0x150 [ 139.500821] sock_sendmsg+0xd7/0x130 [ 139.504556] ___sys_sendmsg+0x3e2/0x920 [ 139.508551] ? copy_msghdr_from_user+0x430/0x430 [ 139.513326] ? lock_downgrade+0x810/0x810 [ 139.517578] ? kasan_check_read+0x11/0x20 [ 139.521766] ? __fget+0x367/0x540 [ 139.525225] ? iterate_fd+0x360/0x360 [ 139.525858] kobject: 'loop4' (00000000df7de78b): kobject_uevent_env [ 139.529030] ? mark_held_locks+0x100/0x100 [ 139.529047] ? __fget_light+0x1a9/0x230 [ 139.529065] ? __fdget+0x1b/0x20 [ 139.547030] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 139.552587] ? sockfd_lookup_light+0xcb/0x180 [ 139.557096] __sys_sendmmsg+0x1bf/0x4e0 [ 139.561088] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 139.565428] ? _copy_to_user+0xc9/0x120 [ 139.569420] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 139.575141] ? put_timespec64+0xda/0x140 [ 139.576598] kobject: 'loop4' (00000000df7de78b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 139.579236] ? nsecs_to_jiffies+0x30/0x30 [ 139.579258] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 139.579278] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 139.603057] ? do_syscall_64+0x26/0x620 [ 139.607048] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 139.612422] ? do_syscall_64+0x26/0x620 [ 139.616406] __x64_sys_sendmmsg+0x9d/0x100 [ 139.620660] do_syscall_64+0xfd/0x620 [ 139.624482] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 139.629676] RIP: 0033:0x459829 [ 139.632878] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 139.643502] kobject: 'loop0' (000000003e0a121f): kobject_uevent_env [ 139.651796] RSP: 002b:00007fa724d12c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 139.651812] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459829 [ 139.651826] RDX: 0000000000000001 RSI: 0000000020005c00 RDI: 0000000000000003 [ 139.676787] kobject: 'loop0' (000000003e0a121f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 139.680463] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 139.680472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa724d136d4 [ 139.680479] R13: 00000000004c6fe8 R14: 00000000004dc518 R15: 00000000ffffffff [ 139.680494] Modules linked in: [ 139.691252] kobject: 'loop3' (00000000fe99fe24): kobject_uevent_env [ 139.715624] ---[ end trace d76c94051c52ded7 ]--- [ 139.726459] RIP: 0010:rxrpc_connect_call+0xe0/0x48d0 [ 139.727313] kobject: 'loop3' (00000000fe99fe24): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 139.732055] Code: 03 80 3c 18 00 0f 85 a9 40 00 00 48 8b 85 08 ff ff ff 48 8b 18 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 76 40 00 00 48 8b 5b 18 48 8d bb f0 01 00 00 48 [ 139.753880] kobject: 'loop5' (00000000e8e74909): kobject_uevent_env [ 139.761710] RSP: 0018:ffff88806160f660 EFLAGS: 00010206 [ 139.773279] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000a693000 [ 139.780574] RDX: 0000000000000003 RSI: ffffffff86557ea0 RDI: 0000000000000018 [ 139.784939] kobject: 'loop5' (00000000e8e74909): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 139.787965] RBP: ffff88806160f7d0 R08: 00000000006000c0 R09: ffff8880616068e0 [ 139.804724] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888061611b40 [ 139.812011] R13: ffff8880906c06a0 R14: ffff8880906c0690 R15: ffff88806160f8f8 [ 139.820104] FS: 00007fa724d13700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 139.829269] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 139.835252] CR2: 0000000000625208 CR3: 0000000083de1000 CR4: 00000000001406f0 [ 139.842818] Kernel panic - not syncing: Fatal exception [ 139.849324] Kernel Offset: disabled [ 139.852960] Rebooting in 86400 seconds..