Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 31.976289] kauditd_printk_skb: 9 callbacks suppressed [ 31.976299] audit: type=1800 audit(1544155118.789:33): pid=6011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 32.003013] audit: type=1800 audit(1544155118.789:34): pid=6011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 35.740207] audit: type=1400 audit(1544155122.549:35): avc: denied { map } for pid=6186 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.124' (ECDSA) to the list of known hosts. 2018/12/07 03:58:49 fuzzer started [ 42.523439] audit: type=1400 audit(1544155129.339:36): avc: denied { map } for pid=6197 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/12/07 03:58:51 dialing manager at 10.128.0.26:38267 [ 44.404784] ld (6207) used greatest stack depth: 15296 bytes left 2018/12/07 03:58:51 syscalls: 1 2018/12/07 03:58:51 code coverage: enabled 2018/12/07 03:58:51 comparison tracing: enabled 2018/12/07 03:58:51 setuid sandbox: enabled 2018/12/07 03:58:51 namespace sandbox: enabled 2018/12/07 03:58:51 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/07 03:58:51 fault injection: enabled 2018/12/07 03:58:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/07 03:58:51 net packet injection: enabled 2018/12/07 03:58:51 net device setup: enabled 04:01:25 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfffffffffffffffd, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000040)=0x6, 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) write$FUSE_LK(r0, &(0x7f00000000c0)={0x28, 0x0, 0x7, {{0x408, 0x7, 0x2, r1}}}, 0x28) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000100)={0x4, 0x80000000}) prctl$PR_MCE_KILL_GET(0x22) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000140)={0x3f, 0x606}) readv(r0, &(0x7f00000022c0)=[{&(0x7f0000000180)=""/93, 0x5d}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/164, 0xa4}, {&(0x7f00000012c0)=""/4096, 0x1000}], 0x4) getsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000002300)={@broadcast, @broadcast, @multicast2}, &(0x7f0000002340)=0xc) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000002780)='/dev/rfkill\x00', 0x40, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f00000027c0)) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000002800)={{0x2, 0x4e22, @local}, {0x7, @random="7568304b941d"}, 0x2a, {0x2, 0x4e22, @broadcast}, 'vcan0\x00'}) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000002880)=@int=0x4, 0x4) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f00000028c0)={0x0, 0x1, {0x5, 0x3, 0x2014, 0x7, 0xb, 0x8, 0x3, 0x2}}) r3 = shmget(0x1, 0x3000, 0x54000302, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_INFO(r3, 0x3, &(0x7f0000002940)=""/169) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000002a80)={0x0, 0x1, 0x10}, &(0x7f0000002ac0)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000002b40)={r4, 0x30, &(0x7f0000002b00)=[@in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e21, @broadcast}]}, &(0x7f0000002b80)=0x10) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000002c40)=@buf={0x67, &(0x7f0000002bc0)="ad8be48be53268136180cbeeae2c53b7e336a734cbab53d630fe981632fb6618fd18cfcb189e0d6772266e61e4624493cc9b7c36b7ac6458021cd6a96059576f6f525961c7e7b380dfbc3c592652a3403418379695ce31b146fff826d8c75d161333146cd20566"}) lsetxattr$trusted_overlay_origin(&(0x7f0000002c80)='./file0\x00', &(0x7f0000002cc0)='trusted.overlay.origin\x00', &(0x7f0000002d00)='y\x00', 0x2, 0x2) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000002d40), 0x0) syz_open_dev$video4linux(&(0x7f0000002d80)='/dev/v4l-subdev#\x00', 0x7, 0x100) accept4$unix(r0, &(0x7f0000002dc0), &(0x7f0000002e40)=0x6e, 0x80000) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000002ec0)=@req={0x28, &(0x7f0000002e80)={'team0\x00', @ifru_names='irlan0\x00'}}) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000002f00), 0x4) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000002f40)={r4, 0x4, 0xb587}, 0x8) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f0000002f80)=""/99, &(0x7f0000003000)=0x63) write$selinux_load(r0, &(0x7f0000003040)={0xf97cff8c, 0x8, 'SE Linux', "1faa9d7d64dcd45361eb496623a24ea6d913302024c32ab7"}, 0x28) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000003080)={'veth0\x00', {0x2, 0x4e24, @multicast1}}) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f00000030c0)={0xfffffffffffffe01, 0xdd43, 0x8a35, 0x3, 0x686}) [ 198.760457] audit: type=1400 audit(1544155285.569:37): avc: denied { map } for pid=6212 comm="syz-executor0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14747 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 198.872054] IPVS: ftp: loaded support on port[0] = 21 04:01:25 executing program 1: ustat(0xd, &(0x7f0000000000)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000080)=""/45, &(0x7f00000000c0)=0x2d) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000100)) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x200040000000000, 0x30, 0x800, 0x8}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r1, 0x5, 0xd11c, 0x4}, &(0x7f0000000240)=0x10) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000280)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000002c0)={0x7f, 0x25, 0x5}) getsockopt$inet6_dccp_int(r0, 0x21, 0x7, &(0x7f0000000340), &(0x7f0000000380)=0x4) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000003c0)={r2, 0x7fffffff}, 0x8) mknodat(r0, &(0x7f0000000400)='./file0\x00', 0x8801, 0x5) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000440)={0x0, 0x0, 0x20}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000480)={r3}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000500)='keyring\x00') getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000540), &(0x7f0000000580)=0x4) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000600)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x40, r4, 0x820, 0x70bd2d, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x40800) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000700)={r0, r0}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000740)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000007c0)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000800)='net/rt_acct\x00') ioctl$FICLONE(r6, 0x40049409, r6) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000840)={@dev, 0x0}, &(0x7f0000000880)=0x14) sendmsg$xdp(r0, &(0x7f0000000a40)={&(0x7f00000008c0)={0x2c, 0x2, r7, 0x6}, 0x10, &(0x7f0000000a00)=[{&(0x7f0000000900)="28c2157ca4da9af0a671999cd1189c64f807d0be822ccddb3773bbf6d4849d25db91392ea482cf912ce3d3b2d797e6c306ae4d7beb49a7433cd6972e50c20c933011863d6db93a326d69d48fb288957bbbe549c985f877322eda03d0b02d90b4c079dcd9367f43b03e9379c49eff12d7469288791af8e7aee9188f9abc7289b9c855df902493566227493a21391935a7964640ee90fc032010c1b96f762d21b901686902b183a443e80c6fe8d733ca3d03db07de29de186b2265fb5c65892900fcba9809f3943c82e85418b1", 0xcc}], 0x1, 0x0, 0x0, 0x20008000}, 0x80) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000a80)) setsockopt$llc_int(r6, 0x10c, 0x3, &(0x7f0000000ac0)=0x7, 0x4) ioctl$SG_SET_COMMAND_Q(r6, 0x2271, &(0x7f0000000b00)=0x1) [ 199.071791] IPVS: ftp: loaded support on port[0] = 21 04:01:26 executing program 2: times(&(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/relabel\x00', 0x2, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000180)) ioctl$TIOCMSET(r0, 0x5418, &(0x7f00000001c0)=0x10001) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000200)={0x8, 0x775b575b, 0x1, @stepwise={0x2, 0x23c, 0x1ff, 0xbd, 0xfffffffffffffffa, 0xff}}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) ptrace$poke(0x5, r1, &(0x7f00000002c0), 0x5) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000300)=0x4, 0x4) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f00000003c0)=""/221) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000500)={0x4, &(0x7f00000004c0)=[{0x7f, 0x3d7}, {0x100, 0x9}, {0x1, 0x4}, {0x5, 0x1}]}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000540)={0x0, 0xa2}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r3, @in6={{0xa, 0x4e24, 0xa05, @mcast1, 0x4}}}, 0x84) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9220}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x40080}, 0x4) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f00000007c0)={0x4, 0x13f, 0x3, 0x9, 0x18, 0x10001}) r5 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x92) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000840)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000980)=[{&(0x7f00000008c0)=""/55, 0x37}, {&(0x7f0000000900)=""/81, 0x51}], 0x2, &(0x7f00000009c0)=""/6, 0x6, 0x7f}, 0x0) ioctl$TIOCCBRK(r5, 0x5428) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000a40)={0x5, 0x400, r1, 0x5, r2, 0xef, 0xfffffffffffffffe, 0x4}) syz_mount_image$nfs4(&(0x7f0000000a80)='nfs4\x00', &(0x7f0000000ac0)='./file0/file0\x00', 0x5, 0x5, &(0x7f0000000d80)=[{&(0x7f0000000b00)="206f988b418146c92cdf3473a9ca212a881e42aa", 0x14, 0x1}, {&(0x7f0000000b40)="a33aaf1da6ada4169aaf21417733f724f2869e72e6e1955721aef032def67e84427b70644a91cc62ed1c36daa8bcda6bb086dbd6", 0x34, 0x1}, {&(0x7f0000000b80)="d3288a9b3c93ecb1dce4bb8fe5e4b49ed7917461e0ecb4370ea5975eab310b58c8b2a5324a24ce1c572702b3c5649b8389fa15c114e30d54bab376ceb4ed6485d4a4d03468de82587c614a5c0fe53d1dafe1ed19b0780d89f8b87e71ed5b9427f6f7eaa36ca27acff37924eeabb9cbeea74234df3a9d40fc36f2eedfbc469fa784692102bd3cfe3081ba3719ed7ed0076870e0b861c1409c167376d45279ecf94c7bcc", 0xa3}, {&(0x7f0000000c40)="8566e67b9e3f3ff480d3c699a224a37c6948e7cab94f475d74aed5a13bca673b0c3e512b74f3c125534cd59103901b5a82c237fcb22649b273bc520be1c5d32cca0494c9a73637f4167b980bcc71c51068a83bbfce5a0e41749f39e25a3ab609421ddacc55ba78cfdbaa84c6269e3e6bdd9c6c885dc6b87e19920fe04160ca98540ce6bc1b3cef2da9c1238e7f2b805d13ff51e9bd57f9488faa321ddf41bfda82628bad56dd48728afa40f304c412f1e51c83eeb7fbd0", 0xb7, 0x1ff}, {&(0x7f0000000d00)="3b697f60246ab376eefa9259635cd304e1db7545571842dc684051ecbc80cc15782596090f81167a69270477b76f61902fe5a1c0c108df2fc1c77758c81b3d0f46602d32c640503c75347aede4cf5cef920de1f875ea042b36feec12fd4036f1f417a2", 0x63, 0x2}], 0x4000, &(0x7f0000000e00)='&\x00') ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x2) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000e40)='tls\x00', 0x4) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KDSETLED(r5, 0x4b32, 0x80) setrlimit(0x1, &(0x7f0000000e80)={0xfffffffffffffffd, 0x7ff}) ioctl$SCSI_IOCTL_DOORLOCK(r5, 0x5380) [ 199.344854] IPVS: ftp: loaded support on port[0] = 21 04:01:26 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2000, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000040)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f00000000c0)={0x8, 0x6811, 0x80, 0x100}) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000100)={0x8, "2c3133739a6a85a8d5d63296b1eb785bd79a773a6dbf722c590892ecc582e187", 0x2, 0x1}) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000140)=0xf000) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000180)={0x10203, 0x0, &(0x7f0000ffd000/0x3000)=nil}) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x400, 0x54, &(0x7f0000000200)) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000300)={{0x3, @addr=0x1ff}, "0996a3fac753bae927f1e61c7160d9286a1f2cdda76e8d0032842687d8a56e32"}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000400)=0x8, 0x8) execveat(r1, &(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000480)='/dev/dlm_plock\x00', &(0x7f00000004c0)='/dev/dlm_plock\x00', &(0x7f0000000500)='mime_type\x00', &(0x7f0000000540)='md5sum\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='/dev/rfkill\x00', &(0x7f0000000600)='/dev/rfkill\x00', &(0x7f0000000640)='/dev/rfkill\x00', &(0x7f0000000680)='\x00'], &(0x7f0000000780)=[&(0x7f0000000740)='\x00'], 0x400) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f00000007c0)=0x401) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000800)={0x1, 0xfff, {0x1, 0x100000000, 0x0, 0x5}}) getsockopt$inet6_dccp_int(r1, 0x21, 0xf, &(0x7f0000000840), &(0x7f0000000880)=0x4) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x100}, &(0x7f0000000900)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000940)={r2, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @rand_addr=0x4}, 0x80000001}}, 0x9, 0x5, 0xfffffffffffffffb, 0x2, 0x28}, 0x98) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000a00)={r2, 0xfffffffffffffffe}, &(0x7f0000000a40)=0x8) pipe2(&(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, &(0x7f0000000ac0)=0x8, 0x4) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000b00)) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)) socket$bt_hidp(0x1f, 0x3, 0x6) setsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000c00)={r2, 0x1, 0x400, 0x1, 0x2, 0x3}, 0x14) sendmsg$kcm(r0, &(0x7f00000012c0)={&(0x7f0000000c40)=@pppol2tp={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @remote}, 0x3, 0x3, 0x2, 0x4}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000cc0)="2e66a2f1c068d781728cc2b901bcb40c9ffaf6fa8de43338236a0787f7b3b1323cb20bbf2252039834de64002e14c7f37b607b8ec88eddd01986b9269ad29fb161c10230ef4cf114d88009e8adab4f24a056cb3473ba5a43cd80b2d0662880cbc20410a84154a6dfcc4211c661bc03fd823640685b7d3ced510bac1e0001b07c71ffe3a4d284374c159d68c1a6b0e01155e2c46390ac68de30aa5568f035bd75466b5f996ec80d712f88dbe12f631ceb8f59fd0bb2", 0xb5}, {&(0x7f0000000d80)="5ddb1b7f89be96da3b40369332bb1349eea75c29180d0ceb6ebb5b233f663d577cee", 0x22}], 0x2, &(0x7f0000000e00)=[{0x60, 0x1, 0x3, "dd8ab1e94347d65189acce904086d6a9a91526bf1dfad36f967697649e6dd86586dbe02ed67e787201e95541fc5f9516a83420fac5b29a96023806d2d9472015748e04c3a23ac99ebb8679"}, {0xc8, 0x117, 0x6, "a2b8c59575df1b730c4e486b3f8fb2f474981a2543384c77e1e667cd195216c351f199abdf803f62a8faddcaed75ddaa8d6dc86c62245cdd84128586da4a01ef6c1478b07226b4f3d08178a48114aabab04139db992cd82d132a07564513b6d2ac9c23612b92fcac359ab67ba3d99316fc06cf50f0d0bf3f5f20173e07f20764b64c814a76919dc77e1a9d486881c58086bfe6ac7c09df0675d81737129f49b83695a73f5f420a3d104b63100bce4ca8dcacda6be5"}, {0x70, 0x10d, 0x70, "bfb16cd08ac6b6c5ebf0482c26acf7c55dd913c8a0a426b9eb7485815a918af6f60a08f841d7385d07ab66d00b266a5bcca4240acbfe33c4a9ec70727189a44a8fa45871ca91073c06b1167099d0bae9b7bd9dc49a28e14e5ae60f694c"}, {0x18, 0x1, 0x0, "a023f9"}, {0x100, 0x105, 0xfffffffffffffffe, "8fa66d65739bcc65e551e5288eddc91fd42c84765f76b8f0e987085ec8e2e774f33f3ab592c4ea0832cb1ce74a6c12023b0b8978ca42ecaa103ff2be06f74df2ee959e4c56f0021a694c0a0114e2be0be0f83225661e2c63290469af0b613982c2b3d20fdab5d0254967698275fcf8bfca504e8d16528b767ff8b8502aca8b776ba3f0ee731b40f6b878fb040a1d22183a05548c0a5c4da11cb4766f6e484e0a69db3d74f1e849cc63acb06b8d9f991a495cd35f3902d91be1aa739f97e264c6641c813e76b5849a1a9d798fbabffc0d64caad4a114e5bd6b3b947db2ef65e3499f8a13bb1522c70346b6d"}, {0xf8, 0x117, 0x101, "c4b049d2ffe4fb1cab194958194e38dc21b01103d6c4c5d6c782d9019f90071f1b83e41556bd3ab679ec42fe5ab1939287be0181a77de9d35aaec1e00c5547c17d105ce286374574580159b0aabac36255b610f790f9d26fd500f551cdcd08de29b58e82aa2b6d055510a978a3b23d7305581b1fdaeaf4e867c6e05c2d75a75e122433b635d359f6297ca1405ae1bc93ae8bfdc6edeca2fd9f9c230dd1bb99910c110010ed72080bc493ec2b738ba90ebbda26bbca9981fb7904f30c859235e57130f24d864596533bd9d51219102e81f42bd62d89a426a626be4fc11895a6e8ea216b679a68f3"}, {0x20, 0x0, 0xfffffffffffffffd, "a59bdf632ebf5fae6626a2"}, {0xd8, 0x0, 0x7ff, "e0582c79dcafbc6f7772bba753daf826d3540920f5bfea595e477c7cb528e18fc30a8b2cc672110191c46513886ec887ccbdb6f2f315ca4a634c7175bf1e6b1812b4a909a7f075a2860966baffe1434d49157cfaad24d441dd71218601e320a03fd4499cc2b6b21fee07b79358a17e58f27bb58662698d3a46d2ce3b0293ce292f9ef98aca645f40c3455c9046b971dfe26ef3be8deb6a20af52b4824ab9dc82414af68c26283a08a49321f4bf1bce6b3b302ab2188e9d9013bdc63c5f3d8c4c530a"}], 0x4a0, 0x24040800}, 0x8931d3505a5c3727) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000001300)=0x0) r6 = fcntl$getown(r3, 0x9) kcmp(r5, r6, 0x0, r0, r0) pause() ioctl$BLKSECDISCARD(r1, 0x127d, 0x0) [ 199.820559] IPVS: ftp: loaded support on port[0] = 21 04:01:26 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400400, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0xff, 0x0, 0x3, 0x1, 0x81, 0x9, 0x3f}, 0x20) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="ddad7ce061bc60e9b2bbf88a9b84b92e", 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={@ipv4={[], [], @remote}, 0xe, r1}) fcntl$getownex(r0, 0x10, &(0x7f0000000340)={0x0, 0x0}) setpriority(0x2, r2, 0x3) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000380)={0x1, {0x0, 0x989680}, 0x0, 0xfdd}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0xa4, r3, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x5c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x15f3f3ac}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4004000}, 0x1) ioctl$RTC_AIE_OFF(r0, 0x7002) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000580)=""/177, &(0x7f0000000640)=0xb1) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x9010, r0, 0x0) migrate_pages(r2, 0x87, &(0x7f0000000680), &(0x7f00000006c0)) r4 = syz_open_dev$admmidi(&(0x7f0000000700)='/dev/admmidi#\x00', 0xfffffffffffffff7, 0x125000) sysfs$3(0x3) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000740)='/dev/rfkill\x00', 0x800, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000780)={[0x4d2, 0x9, 0x4000, 0x9, 0x2, 0x400, 0x7, 0x20, 0x0, 0x5, 0x0, 0x80000001, 0x8000, 0x4, 0x8, 0x40], 0xf000, 0x100000}) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f0000000840)={0x2, 0x59, 0xffffffffffffffff, 0xfffffffffffffff9, 0xc0000000000000}) ioctl$DRM_IOCTL_GET_CAP(r5, 0xc010640c, &(0x7f0000000880)={0x0, 0x7}) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f00000008c0)) r6 = add_key$user(&(0x7f0000000900)='user\x00', &(0x7f0000000940)={'syz', 0x1}, &(0x7f0000000980)="4de8a484119aea335c8d2b4030db5699385fcf9e840126c9007f19e3b3a62818e0f696ffbf873c227c13371f3c0c756128de246319b3d344a06bd22c0f079d2091ac2da0417ab9ae31120ddc95fb35f137695853094effb7df75ae1c78c69d14ea3a1a7ff8ca1b78c25f96844851b3b9254bf1961823c96b546f1f2fb0557f0143a938497f8e416991198bcbf99bac5900d79736da2dad1c668640b96af11abb1a620e2e0cfc68ce53c3ff101497dd5b7b24508ddec39004086657dc4b34239af7f30490e28bc9e7f101056646d8abc20ef271c72e6ddd2456", 0xd9, 0x0) keyctl$revoke(0x3, r6) setsockopt$sock_void(r5, 0x1, 0x3f, 0x0, 0x0) ioctl$void(r5, 0x5450) ioctl$VHOST_SET_LOG_FD(r5, 0x4004af07, &(0x7f0000000a80)=r4) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000ac0)='/selinux/user\x00', 0x2, 0x0) fcntl$setflags(r5, 0x2, 0x1) creat(&(0x7f0000000b00)='./file0\x00', 0x28) [ 200.298694] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.314236] IPVS: ftp: loaded support on port[0] = 21 [ 200.321581] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.333427] device bridge_slave_0 entered promiscuous mode [ 200.410549] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.432418] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.440066] device bridge_slave_1 entered promiscuous mode 04:01:27 executing program 5: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f00000000c0)={{0x2, @name="4136d33ef2c7b2a4c9ce885903fc9084a83b5662befc97049f4530125f52800f"}, "67a3295713049704fb0810bcb6d16e0aa486444739af91d2628385e912c03401", 0x1}) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000001c0)={0x1, 0x0, @raw_data=[0xffffffff, 0x5, 0x4362, 0x7fff, 0xa4, 0x10001, 0x0, 0x0, 0x80000001, 0x9, 0x100000001, 0x9, 0x5, 0x9, 0x6, 0x3]}) r1 = socket$inet6(0xa, 0x800, 0x5) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000240), &(0x7f0000000280)=0x4) r2 = syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x2, 0x2) openat$cgroup_subtree(r2, &(0x7f0000000300)='cgroup.subtree_control\x00', 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000440)={'filter\x00', 0x0, 0x3, 0x8b, [], 0x4, &(0x7f0000000340)=[{}, {}, {}, {}], &(0x7f0000000380)=""/139}, &(0x7f00000004c0)=0x78) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000500)={0x7, 0x5}) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000540)={0x4, 0xb, 0x4, 0x20000000, {0x77359400}, {0x5, 0xf, 0x4, 0xc000000000000000, 0x0, 0x502f, "ddff0112"}, 0x6, 0x1, @fd=0xffffffffffffff9c, 0x4}) recvmsg$kcm(r2, &(0x7f0000001cc0)={&(0x7f00000005c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000640)=""/132, 0x84}, {&(0x7f0000000700)}, {&(0x7f0000000740)=""/90, 0x5a}, {&(0x7f00000007c0)=""/219, 0xdb}, {&(0x7f00000008c0)=""/222, 0xde}, {&(0x7f00000009c0)=""/158, 0x9e}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000001a80)=""/127, 0x7f}, {&(0x7f0000001b00)=""/105, 0x69}], 0x9, &(0x7f0000001c40)=""/91, 0x5b, 0x4}, 0x2) fstat(r1, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@broadcast, @in=@broadcast, 0x4e21, 0x3ff, 0x4e20, 0x0, 0xa, 0x20, 0xa0, 0x3f, r4, r5}, {0x3, 0x8, 0x0, 0x0, 0x9, 0x2, 0x8, 0x80}, {0xda, 0x2, 0x3f, 0xf3}, 0x81, 0x6e6bbb, 0x1, 0x1, 0x0, 0x1}, {{@in6=@mcast1, 0x4d6, 0x32}, 0xa, @in=@local, 0x3504, 0x2, 0x3, 0x100000001, 0x5, 0xbd5, 0x1}}, 0xe8) ioctl$VIDIOC_ENUMAUDOUT(r2, 0xc0345642, &(0x7f0000001e80)={0x9, "961744208d031a1d5ca4190ba2bb305b2ed7c1e28d7979624f9aeaf4876fc0d6", 0x1, 0x1}) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001ec0), 0x4) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000001f00)) getsockopt$inet_int(r3, 0x0, 0xf, &(0x7f0000001f40), &(0x7f0000001f80)=0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000002000)={0x0, 0x38, &(0x7f0000001fc0)=[@in6={0xa, 0x4e22, 0x6, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1a}}, 0x3}, @in6={0xa, 0x4e22, 0x9c, @ipv4, 0x8}]}, &(0x7f0000002040)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000002080)={0x6, 0x6, 0x200, 0x4, 0x9, 0x80, 0x9e0f, 0x100, r6}, &(0x7f00000020c0)=0x20) syz_execute_func(&(0x7f0000002100)="c4c178ae9d0866d21d4084d6c4224128228fa8789ed94a0f1f4000477f9643db4d22c46271077ffe660ff6cdc4a17172e008") getsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000002140), &(0x7f0000002180)=0x10) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f00000021c0)={0x80, 0x0, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x0) ioctl$TCSBRK(r2, 0x5409, 0x5) openat$ion(0xffffffffffffff9c, &(0x7f0000002200)='/dev/ion\x00', 0x82200, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000002240)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f00000022c0)={r7, &(0x7f0000002280)=""/7}) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f0000002300)={0x1, 0x0, 0x1}) [ 200.586778] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 200.703612] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 200.733527] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.742847] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.750017] device bridge_slave_0 entered promiscuous mode [ 200.756639] IPVS: ftp: loaded support on port[0] = 21 [ 200.871788] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.895563] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.909826] device bridge_slave_1 entered promiscuous mode [ 201.026373] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 201.070066] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 201.165873] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 201.196001] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.203573] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.210594] device bridge_slave_0 entered promiscuous mode [ 201.224524] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 201.315905] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.322292] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.335111] device bridge_slave_1 entered promiscuous mode [ 201.418738] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 201.513784] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 201.633213] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 201.740357] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 201.762551] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 201.770339] team0: Port device team_slave_0 added [ 201.778454] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.792404] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.800689] device bridge_slave_0 entered promiscuous mode [ 201.830083] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 201.886481] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 201.907793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.925135] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 201.950157] team0: Port device team_slave_1 added [ 201.956607] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.965978] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.974490] device bridge_slave_1 entered promiscuous mode [ 201.991169] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 202.012728] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 202.023206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.076662] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 202.090397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.102342] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.155113] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 202.162590] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 202.171191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.185430] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 202.203312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.218533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.260382] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 202.272565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.301403] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 202.328603] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 202.341934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.359357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.430256] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 202.446164] team0: Port device team_slave_0 added [ 202.454291] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 202.468426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.489590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.516216] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.525787] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.533166] device bridge_slave_0 entered promiscuous mode [ 202.570239] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 202.595986] team0: Port device team_slave_1 added [ 202.608791] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.627950] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.643918] device bridge_slave_1 entered promiscuous mode [ 202.661774] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 202.685141] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 202.703290] team0: Port device team_slave_0 added [ 202.736228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.750606] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.766623] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.774263] device bridge_slave_0 entered promiscuous mode [ 202.783589] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 202.804747] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 202.811987] team0: Port device team_slave_1 added [ 202.836067] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 202.859913] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 202.875553] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.881912] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.910243] device bridge_slave_1 entered promiscuous mode [ 202.917418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.930523] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.940840] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 202.949491] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 202.967273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 203.006613] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 203.016731] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 203.025716] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 203.036202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 203.047990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 203.063080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.081107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.094711] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 203.104507] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 203.142067] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 203.163374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 203.171132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.193109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.200631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.209400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.220272] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 203.245370] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 203.252735] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.260547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.389499] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 203.396752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.407694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.433890] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 203.462640] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 203.473248] team0: Port device team_slave_0 added [ 203.567100] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 203.584459] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 203.591831] team0: Port device team_slave_1 added [ 203.617514] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 203.733198] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 203.773472] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 203.790097] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.836415] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.842958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.849882] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.856291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.889602] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 203.896543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 203.908381] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 203.919357] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 203.936054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 203.953206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.973202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.991364] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 204.012775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 204.032607] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 204.040687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.056798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.212916] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 204.220091] team0: Port device team_slave_0 added [ 204.331035] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 204.343714] team0: Port device team_slave_0 added [ 204.367550] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 204.381395] team0: Port device team_slave_1 added [ 204.403410] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 204.410642] team0: Port device team_slave_1 added [ 204.452491] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.458859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.465541] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.471893] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.499113] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 204.513203] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.532042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.604843] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.621881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.709001] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 204.722171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.737056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.763466] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 204.784125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.799619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.823135] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.829530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.836214] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.842574] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.853376] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 204.864257] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 204.878720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.891681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.911772] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 204.933210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.943174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.954337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.991291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.317917] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.324437] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.331046] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.337443] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.367128] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 205.942600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.111008] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.117417] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.124109] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.130469] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.152369] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 206.184042] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.190430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.197126] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.203514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.239466] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 206.993117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 207.023272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.903007] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.264802] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.350392] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 209.613099] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 209.651931] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.853832] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 209.860010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 209.868636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.013588] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 210.019769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.033202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.066317] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 210.161608] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.355149] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.414146] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.448668] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 210.471593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.480166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.553566] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.592915] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 210.741599] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.821728] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.898849] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 210.979900] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 210.991817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.002872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.160586] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 211.303915] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 211.310135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.323927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.380160] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.599722] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 211.612095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.619440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.740635] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.978860] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.660328] audit: type=1400 audit(1544155299.469:38): avc: denied { associate } for pid=6220 comm="syz-executor1" name="syz1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 212.876487] audit: type=1400 audit(1544155299.689:39): avc: denied { create } for pid=7662 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:01:39 executing program 1: clone(0x1fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000003, 0x20400000087) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x83, &(0x7f0000001200)={'nat\x00', 0x0, 0x0, 0x3b5, [], 0x10000334, &(0x7f00000001c0), &(0x7f0000000200)=""/4096}, &(0x7f0000000080)=0x108) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 212.962743] audit: type=1400 audit(1544155299.729:40): avc: denied { write } for pid=7662 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 213.047039] audit: type=1400 audit(1544155299.729:41): avc: denied { read } for pid=7662 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:01:39 executing program 0: capset(&(0x7f0000000100)={0x20071026}, &(0x7f00000000c0)) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000000)="2700000014000707030e0000120f0a0011000100f517363ba84fc8e3da95f5fe0012ff00000007", 0x27) [ 213.089097] kernel msg: ebtables bug: please report to author: Wrong size [ 213.105997] kernel msg: ebtables bug: please report to author: Wrong size 04:01:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000040)=""/4, &(0x7f0000000000)=0x4) [ 213.232970] capability: warning: `syz-executor0' uses deprecated v2 capabilities in a way that may be insecure 04:01:40 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0xfcda) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) 04:01:40 executing program 2: socket$key(0xf, 0x3, 0x2) 04:01:40 executing program 1: r0 = getpgid(0x0) sched_setscheduler(r0, 0x0, &(0x7f0000000180)) [ 213.421535] raw_sendmsg: syz-executor0 forgot to set AF_INET. Fix it! 04:01:40 executing program 1: ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000080)) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000180)=0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'vlan0\x00', 0xd803}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={"766c616e300000f6ffffffffffffff00", {0x2, 0x0, @local}}) dup3(r1, r2, 0x0) mkdir(0x0, 0x28) r3 = accept4$bt_l2cap(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, 0x0, &(0x7f0000000140)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rfkill\x00', 0x1, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r5 = inotify_init1(0x0) inotify_add_watch(r5, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) semget(0x2, 0x4, 0x0) open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000680)='./file0\x00', 0x0, &(0x7f0000000740)=@v3={0x3000000, [{0x488a, 0x3}, {0xfffffffffffffffe, 0xf}], r4}, 0x18, 0x3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, 0x0}, 0x10) semctl$SEM_STAT(0x0, 0x2, 0x12, &(0x7f0000000540)=""/87) 04:01:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000001a00010200000000000000000a0000000000000000000000"], 0x1}}, 0x0) 04:01:40 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x116, &(0x7f0000000d80)}}], 0x6d7, 0x40400d4) [ 213.641988] hrtimer: interrupt took 25371 ns [ 213.651948] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:01:41 executing program 3: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) set_mempolicy(0x2, &(0x7f0000000040)=0x9, 0x3) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 04:01:41 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000140)={'gre0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000240)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2200000}, 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) r0 = memfd_create(&(0x7f0000000040)='Z\x00', 0x2) write(r0, &(0x7f00000003c0)="b156d417452c8f6db1077f2abaa85f348946610dabcc617d9aeb42aa515f23c9150bfdba5ea1be4e0415cb2c3a4a1cdff5aba4a225b20c2119091edf0122e9d962c24a106835a6dbf37fb396be102345c020b4c71a49a36790a158dbe6cc2bcb635db14882673e50dd4ac29630ab6e11839b6563d3e9e08b8838e9654cfc03513e35f87570eeb92b7fabcd8de830da11c46b7e8c54", 0x95) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 04:01:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000140)="1f0000000104ff00fd4354c007110000f3e900000800010004000000ffdf00", 0x1f) 04:01:41 executing program 1: ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000080)) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000180)=0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'vlan0\x00', 0xd803}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={"766c616e300000f6ffffffffffffff00", {0x2, 0x0, @local}}) dup3(r1, r2, 0x0) mkdir(0x0, 0x28) r3 = accept4$bt_l2cap(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, 0x0, &(0x7f0000000140)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rfkill\x00', 0x1, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r5 = inotify_init1(0x0) inotify_add_watch(r5, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) semget(0x2, 0x4, 0x0) open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000680)='./file0\x00', 0x0, &(0x7f0000000740)=@v3={0x3000000, [{0x488a, 0x3}, {0xfffffffffffffffe, 0xf}], r4}, 0x18, 0x3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, 0x0}, 0x10) semctl$SEM_STAT(0x0, 0x2, 0x12, &(0x7f0000000540)=""/87) 04:01:41 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000880)="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", 0x3, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchown(r0, 0x0, 0x0) 04:01:41 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioprio_set$uid(0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) socket(0x0, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x1fc, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000001980)={0x2, &(0x7f0000000000)=[{0x94, 0x0, 0x0, 0x9}, {0x6}]}) 04:01:41 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 214.893141] audit: type=1400 audit(1544155301.709:42): avc: denied { create } for pid=7825 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 214.922078] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. [ 214.933544] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. [ 214.954612] WARNING: CPU: 0 PID: 7838 at mm/mempolicy.c:1745 alloc_pages_vma+0x1bd/0x4a0 [ 214.963079] Kernel panic - not syncing: panic_on_warn set ... [ 214.963266] kobject: 'vlan0' (0000000017cb428a): kobject_uevent_env [ 214.968996] CPU: 0 PID: 7838 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #145 [ 214.969032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.969038] Call Trace: [ 214.969060] dump_stack+0x244/0x39d [ 214.969079] ? dump_stack_print_info.cold.1+0x20/0x20 [ 215.003497] panic+0x2ad/0x55c [ 215.006681] ? add_taint.cold.5+0x16/0x16 [ 215.010821] ? __warn.cold.8+0x5/0x45 [ 215.014612] ? alloc_pages_vma+0x1bd/0x4a0 [ 215.018832] __warn.cold.8+0x20/0x45 [ 215.022533] ? rcu_softirq_qs+0x20/0x20 [ 215.026491] ? alloc_pages_vma+0x1bd/0x4a0 [ 215.030712] report_bug+0x254/0x2d0 [ 215.034338] do_error_trap+0x11b/0x200 [ 215.038220] do_invalid_op+0x36/0x40 [ 215.041915] ? alloc_pages_vma+0x1bd/0x4a0 [ 215.046138] invalid_op+0x14/0x20 [ 215.049585] RIP: 0010:alloc_pages_vma+0x1bd/0x4a0 [ 215.054413] Code: 5f 5d c3 e8 15 2f bf ff 45 89 ec 31 ff 41 81 e4 00 00 04 00 44 89 e6 e8 11 30 bf ff 45 85 e4 0f 84 50 ff ff ff e8 f3 2e bf ff <0f> 0b e9 44 ff ff ff e8 e7 2e bf ff e8 22 5e ff ff 48 89 c3 e9 6b [ 215.073294] RSP: 0018:ffff88818968ed68 EFLAGS: 00010216 [ 215.078636] RAX: 0000000000040000 RBX: ffff8881da96f280 RCX: ffffc9000be8a000 [ 215.085889] RDX: 00000000000011d2 RSI: ffffffff81c06ccd RDI: 0000000000000005 [ 215.093138] RBP: ffff88818968eda8 R08: ffff8881bfba8140 R09: ffffed10345b8a86 [ 215.100392] R10: 0000000000000002 R11: ffff8881a2dc5433 R12: 0000000000040000 [ 215.107643] R13: 00000000002742ca R14: ffff8881da96f288 R15: 0000000000000002 [ 215.114903] ? alloc_pages_vma+0x1bd/0x4a0 [ 215.119135] ? alloc_pages_vma+0x1bd/0x4a0 [ 215.123369] do_huge_pmd_anonymous_page+0x59e/0x2030 [ 215.128455] ? pick_next_task_fair+0xa05/0x1b30 [ 215.133131] ? __thp_get_unmapped_area+0x180/0x180 [ 215.138043] ? zap_class+0x640/0x640 [ 215.141746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 215.147272] ? print_usage_bug+0xc0/0xc0 [ 215.151403] ? print_usage_bug+0xc0/0xc0 [ 215.155446] ? print_usage_bug+0xc0/0xc0 [ 215.159499] ? find_held_lock+0x36/0x1c0 [ 215.163557] ? print_usage_bug+0xc0/0xc0 [ 215.167606] ? __lock_acquire+0x62f/0x4c20 [ 215.171826] ? __lock_acquire+0x62f/0x4c20 [ 215.176169] ? trace_hardirqs_on+0xbd/0x310 [ 215.180474] ? kasan_check_read+0x11/0x20 [ 215.184714] ? finish_task_switch+0x1f4/0x910 [ 215.189198] ? mark_held_locks+0x130/0x130 [ 215.193414] ? mark_held_locks+0x130/0x130 [ 215.197631] ? _raw_spin_unlock_irq+0x60/0x80 [ 215.202131] ? finish_task_switch+0x1f4/0x910 [ 215.206618] __handle_mm_fault+0x3c91/0x5be0 [ 215.211006] ? __switch_to_asm+0x34/0x70 [ 215.215055] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 215.219884] ? print_usage_bug+0xc0/0xc0 [ 215.223928] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 215.229463] ? pud_huge+0xc1/0x110 [ 215.232993] ? zap_class+0x640/0x640 [ 215.236690] ? zap_class+0x640/0x640 [ 215.240396] ? find_held_lock+0x36/0x1c0 [ 215.244453] ? handle_mm_fault+0x42a/0xc70 [ 215.248669] ? lock_downgrade+0x900/0x900 [ 215.252800] ? check_preemption_disabled+0x48/0x280 [ 215.257799] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 215.262712] ? kasan_check_read+0x11/0x20 [ 215.266846] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 215.272112] ? rcu_softirq_qs+0x20/0x20 [ 215.276072] ? trace_hardirqs_off_caller+0x310/0x310 [ 215.281166] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 215.286700] ? check_preemption_disabled+0x48/0x280 [ 215.291700] handle_mm_fault+0x54f/0xc70 [ 215.295745] ? __handle_mm_fault+0x5be0/0x5be0 [ 215.300306] ? find_vma+0x34/0x190 [ 215.303828] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 215.308827] __get_user_pages+0xa3d/0x1ea0 [ 215.313055] ? follow_page_mask+0x2160/0x2160 [ 215.317537] ? lock_downgrade+0x900/0x900 [ 215.321669] ? do_syscall_64+0x1b9/0x820 [ 215.325706] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.331051] ? zap_class+0x640/0x640 [ 215.334749] ? find_held_lock+0x36/0x1c0 [ 215.338800] ? process_vm_rw_core.isra.2+0x43a/0xe10 [ 215.343886] ? lock_release+0xa00/0xa00 [ 215.347849] ? perf_trace_sched_process_exec+0x860/0x860 [ 215.353281] ? kasan_check_read+0x11/0x20 [ 215.357408] ? do_raw_spin_unlock+0xa7/0x330 [ 215.361804] get_user_pages_remote+0x21a/0x440 [ 215.366371] process_vm_rw_core.isra.2+0x469/0xe10 [ 215.371292] ? alloc_vmap_area.cold.45+0x24/0x24 [ 215.376027] ? lock_release+0xa00/0xa00 [ 215.379977] ? perf_trace_sched_process_exec+0x860/0x860 [ 215.385411] ? usercopy_warn+0x110/0x110 [ 215.389459] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 215.394973] ? _copy_from_user+0xdf/0x150 [ 215.399108] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 215.404109] ? rw_copy_check_uvector+0x310/0x3e0 [ 215.408853] process_vm_rw+0x300/0x360 [ 215.412731] ? process_vm_rw_core.isra.2+0xe10/0xe10 [ 215.417816] ? __might_fault+0x12b/0x1e0 [ 215.421861] ? lock_downgrade+0x900/0x900 [ 215.425991] ? lock_release+0xa00/0xa00 [ 215.429945] ? perf_trace_sched_process_exec+0x860/0x860 [ 215.435374] ? posix_ktime_get_ts+0x15/0x20 [ 215.439675] ? trace_hardirqs_off_caller+0x310/0x310 [ 215.444772] ? kasan_check_read+0x11/0x20 [ 215.448901] ? _copy_to_user+0xc8/0x110 [ 215.452860] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 215.458382] ? put_timespec64+0x10f/0x1b0 [ 215.462510] ? nsecs_to_jiffies+0x30/0x30 [ 215.466642] ? do_syscall_64+0x9a/0x820 [ 215.470592] ? do_syscall_64+0x9a/0x820 [ 215.474547] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 215.479109] ? trace_hardirqs_on+0xbd/0x310 [ 215.483408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 215.488927] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.494277] __x64_sys_process_vm_writev+0xe3/0x1a0 [ 215.499277] do_syscall_64+0x1b9/0x820 [ 215.503146] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 215.508504] ? syscall_return_slowpath+0x5e0/0x5e0 [ 215.513433] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 215.518257] ? trace_hardirqs_on_caller+0x310/0x310 [ 215.523251] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 215.528260] ? prepare_exit_to_usermode+0x291/0x3b0 [ 215.533258] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 215.538088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.543273] RIP: 0033:0x457569 [ 215.546445] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 215.565414] RSP: 002b:00007f89be902c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 [ 215.573109] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457569 [ 215.580372] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000103 [ 215.587635] RBP: 000000000072bf00 R08: 000000000000023a R09: 0000000000000000 [ 215.594885] R10: 0000000020121000 R11: 0000000000000246 R12: 00007f89be9036d4 [ 215.602137] R13: 00000000004c37fc R14: 00000000004d5a20 R15: 00000000ffffffff [ 215.611051] Kernel Offset: disabled [ 215.614797] Rebooting in 86400 seconds..