[ 41.434922][ T26] audit: type=1800 audit(1569536955.826:26): pid=7727 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 41.458864][ T26] audit: type=1800 audit(1569536955.826:27): pid=7727 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 41.485645][ T26] audit: type=1800 audit(1569536955.826:28): pid=7727 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 42.530152][ T26] audit: type=1800 audit(1569536956.956:29): pid=7727 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.24' (ECDSA) to the list of known hosts. 2019/09/26 22:29:27 fuzzer started 2019/09/26 22:29:29 dialing manager at 10.128.0.26:36093 2019/09/26 22:29:29 syscalls: 2493 2019/09/26 22:29:29 code coverage: enabled 2019/09/26 22:29:29 comparison tracing: enabled 2019/09/26 22:29:29 extra coverage: extra coverage is not supported by the kernel 2019/09/26 22:29:29 setuid sandbox: enabled 2019/09/26 22:29:29 namespace sandbox: enabled 2019/09/26 22:29:29 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/26 22:29:29 fault injection: enabled 2019/09/26 22:29:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/26 22:29:29 net packet injection: enabled 2019/09/26 22:29:29 net device setup: enabled 22:30:50 executing program 0: 22:30:50 executing program 1: syzkaller login: [ 136.169645][ T7893] IPVS: ftp: loaded support on port[0] = 21 22:30:50 executing program 2: [ 136.302098][ T7895] IPVS: ftp: loaded support on port[0] = 21 [ 136.334473][ T7893] chnl_net:caif_netlink_parms(): no params data found [ 136.441540][ T7893] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.449696][ T7893] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.459044][ T7893] device bridge_slave_0 entered promiscuous mode [ 136.467819][ T7893] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.474864][ T7893] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.484076][ T7893] device bridge_slave_1 entered promiscuous mode [ 136.510660][ T7895] chnl_net:caif_netlink_parms(): no params data found [ 136.533506][ T7899] IPVS: ftp: loaded support on port[0] = 21 [ 136.541633][ T7893] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 136.568914][ T7893] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 136.588926][ T7895] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.596801][ T7895] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.604635][ T7895] device bridge_slave_0 entered promiscuous mode [ 136.622712][ T7895] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.637329][ T7895] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.645210][ T7895] device bridge_slave_1 entered promiscuous mode 22:30:51 executing program 3: [ 136.672372][ T7893] team0: Port device team_slave_0 added [ 136.703291][ T7893] team0: Port device team_slave_1 added [ 136.719250][ T7895] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 136.759986][ T7893] device hsr_slave_0 entered promiscuous mode 22:30:51 executing program 4: [ 136.875815][ T7893] device hsr_slave_1 entered promiscuous mode [ 136.935799][ T7893] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.942941][ T7893] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.950838][ T7893] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.957928][ T7893] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.993244][ T7895] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 137.015037][ T7895] team0: Port device team_slave_0 added [ 137.023523][ T7895] team0: Port device team_slave_1 added [ 137.053509][ T7903] IPVS: ftp: loaded support on port[0] = 21 [ 137.059745][ T7901] IPVS: ftp: loaded support on port[0] = 21 22:30:51 executing program 5: [ 137.157584][ T7895] device hsr_slave_0 entered promiscuous mode [ 137.216086][ T7895] device hsr_slave_1 entered promiscuous mode [ 137.265617][ T7895] debugfs: Directory 'hsr0' with parent '/' already present! [ 137.298075][ T7906] IPVS: ftp: loaded support on port[0] = 21 [ 137.298248][ T7899] chnl_net:caif_netlink_parms(): no params data found [ 137.367353][ T7895] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.374451][ T7895] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.381826][ T7895] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.388902][ T7895] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.403810][ T7899] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.411917][ T7899] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.419750][ T7899] device bridge_slave_0 entered promiscuous mode [ 137.428607][ T2853] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.437043][ T2853] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.445548][ T2853] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.452978][ T2853] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.478968][ T7899] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.487067][ T7899] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.494683][ T7899] device bridge_slave_1 entered promiscuous mode [ 137.513971][ T7899] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 137.533905][ T7899] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 137.618759][ T7901] chnl_net:caif_netlink_parms(): no params data found [ 137.629205][ T7899] team0: Port device team_slave_0 added [ 137.649811][ T7893] 8021q: adding VLAN 0 to HW filter on device bond0 [ 137.657350][ T7903] chnl_net:caif_netlink_parms(): no params data found [ 137.670714][ T7899] team0: Port device team_slave_1 added [ 137.711327][ T7893] 8021q: adding VLAN 0 to HW filter on device team0 [ 137.720009][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.730492][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.757579][ T7901] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.764710][ T7901] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.774369][ T7901] device bridge_slave_0 entered promiscuous mode [ 137.828046][ T7899] device hsr_slave_0 entered promiscuous mode [ 137.885861][ T7899] device hsr_slave_1 entered promiscuous mode [ 137.945852][ T7899] debugfs: Directory 'hsr0' with parent '/' already present! [ 137.970627][ T7901] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.977943][ T7901] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.986342][ T7901] device bridge_slave_1 entered promiscuous mode [ 138.002285][ T7903] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.009867][ T7903] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.018061][ T7903] device bridge_slave_0 entered promiscuous mode [ 138.039252][ T7903] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.046552][ T7903] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.054074][ T7903] device bridge_slave_1 entered promiscuous mode [ 138.068877][ T2853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.077523][ T2853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.085891][ T2853] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.092944][ T2853] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.100520][ T2853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.109146][ T2853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.117652][ T2853] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.124669][ T2853] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.132212][ T2853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 138.142765][ T7906] chnl_net:caif_netlink_parms(): no params data found [ 138.177627][ T7901] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 138.188775][ T7903] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 138.199266][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 138.216569][ T7895] 8021q: adding VLAN 0 to HW filter on device bond0 [ 138.229643][ T7901] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 138.244055][ T7903] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 138.254665][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 138.263383][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 138.271709][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 138.301789][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 138.312071][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 138.321892][ T7901] team0: Port device team_slave_0 added [ 138.329155][ T7901] team0: Port device team_slave_1 added [ 138.340282][ T7906] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.348194][ T7906] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.356190][ T7906] device bridge_slave_0 entered promiscuous mode [ 138.366861][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.375062][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.385204][ T7903] team0: Port device team_slave_0 added [ 138.392231][ T7903] team0: Port device team_slave_1 added [ 138.401917][ T7895] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.410589][ T7906] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.417990][ T7906] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.426242][ T7906] device bridge_slave_1 entered promiscuous mode [ 138.440246][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.448608][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.476951][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.486197][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.494570][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.501680][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.509374][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.518080][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.526425][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.533475][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.541590][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 138.550255][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 138.558811][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 138.567650][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 138.576288][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 138.585673][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 138.595128][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 138.602997][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 138.612275][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.628080][ T7906] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 138.687958][ T7901] device hsr_slave_0 entered promiscuous mode [ 138.745910][ T7901] device hsr_slave_1 entered promiscuous mode [ 138.795587][ T7901] debugfs: Directory 'hsr0' with parent '/' already present! [ 138.815982][ T7906] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 138.830900][ T7893] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 138.851629][ T7909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.860021][ T7909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.907090][ T7903] device hsr_slave_0 entered promiscuous mode [ 138.958493][ T7903] device hsr_slave_1 entered promiscuous mode [ 139.015642][ T7903] debugfs: Directory 'hsr0' with parent '/' already present! [ 139.037189][ T7895] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 139.050251][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 139.063269][ T7906] team0: Port device team_slave_0 added [ 139.075090][ T7893] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 139.088623][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.100943][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.132017][ T7906] team0: Port device team_slave_1 added [ 139.161239][ T7899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 139.217987][ T7906] device hsr_slave_0 entered promiscuous mode [ 139.245811][ T7906] device hsr_slave_1 entered promiscuous mode [ 139.315558][ T7906] debugfs: Directory 'hsr0' with parent '/' already present! [ 139.343205][ T7899] 8021q: adding VLAN 0 to HW filter on device team0 [ 139.352195][ T7895] 8021q: adding VLAN 0 to HW filter on device batadv0 22:30:53 executing program 0: unshare(0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0xd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x403, 0x0) semtimedop(0x0, 0x0, 0x0, &(0x7f0000000200)) [ 139.377116][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.387513][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.446921][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.456039][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.467177][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.474206][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.484467][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.493313][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.501917][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.508998][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.517309][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 139.526522][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 139.534879][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 139.543630][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 139.553097][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.561115][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 139.579058][ T7901] 8021q: adding VLAN 0 to HW filter on device bond0 [ 139.588662][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 139.597604][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 139.619515][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 139.633567][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.651773][ T7903] 8021q: adding VLAN 0 to HW filter on device bond0 [ 139.668099][ T7899] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 139.679547][ T7899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 139.694537][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.706701][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.714512][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.724801][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.735445][ C1] hrtimer: interrupt took 56609 ns [ 139.763622][ T7909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.780655][ T7909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.789980][ T7901] 8021q: adding VLAN 0 to HW filter on device team0 [ 139.803025][ T7903] 8021q: adding VLAN 0 to HW filter on device team0 22:30:54 executing program 1: [ 139.826165][ T7899] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 139.860181][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.887231][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.916144][ T3504] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.923257][ T3504] bridge0: port 1(bridge_slave_0) entered forwarding state 22:30:54 executing program 1: [ 139.941165][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.958930][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.980795][ T3504] bridge0: port 1(bridge_slave_0) entered blocking state 22:30:54 executing program 1: [ 139.987957][ T3504] bridge0: port 1(bridge_slave_0) entered forwarding state 22:30:54 executing program 1: 22:30:54 executing program 1: [ 140.061566][ T7906] 8021q: adding VLAN 0 to HW filter on device bond0 [ 140.081941][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 140.093429][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 22:30:54 executing program 1: [ 140.115008][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 140.128885][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 140.142084][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.149220][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.158363][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 140.173261][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 140.182396][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 140.196509][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 140.204921][ T22] bridge0: port 2(bridge_slave_1) entered blocking state 22:30:54 executing program 1: [ 140.212029][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.252380][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 140.261734][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 140.289140][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 140.298617][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 140.307258][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 140.316136][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 140.324613][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 140.333646][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 140.342330][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 140.351219][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 140.360018][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 140.368001][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 140.378061][ T7906] 8021q: adding VLAN 0 to HW filter on device team0 [ 140.389929][ T7901] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 140.401909][ T7901] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 140.429128][ T7903] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 140.439861][ T7903] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 140.465937][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 140.474558][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 140.496179][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 140.504453][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 22:30:54 executing program 2: [ 140.513019][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 140.521995][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 140.530617][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 140.539233][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 140.548431][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 140.557076][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 140.566449][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 140.573988][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 140.617931][ T7903] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 140.659457][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 140.669040][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 140.677790][ T3504] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.684884][ T3504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.692582][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 140.701326][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 140.710079][ T3504] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.717277][ T3504] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.725082][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 140.740805][ T7901] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 140.756799][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 140.771868][ T7909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 140.793026][ T7906] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 140.804419][ T7906] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 140.819887][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 140.829252][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 140.838171][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 140.849368][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 140.858228][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 140.866584][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 140.874779][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 140.883559][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 140.892489][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 140.901493][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 140.920245][ T7906] 8021q: adding VLAN 0 to HW filter on device batadv0 22:30:55 executing program 1: 22:30:55 executing program 4: 22:30:55 executing program 3: 22:30:55 executing program 0: 22:30:55 executing program 2: 22:30:55 executing program 1: 22:30:55 executing program 5: 22:30:55 executing program 2: 22:30:55 executing program 3: 22:30:55 executing program 1: 22:30:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10) 22:30:55 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x31, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) connect$inet(r1, &(0x7f0000000400)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 22:30:55 executing program 5: ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@rand_addr="94a8998e4358b914a3b6840c3b33e329", @in6=@ipv4={[], [], @rand_addr=0x4}, 0x0, 0xe6, 0x4e21, 0xdad}, {0x800, 0x0, 0xfffffffffffffffb, 0x0, 0x732, 0x7fffffff}, {0x0, 0x2}}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in=@remote, 0x34ff, 0x0, 0x0, 0x0, 0x0, 0xfa}}, 0xe8) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000880)={0x0, 0x0}) r3 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000008c0)={{{@in6, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) r5 = getegid() fcntl$getownex(r1, 0x10, &(0x7f0000000a80)={0x0, 0x0}) r7 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r8) lstat(0x0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) lstat(0x0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r11, 0x0, r12) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000300)}, {&(0x7f00000003c0)="461b173c1daf6fd3514b07e58b123ee40c55eb9586082bf98076ed45f0a0344a8b3366c25b10c962569d34684addf1078c3af1132a862f36a4917c2b837f86361a1bfcf81b8859a44fa1a3aaecc79b2c8c0537df9ff0d2322077077298d6ad2bb54b82009d4dbc3242", 0x69}, {&(0x7f00000004c0)="f50f9a7b4ce88e54dc2a455658e089b0e875dc6bfd3655d564bbccce2ffd3431cbec846dbad0b2641cf02ef5c3d8d60e28c58f33f53d85931b285193292fd53e93216ef9f0db3158964d46e82c2273c3b47d125a8b00eb64aa10ec10dcbb604b208a851104b1c77da7b34b251653815e2ff3c1a026add1c595282fb98b4a01bfd1250b8a5e55f273619d614b4c9e311f151a4e77e0d13002d87ee19855d4ae9c7a236129763fdc694e0000e612dec3a37e2e3d4d500e309196f5fc836cb2d74bf4648fd528633f92c3884d88dc8568", 0xcf}, {&(0x7f00000005c0)}, {&(0x7f0000000600)="ec76a3f747a262cde274cc24f17877ae1d43e3b2e0d628062a905956de27e1cf4e22cd6445e1230ae931eeae4ab26a5b7f684488c300ffb1c1f541e3c2738aba3af9e1270b423754a131419b4c930c033ecd3cac873f9fef2aa5ccb8c93d22add1df16b1a8d9b6544e6583c1b2f6df6a31d10b8cff5e9b587d66b2449b255c07ff51889355968a84cbeaa1c113fa663c537031cd03440ca70c38e303793485a521d109eacaa58178a34692a7ac2995b10ff942e87771ecac491c0df3e00a1c8969fe34ccb1c8f2a5a1c25cef841b1be20bf94bfd237ddef0fbfbf72dc38102bb4b52c81e268506dd", 0xe8}, {0x0}], 0x6, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {r2, r4}}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r6, r8, r9}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r10, r12}}}], 0xa0, 0x4}, 0x6010) r13 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r13, 0x4, 0x42000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6, @in6=@empty}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) fcntl$getownex(r13, 0x10, &(0x7f0000000a80)) r14 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) lstat(0x0, &(0x7f0000000b00)) setregid(r5, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x1000000000001e, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x3ffe, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 22:30:55 executing program 2: msgget(0x3, 0x224) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0xffffffffffffffff, &(0x7f0000c20000/0x1000)=nil, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/sequencer\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x200000, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) 22:30:55 executing program 1: lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000200)="00815be3", 0x4, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000000b80)='./file0\x00', 0x0) open(0x0, 0x141042, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{0x0}, {0x0}, {&(0x7f00000004c0)="f50f9a7b4ce88e54dc2a455658e089b0e875dc6bfd3655d564bbccce2ffd3431cbec846dbad0b2", 0x27}, {0x0}], 0x4}, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) syz_open_dev$midi(0x0, 0x800, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3ff, 0x8, 0x0, 0x8}) 22:30:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x9) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r1, 0x200006) sendfile(r0, r1, 0x0, 0x8000fffffffe) 22:30:55 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000000c0)={0x2, "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"}, 0x401, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000500)={{}, 0x0, 0x0, 0x0, 0x5168, 0x0, 0x10001}) [ 167.250146][ T2853] kasan: CONFIG_KASAN_INLINE enabled [ 167.260010][ T2853] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 167.291961][ T2853] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 167.298964][ T2853] CPU: 0 PID: 2853 Comm: kworker/0:2 Not tainted 5.3.0+ #0 [ 167.306162][ T2853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.316236][ T2853] Workqueue: krxrpcd rxrpc_peer_keepalive_worker [ 167.322578][ T2853] RIP: 0010:smack_socket_sendmsg+0x5b/0x480 [ 167.328474][ T2853] Code: e8 5a b5 6c fe 4c 89 e8 48 c1 e8 03 42 80 3c 38 00 74 08 4c 89 ef e8 74 e7 a5 fe 4d 8b 65 00 48 83 c3 18 48 89 d8 48 c1 e8 03 <42> 80 3c 38 00 74 08 48 89 df e8 56 e7 a5 fe 4c 8b 33 49 8d 9e 08 [ 167.348084][ T2853] RSP: 0018:ffff8880a04af9c8 EFLAGS: 00010206 [ 167.354153][ T2853] RAX: 0000000000000003 RBX: 0000000000000018 RCX: ffff8880a04cc300 [ 167.362140][ T2853] RDX: 0000000000000000 RSI: ffff8880a04afb18 RDI: 0000000000000000 [ 167.365272][ T3892] kobject: 'loop2' (00000000ec42c455): kobject_uevent_env [ 167.370122][ T2853] RBP: ffff8880a04afa80 R08: ffffffff8340d780 R09: ffff8880a04afb86 [ 167.370127][ T2853] R10: ffffed1014095f72 R11: 0000000000000000 R12: ffff888099000594 [ 167.370131][ T2853] R13: ffff8880a04afb18 R14: dffffc0000000000 R15: dffffc0000000000 [ 167.370137][ T2853] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 167.370141][ T2853] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 167.370145][ T2853] CR2: 00007faf6e6a8000 CR3: 000000008ee84000 CR4: 00000000001406f0 [ 167.370152][ T2853] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 167.370156][ T2853] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 167.370160][ T2853] Call Trace: [ 167.370178][ T2853] ? __lock_acquire+0xc75/0x1be0 [ 167.448800][ T2853] ? __kasan_check_read+0x11/0x20 [ 167.453830][ T2853] ? mark_lock+0x107/0x1650 [ 167.458339][ T2853] security_socket_sendmsg+0x6c/0xd0 [ 167.458851][ T3892] kobject: 'loop2' (00000000ec42c455): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 167.463637][ T2853] kernel_sendmsg+0x77/0x140 [ 167.478397][ T2853] rxrpc_send_keepalive+0x254/0x3c0 [ 167.483610][ T2853] ? rxrpc_peer_keepalive_worker+0x6ed/0xb40 [ 167.489600][ T2853] rxrpc_peer_keepalive_worker+0x76e/0xb40 [ 167.495424][ T2853] process_one_work+0x7ef/0x10e0 [ 167.500384][ T2853] worker_thread+0xc01/0x1630 [ 167.505072][ T2853] kthread+0x332/0x350 [ 167.509141][ T2853] ? rcu_lock_release+0x30/0x30 [ 167.513988][ T2853] ? kthread_blkcg+0xe0/0xe0 [ 167.518578][ T2853] ret_from_fork+0x24/0x30 [ 167.522985][ T2853] Modules linked in: [ 167.559127][ T3892] kobject: 'loop3' (00000000bdd0a8e2): kobject_uevent_env [ 167.574584][ T3892] kobject: 'loop3' (00000000bdd0a8e2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 167.591328][ T3892] kobject: 'loop0' (00000000ba5d0d77): kobject_uevent_env [ 167.598780][ T3892] kobject: 'loop0' (00000000ba5d0d77): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 167.617038][ T3892] kobject: 'loop4' (00000000aa13ed1b): kobject_uevent_env [ 167.624209][ T3892] kobject: 'loop4' (00000000aa13ed1b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 167.649814][ T3892] kobject: 'loop1' (0000000050817070): kobject_uevent_env 22:31:22 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4ba0ff) clone(0x1000109, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000000)='./bus\x00', &(0x7f0000000140)='./file0/file0\x00') ftruncate(r0, 0x0) 22:31:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x9) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r1, 0x200006) sendfile(r0, r1, 0x0, 0x8000fffffffe) 22:31:22 executing program 2: msgget(0x3, 0x224) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0xffffffffffffffff, &(0x7f0000c20000/0x1000)=nil, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/sequencer\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x200000, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) 22:31:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) accept4(r0, &(0x7f0000000000)=@generic, 0x0, 0x0) 22:31:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$unix(r3, &(0x7f0000002200)=[{0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000240)='9', 0x1}, {&(0x7f0000000300)="978468d4f7d06ce35ea2ee914e8c2ad17aa65fe07e65eb7b97b5f3f9ccb9430a90056d07ff4d60b6a6e227389677921e1f18018fb6acf86abbff6173a9dbf3e3031460546cdb26e114ba349d48b066578ca88cc34e7b98ea73d73698b2fb0e73ca04ac", 0x63}, {&(0x7f0000000480)="ed9202391c0157cab72ab55a43d2c347860e92229af37559e6e7b694571649c54742e5b609733cc835ff08d480385ce9b40f183cb3434fc72ee474d773b3f02f2cd594dc323805f89dfc4c8d87360943e2a0bfd0acb8ae348cf1abdb04c77e6c2f3ac405b30381", 0x67}], 0x3}], 0x1, 0x0) [ 167.659196][ T3892] kobject: 'loop1' (0000000050817070): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:31:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$unix(r3, &(0x7f0000002200)=[{0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000240)='9', 0x1}, {&(0x7f0000000300)="978468d4f7d06ce35ea2ee914e8c2ad17aa65fe07e65eb7b97b5f3f9ccb9430a90056d07ff4d60b6a6e227389677921e1f18018fb6acf86abbff6173a9dbf3e3031460546cdb26e114ba349d48b066578ca88cc34e7b98ea73d73698b2fb0e73ca04ac", 0x63}, {&(0x7f0000000480)="ed9202391c0157cab72ab55a43d2c347860e92229af37559e6e7b694571649c54742e5b609733cc835ff08d480385ce9b40f183cb3434fc72ee474d773b3f02f2cd594dc323805f89dfc4c8d87360943e2a0bfd0acb8ae348cf1abdb04c77e6c2f3ac405b30381", 0x67}], 0x3}], 0x1, 0x0) 22:31:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$unix(r3, &(0x7f0000002200)=[{0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000240)='9', 0x1}, {&(0x7f0000000300)="978468d4f7d06ce35ea2ee914e8c2ad17aa65fe07e65eb7b97b5f3f9ccb9430a90056d07ff4d60b6a6e227389677921e1f18018fb6acf86abbff6173a9dbf3e3031460546cdb26e114ba349d48b066578ca88cc34e7b98ea73d73698b2fb0e73ca04ac", 0x63}, {&(0x7f0000000480)="ed9202391c0157cab72ab55a43d2c347860e92229af37559e6e7b694571649c54742e5b609733cc835ff08d480385ce9b40f183cb3434fc72ee474d773b3f02f2cd594dc323805f89dfc4c8d87360943e2a0bfd0acb8ae348cf1abdb04c77e6c2f3ac405b30381", 0x67}], 0x3}], 0x1, 0x0) [ 167.799973][ T3892] kobject: 'loop3' (00000000bdd0a8e2): kobject_uevent_env [ 167.816500][ T3892] kobject: 'loop3' (00000000bdd0a8e2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 167.851410][ T3892] kobject: 'loop0' (00000000ba5d0d77): kobject_uevent_env [ 167.875667][ T3892] kobject: 'loop0' (00000000ba5d0d77): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 167.915040][ T3892] kobject: 'loop3' (00000000bdd0a8e2): kobject_uevent_env [ 167.931486][ T3892] kobject: 'loop3' (00000000bdd0a8e2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 167.950564][ T2853] ---[ end trace 4a9bb9667776dc07 ]--- [ 167.956159][ T2853] RIP: 0010:smack_socket_sendmsg+0x5b/0x480 [ 167.962073][ T2853] Code: e8 5a b5 6c fe 4c 89 e8 48 c1 e8 03 42 80 3c 38 00 74 08 4c 89 ef e8 74 e7 a5 fe 4d 8b 65 00 48 83 c3 18 48 89 d8 48 c1 e8 03 <42> 80 3c 38 00 74 08 48 89 df e8 56 e7 a5 fe 4c 8b 33 49 8d 9e 08 [ 167.981402][ T3892] kobject: 'loop4' (00000000aa13ed1b): kobject_uevent_env [ 167.984079][ T2853] RSP: 0018:ffff8880a04af9c8 EFLAGS: 00010206 [ 167.997623][ T2853] RAX: 0000000000000003 RBX: 0000000000000018 RCX: ffff8880a04cc300 [ 168.005957][ T2853] RDX: 0000000000000000 RSI: ffff8880a04afb18 RDI: 0000000000000000 [ 168.013938][ T2853] RBP: ffff8880a04afa80 R08: ffffffff8340d780 R09: ffff8880a04afb86 [ 168.020346][ T3892] kobject: 'loop4' (00000000aa13ed1b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 168.024190][ T2853] R10: ffffed1014095f72 R11: 0000000000000000 R12: ffff888099000594 [ 168.042491][ T2853] R13: ffff8880a04afb18 R14: dffffc0000000000 R15: dffffc0000000000 [ 168.050746][ T2853] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 168.067141][ T2853] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 168.073761][ T2853] CR2: 000000000260efd0 CR3: 000000008d70e000 CR4: 00000000001406f0 [ 168.085037][ T3892] kobject: 'loop1' (0000000050817070): kobject_uevent_env [ 168.093066][ T3892] kobject: 'loop1' (0000000050817070): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 168.106842][ T2853] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 168.132560][ T2853] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 168.152741][ T2853] Kernel panic - not syncing: Fatal exception [ 168.160120][ T2853] Kernel Offset: disabled [ 168.164469][ T2853] Rebooting in 86400 seconds..