Warning: Permanently added '10.128.1.2' (ECDSA) to the list of known hosts. 2020/03/16 00:29:44 fuzzer started [ 141.189680][ T32] audit: type=1400 audit(1584318584.231:42): avc: denied { map } for pid=12101 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/03/16 00:29:49 dialing manager at 10.128.0.26:39629 2020/03/16 00:29:50 syscalls: 2967 2020/03/16 00:29:50 code coverage: enabled 2020/03/16 00:29:50 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2020/03/16 00:29:50 extra coverage: enabled 2020/03/16 00:29:50 setuid sandbox: enabled 2020/03/16 00:29:50 namespace sandbox: enabled 2020/03/16 00:29:50 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/16 00:29:50 fault injection: enabled 2020/03/16 00:29:50 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/16 00:29:50 net packet injection: enabled 2020/03/16 00:29:50 net device setup: enabled 2020/03/16 00:29:50 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/16 00:29:50 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 147.305830][ T32] audit: type=1400 audit(1584318590.351:43): avc: denied { integrity } for pid=12116 comm="syz-executor" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 00:32:36 executing program 0: [ 313.915750][ T32] audit: type=1400 audit(1584318756.961:44): avc: denied { map } for pid=12118 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=17437 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 314.461596][T12119] IPVS: ftp: loaded support on port[0] = 21 [ 314.677223][T12119] chnl_net:caif_netlink_parms(): no params data found [ 314.833655][T12119] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.841246][T12119] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.851994][T12119] device bridge_slave_0 entered promiscuous mode [ 314.867683][T12119] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.877282][T12119] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.886799][T12119] device bridge_slave_1 entered promiscuous mode [ 314.937744][T12119] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 314.958879][T12119] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 315.007264][T12119] team0: Port device team_slave_0 added [ 315.021795][T12119] team0: Port device team_slave_1 added [ 315.066714][T12119] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 315.074086][T12119] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 315.101066][T12119] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 315.119937][T12119] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 315.127687][T12119] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 315.155115][T12119] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 315.250539][T12119] device hsr_slave_0 entered promiscuous mode [ 315.323504][T12119] device hsr_slave_1 entered promiscuous mode [ 315.839142][ T32] audit: type=1400 audit(1584318758.881:45): avc: denied { create } for pid=12119 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 315.872619][T12119] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 315.893121][ T32] audit: type=1400 audit(1584318758.911:46): avc: denied { write } for pid=12119 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 315.918754][ T32] audit: type=1400 audit(1584318758.911:47): avc: denied { read } for pid=12119 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 315.931449][T12119] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 316.023627][T12119] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 316.153673][T12119] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 316.515828][T12119] 8021q: adding VLAN 0 to HW filter on device bond0 [ 316.554206][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 316.564150][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 316.593027][T12119] 8021q: adding VLAN 0 to HW filter on device team0 [ 316.620549][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 316.632141][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.641741][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.649867][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.662959][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 316.686877][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 316.696647][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 316.706209][ T3910] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.713624][ T3910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.763475][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 316.774831][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 316.785771][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 316.796321][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 316.855235][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 316.870640][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 316.881647][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 316.892156][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 316.902084][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 316.911844][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 316.921532][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 316.939845][T12119] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 317.017918][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 317.026309][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 317.064456][T12119] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 317.144803][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 317.155220][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 317.221797][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 317.231984][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 317.258647][T12119] device veth0_vlan entered promiscuous mode [ 317.268534][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 317.278336][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 317.319080][T12119] device veth1_vlan entered promiscuous mode [ 317.400397][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 317.410902][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 317.420671][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 317.430665][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 317.455908][T12119] device veth0_macvtap entered promiscuous mode [ 317.478011][T12119] device veth1_macvtap entered promiscuous mode [ 317.540497][T12119] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 317.549405][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 317.559067][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 317.568600][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 317.578926][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 317.608697][T12119] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 317.620460][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 317.631885][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 318.083476][ T32] audit: type=1400 audit(1584318761.121:48): avc: denied { associate } for pid=12119 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 00:32:41 executing program 0: 00:32:41 executing program 0: 00:32:41 executing program 0: 00:32:41 executing program 0: 00:32:42 executing program 0: 00:32:42 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000040)="020185ffffff0a000000ff45ac0000ffffffa500080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) r0 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r2 = dup2(r0, r1) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) r3 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) dup2(r3, r4) r5 = pidfd_getfd(r2, r3, 0x0) read$alg(r5, &(0x7f00000002c0)=""/4096, 0x1000) [ 319.386028][T12158] loop0: p1 < > p2 p3 < > p4 < p5 > [ 319.391447][T12158] loop0: partition table partially beyond EOD, truncated [ 319.399246][T12158] loop0: p1 start 10 is beyond EOD, truncated [ 319.405482][T12158] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 319.440325][T12158] loop0: p3 start 225 is beyond EOD, truncated [ 319.446736][T12158] loop0: p4 size 2 extends beyond EOD, truncated [ 319.455582][T12158] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 319.539291][T12163] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 319.553147][T12158] __loop_clr_fd: partition scan of loop0 failed (rc=-16) [ 319.553192][ T3276] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 319.553250][ T3276] Buffer I/O error on dev loop0p2, logical block 0, async page read [ 319.582856][T12165] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 319.583643][ T3276] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 319.605471][ T3276] Buffer I/O error on dev loop0p2, logical block 0, async page read [ 319.613825][ T3276] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 319.625266][ T3276] Buffer I/O error on dev loop0p4, logical block 0, async page read [ 319.633614][ T3276] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 319.644605][ T3276] Buffer I/O error on dev loop0p2, logical block 0, async page read [ 319.653065][ T3276] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 319.661308][T12166] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 319.664090][ T3276] Buffer I/O error on dev loop0p4, logical block 0, async page read 00:32:42 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80800, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000040)=0x9, 0x4) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x18) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @null}, [@null, @rose, @netrom, @default, @bcast, @remote, @remote, @bcast]}, &(0x7f0000000200)=0x48, 0x80800) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000240)={@local, 0x0}, &(0x7f0000000280)=0x14) ioctl$sock_SIOCDELRT(r2, 0x890c, &(0x7f00000002c0)={0x0, @in={0x2, 0x4e20, @remote}, @nfc={0x27, 0x0, 0x2, 0x6}, @xdp={0x2c, 0x8, r3, 0x32}, 0x101, 0x0, 0x0, 0x0, 0x80, 0x0, 0x80000001, 0x9}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000380)=0x1c) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000480), &(0x7f00000004c0)=0x4) sendmsg$alg(r4, &(0x7f0000000980)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000500)="741db35e854a19e69188452e784e9f68a9afee6e03b92fc6ab01121a2f8a414d226f1f042812106c434e5e4e07c5cf721ec2759149d4b57c0aca2bf84f1f526b559cba4869780291ebe9475e21595a8df58de7c4edd24ccc7dddffd6df2e385e479cc79df990c0001ea5ee08007e161335e7f62c9984fa8d82a37bbbe3811426ef3e26e66f14493d9aea090941fa58563ada67f862b74800a266d1f6da3d4e2820c501", 0xa3}, {&(0x7f00000005c0)="f1f6c62b06e1cc654e4676b11e14974b8147e4d8b60894d04d7efbd80137abdde6f9a79f18b189e0fc74628b918842ec0355b548e2693c4b4f4a88cb65771dfd603fa5770e419d0e37ab7259a0ab9059de15c7f5d055a8a1cf9e51121505662a4f55701a27bb8ecd73a7375f5cd514b5eb84d3f65727a94c413751209ca58e78656f50dfdc5a", 0x86}, {&(0x7f0000000680)="e68b6887323ba2e1aaa0a326f3ab5b1a98dfdfd5dc4a5bcdb068f4f929184307fc78719b3c8282561889b6912e40ce05a86a35192bd4337c77c1eb76aaa27817bf4d8684b64fabd71389c634f57e532c7fb5cdfb0bdea73485502b14280428d97e5b50f25d6533dcca2f593458dd975e0c04a8a36dd759ecc3e045a29757d1610f6c2bc28e48e4e66b9d9724b271ac5fe44d13832b14a1ff9b645f828490a206532d084635fb29cfd6ad3a4390166d87157c2c0c972d57eef7b1f5e60a974b94eaa404d65fb45f1110a415e3a18f0adc", 0xd0}, {&(0x7f0000000780)="e306fc91bd4085a3509763f970d0f9eea08b8531f24ea6605beacc40c4c5f3f1b0bb0f721233207449293306277d4b47c14056efd8d5b9e8878f87c0555aa07843aeb1ad55aa9bc1ceb492e66d1eae67a3b916f6ad334ef455ec5006e77b192bcf20869b68e8a0cfe4097ddf36ae5858a41de404f92779d306a534e3c5392f6c8a", 0x81}, {&(0x7f0000000840)="171b62e7153cba4ec54b412a5e45df93243e507c24634857942f1b15985cd668c5c7b476b756b238245399ec6d9140242569a0df1c81c5902fa9ab34c8bb1e08e505108c9f253087c095cc433f1caf0e2f813fe01b6505a4c9f59153eeb54a44", 0x60}], 0x5, &(0x7f0000000900)=[@op={0x10, 0x117, 0x3, 0x1}, @op={0x10, 0x117, 0x3, 0x1}, @op={0x10}, @op={0x10, 0x117, 0x3, 0x1}, @op={0x10, 0x117, 0x3, 0x1}], 0x50, 0x801}, 0x4) set_mempolicy(0x0, &(0x7f00000009c0)=0xffffffff, 0x2) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/vsock\x00', 0x101002, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r5, 0xc0086418, &(0x7f0000000a40)={0x4, 0x1, 0x5fbe, 0x2, 0x1f, 0x8}) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/thread-self\x00', 0x2, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setflags(r6, 0x2, 0x1) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000ac0)='tls\x00', 0x4) [ 319.664272][ T3276] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 319.675204][T12166] Buffer I/O error on dev loop0p2, logical block 0, async page read [ 319.702914][ T3276] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 319.713959][ T3276] Buffer I/O error on dev loop0p4, logical block 0, async page read [ 319.722197][ T3276] Buffer I/O error on dev loop0p2, logical block 0, async page read [ 319.730554][ T3276] Buffer I/O error on dev loop0p5, logical block 0, async page read [ 319.738839][ T3276] Buffer I/O error on dev loop0p4, logical block 0, async page read [ 319.938892][T12158] loop0: p1 < > p2 p3 < > p4 < p5 > [ 319.944866][T12158] loop0: partition table partially beyond EOD, truncated [ 319.953018][T12158] loop0: p1 start 10 is beyond EOD, truncated [ 319.959167][T12158] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 319.969030][T12158] loop0: p3 start 225 is beyond EOD, truncated [ 319.975646][T12158] loop0: p4 size 2 extends beyond EOD, truncated [ 319.986980][T12158] loop0: p5 size 1073741824 extends beyond EOD, truncated 00:32:43 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, 0x2, {0x1f}}, 0x18) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/access\x00', 0x2, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r2 = dup2(r0, r1) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f0000000140)) syz_emit_ethernet(0x32e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r5 = dup2(r3, r4) getsockname$tipc(r5, 0x0, &(0x7f0000000080)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000080)={r8}, 0x14) ioctl$KDSKBENT(r5, 0x4b47, &(0x7f0000000180)={0x3f, 0xff, 0x6}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000080)={r8, 0x6d, "6c5defc78eb136701bf3e7e555d418f8281ba2536a4a41b6fc3c618a9c1e7d4c6fe0ae82eb67a48ee9f6c4726ae40497dafd520ddbb13c131daaaa4276b206aff1ce0527f6e3d3250f4fba36af903455abc13126a50196695e121c3fc20a0b5b94daeb9e2be1598abfcec2f9f5"}, &(0x7f0000000100)=0x75) [ 320.398340][T12177] IPVS: ftp: loaded support on port[0] = 21 00:32:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet(0xa, 0x801, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={r4}, 0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={r4, @in6={{0xa, 0x4e22, 0x6, @dev={0xfe, 0x80, [], 0x1d}, 0xa6b}}, 0x80000001, 0x9, 0x4, 0x9, 0xfffffffa}, &(0x7f0000000180)=0x98) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a840200400402000a00000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c89", 0x48}], 0x1}, 0x0) [ 320.719044][T12177] chnl_net:caif_netlink_parms(): no params data found [ 321.067838][T12177] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.075338][T12177] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.105947][T12177] device bridge_slave_0 entered promiscuous mode [ 321.127689][T12177] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.135081][T12177] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.144411][T12177] device bridge_slave_1 entered promiscuous mode [ 321.247501][T12177] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 321.291634][T12177] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 321.381137][T12177] team0: Port device team_slave_0 added [ 321.410799][T12177] team0: Port device team_slave_1 added [ 321.481703][T12177] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 321.488973][T12177] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 321.515131][T12177] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 321.532714][T12177] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 321.539776][T12177] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 321.565860][T12177] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 321.659628][T12177] device hsr_slave_0 entered promiscuous mode [ 321.694954][T12177] device hsr_slave_1 entered promiscuous mode [ 321.732996][T12177] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 321.740818][T12177] Cannot create hsr debugfs directory [ 322.140564][T12177] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 322.206358][T12177] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 322.282976][T12177] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 322.354130][T12177] netdevsim netdevsim1 netdevsim3: renamed from eth3 00:32:45 executing program 0: listen(0xffffffffffffffff, 0x800000000000401) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x3, 0x0, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r2 = dup2(r0, r1) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) r3 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r3, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="1d000000dad8bca641b1f88c467fc2b76e86f1acbc25e5a1ccc6a321a8c4e44cba1b208b1a0b155e21e7d36b7b2f908c77432ca4666c07df4bf18c76ac670aee2e0bef9de1173f6988cb", @ANYRES16=r4, @ANYBLOB="000326bd7000ffdbdf250400000008000200070000004eb6125380a08babc21d3ee5a09b7270cf8112a5575a1ce9"], 0x1c}, 0x1, 0x0, 0x0, 0x4000011}, 0x11) sendmsg$NLBL_CIPSOV4_C_LISTALL(r2, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)={0x340, r4, 0x8, 0x70bd29, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x74, 0xc, 0x0, 0x1, [{0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf146}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7ef747ba}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1191}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b7a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3df1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7ff2e424}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x45a0b956}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8f39}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x68d4c91b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76c98793}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xe054f97}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x66334060}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8724}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x6}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x4c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41f2cd4f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc45e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1a6c0dbe}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4780}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x578f4f8c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3157}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdaed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcce6}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x138, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x49}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfa}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x81}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d3c309b}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xca}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1c5c1f4b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x18852c56}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x659990bf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3433bd78}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb9}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x92}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x78a93a4b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3763de6d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x76}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5837796d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x89}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x61679232}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x38}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x424d993e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x55ee990f}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2302c37e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2a}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x531b0902}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x8ed8b39}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf7}]}]}, @NLBL_CIPSOV4_A_DOI={0xfffffffffffffec7, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4c, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x48ff633c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1ef8bfc7}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6bac53cc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x250eef43}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x70}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x77de9876}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x42ac15d2}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xa8, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5a318789}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x290b446b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x10a4543a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbc}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5822489a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4bfac355}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x196f0802}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2041da92}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x45a6bc0e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e22b8db}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x42}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x38b306b5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x83}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x32d9d93a}]}]}]}, 0x340}, 0x1, 0x0, 0x0, 0x20008045}, 0x40084) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x80, 0x3, 0x1a00, 0x3, 0x3, 0x1ff, 0x9, 0xc, 0x0, 0x19, 0x8, 0x80, 0x103, 0x8, 0x68, 0x3], 0xd000, 0x348880}) r5 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r7 = dup2(r5, r6) getsockname$tipc(r7, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_INITMSG(r7, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x8) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000880)={&(0x7f0000000f40)=ANY=[@ANYBLOB="a4050000", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="14000200776731000000000000000000000000000800050000000000"], 0x5a4}, 0x1, 0x0, 0x0, 0x5}, 0x4c085) readlinkat(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000700)=""/248, 0xf8) [ 322.705561][T12177] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.783764][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 322.795216][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.817662][T12177] 8021q: adding VLAN 0 to HW filter on device team0 [ 322.825264][ T32] audit: type=1400 audit(1584318765.871:49): avc: denied { open } for pid=12193 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 322.825370][ T32] audit: type=1400 audit(1584318765.871:50): avc: denied { confidentiality } for pid=12193 comm="syz-executor.0" lockdown_reason="unsafe use of perf" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 [ 322.895241][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 322.907566][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 322.916961][ T3910] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.924222][ T3910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.936475][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 322.954498][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 322.964042][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.973250][T12125] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.980462][T12125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.051759][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 323.061820][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 323.072934][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 323.083418][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 323.134410][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 323.144381][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 323.154821][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 323.166241][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 323.175940][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 323.193042][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 323.202964][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 323.228825][T12177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 00:32:46 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0xf) socket(0x28, 0xa, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x20380, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000180)='.*\x00', &(0x7f00000001c0)="c11b3f5bc2d7ee30a131dfd212d4cd831d256224b1be6562428f5e52ed983249760cc7907d003a71118e40a77ae00e259bf7d71dfa65a177442a73af5c1bf115c421626678246829fcc5ae89a9d8789ac7f60f741b5c5eff4791bd398c6e2c59c4e753bfb520e3847f78d752a5cc44c643f026e0aeebc284a807932b", 0x7c) r1 = socket$pptp(0x18, 0x1, 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x36) setuid(r2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x8a040, 0x0) fcntl$setlease(r3, 0x400, 0x0) r4 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r6 = dup2(r4, r5) getsockname$tipc(r6, 0x0, &(0x7f0000000080)) ioctl$KVM_CHECK_EXTENSION_VM(r6, 0xae03, 0xfffff801) setreuid(0x0, 0x0) truncate(&(0x7f0000000040)='./file1\x00', 0x1) fcntl$setlease(r3, 0x400, 0x2) [ 323.320682][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 323.328908][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 323.383826][T12177] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 323.460757][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 323.471374][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 323.552300][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 323.562127][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 323.587589][T12177] device veth0_vlan entered promiscuous mode [ 323.598455][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 323.607828][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 323.647434][T12177] device veth1_vlan entered promiscuous mode 00:32:46 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r2 = dup2(r0, r1) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f0000000080)="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") r3 = socket$inet6(0xa, 0x5, 0x0) r4 = creat(&(0x7f0000001080)='./file0\x00', 0x84) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000a00)={0x9, 0x108, 0xfa00, {r7, 0x0, "adf85a", "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"}}, 0x110) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f00000010c0)={0x15, 0x110, 0xfa00, {r7, 0x4, 0x0, 0x0, 0x0, @ib={0x1b, 0x7fff, 0x5, {"77be442d9457d2f139c4050000008c13"}, 0xcf02, 0xb647, 0x240c}, @ib={0x1b, 0x5, 0xe23f, {"9d3770bae02f89aee2fa31ea777816e0"}, 0xfffffffffffffffe, 0x8000, 0x7}}}, 0x118) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r8}) mlock(&(0x7f0000ff7000/0x7000)=nil, 0x7000) [ 323.759321][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 323.768734][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 323.778295][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 323.787984][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 323.835755][T12177] device veth0_macvtap entered promiscuous mode [ 323.860246][T12177] device veth1_macvtap entered promiscuous mode [ 323.894742][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 323.904399][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 323.973624][T12177] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 323.984192][T12177] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 323.997697][T12177] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 324.009223][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 324.019837][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 324.053622][T12177] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 324.064328][T12177] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 324.077892][T12177] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 324.085935][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 324.095977][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 00:32:47 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r3 = dup2(r1, r2) r4 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r6 = dup2(r4, r5) getsockname$tipc(r6, 0x0, &(0x7f0000000080)) getsockname$tipc(r6, 0x0, &(0x7f0000000080)=0xfffffffffffffe3e) socket$l2tp6(0xa, 0x2, 0x73) mmap$snddsp_control(&(0x7f0000ffd000/0x3000)=nil, 0x1000, 0x2000001, 0x80010, r3, 0x83000000) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14}}}}]}, 0x48}}, 0x0) r10 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r10, &(0x7f00000000c0), 0x49249249249265a, 0x0) [ 324.458490][ T32] audit: type=1400 audit(1584318767.501:51): avc: denied { map } for pid=12219 comm="syz-executor.0" path="socket:[30055]" dev="sockfs" ino=30055 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=socket permissive=1 [ 324.886672][T12233] Unknown ioctl -1073191912 [ 324.937423][T12234] Unknown ioctl -1073191912 00:32:48 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000100)={0x4, &(0x7f0000000080)=[{0x9, 0x4e}, {0x7f, 0x3}, {0x8b03, 0x6e1c}, {0x800, 0x2}]}) r2 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r4 = dup2(r2, r3) getsockname$tipc(r4, 0x0, &(0x7f0000000080)) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$smc(&(0x7f0000000080)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r6, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x20}}, 0x0) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r6, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000800}, 0x20000000) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, 0x0, 0x10, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x2, @media='eth\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20008010}, 0x20000000) 00:32:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x10}, [@ldst={0x6, 0x0, 0x5, 0x5, 0x0, 0x0, 0xffffffff}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r0 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r2 = dup2(r0, r1) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x9) [ 325.285750][ T32] audit: type=1400 audit(1584318768.331:52): avc: denied { prog_load } for pid=12243 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:32:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) r1 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) r3 = dup2(r1, r2) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) r4 = socket(0x2c, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r5) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r7 = socket(0x10, 0x2, 0x0) r8 = open(&(0x7f0000000000)='./file0\x00', 0x202001, 0x15d) setsockopt$inet6_udp_int(r8, 0x11, 0x65, &(0x7f0000000100)=0x6, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0x9) ioctl$TUNSETGROUP(r6, 0x400454ce, r9) fchown(r3, r5, r9) sendto$inet6(r0, &(0x7f00000000c0)='X', 0x1, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$PPPIOCSMRU(r4, 0x40047452, &(0x7f0000000140)=0x20) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 325.597694][ T32] audit: type=1400 audit(1584318768.641:53): avc: denied { prog_run } for pid=12243 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:32:48 executing program 1: unshare(0x2040400) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000001740)=[{0x0}, {0x0}, {0x0}, {0x0, 0xffffffffffffff68}, {0x0}, {0x0}, {0x0, 0xfffffe78}, {0x0}, {0x0, 0x25}], 0x9, 0x2) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp1\x00', 0x0, 0x0) 00:32:49 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r2 = dup2(r0, r1) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) sendmsg$alg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="45dcec4cab21a0c1ed20f81710e1029ccd69528271a5a16d8c6b69b24996295b94e8a7346d6121afda896c651bb4fdad", 0x30}], 0x1, 0x0, 0x0, 0x4081}, 0x4000) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$xdp(0x2c, 0x3, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) unshare(0x20400) mknod(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000600)='./bus\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r5 = dup2(r3, r4) getsockname$tipc(r5, 0x0, &(0x7f0000000080)) getsockopt$inet6_int(r5, 0x29, 0x18, &(0x7f00000001c0), &(0x7f0000000240)=0x4) 00:32:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x801}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x1}]}}}]}, 0x3c}}, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r3 = dup2(r1, r2) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000080)={r6}, 0x14) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000080)={r6, @in6={{0xa, 0x4e23, 0x5, @local, 0x3f}}, 0x8, 0x2, 0x40, 0x20, 0x7c, 0x8, 0x5}, &(0x7f0000000000)=0x9c) [ 326.316131][T12269] 8021q: adding VLAN 0 to HW filter on device bond1 [ 326.441407][T12269] 8021q: adding VLAN 0 to HW filter on device bond2 00:32:49 executing program 1: syz_emit_ethernet(0x22, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x11, 0x14, 0x0, 0x0, 0x0, 0x21, 0x0, @empty, @multicast1}}}}}, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r3 = dup2(r1, r2) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) write$cgroup_type(r3, &(0x7f0000000040)='threaded\x00', 0x9) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 00:32:49 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r3 = dup2(r1, r2) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0x1, 0x0, 0x4}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4) [ 326.849741][T12279] dccp_invalid_packet: pskb_may_pull failed [ 326.992263][T12279] dccp_invalid_packet: pskb_may_pull failed 00:32:50 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r2 = dup2(r0, r1) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000180)={'veth1_to_team\x00', 0x200}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x101082, 0x0) getsockopt$netlink(r3, 0x10e, 0x2, &(0x7f0000000080)=""/39, &(0x7f0000000140)=0x27) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e00000032000502d25a80648c6356c10324fc000c0000000a000900053582c1b0acea8b09000380feff0003d1bd", 0x2e}], 0x1}, 0x0) [ 327.245128][T12288] netlink: 'syz-executor.1': attribute type 9 has an invalid length. [ 327.421018][T12290] netlink: 'syz-executor.1': attribute type 9 has an invalid length. 00:32:50 executing program 1: r0 = socket(0x102010800000011, 0x2, 0xfffffffffffffffd) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') sendfile(r0, r1, &(0x7f0000000040)=0x258, 0x92da) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000080)={0x4, 0x6, 0x7ff, 0x1f, 0x36, 0x1, 0x401}, 0xc) 00:32:51 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="0201bfffffff0a000000ff45ac000000000063000800000000000000024000ffffff82000000e1000000887700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r2 = dup2(r0, r1) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000040)={0x5}) 00:32:51 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r2 = dup2(r0, r1) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_ZERO(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r3, 0x1, 0x0, 0x0, {0xc}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x1c}}, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f000045fff8)={0x0, 0x0}) clone3(&(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000001880)=[r6], 0x1}, 0x50) r7 = syz_open_procfs(r6, &(0x7f0000000140)='net/ip_mr_vif\x00') ioctl$TIOCNOTTY(r7, 0x5422) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r3, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xd2e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000801}, 0x40) request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) [ 328.201761][T12297] loop0: p1 p2 p3 p4 [ 328.206497][T12297] loop0: partition table partially beyond EOD, truncated [ 328.214187][T12297] loop0: p1 start 10 is beyond EOD, truncated [ 328.220331][T12297] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 328.235083][T12297] loop0: p3 start 225 is beyond EOD, truncated [ 328.241473][T12297] loop0: p4 size 3657465856 extends beyond EOD, truncated [ 328.435191][T12297] loop0: p1 p2 p3 p4 [ 328.439279][T12297] loop0: partition table partially beyond EOD, truncated [ 328.447060][T12297] loop0: p1 start 10 is beyond EOD, truncated [ 328.453423][T12297] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 328.543590][T12297] loop0: p3 start 225 is beyond EOD, truncated [ 328.549933][T12297] loop0: p4 size 3657465856 extends beyond EOD, truncated 00:32:51 executing program 0: syz_mount_image$xfs(&(0x7f00000001c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x3}, {&(0x7f0000000040)="209e2fe2db0e3791c6e2c580d22ae165fc42a1157ecf0708d82813fbea87250f8c226c875ebbeda2bda58750a3d0cb10e4344bc340af04459aa28defe43dd7cc10e6e9280c2996af69a62e1bb733219617948f41c41b1743b97daeeafc86c8f488feaffb98db63329ae1119d9d36aee3cedd951a3fa852f6d6b2abe780ee5be729c386c3e97fcb9a92ccdec965ce986f8139f4c571d86f66f5b3036cfe378b9d200000002d5bc8c68b4997b248f494b40a92939a7af828d63249eea58fd9a674376a7da5c3c9d8373e8e5284bbbe087db43397de", 0xd4, 0x4}, {&(0x7f0000000200)="5c295a8009a32f8783fa984fcfcf1ba50faf8e7f4728c257a13a708b3a2af68ef2e86849fa70d741766bd0417947914a842a60abac61d1d8b43f32e33ea9ad5e097088f9269fe1118bf740ca084bb9fb439bf6a61fc7146bebe1dc3441996317bbffbce89354ff8692ccf21ec706cd8f50aeee87aa9585b3cf2aecde1f0a3c6d57da6b9dcc05238ade64d1bc422cc5303b92fd1a814ffc1b24cbe24b13057df9e9703bfd74d621715e315e15b9e0ec", 0xaf, 0x80}, {&(0x7f00000002c0)="a1db0dca2bfc127b2369f96495e13a80f9bbae28ee22ebfbbf3bce27f98c8bf20dd81a0a54346029a527c61c259119e8f6e17637811c9653d0181ac584d35bcbf4a23bcbbc2b7fda053b30682ac077b21c587f98a41bd4cad106c37bd89175ac6980c6b42160d904301a06cf56a9", 0x6e, 0x7fffffff}], 0x8002, 0x0) 00:32:51 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x8001}, 0x10) write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff8070000000100000000000000080009000d000000", 0x24) socket$rds(0x15, 0x5, 0x0) 00:32:51 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x208400, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x963) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x400400) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0xbb, 0x100c0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) setsockopt$inet6_dccp_buf(r3, 0x21, 0x2, &(0x7f00000000c0)="685e638112aa3f848df86be1686855c26fae2d0cd7e9059013236084f7a3bbb498f335968ddb850a4eb3d894f9a7be7e4c464c6d6bd5c6d67664da7ad67f0b99f23db317ae5d03679eceebfcb6ec5a85353999481e176704f96f878a9b2d5df2d8d52da05dd17d6d34e0bc8154cf72a4dd235748675f4066b26faf52dbcfb4307558dd18669028e1f9f3e76f56ff824fae8f0efd81e6ec7b878b307c8a2b2b7701540572f318", 0xa6) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x480, 0x0) bind$isdn(r4, &(0x7f00000001c0)={0x22, 0xad, 0x0, 0x7, 0x15}, 0x6) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000200)=0x100) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000240)) sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x48, 0x3, 0x6, 0x3, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20}, 0x44001) r5 = getpgrp(0xffffffffffffffff) fcntl$setownex(r4, 0xf, &(0x7f00000003c0)={0x2, r5}) socket$netlink(0x10, 0x3, 0xc) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r2, 0xc0044d03, &(0x7f0000000400)=0x15) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/keys\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r6, 0x80404521, &(0x7f0000000480)=""/52) ioctl$sock_ifreq(0xffffffffffffffff, 0x8916, &(0x7f0000000500)={'ip6tnl0\x00', @ifru_settings={0x80000001, 0x3, @te1=&(0x7f00000004c0)={0x8, 0x6, 0x5, 0x8}}}) 00:32:52 executing program 1: unshare(0x2a000400) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x1ff}}, 0x18) unshare(0x10020600) 00:32:52 executing program 1: socket(0x10, 0x3, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r2 = dup2(r0, r1) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) connect$netlink(r2, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x40000000}, 0xc) 00:32:52 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) dup2(r2, r3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000c76f4503775e3a23a7073ab87e54d66704d2654729"], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x3c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00', r7}) r9 = socket(0x2c, 0x3, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r10) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@multicast1, @in6=@rand_addr="2c7043f61933fe197a61f63bb548ca17", 0x4e23, 0x0, 0x4e23, 0x200, 0x2, 0x20, 0x20, 0x11, r8, r10}, {0x0, 0x81, 0x0, 0x20, 0x3, 0x8000, 0x9}, {0x10001, 0x1, 0x6, 0x20}, 0x1, 0x6e6bbf, 0x2, 0x1, 0x1, 0x3}, {{@in=@multicast1, 0x4d6, 0x6c}, 0xa, @in=@broadcast, 0x3506, 0x3, 0x1, 0xe1, 0x9, 0x5}}, 0xe4) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r1, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) 00:32:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x11, 0x8}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x0, 0x3, 0xa5, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000080)=0x8, 0x4) [ 329.685438][ T32] audit: type=1804 audit(1584318772.731:54): pid=12349 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir734773676/syzkaller.FA0nGn/19/bus" dev="sda1" ino=16536 res=1 [ 329.758975][T12349] device macvlan2 entered promiscuous mode [ 330.068596][ T32] audit: type=1400 audit(1584318773.111:55): avc: denied { map } for pid=12347 comm="syz-executor.0" path="socket:[30290]" dev="sockfs" ino=30290 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_route_socket permissive=1 [ 330.121867][T12357] IPVS: ftp: loaded support on port[0] = 21 00:32:53 executing program 0: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x7}, 0x18) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xc4, 0x1) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="2d004ac2cad9e6346214a9c5511ab1048bbe075b39c6b348e5ae7284cd3c083e396144d84ac568193d9eecde7c53"]) 00:32:53 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self\x00', 0xa02, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x2, 0x0, 0x0, 0x79, 0x11, 0xa8}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 00:32:53 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7f, 0x111800) r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r3 = dup2(r1, r2) getsockname$tipc(r3, 0x0, &(0x7f0000000080)) setsockopt$inet_dccp_buf(r3, 0x21, 0xe, &(0x7f0000000080)="6932e14a4553e557d38b2bd6e323fb927ae85efaf42a8b8b2d80f9f28eebc451b41fd7377e44fad4a6762a5401bc9b388afb8611d8277f404a405daa368dc8d86606c872998bbaa5bf9c2a55586dcb79b9553546887623d079a4637d6051f964b406aa32e17f2d8c6d6203b3c4a225a2f0eafe69548dacae1e4c099649a1d6479e33d59d82eaa9bb205bbae03fb78f351b2e3f2aed66490b4fa92479abe6c160877830be69be8be6f5aa751da662d3056743095c15d3adbe371cbe5f25d1558cbf2eac0ac505b4f97dec8cff3bf61f81a7bde9ef92cff7336c42910dc065ba031835", 0xe2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r4 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r6 = dup2(r4, r5) getsockname$tipc(r6, 0x0, &(0x7f0000000080)) getsockopt$inet_mreqn(r6, 0x0, 0x24, &(0x7f00000001c0)={@multicast2, @dev}, &(0x7f0000000200)=0xc) syz_read_part_table(0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000040)="0201a6ffffff0a000000ff45ac0000ffffffa600080000000000000000400000000063000000e1000000887700720030070063000fffff000000008000da55aa", 0x40, 0x5c1}]) r7 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff}, 0x84000) r9 = dup2(r7, r8) getsockname$tipc(r9, 0x0, &(0x7f0000000080)) r10 = accept4$unix(r9, &(0x7f0000000240)=@abs, &(0x7f00000002c0)=0x6e, 0x80000) sendfile(r10, r2, &(0x7f0000000300)=0x4, 0x5) [ 330.433654][T12365] 9pnet: Insufficient options for proto=fd [ 330.489456][T12368] 9pnet: Insufficient options for proto=fd [ 330.572562][T12357] chnl_net:caif_netlink_parms(): no params data found 00:32:53 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r2 = dup2(r0, r1) socketpair(0x26, 0x2, 0x4, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) close(r4) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r6 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x1c, r5, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r5, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x8b}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x5880) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000040)={0x3000, 0x0, 0xfffffd3a, 0x3ff, 0x6}) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) [ 330.653364][T12371] Dev loop1: unable to read RDB block 5 [ 330.659235][T12371] loop1: unable to read partition table [ 330.666850][T12371] loop1: partition table beyond EOD, truncated [ 330.673375][T12371] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 330.927685][T12357] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.935267][T12357] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.944784][T12357] device bridge_slave_0 entered promiscuous mode [ 330.967692][T12371] Dev loop1: unable to read RDB block 5 [ 330.974522][T12371] loop1: unable to read partition table [ 330.980347][T12371] loop1: partition table beyond EOD, truncated [ 330.986752][T12371] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 330.987968][T12357] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.002687][T12357] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.011785][T12357] device bridge_slave_1 entered promiscuous mode [ 331.034256][T12381] SELinux: security_context_str_to_sid(user_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 331.160734][T12357] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 00:32:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x47}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x35, 0x9473a340f16db0ce}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xbd, &(0x7f000000cf3d)=""/189, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4}, 0x10}, 0x74) r0 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r2 = dup2(r0, r1) getsockname$tipc(r2, 0x0, &(0x7f0000000080)) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e24, @empty}, 0x10) shmget(0x3, 0x4000, 0x100, &(0x7f0000ff9000/0x4000)=nil) r3 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) dup2(r3, r4) open_by_handle_at(r4, &(0x7f0000000140)={0xde, 0x7f, "74a9135337e5a4e21769d7a5beca1946a672e1492eb44db97be77204d697709d66ffdf46159038e83b9f62955729022806659c5de808ac37d79b69a4b9d5b1a6cc50ef1ddf6626189ddaf75f6f33320a6dc88afe9c014d1c02415d93864115bf6e24c03c04dfe54f65331cfae91f8eba03fc9ef687a629fb5fe9bf5f8e5925149ded604aac04b21876833ee230a509ba5e42f1d49e301b246147eaa3b63a751eff23bf4a0967e3397d2195762f17a04b846b6cefbf5e8be5d189ba7ff0b79ae9387dff781b32e467ce4a29db5f32a813c55fdcdfca5c"}, 0x100) [ 331.204924][T12381] SELinux: security_context_str_to_sid(user_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 331.221872][T12357] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:32:54 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @empty, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, ' \x00'}}}}, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f000045fff8)={0x0, 0x0}) clone3(&(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000001880)=[r2], 0x1}, 0x50) r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/protocols\x00') ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000080)) [ 331.410436][T12357] team0: Port device team_slave_0 added [ 331.445470][T12357] team0: Port device team_slave_1 added [ 331.499127][T12357] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 331.506652][T12357] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 331.532797][T12357] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 00:32:54 executing program 1: gettid() r0 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r0, &(0x7f0000001540)=ANY=[@ANYBLOB="01003ddf45f187edef68441dda35bf4a7be7b9973809ae62f5f46c544c83a5c05747027fa1b9b385b4000000000000000b34dd1361e3d84534f9033c3f00ffff003f5df5c20bd12a9010b5a681cec86274d22e57777667e9c14368b635e69afce562d093b547d0e4df58877abd3882eee5e4373bbbb194ca97026df4cb023fa6ac66ab2fcdf04f563f30a9bbfd37c7d4562b64254013b0d041f4c73648e3f75d22aa3c5efb86fd5fa8f2f7101508114e629ad1a85f0e3c47e10ef0371b802bfb614bb5deb3de968eeaae142b20770100000021dcab0241c4278f8a8546203ea653a2fc828f94a99e88f98a817cbfc8e236d7d2ca30b24c7a3e7f994c604a12b696ea398a52dab11137585f628fb2ccfea0a3e5a2f1a8c834c5ddc4018d3136c0db5b952f0ff01093bc8e37c0354b7a580e97f1c8a6a2df97563c852339205487c6b5bf7678fdcdf7060bf3fa82866f1beedfb1d64a9b17a6acad1920889ede7a0b98e46afb9733a2e2e2255510a67667043249732c4a2834b07d21fef8bb03625c74e7353dafca43d5e5287ff5437a45976af7cd4fc7c6f4ea517c18712ea84d37e0fd1abafa1474eb5527dd4cd774391e666c2b7adbdc97cbe4742a4ae2f0a28797183742c54ae5daf98b9ea76f25784a992383b7b8fcf55bee891b1c2dff08290238c30aa82e213271aaa42573dd96572e370244364467d6ab7df495e351e4dd498f1bb2981421ee66e77d9d4a593238171c509770ad7480626efa85bc4ec7404709739de78b4df350542503cd873c9d505344d2cd47cb9ec1dbbf81bfd3e7b7de8a31205b63cd00cd72d1b86779"], 0x24f) r1 = open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="00262ccaa1d17ab99b1c61ed36a957cbead40bf7dff87a88ee082e15119d509dc7cb14524add0000000000000069d36ea659408fb5c687164fa4ed2e791eed3090c3f7b6eb6be9a4d217e44a000000000000"], 0x1, 0x0) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r4 = dup2(r2, r3) getsockname$tipc(r4, 0x0, &(0x7f0000000080)) ioctl$USBDEVFS_RELEASEINTERFACE(r4, 0x80045510, &(0x7f0000000080)=0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 331.662603][T12357] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 331.669829][T12357] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 331.695987][T12357] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 331.842634][T12357] device hsr_slave_0 entered promiscuous mode [ 331.884316][T12357] device hsr_slave_1 entered promiscuous mode [ 331.936850][T12357] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 331.947017][T12357] Cannot create hsr debugfs directory [ 332.392887][T12357] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 332.524144][T12357] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 332.632617][T12357] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 332.755129][T12357] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 333.135338][T12357] 8021q: adding VLAN 0 to HW filter on device bond0 [ 333.173715][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 333.183194][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 333.206451][T12357] 8021q: adding VLAN 0 to HW filter on device team0 [ 333.233353][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 333.244515][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 333.254012][T12125] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.261203][T12125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.315340][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 333.324585][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 333.334497][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 333.344246][T12125] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.351431][T12125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.360530][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 333.371616][T12125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 333.411483][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 333.421039][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 333.453719][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 333.463929][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 333.474425][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 333.515894][T12357] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 333.526611][T12357] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 333.543804][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 333.554142][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 333.564649][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 333.574280][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 333.615622][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 333.653397][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 333.661337][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 333.700759][T12357] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 333.771456][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 333.781597][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 333.852475][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 333.862039][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 333.874728][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 333.884417][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.915113][T12357] device veth0_vlan entered promiscuous mode [ 333.956787][T12357] device veth1_vlan entered promiscuous mode [ 333.993153][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 334.003715][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 334.079873][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 334.089928][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 334.127094][T12357] device veth0_macvtap entered promiscuous mode [ 334.153878][T12357] device veth1_macvtap entered promiscuous mode [ 334.219989][T12357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 334.230663][T12357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.240932][T12357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 334.252101][T12357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.265839][T12357] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 334.275019][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 334.285030][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 334.294661][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 334.304757][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 334.350028][T12357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 334.360653][T12357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.370802][T12357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 334.381704][T12357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.395268][T12357] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 334.405595][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 334.415630][ T3910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 335.188614][ T32] audit: type=1400 audit(1584318778.231:56): avc: denied { create } for pid=12429 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 00:32:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], 0x338) 00:32:58 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'sed\x00', 0x0, 0x7}, {@remote}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) dup2(r0, r1) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0185648, &(0x7f0000000100)={0x9c0000, 0xfffffff8, 0x3df, r0, 0x0, &(0x7f0000000040)={0x9a0001, 0x6, [], @ptr=0x800}}) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000140)=""/201) 00:32:58 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) fstat(0xffffffffffffffff, &(0x7f00000000c0)) r1 = socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r3 = dup2(r1, r2) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000040)) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) socket$pptp(0x18, 0x1, 0x2) pipe2$9p(&(0x7f00000006c0), 0x0) r5 = dup2(r3, r0) getsockname$tipc(r5, 0x0, &(0x7f0000000080)) r6 = dup2(r5, r4) getsockname$tipc(r6, 0x0, &(0x7f0000000080)) write$9p(r6, &(0x7f0000000000)="2f88c7df6fb0a286eba62aedbaadc529820faaa4f0ae5861ee1ccccfa813130c7ec1", 0x22) write$selinux_validatetrans(r3, &(0x7f0000000140)={'system_u:object_r:load_policy_exec_t:s0', 0x20, 'system_u:object_r:crash_device_t:s0', 0x20, 0x8, 0x20, 'unconfined\x00'}, 0x6c) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) dup2(0xffffffffffffffff, r7) getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000001c0)={0x6, 0x7, 'syz0\x00'}, &(0x7f0000000200)=0x28) socket(0x1d, 0x0, 0x0) [ 335.413258][T12436] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 335.424079][T12436] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 1, start bb1414ac) [ 335.434194][T12436] FAT-fs (loop1): Filesystem has been set read-only [ 335.440871][T12436] ===================================================== [ 335.447819][T12436] BUG: KMSAN: uninit-value in fat_evict_inode+0x2f4/0x920 [ 335.454938][T12436] CPU: 0 PID: 12436 Comm: syz-executor.1 Not tainted 5.6.0-rc2-syzkaller #0 [ 335.463602][T12436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.473656][T12436] Call Trace: [ 335.477013][T12436] dump_stack+0x1c9/0x220 [ 335.481370][T12436] kmsan_report+0xf7/0x1e0 [ 335.485786][T12436] __msan_warning+0x58/0xa0 [ 335.490287][T12436] fat_evict_inode+0x2f4/0x920 [ 335.495051][T12436] ? fat_write_inode+0x250/0x250 [ 335.499989][T12436] evict+0x4ab/0xe10 [ 335.503893][T12436] iput+0xa70/0xe10 [ 335.507719][T12436] fat_fill_super+0x7b5c/0x89b0 [ 335.512604][T12436] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 335.518403][T12436] ? kmsan_get_metadata+0x11d/0x180 [ 335.523610][T12436] vfat_fill_super+0xa6/0xc0 [ 335.528213][T12436] mount_bdev+0x654/0x880 [ 335.532553][T12436] ? vfat_mount+0xe0/0xe0 [ 335.536883][T12436] vfat_mount+0xc9/0xe0 [ 335.541054][T12436] legacy_get_tree+0x169/0x2e0 [ 335.545817][T12436] ? __fat_nfs_get_inode+0x6f0/0x6f0 [ 335.551242][T12436] ? legacy_parse_monolithic+0x2c0/0x2c0 [ 335.556877][T12436] vfs_get_tree+0xdd/0x580 [ 335.561303][T12436] do_mount+0x365c/0x4ac0 [ 335.565665][T12436] ? _copy_from_user+0x15b/0x260 [ 335.570615][T12436] __se_compat_sys_mount+0x3a8/0xa10 [ 335.575901][T12436] ? kmsan_get_metadata+0x4f/0x180 [ 335.581014][T12436] __ia32_compat_sys_mount+0x157/0x1b0 [ 335.586481][T12436] ? locks_show+0x580/0x580 [ 335.590977][T12436] do_fast_syscall_32+0x3c7/0x6e0 [ 335.596084][T12436] entry_SYSENTER_compat+0x68/0x77 [ 335.601222][T12436] RIP: 0023:0xf7f88d99 [ 335.605297][T12436] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 335.624904][T12436] RSP: 002b:00000000f5d82ef0 EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 335.633310][T12436] RAX: ffffffffffffffda RBX: 00000000f5d82f8c RCX: 0000000020000380 [ 335.641288][T12436] RDX: 00000000f5d82f6c RSI: 0000000000000000 RDI: 00000000f5d82fcc [ 335.649380][T12436] RBP: 00000000f5d83168 R08: 0000000000000000 R09: 0000000000000000 [ 335.657356][T12436] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 335.665345][T12436] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 335.673329][T12436] [ 335.675675][T12436] Uninit was created at: [ 335.679913][T12436] kmsan_save_stack_with_flags+0x3c/0x90 [ 335.685553][T12436] kmsan_alloc_page+0x12a/0x310 [ 335.690395][T12436] __alloc_pages_nodemask+0x5712/0x5e80 [ 335.696104][T12436] alloc_pages_current+0x67d/0x990 [ 335.701218][T12436] alloc_slab_page+0x111/0x12f0 [ 335.706070][T12436] new_slab+0x2bc/0x1130 [ 335.710317][T12436] ___slab_alloc+0x1533/0x1f30 [ 335.715195][T12436] kmem_cache_alloc+0xb23/0xd70 [ 335.720040][T12436] fat_alloc_inode+0x58/0x120 [ 335.724718][T12436] new_inode_pseudo+0xb1/0x590 [ 335.729472][T12436] new_inode+0x5a/0x3d0 [ 335.733618][T12436] fat_fill_super+0x634b/0x89b0 [ 335.738460][T12436] vfat_fill_super+0xa6/0xc0 [ 335.743052][T12436] mount_bdev+0x654/0x880 [ 335.747394][T12436] vfat_mount+0xc9/0xe0 [ 335.751540][T12436] legacy_get_tree+0x169/0x2e0 [ 335.756297][T12436] vfs_get_tree+0xdd/0x580 [ 335.760711][T12436] do_mount+0x365c/0x4ac0 [ 335.765037][T12436] __se_compat_sys_mount+0x3a8/0xa10 [ 335.770308][T12436] __ia32_compat_sys_mount+0x157/0x1b0 [ 335.775754][T12436] do_fast_syscall_32+0x3c7/0x6e0 [ 335.780775][T12436] entry_SYSENTER_compat+0x68/0x77 [ 335.785863][T12436] ===================================================== [ 335.792778][T12436] Disabling lock debugging due to kernel taint [ 335.798910][T12436] Kernel panic - not syncing: panic_on_warn set ... [ 335.805486][T12436] CPU: 0 PID: 12436 Comm: syz-executor.1 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 335.815528][T12436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.825565][T12436] Call Trace: [ 335.828848][T12436] dump_stack+0x1c9/0x220 [ 335.833187][T12436] panic+0x3d5/0xc3e [ 335.837105][T12436] kmsan_report+0x1df/0x1e0 [ 335.841605][T12436] __msan_warning+0x58/0xa0 [ 335.846128][T12436] fat_evict_inode+0x2f4/0x920 [ 335.850900][T12436] ? fat_write_inode+0x250/0x250 [ 335.855839][T12436] evict+0x4ab/0xe10 [ 335.859755][T12436] iput+0xa70/0xe10 [ 335.863578][T12436] fat_fill_super+0x7b5c/0x89b0 [ 335.868457][T12436] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 335.874262][T12436] ? kmsan_get_metadata+0x11d/0x180 [ 335.879460][T12436] vfat_fill_super+0xa6/0xc0 [ 335.884051][T12436] mount_bdev+0x654/0x880 [ 335.888369][T12436] ? vfat_mount+0xe0/0xe0 [ 335.892700][T12436] vfat_mount+0xc9/0xe0 [ 335.896852][T12436] legacy_get_tree+0x169/0x2e0 [ 335.901606][T12436] ? __fat_nfs_get_inode+0x6f0/0x6f0 [ 335.906890][T12436] ? legacy_parse_monolithic+0x2c0/0x2c0 [ 335.912513][T12436] vfs_get_tree+0xdd/0x580 [ 335.916925][T12436] do_mount+0x365c/0x4ac0 [ 335.921250][T12436] ? _copy_from_user+0x15b/0x260 [ 335.926217][T12436] __se_compat_sys_mount+0x3a8/0xa10 [ 335.931945][T12436] ? kmsan_get_metadata+0x4f/0x180 [ 335.937062][T12436] __ia32_compat_sys_mount+0x157/0x1b0 [ 335.942521][T12436] ? locks_show+0x580/0x580 [ 335.947024][T12436] do_fast_syscall_32+0x3c7/0x6e0 [ 335.952053][T12436] entry_SYSENTER_compat+0x68/0x77 [ 335.957160][T12436] RIP: 0023:0xf7f88d99 [ 335.961223][T12436] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 335.980839][T12436] RSP: 002b:00000000f5d82ef0 EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 335.989250][T12436] RAX: ffffffffffffffda RBX: 00000000f5d82f8c RCX: 0000000020000380 [ 335.997211][T12436] RDX: 00000000f5d82f6c RSI: 0000000000000000 RDI: 00000000f5d82fcc [ 336.005183][T12436] RBP: 00000000f5d83168 R08: 0000000000000000 R09: 0000000000000000 [ 336.013142][T12436] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 336.021102][T12436] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 336.030827][T12436] Kernel Offset: 0x13c00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 336.042540][T12436] Rebooting in 86400 seconds..