[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 55.931416] kauditd_printk_skb: 4 callbacks suppressed [ 55.931447] audit: type=1800 audit(1544911124.975:29): pid=6414 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 55.956437] audit: type=1800 audit(1544911124.995:30): pid=6414 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.154' (ECDSA) to the list of known hosts. 2018/12/15 21:58:58 fuzzer started 2018/12/15 21:59:03 dialing manager at 10.128.0.26:36273 2018/12/15 21:59:03 syscalls: 1 2018/12/15 21:59:03 code coverage: enabled 2018/12/15 21:59:03 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/15 21:59:03 setuid sandbox: enabled 2018/12/15 21:59:03 namespace sandbox: enabled 2018/12/15 21:59:03 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/15 21:59:03 fault injection: enabled 2018/12/15 21:59:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/15 21:59:03 net packet injection: enabled 2018/12/15 21:59:03 net device setup: enabled 22:02:20 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group\tHz\xeb\x93\xb4\x99\xec\x8d\xd4)(.stau\x00<#\xfbW*\x1f\x02\x94\xe6\xf3\xe9d\x1a\xd5KM\x9d\x9a\x1fb\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\x1d\xeeH;\x15v$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2761, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0xffffffff}) syzkaller login: [ 271.885506] IPVS: ftp: loaded support on port[0] = 21 [ 273.347896] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.354540] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.363078] device bridge_slave_0 entered promiscuous mode [ 273.451202] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.458112] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.466542] device bridge_slave_1 entered promiscuous mode [ 273.555440] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 273.642210] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 273.902091] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 273.991469] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 274.074319] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 274.081326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 274.169726] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 274.176861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 274.445724] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 274.454649] team0: Port device team_slave_0 added [ 274.540485] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 274.549263] team0: Port device team_slave_1 added [ 274.635947] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 274.730139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 274.821895] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 274.829573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.839014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.929130] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 274.936943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.946257] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 275.288751] ip (6656) used greatest stack depth: 53832 bytes left 22:02:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000140)={'bridge0\x00\x00\x00\x00\x80\x00'}) [ 275.997252] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.003916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.011089] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.017714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.027243] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 276.033811] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 276.093064] IPVS: ftp: loaded support on port[0] = 21 [ 278.316528] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.323271] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.331675] device bridge_slave_0 entered promiscuous mode [ 278.484404] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.490941] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.499700] device bridge_slave_1 entered promiscuous mode [ 278.660550] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 278.833599] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 279.267837] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 279.388988] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 279.985707] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 279.994592] team0: Port device team_slave_0 added [ 280.096479] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 280.105304] team0: Port device team_slave_1 added [ 280.275466] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 280.442787] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 280.576037] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 280.583804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 280.593183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 280.737005] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 280.744807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 280.754081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 22:02:30 executing program 2: socketpair(0x4, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000200)=""/57, 0x39, 0x10000, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) socket$kcm(0x29, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r0, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) [ 281.588569] IPVS: ftp: loaded support on port[0] = 21 [ 282.532362] 8021q: adding VLAN 0 to HW filter on device bond0 [ 282.754382] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.760963] bridge0: port 2(bridge_slave_1) entered forwarding state [ 282.768207] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.774816] bridge0: port 1(bridge_slave_0) entered forwarding state [ 282.784225] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 282.790787] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 283.186338] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 283.923684] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 283.930326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.938596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.591538] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.598137] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.606539] device bridge_slave_0 entered promiscuous mode [ 284.653936] 8021q: adding VLAN 0 to HW filter on device team0 [ 284.882713] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.889284] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.897907] device bridge_slave_1 entered promiscuous mode [ 285.125368] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 285.223781] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 285.737870] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 285.914286] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 286.130592] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 286.137684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 286.243099] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 286.250123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 286.793958] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 286.802741] team0: Port device team_slave_0 added [ 287.002822] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 287.011782] team0: Port device team_slave_1 added [ 287.206193] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 287.213423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 287.222566] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 287.462439] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 287.471067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 287.480144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 287.670790] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 287.678633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 287.687987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 287.903561] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 287.911277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 287.920614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 22:02:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffd2) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000240)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r1}) tee(r0, r1, 0x0, 0x0) 22:02:38 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8dab}]}, 0x10) sendto$inet6(r1, &(0x7f0000000300), 0x0, 0x4008080, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000280)='memory.events\x9f^Fm4\xc3Y\xc5J\a{\x03\xfd\xb0\xe6\r\x14\xdf\x124\x83\xfd\xcbX\x8de\xed\x18;\x03\xe7\xd42\x80\xf9\xa77w\x19\xcdv\xf7\x83H\x88>]\x8d$GR]\b\x11\xf6\x1d\x8b\x1d\xd2\xd3d\x1a\x8b\bh\xe8p\t\xb44 L\x11!U\xc49\xa0\xe8\xd9d\xac\xe1 \xf1\x1e0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@ipv6_newaddr={0x2c, 0x14, 0x101, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_ADDRESS={0x14, 0x1, @loopback}]}, 0x2c}}, 0x0) [ 289.928617] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.935293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.942570] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.949108] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.958518] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 290.050779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 290.308755] IPVS: ftp: loaded support on port[0] = 21 [ 290.432075] 8021q: adding VLAN 0 to HW filter on device bond0 [ 291.263786] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 292.170123] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 292.176558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.184902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.756798] syz-executor0 (7104) used greatest stack depth: 53168 bytes left [ 293.027261] 8021q: adding VLAN 0 to HW filter on device team0 22:02:42 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8dab}]}, 0x10) sendto$inet6(r1, &(0x7f0000000300), 0x0, 0x4008080, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000280)='memory.events\x9f^Fm4\xc3Y\xc5J\a{\x03\xfd\xb0\xe6\r\x14\xdf\x124\x83\xfd\xcbX\x8de\xed\x18;\x03\xe7\xd42\x80\xf9\xa77w\x19\xcdv\xf7\x83H\x88>]\x8d$GR]\b\x11\xf6\x1d\x8b\x1d\xd2\xd3d\x1a\x8b\bh\xe8p\t\xb44 L\x11!U\xc49\xa0\xe8\xd9d\xac\xe1 \xf1\x1e0x0}) timer_settime(0x0, 0x1, &(0x7f0000000100)={{0x0, r2+30000000}, {0x0, 0x989680}}, &(0x7f0000000200)) 22:02:45 executing program 0: clone(0x4ffffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:02:45 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@empty, 0x0, 0x0, 0x0, 0x3}, 0x20) r0 = socket$inet(0x2, 0x805, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xfffffffffffffe5e, &(0x7f0000000140)={0x0}}, 0x0) 22:02:45 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@empty, 0x0, 0x0, 0x0, 0x3}, 0x20) r0 = socket$inet(0x2, 0x805, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xfffffffffffffe5e, &(0x7f0000000140)={0x0}}, 0x0) [ 296.780366] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 296.789065] team0: Port device team_slave_0 added 22:02:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000320029080000dbb5241be3f100000000000003000000180000000900010007000000000000000000000001000000"], 0x2c}}, 0x0) [ 297.012491] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 297.021074] team0: Port device team_slave_1 added [ 297.228629] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 297.472144] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 297.479226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 297.488190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 297.658508] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 297.666366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 297.675808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 297.769649] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 297.777774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 297.786744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 22:02:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x80, &(0x7f00000016c0), 0x1, &(0x7f0000000240)=""/17, 0xfffffe3f}, 0x40) accept$unix(r2, 0x0, &(0x7f0000000000)) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)}, 0x0) close(r1) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='dummy0\x00') recvmsg$kcm(r2, &(0x7f00000000c0)={&(0x7f0000000340)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000003c0)=""/186, 0xba}, 0x10020) [ 299.122902] 8021q: adding VLAN 0 to HW filter on device bond0 [ 299.504319] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.510879] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.518116] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.524723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.533781] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 299.540303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 299.812343] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 300.363756] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 300.370067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 300.378178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 300.899477] 8021q: adding VLAN 0 to HW filter on device team0 [ 305.339624] 8021q: adding VLAN 0 to HW filter on device bond0 22:02:54 executing program 2: 22:02:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") mknod(&(0x7f0000000ffa)='./bus\x00', 0x1000, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x800, 0x0) ppoll(&(0x7f00000000c0)=[{r1}], 0x91, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x100}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080)={0x1ff}, 0x8) 22:02:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f00000004c0)={0x14, 0x37, 0x1}, 0x14}}, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="34001000", @ANYRES16=r1, @ANYBLOB="000225bd7000fbdbdf25090000002000020008000100f30200000400040008000100020000000800020008000000"], 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) [ 305.787684] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 305.967696] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 305.973950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 305.981756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.163709] 8021q: adding VLAN 0 to HW filter on device team0 22:02:56 executing program 3: 22:02:56 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffff9c, 0x10, &(0x7f0000000100)={&(0x7f0000000040)=""/160, 0xa0, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=r1, 0x4) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x7f, 0x40) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0xe) setsockopt$inet6_buf(r3, 0x29, 0x3f, &(0x7f0000000200)="b3ad6b063ce19fd0f2e7bdf2e45e83c02f8e49a5684b5c1fc12ea06a3a46aaa02088cd8656fb250ebfd979e540f5c9e1d30087e4dc4120443ab4147e264eee69d5f2b29585e6b476149037", 0x4b) readlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/219, 0xdb) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f00000003c0)={0x5000, 0x4000}) ioctl$FICLONE(r0, 0x40049409, r2) r4 = openat$cgroup_ro(r3, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000440), 0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000480)={0x0, 0xce, "03cd699a3e1bc8520902be44bab31f27d2d8c053f1c3593fece32bcbc22b015707b78b586a41395ec12746dbfe0a1b3f0ca44a59c9149ff1f9b8595a56d9cabaf017001b7053a7cd0fb64db5af998deaee6d6da2cef1ce5f63d83bd5887cc6cd13d280859a20c9e55a21b23e8937120e49c5986ad61a975522ebfcea235d955740671b515c9b910781cf004070914c31fff58995b8faf60070f8b2acf51402da11eecd63a43d7da265dfd4cd7e02f71f3bf46094e667a1e4132f378d0edb4be8c6c9004fddcc4d98f88f94fb378b"}, &(0x7f0000000580)=0xd6) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000005c0)={r5, @in={{0x2, 0x4e23, @multicast2}}, 0x6, 0x0, 0x100000001, 0xfffffffffffffffe, 0x40}, &(0x7f0000000680)=0x98) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000006c0)={r5, @in6={{0xa, 0x4e20, 0xac3, @dev={0xfe, 0x80, [], 0xb}, 0x4}}, 0x1, 0x2, 0x74540999, 0x22e2, 0x20}, 0x98) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000780)=0x3) connect(r3, &(0x7f00000007c0)=@l2={0x1f, 0x6, {0xdb, 0x100, 0x3, 0xffff, 0xfffffffffffffffb}, 0x1, 0x2}, 0x80) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000840)=0x3a80, 0x4) ioctl$VIDIOC_EXPBUF(r4, 0xc0405610, &(0x7f0000000880)={0xb, 0x1, 0x6, 0x0, r3}) fcntl$getflags(r0, 0x40b) getsockopt$inet6_tcp_buf(r3, 0x6, 0xd, &(0x7f00000008c0)=""/20, &(0x7f0000000900)=0x14) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000940), 0x4) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000980)) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000001280)=@broute={'broute\x00', 0x20, 0x5, 0x880, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a00], 0x0, &(0x7f00000009c0), &(0x7f0000000a00)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x4, 0xf9, 'bridge_slave_0\x00', 'veth1\x00', 'bridge_slave_0\x00', 'bcsh0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0xff, 0xff, 0x0, 0xff, 0x40d0ac3135e0441a], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0xa0, 0x200, 0x230, [@m802_3={'802_3\x00', 0x8, {{0xfe, 0x3, 0x2, 0x2}}}]}, [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x3}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x1, 'system_u:object_r:inetd_child_exec_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x3}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x5, 0x8, 0x4b15, 'syz_tun\x00', 'bridge0\x00', 'rose0\x00', 'ip_vti0\x00', @dev={[], 0x21}, [0xff, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x4, 0x8, 0x80b}}}}, {{{0x9, 0x22, 0x88f5, 'veth1\x00', 'lo\x00', 'bond0\x00', 'bcsh0\x00', @local, [0x0, 0xff, 0xff], @local, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], 0xa0, 0xf0, 0x120, [@connlabel={'connlabel\x00', 0x8, {{0x16f0fce8, 0x2}}}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00', 0x100000001}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x8001}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x2, [{{{0x13, 0x2, 0x0, 'ip_vti0\x00', 'bridge_slave_0\x00', 'vcan0\x00', 'eql\x00', @remote, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x1f0, 0x220}, [@common=@log={'log\x00', 0x28, {{0xb4, "62b73fe98e9453482c8cd7aecaff9f27dcdb8a45a8e265b5cd653c90be97", 0x8}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:auditd_unit_file_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0xe5}}}}, {{{0x19, 0x4c, 0x8fdf, 'sit0\x00', 'veth0_to_bond\x00', 'ip6_vti0\x00', 'team_slave_1\x00', @random="76a085774af9", [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], @remote, [0xff, 0x0, 0xff, 0x0, 0x0, 0xff], 0xf8, 0x148, 0x198, [@ip={'ip\x00', 0x20, {{@multicast2, @remote, 0x0, 0xffffffff, 0x1, 0xa9, 0x14, 0x2, 0x4e23, 0x4e21, 0x4e20, 0x4e22}}}, @mark_m={'mark_m\x00', 0x18, {{0x7fffffff, 0x1f, 0x3, 0x3}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x4fd3, 0x4, 0x1ff}}}]}, @common=@log={'log\x00', 0x28, {{0x5, "d2aef8dccbc745126936b507d0463b33c77c68829bac6555c99862c17185"}}}}]}]}, 0x8f8) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000001300)={0x1}) keyctl$session_to_parent(0x12) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001340)={0x0}, &(0x7f0000001380)=0xc) getpgrp(r7) ioctl$KVM_SET_CPUID(r6, 0x4008ae8a, &(0x7f00000013c0)={0x6, 0x0, [{0x1, 0x9, 0x8001, 0x400, 0x578}, {0x80000000, 0x5, 0x9, 0x85, 0x81}, {0xb, 0xade, 0x101, 0x2, 0x8}, {0x80000000, 0x800, 0x3e79, 0x0, 0x9}, {0x0, 0x3, 0x5, 0x1, 0x40000}, {0x80000000, 0xa4, 0xfffffffffffffffc, 0x9, 0x1}]}) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000001480)={0x1, 0xfff}, 0x2) 22:02:56 executing program 0: 22:02:56 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000000)=0x7ff, 0x4) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000040)=0x400, 0x4) getcwd(&(0x7f0000000080)=""/189, 0xbd) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000140)=0x4) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14, 0x67, 0x1, {0x2, 0x2, 0x1}}, 0x14) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@random={'security.', ':\x00'}, &(0x7f0000000240)=""/34, 0x22) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000280)={0x2, 0x5561, 0x8, {0x77359400}, 0x2, 0x80000001}) lsetxattr$security_smack_transmute(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0x4, 0x1) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8002002}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r1, 0xc, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_AF={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048000}, 0x800) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') linkat(r0, &(0x7f0000000580)='./file0\x00', r0, &(0x7f00000005c0)='./file0\x00', 0x400) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000600)=0x2, 0x2) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000640)=0x3f) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000680)={{0x3, @name="0a445461170f378384bb022c6063ed6245166b733991198f9e9a250147af8208"}, "386cf97fda7d2b0296eb91050c5e5dbe4b8d837ca18ffc05a611e2c8c658dde7", 0x2}) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000780)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000007c0)) unlinkat(r0, &(0x7f0000000940)='./file0\x00', 0x200) getpeername$packet(r0, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000009c0)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000a00)={@mcast1, 0x80, r2}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000a80)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a40)={0xffffffffffffffff}, 0x111, 0xa66cae8fae95d8b9}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000ac0)={0xa, 0x4, 0xfa00, {r3}}, 0xc) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$NBD_DISCONNECT(r0, 0xab08) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000b00)={0x0, 0x0, [], @bt={0xb6, 0x8, 0x0, 0x0, 0x800, 0x7f, 0x4, 0x8}}) setsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000bc0), 0x4) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000c00)) 22:02:56 executing program 2: 22:02:56 executing program 1: 22:02:56 executing program 0: 22:02:56 executing program 1: 22:02:56 executing program 2: 22:02:56 executing program 3: 22:02:56 executing program 1: 22:02:56 executing program 0: 22:02:56 executing program 3: [ 308.296492] IPVS: ftp: loaded support on port[0] = 21 [ 308.306769] IPVS: ftp: loaded support on port[0] = 21 [ 309.774643] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.781207] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.789645] device bridge_slave_0 entered promiscuous mode [ 309.804355] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.810887] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.819500] device bridge_slave_0 entered promiscuous mode [ 309.877561] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.884208] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.892640] device bridge_slave_1 entered promiscuous mode [ 309.906790] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.913464] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.922220] device bridge_slave_1 entered promiscuous mode [ 309.978253] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 310.008183] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 310.063964] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 310.091560] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 310.323278] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 310.356207] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 310.414012] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 310.446447] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 310.508498] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 310.515564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 310.533551] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 310.540541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 310.603257] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 310.610302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 310.631058] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 310.638154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 310.897840] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 310.906279] team0: Port device team_slave_0 added [ 310.920578] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 310.929332] team0: Port device team_slave_0 added [ 310.993947] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 311.002780] team0: Port device team_slave_1 added [ 311.016609] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 311.025795] team0: Port device team_slave_1 added [ 311.091760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 311.116543] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 311.185446] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 311.208693] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 311.295107] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 311.303000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 311.312242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 311.329156] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 311.336990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 311.347241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 311.394860] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 311.402655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 311.412130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 311.440517] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 311.448300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 311.459270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 312.377224] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.383851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.391049] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.397697] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.406879] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 312.422742] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.429296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.436485] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.443083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.452638] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 312.458986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 312.467102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 315.953134] 8021q: adding VLAN 0 to HW filter on device bond0 [ 316.002467] 8021q: adding VLAN 0 to HW filter on device bond0 [ 316.280549] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 316.324931] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 316.609429] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 316.615875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 316.624018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 316.652155] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 316.658807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 316.666846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 316.956380] 8021q: adding VLAN 0 to HW filter on device team0 [ 316.994312] 8021q: adding VLAN 0 to HW filter on device team0 22:03:08 executing program 4: 22:03:08 executing program 2: 22:03:08 executing program 5: 22:03:08 executing program 1: 22:03:08 executing program 0: 22:03:08 executing program 3: 22:03:08 executing program 0: 22:03:08 executing program 1: 22:03:08 executing program 2: 22:03:08 executing program 5: 22:03:08 executing program 3: 22:03:08 executing program 4: 22:03:08 executing program 0: 22:03:08 executing program 1: 22:03:08 executing program 4: 22:03:08 executing program 2: 22:03:08 executing program 3: 22:03:08 executing program 5: 22:03:09 executing program 4: 22:03:09 executing program 1: 22:03:09 executing program 2: 22:03:09 executing program 0: 22:03:09 executing program 3: 22:03:09 executing program 5: 22:03:09 executing program 1: 22:03:09 executing program 4: 22:03:09 executing program 3: 22:03:09 executing program 5: 22:03:09 executing program 0: 22:03:09 executing program 2: 22:03:09 executing program 1: 22:03:09 executing program 5: 22:03:09 executing program 3: 22:03:09 executing program 4: 22:03:09 executing program 0: 22:03:09 executing program 5: 22:03:09 executing program 2: 22:03:09 executing program 3: 22:03:10 executing program 1: 22:03:10 executing program 4: 22:03:10 executing program 2: 22:03:10 executing program 0: 22:03:10 executing program 5: 22:03:10 executing program 1: 22:03:10 executing program 4: 22:03:10 executing program 3: 22:03:10 executing program 0: 22:03:10 executing program 2: 22:03:10 executing program 5: 22:03:10 executing program 4: 22:03:10 executing program 3: 22:03:10 executing program 1: 22:03:10 executing program 5: 22:03:10 executing program 0: 22:03:10 executing program 3: 22:03:10 executing program 4: 22:03:10 executing program 1: 22:03:11 executing program 2: 22:03:11 executing program 3: 22:03:11 executing program 5: 22:03:11 executing program 1: 22:03:11 executing program 0: 22:03:11 executing program 4: 22:03:11 executing program 3: 22:03:11 executing program 2: 22:03:11 executing program 1: 22:03:11 executing program 5: 22:03:11 executing program 0: 22:03:11 executing program 2: 22:03:11 executing program 4: 22:03:11 executing program 3: 22:03:11 executing program 1: 22:03:11 executing program 5: 22:03:11 executing program 3: 22:03:11 executing program 2: 22:03:11 executing program 0: 22:03:11 executing program 4: 22:03:12 executing program 5: 22:03:12 executing program 1: 22:03:12 executing program 3: 22:03:12 executing program 2: 22:03:12 executing program 4: 22:03:12 executing program 5: 22:03:12 executing program 0: 22:03:12 executing program 3: 22:03:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x800000006, 0x0, 0x0, 0xfffffffffffffffe}]}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000005c0)=""/186, 0x798d65f72a4e90e8) 22:03:12 executing program 2: r0 = msgget$private(0x0, 0xffffffffffffffff) msgrcv(r0, &(0x7f0000000200)={0x0, ""/30}, 0xff10, 0x2, 0x1800) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x10004) getpeername$unix(r1, &(0x7f0000000280)=@abs, &(0x7f00000002c0)=0x8) sync() pipe(&(0x7f0000000040)={0xffffffffffffffff}) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000080)='./file0\x00') r3 = shmget(0x3, 0x2000, 0x220, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_UNLOCK(r3, 0x4) msgrcv(r0, &(0x7f0000000240)={0x0, ""/30}, 0x173, 0x3, 0x17ff) msgrcv(r0, &(0x7f0000000140)={0x0, ""/28}, 0x24, 0x0, 0x1800) 22:03:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='veth1\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x6, 0xf08a}, 0x14) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto(r1, &(0x7f00000001c0)="d8", 0x1, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00000002c0)='$', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) close(r1) 22:03:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, 0x0, 0x301}, 0x1c}}, 0x0) 22:03:12 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000000)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000010, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 323.604153] audit: type=1326 audit(1544911392.655:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8384 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:12 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x200000001, 0xb, 0x2000000000080009, 0x1}, 0x34a) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), 0x0}, 0x20) 22:03:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000200)={0x10000000}) 22:03:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000280)={0x40000000000002, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) [ 323.810661] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 22:03:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f00000016c0)=@newlink={0x34, 0x10, 0x511, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x4}}}]}, 0x34}}, 0x0) 22:03:13 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002a40)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f00000000c0), 0x0, 0x1}, 0x20) 22:03:13 executing program 0: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000000c0012000c000100626f6e64000000000c00020008000400009b0e71"], 0x1}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:03:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) read(r1, &(0x7f0000000240)=""/193, 0xc1) [ 324.287304] audit: type=1326 audit(1544911393.335:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8384 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:13 executing program 1: 22:03:13 executing program 2: 22:03:13 executing program 3: 22:03:13 executing program 5: 22:03:13 executing program 0: 22:03:13 executing program 1: 22:03:13 executing program 5: 22:03:13 executing program 0: 22:03:13 executing program 3: 22:03:13 executing program 2: 22:03:13 executing program 1: 22:03:14 executing program 4: syz_emit_ethernet(0x4e, &(0x7f0000000080)={@random="ff3997ffcd00", @local, [], {@ipv6={0x86dd, {0x0, 0x6, "c8fba2", 0x18, 0x40000000002c, 0x0, @empty, @mcast2, {[], @icmpv6=@mld={0x0, 0xd, 0x0, 0x0, 0x0, @mcast2}}}}}}, 0x0) 22:03:14 executing program 5: 22:03:14 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', 0x0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 22:03:14 executing program 3: syslog(0x8, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc) sendmmsg(0xffffffffffffffff, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 22:03:14 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 22:03:14 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x7fff) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280)={0x7}, 0xff7f) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000040)={0x18}, 0x18) syncfs(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3}) 22:03:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='.\x8e\xd8ents\x00\xa3\\\xcc\xe1O\x1a\xf7\xebl\fo,WM\"Q.\xa3\xbf:\x8d\x98\x938\xc9\xb0Ls\xd2\xef\v\xfc\x98\x00\x00\x00\x00}#0\x06_\x16\aQ\xd2\a\xb9=\xe7\x80\xbe\xba\xee*#\xcd5\x13\xe5\xe5\xbc*\x15~\xbe\x0f\x00\x00\x00\x00\xf0\x80\xb1\xa5?\x84\xc3\x80', 0x26e1, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="c8", 0x1}], 0x1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x1000}) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) 22:03:14 executing program 2: 22:03:14 executing program 5: 22:03:14 executing program 1: 22:03:14 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x7fff) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280)={0x7}, 0xff7f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syncfs(0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3}) fdatasync(r2) 22:03:14 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(0xffffffffffffffff, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 22:03:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) r5 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="73797a31df474d6c7b4e02a2f1745465d7a7683bc1dc576537fc7f1faca7359dca2a53260b451af2feed057257edd9d6b4c415e95a6aeb0bf2ce45a46b12e0ce844faf7f9fc77eb048912c56b25e49000502c789b85d5be38ff13e31d0ec58116c090755ddf429c6fbffcf0f0004000000000000405b6b56edb263107f8c9ca7914d50e976427935c069929de302d14b8c0e4365d5b206854314f3d66d334ee6054f0e16e93e1fedbe0ddcc766da7af8322dbb9900be8a580ff54f4cd9d23b9dc0993e6af5098ae30221cbd38bad7f6bbca801c57db530e117000000004056572a67103edea870339c8d916fec3e5bdfe666f1ff06e79764f136417620602789c4e0b4a2c6f1b546ef49a2f4cd79057342d0ee4805325aa7960c832336de251dbe3a4b4e4540d8f574490f07c89704250e90995f4dc102fae59be12f08048a23fc9cb214395329eb393c9cdd066c61a1f73f337871c60a30763c130f8a378f93000000000000000000"], 0x169) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) fcntl$getown(r2, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001740)) ptrace$setopts(0x4200, 0x0, 0x0, 0x100000) r6 = fcntl$dupfd(r4, 0x0, r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000180)=0x1e, 0x4) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_CAPACITY(r4, 0x4c07) stat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000680)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x4e24, 0x9, 0x2, 0x20, 0xa0, 0x9, 0x0, r7}, {0x9, 0x400, 0x2e0, 0xffffffff, 0x0, 0x0, 0x1}, {0x2, 0x4f67, 0xff, 0x80000000}, 0x100000001, 0x6e6bb8, 0x1, 0x1, 0x1}, {{@in6=@local, 0x0, 0x6c}, 0xa, @in6=@loopback, 0x3500, 0x3, 0x2, 0xffffffff, 0x3, 0x0, 0x1ff}}, 0xe8) sendfile(r1, r1, 0x0, 0x2000005) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) flock(r6, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x7fff) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast1, @dev={0xac, 0x14, 0x14, 0x1e}, @multicast1}, 0xc) r8 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r8, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 22:03:14 executing program 0: 22:03:14 executing program 5: 22:03:14 executing program 3: 22:03:14 executing program 4: 22:03:14 executing program 0: 22:03:15 executing program 5: 22:03:15 executing program 4: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000480)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000600)={0x44, 0x0, &(0x7f0000000380)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 22:03:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x80000001) 22:03:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x800000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000010c0)=ANY=[@ANYBLOB="140000000301ffffef7f12b685d3901b00000000"], 0x14}}, 0x0) [ 326.145920] print_req_error: I/O error, dev loop5, sector 0 [ 326.151920] Buffer I/O error on dev loop5, logical block 0, lost async page write [ 326.160183] print_req_error: I/O error, dev loop5, sector 8 [ 326.166138] Buffer I/O error on dev loop5, logical block 1, lost async page write [ 326.176693] print_req_error: I/O error, dev loop5, sector 16 [ 326.182617] Buffer I/O error on dev loop5, logical block 2, lost async page write [ 326.190361] print_req_error: I/O error, dev loop5, sector 24 [ 326.196316] Buffer I/O error on dev loop5, logical block 3, lost async page write [ 326.204106] print_req_error: I/O error, dev loop5, sector 32 [ 326.209950] Buffer I/O error on dev loop5, logical block 4, lost async page write [ 326.217856] print_req_error: I/O error, dev loop5, sector 40 [ 326.223778] Buffer I/O error on dev loop5, logical block 5, lost async page write [ 326.231520] print_req_error: I/O error, dev loop5, sector 48 [ 326.237478] Buffer I/O error on dev loop5, logical block 6, lost async page write [ 326.245266] print_req_error: I/O error, dev loop5, sector 56 [ 326.251163] Buffer I/O error on dev loop5, logical block 7, lost async page write [ 326.258971] print_req_error: I/O error, dev loop5, sector 64 [ 326.264874] Buffer I/O error on dev loop5, logical block 8, lost async page write [ 326.272669] print_req_error: I/O error, dev loop5, sector 72 [ 326.278509] Buffer I/O error on dev loop5, logical block 9, lost async page write 22:03:15 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000200)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x4005eed) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18}, 0xff9c) fallocate(r2, 0x3, 0x0, 0x8003) write$P9_ROPEN(r1, &(0x7f00000000c0)={0x18}, 0xff9c) fallocate(r1, 0x3, 0x0, 0x8001) 22:03:15 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x40002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='romfs\x00', 0x0, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0x0) [ 326.373670] binder: 8528 RLIMIT_NICE not set [ 326.378241] binder: 8528 RLIMIT_NICE not set [ 326.419776] binder: 8527:8531 got reply transaction with no transaction stack [ 326.427306] binder: 8527:8531 transaction failed 29201/-71, size 0-0 line 2741 [ 326.588530] binder: release 8527:8528 transaction 2 in, still active [ 326.595314] binder: send failed reply for transaction 2 to 8527:8528 [ 326.601994] binder: undelivered TRANSACTION_ERROR: 29201 [ 326.661817] binder: undelivered TRANSACTION_COMPLETE [ 326.667043] binder: undelivered TRANSACTION_ERROR: 29189 22:03:15 executing program 2: sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_create(0x0) r0 = getpgrp(0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) sched_getaffinity(r0, 0x8, &(0x7f0000001d00)) fstat(0xffffffffffffffff, 0x0) 22:03:15 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r2, 0x5424, &(0x7f00000002c0)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)={0x2a, 0x4, 0x0, {0x1, 0xbe, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="539b9105ab1072c24e2b980945c27f3b81ff00"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e601019df973b53d859e769464fe2a2410d59da45"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f00002b9ff8), &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r3 = dup2(r1, r1) ioctl$TCSBRKP(r2, 0x5425, 0x5) write$FUSE_OPEN(r3, &(0x7f0000000780)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000c00)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES64=r0, @ANYRESHEX, @ANYRES32=r2, @ANYPTR64], 0x0, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) ioctl$int_out(r0, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) close(r1) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x24}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f00000006c0)={r4, 0x100000000}, &(0x7f0000000740)=0x8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @multicast2}, 'lo\x00'}) fcntl$setflags(r0, 0x2, 0x0) 22:03:15 executing program 4: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaeaaaaa86dd601bfc97004d8800fe8000000000001a864a000000000000000000ff02000000000000000000009607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcaffe87429e50b00881721afab69cc37126fcd09b86d9702c37ed0000000000000000d0efb6ee186b768d4bcc3f533ffde15c448fa6d8f28bf6d39530f8914f7e218e7"], 0x0) 22:03:15 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='nv\x00', 0x3) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x28b60}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) 22:03:15 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8000000003a) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a", 0x2}], 0x1}, 0x0) 22:03:15 executing program 1: socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mlockall(0x4) 22:03:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="bf16000000000000b707000001000000507000000000e0ff20000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r0, 0x0, 0x12, 0x0, &(0x7f0000000d80)="5010e88e394ecec9d0ca217ed8cb6ea088ac", 0x0}, 0x28) 22:03:16 executing program 1: 22:03:16 executing program 2: 22:03:16 executing program 5: 22:03:16 executing program 1: 22:03:16 executing program 1: 22:03:16 executing program 4: 22:03:16 executing program 0: 22:03:16 executing program 2: 22:03:16 executing program 4: 22:03:16 executing program 5: 22:03:16 executing program 1: 22:03:16 executing program 3: 22:03:16 executing program 2: 22:03:16 executing program 0: 22:03:17 executing program 0: 22:03:17 executing program 1: 22:03:17 executing program 5: 22:03:17 executing program 2: 22:03:17 executing program 4: 22:03:17 executing program 3: 22:03:17 executing program 0: 22:03:17 executing program 5: 22:03:17 executing program 2: 22:03:17 executing program 4: 22:03:17 executing program 1: 22:03:17 executing program 3: 22:03:17 executing program 1: 22:03:17 executing program 2: 22:03:17 executing program 4: 22:03:17 executing program 5: 22:03:17 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = dup(r0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getpgrp(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffa) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040), 0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) 22:03:17 executing program 3: clock_settime(0x0, &(0x7f0000000040)={0x100000001}) r0 = socket$inet6(0x18, 0x8003, 0x0) setsockopt(r0, 0x3a, 0x0, 0x0, 0x0) r1 = socket(0x36, 0x3, 0xd90) dup(0xffffffffffffff9c) r2 = socket$inet6(0x18, 0xc007, 0x62734837) r3 = fcntl$dupfd(r1, 0x3, r2) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = semget$private(0x0, 0x0, 0x600) write(r4, &(0x7f0000000180)="09a699c0fa4aeb30ef4a7817ded0d26c2ec51e0961de61d93ff9c8f28acd32b43b829de450c6d1b27f2770f305e1285faec3e191031a00d50d68ca822863fceb9bb7e7374d30782bd4a9a965b237a09f4055364612de637909758158a6f6e3a748ff", 0x62) semctl$GETPID(r6, 0x3, 0x4, &(0x7f0000000100)=""/112) linkat(r3, &(0x7f0000000000)='./file0\x00', r5, &(0x7f00000000c0)='./file0\x00', 0x4) 22:03:17 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x143) 22:03:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) getpeername$packet(r2, 0x0, &(0x7f0000000100)) 22:03:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) 22:03:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) unshare(0x8020000) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/mnt\x00') setns(r0, 0x0) 22:03:18 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = dup(r0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getpgrp(0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm], 0x1) [ 329.089556] audit: type=1326 audit(1544911398.135:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8651 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 329.179393] audit: type=1326 audit(1544911398.215:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8655 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:18 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = dup(r0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000000)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 22:03:18 executing program 2: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) write$P9_RAUTH(r0, 0x0, 0x0) [ 329.285687] audit: type=1326 audit(1544911398.265:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8660 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) socketpair$unix(0x2c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) getgroups(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) write$P9_RGETATTR(r0, 0x0, 0x0) 22:03:18 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="fa0105000f45e9e021c3"], 0x1) 22:03:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000b40)='net/snmp\x00') sendfile(r0, r0, &(0x7f0000000000)=0x20202, 0xdd) 22:03:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmmsg(r0, 0x0, 0x0, 0x0) 22:03:18 executing program 0: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) 22:03:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000b40)='net/snmp\x00') sendfile(r0, r0, &(0x7f0000000000)=0x20202, 0xdd) [ 329.642241] audit: type=1326 audit(1544911398.685:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8685 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 329.862903] audit: type=1326 audit(1544911398.915:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8651 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) fchown(r0, 0x0, 0x0) [ 329.949302] audit: type=1326 audit(1544911398.995:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8655 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 330.006030] audit: type=1326 audit(1544911399.055:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8703 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 330.030635] audit: type=1326 audit(1544911399.085:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8660 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 22:03:19 executing program 5: 22:03:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000500)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x1000102) sendfile(r2, r3, 0x0, 0x800100000002) creat(&(0x7f0000000040)='./bus\x00', 0x0) 22:03:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) r0 = shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) shmdt(r0) [ 330.172162] audit: type=1326 audit(1544911399.215:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8710 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:19 executing program 5: 22:03:19 executing program 2: 22:03:19 executing program 4: 22:03:19 executing program 5: [ 330.425193] audit: type=1326 audit(1544911399.475:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8685 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:19 executing program 3: 22:03:19 executing program 2: 22:03:19 executing program 4: 22:03:20 executing program 2: 22:03:20 executing program 1: 22:03:20 executing program 5: 22:03:20 executing program 3: 22:03:20 executing program 0: 22:03:20 executing program 4: 22:03:20 executing program 2: 22:03:20 executing program 3: 22:03:20 executing program 5: 22:03:20 executing program 1: 22:03:20 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x8040, 0x801) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000000)=0x8) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 22:03:20 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x236161bd) open(&(0x7f0000001040)='./bus\x00', 0x0, 0x0) 22:03:20 executing program 3: r0 = socket(0x2, 0x4001, 0x0) connect$unix(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8202000007686c653000"], 0x1) 22:03:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\xc4\f\xab\x13stat\x00', 0x26e1, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) pipe2$9p(0x0, 0x0) fchdir(0xffffffffffffffff) write$P9_RSTATFS(r0, 0x0, 0xfffffdb9) 22:03:20 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = dup(r0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10) 22:03:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ppoll(0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r0, 0x0, 0x0) 22:03:20 executing program 2: creat(0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getrandom(0x0, 0x0, 0x0) getpeername(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) pipe(0x0) r2 = dup2(r0, r1) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) write$P9_RLINK(r0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$P9_RLOPEN(r2, 0x0, 0x0) 22:03:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x20002, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5402, 0x0) syncfs(r0) 22:03:20 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = dup(r0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in=@multicast1, @in=@dev}, {}, {0x7}}, {{@in6=@local}, 0x0, @in6=@ipv4, 0x34ff}}, 0xe8) 22:03:20 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = dup(r0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getuid() setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000000)="07492eb0540b36ffe76cb7ae95971e49", 0x10) 22:03:20 executing program 0: mknod(&(0x7f0000000100)='./file0\x00', 0x8040, 0x801) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 22:03:20 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x2, 0x2) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:03:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), 0x0}, 0x20) 22:03:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 22:03:21 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) 22:03:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 22:03:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) tkill(0x0, 0x0) 22:03:21 executing program 5: 22:03:21 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x200, 0x0) 22:03:21 executing program 4: 22:03:21 executing program 4: 22:03:21 executing program 5: 22:03:21 executing program 0: 22:03:21 executing program 4: 22:03:21 executing program 5: 22:03:22 executing program 3: 22:03:22 executing program 0: 22:03:22 executing program 4: 22:03:22 executing program 1: 22:03:22 executing program 2: 22:03:22 executing program 3: 22:03:22 executing program 4: 22:03:22 executing program 0: 22:03:22 executing program 5: 22:03:22 executing program 5: 22:03:22 executing program 4: 22:03:22 executing program 0: 22:03:22 executing program 3: 22:03:22 executing program 1: 22:03:22 executing program 2: 22:03:22 executing program 5: 22:03:22 executing program 0: 22:03:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ppoll(0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) 22:03:22 executing program 4: r0 = socket$unix(0x1, 0x20000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = dup(r0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getuid() setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast1, 0x0, 0x0, 'lc\x00', 0x0, 0x5}, 0x2c) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) 22:03:22 executing program 2: mknod(&(0x7f0000000040)='./bus\x00', 0x40000008009, 0x401) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) read(r0, 0x0, 0x0) close(r1) 22:03:23 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x10, 0x7a) 22:03:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) setitimer(0x0, 0x0, 0x0) 22:03:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) personality(0x0) 22:03:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)) 22:03:23 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ff0000/0x3000)=nil, 0x6000) [ 334.155150] kauditd_printk_skb: 7 callbacks suppressed [ 334.155196] audit: type=1326 audit(1544911403.205:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8896 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 334.186496] syz-executor5 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 334.266350] audit: type=1326 audit(1544911403.265:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8898 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$setsig(r0, 0xa, 0x0) [ 334.295839] audit: type=1326 audit(1544911403.345:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8904 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x4b564d02, 0x1]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 22:03:23 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0xc00) 22:03:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) 22:03:23 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) 22:03:23 executing program 2: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r1 = dup(r0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x2000c840, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getuid() setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000000), 0x4) 22:03:23 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r1 = dup(r0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 22:03:23 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) close(r0) semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RATTACH(r1, 0x0, 0x0) [ 334.935526] audit: type=1326 audit(1544911403.985:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8896 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:24 executing program 5: [ 335.024950] audit: type=1326 audit(1544911404.075:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8898 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 335.083218] audit: type=1326 audit(1544911404.135:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8904 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:24 executing program 4: 22:03:24 executing program 0: 22:03:24 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r1 = dup(r0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 22:03:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ppoll(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 22:03:24 executing program 3: 22:03:24 executing program 5: 22:03:24 executing program 4: 22:03:24 executing program 3: 22:03:24 executing program 1: 22:03:24 executing program 5: 22:03:24 executing program 4: 22:03:24 executing program 0: 22:03:24 executing program 1: 22:03:24 executing program 3: 22:03:24 executing program 0: 22:03:25 executing program 2: 22:03:25 executing program 5: 22:03:25 executing program 4: 22:03:25 executing program 1: 22:03:25 executing program 0: 22:03:25 executing program 3: 22:03:25 executing program 4: 22:03:25 executing program 0: 22:03:25 executing program 3: 22:03:25 executing program 5: 22:03:25 executing program 1: 22:03:25 executing program 2: 22:03:25 executing program 0: 22:03:25 executing program 4: 22:03:25 executing program 3: 22:03:25 executing program 1: 22:03:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) syz_open_pts(r0, 0x100) 22:03:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 22:03:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x1) 22:03:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) epoll_create(0x8) [ 336.856088] audit: type=1326 audit(1544911405.905:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9016 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 22:03:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13r\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x06\x00\x8f|\xe6lr\x88A\x04\x1a\xfeW\x05\x95\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7B\xc1\xb6\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xbd\x15\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\a\x00\x00\x00\x00\x00\x00\x1d\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x1a->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9fzgK\x06_o3\xf0\x01\x00\xf4\x84\xf0M\x8b\xba&\x89\x91\xd3d\xecZ\xc18\xba.$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', &(0x7f0000000200)=""/157, 0x9d) 22:03:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast}}) close(r0) [ 337.003312] audit: type=1326 audit(1544911406.055:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9021 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 337.073668] audit: type=1326 audit(1544911406.075:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9027 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 337.095433] audit: type=1326 audit(1544911406.075:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9028 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:26 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'syz_tun\x00'}) 22:03:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast}}) close(r0) [ 337.229246] hrtimer: interrupt took 276869 ns 22:03:26 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000040)={0x11, 0x1, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) 22:03:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x200000012, &(0x7f0000000080)=0xfffffffffffffffd, 0x4) 22:03:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x40000002, 0x31, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="000000000000000008001d0000000000"], 0x1}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924924924924b3, 0x0) 22:03:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000004c0)={0x1, {{0x2, 0x0, @multicast2}}, 0x0, 0x2, [{{0x2, 0x0, @empty}}, {{0x2, 0x0, @loopback}}]}, 0x190) bind$netlink(r0, 0x0, 0x0) 22:03:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) fdatasync(0xffffffffffffffff) 22:03:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040), 0x1c) bind$inet6(r0, &(0x7f0000000500), 0x1c) 22:03:27 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x20005f) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46005d23256d800000000000000000000002000600ca3f8bca0000000038000000000000f7ffffffffffd4d920a26de5677ea5b5b0faea1b0002000000"], 0x40) uselib(&(0x7f0000000000)='./file0\x00') 22:03:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) fchown(r0, 0x0, 0x0) 22:03:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) ioprio_get$pid(0x1, 0x0) 22:03:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 22:03:27 executing program 2: 22:03:27 executing program 2: 22:03:27 executing program 2: 22:03:27 executing program 2: 22:03:27 executing program 5: 22:03:27 executing program 2: 22:03:27 executing program 3: 22:03:27 executing program 5: 22:03:27 executing program 2: 22:03:28 executing program 1: 22:03:28 executing program 5: 22:03:28 executing program 0: 22:03:28 executing program 3: 22:03:28 executing program 2: 22:03:28 executing program 4: 22:03:28 executing program 1: 22:03:28 executing program 5: 22:03:28 executing program 2: 22:03:28 executing program 3: 22:03:28 executing program 4: 22:03:28 executing program 0: 22:03:28 executing program 1: 22:03:28 executing program 5: 22:03:28 executing program 2: 22:03:28 executing program 3: epoll_create1(0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, 0x0) 22:03:28 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) 22:03:28 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r1 = dup(r0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) readv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/149, 0x95}], 0x1) 22:03:28 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockname$unix(r0, 0x0, 0x0) 22:03:28 executing program 5: prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x0) 22:03:29 executing program 3: fcntl$getownex(0xffffffffffffff9c, 0x10, 0x0) socket$inet6(0xa, 0xfffffffffffffffd, 0x400) 22:03:29 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000240)=""/98, &(0x7f00000002c0)=0x62) fchown(r0, r3, r4) 22:03:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getrlimit(0x0, &(0x7f0000000000)) 22:03:29 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/4096) 22:03:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_settime(0x0, 0x0) 22:03:29 executing program 5: r0 = memfd_create(&(0x7f0000000280)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000080)="a8", 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x11, r0, 0x0) utimensat(r0, 0x0, &(0x7f0000000180)={{0x0, 0x2710}, {0x0, 0x7530}}, 0x0) 22:03:29 executing program 0: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(0x0, 0x0) r1 = semget$private(0x0, 0x3, 0x0) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000640)={{}, 0x0, 0x0, 0x7}) 22:03:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) timer_create(0x0, 0x0, &(0x7f0000001580)) 22:03:29 executing program 4: seccomp(0x1, 0x0, 0x0) memfd_create(&(0x7f0000000000)='ppp1%\xa0cgroupproc\x00', 0x3) 22:03:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) finit_module(0xffffffffffffffff, 0x0, 0x0) 22:03:29 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x240800, 0x0) close(r0) [ 340.514751] kauditd_printk_skb: 12 callbacks suppressed [ 340.514784] audit: type=1326 audit(1544911409.565:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9185 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) io_setup(0x3, &(0x7f0000000100)) [ 340.633824] audit: type=1326 audit(1544911409.675:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9200 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000180)={0x1, 0x0, [{0x0, 0x0, 0x6266b913}]}) 22:03:29 executing program 4: 22:03:29 executing program 1: [ 340.809987] audit: type=1326 audit(1544911409.855:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9206 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:30 executing program 1: 22:03:30 executing program 4: 22:03:30 executing program 0: 22:03:30 executing program 1: [ 341.242147] audit: type=1326 audit(1544911410.285:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9185 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:30 executing program 3: 22:03:30 executing program 4: [ 341.427081] audit: type=1326 audit(1544911410.475:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9200 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:30 executing program 2: 22:03:30 executing program 1: [ 341.595690] audit: type=1326 audit(1544911410.645:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9206 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:30 executing program 5: 22:03:30 executing program 0: 22:03:30 executing program 3: 22:03:30 executing program 4: 22:03:30 executing program 1: 22:03:30 executing program 2: 22:03:30 executing program 1: 22:03:31 executing program 0: 22:03:31 executing program 3: 22:03:31 executing program 4: 22:03:31 executing program 5: 22:03:31 executing program 2: 22:03:31 executing program 1: 22:03:31 executing program 0: 22:03:31 executing program 3: 22:03:31 executing program 2: 22:03:31 executing program 5: 22:03:31 executing program 4: 22:03:31 executing program 0: 22:03:31 executing program 1: 22:03:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc), 0x4) 22:03:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 22:03:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() get_robust_list(r1, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) 22:03:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fstat(r0, &(0x7f0000000540)) 22:03:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00~\xdb') writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)='4', 0x1}], 0x1) 22:03:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/71) [ 342.859242] audit: type=1326 audit(1544911411.905:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9286 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) pipe(&(0x7f0000000080)) [ 342.958731] audit: type=1326 audit(1544911411.975:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9278 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1000000001, 0x11, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000000000000025000000000000009500010002000000f907fafd5a6d37e2a0766ea402e655e0daabfcca17b17df94d5ffe54adb96399d346ac7289124c7b4cf7811e2d7b09fa10edbc25c9fc8e4d67321d69576e40914a9dd8da46fdc09e9ed5472cfc35671d74efb4102dd748b2438d51fa641f86feced0f58812a1f5dfdf2b5c6a85315faff373b1"], 0x0, 0x3, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 22:03:32 executing program 0: r0 = socket(0x200000000000011, 0x802, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000140)="fb", 0x1}], 0x1) [ 343.051257] audit: type=1326 audit(1544911412.035:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9294 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:32 executing program 4: r0 = socket(0x200000000000011, 0x802, 0x4001000dd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000140)="fb", 0x1}], 0x1) [ 343.167568] audit: type=1326 audit(1544911412.205:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9300 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 22:03:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r2, 0x4010ae94, 0x0) [ 343.322614] ================================================================== [ 343.330088] BUG: KMSAN: uninit-value in check_6rd+0x65a/0x710 [ 343.335999] CPU: 0 PID: 9310 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #2 [ 343.343119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.352491] Call Trace: [ 343.355106] dump_stack+0x1c9/0x220 [ 343.358767] kmsan_report+0x12d/0x290 [ 343.362613] __msan_warning+0x76/0xc0 [ 343.366461] check_6rd+0x65a/0x710 [ 343.370069] sit_tunnel_xmit+0xb58/0x34d0 [ 343.374275] ? dev_hard_start_xmit+0xb3/0xc80 [ 343.378800] ? ipip6_tunnel_uninit+0x800/0x800 [ 343.383401] dev_hard_start_xmit+0x627/0xc80 [ 343.387860] __dev_queue_xmit+0x3173/0x3cf0 [ 343.392253] dev_queue_xmit+0x4b/0x60 [ 343.396073] ? __netdev_pick_tx+0x1290/0x1290 [ 343.400590] packet_sendmsg+0x7cbd/0x9200 [ 343.404758] ? kmsan_memcpy_metadata+0xb/0x10 [ 343.409262] ? __msan_memcpy+0x61/0x70 [ 343.413179] ? do_iter_readv_writev+0x822/0xac0 [ 343.417897] ? __se_sys_writev+0x9b/0xb0 [ 343.421986] ? do_syscall_64+0xcd/0x110 [ 343.425978] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 343.431366] ? balance_callback+0x48/0x260 [ 343.435636] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 343.441128] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 343.446537] ? aa_sk_perm+0x7ab/0x9e0 [ 343.450412] ? compat_packet_setsockopt+0x360/0x360 [ 343.455443] sock_write_iter+0x3f4/0x4f0 [ 343.459597] ? sock_read_iter+0x4e0/0x4e0 [ 343.463760] do_iter_readv_writev+0x822/0xac0 [ 343.468305] ? sock_read_iter+0x4e0/0x4e0 [ 343.472489] do_iter_write+0x302/0xd80 [ 343.476395] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 343.481864] ? import_iovec+0x41f/0x680 [ 343.485883] do_writev+0x397/0x860 [ 343.489484] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 343.494949] ? prepare_exit_to_usermode+0x137/0x460 [ 343.499984] ? syscall_return_slowpath+0x50/0x680 [ 343.504856] __se_sys_writev+0x9b/0xb0 [ 343.508769] __x64_sys_writev+0x4a/0x70 [ 343.512762] do_syscall_64+0xcd/0x110 [ 343.516585] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 343.521808] RIP: 0033:0x457669 [ 343.525011] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 343.543923] RSP: 002b:00007fd6ec06bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 343.551652] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 343.558925] RDX: 0000000000000001 RSI: 00000000200003c0 RDI: 0000000000000003 [ 343.566199] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 343.573488] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd6ec06c6d4 [ 343.580794] R13: 00000000004c39e8 R14: 00000000004dae38 R15: 00000000ffffffff [ 343.588089] [ 343.589725] Uninit was created at: [ 343.593281] kmsan_internal_poison_shadow+0x92/0x150 [ 343.598429] kmsan_kmalloc+0xa1/0x100 [ 343.602237] kmsan_slab_alloc+0xe/0x10 [ 343.606134] __kmalloc_node_track_caller+0xf06/0x1120 [ 343.611357] __alloc_skb+0x318/0xa40 [ 343.615080] alloc_skb_with_frags+0x1c9/0xa80 [ 343.619581] sock_alloc_send_pskb+0xb5d/0x1140 [ 343.624174] packet_sendmsg+0x66a2/0x9200 [ 343.628368] sock_write_iter+0x3f4/0x4f0 [ 343.632461] do_iter_readv_writev+0x822/0xac0 [ 343.636966] do_iter_write+0x302/0xd80 [ 343.640859] do_writev+0x397/0x860 [ 343.644406] __se_sys_writev+0x9b/0xb0 [ 343.648309] __x64_sys_writev+0x4a/0x70 [ 343.652304] do_syscall_64+0xcd/0x110 [ 343.656117] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 343.661310] ================================================================== [ 343.668679] Disabling lock debugging due to kernel taint [ 343.674133] Kernel panic - not syncing: panic_on_warn set ... [ 343.680028] CPU: 0 PID: 9310 Comm: syz-executor4 Tainted: G B 4.20.0-rc5+ #2 [ 343.688520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.697879] Call Trace: [ 343.700499] dump_stack+0x1c9/0x220 [ 343.704149] panic+0x3f0/0x98f [ 343.707425] kmsan_report+0x290/0x290 [ 343.711272] __msan_warning+0x76/0xc0 [ 343.715118] check_6rd+0x65a/0x710 [ 343.718691] sit_tunnel_xmit+0xb58/0x34d0 [ 343.722900] ? dev_hard_start_xmit+0xb3/0xc80 [ 343.727413] ? ipip6_tunnel_uninit+0x800/0x800 [ 343.732012] dev_hard_start_xmit+0x627/0xc80 [ 343.736500] __dev_queue_xmit+0x3173/0x3cf0 [ 343.740879] dev_queue_xmit+0x4b/0x60 [ 343.744690] ? __netdev_pick_tx+0x1290/0x1290 [ 343.749196] packet_sendmsg+0x7cbd/0x9200 [ 343.753538] ? kmsan_memcpy_metadata+0xb/0x10 [ 343.758049] ? __msan_memcpy+0x61/0x70 [ 343.761978] ? do_iter_readv_writev+0x822/0xac0 [ 343.766657] ? __se_sys_writev+0x9b/0xb0 [ 343.770727] ? do_syscall_64+0xcd/0x110 [ 343.774718] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 343.780093] ? balance_callback+0x48/0x260 [ 343.784339] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 343.789825] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 343.795201] ? aa_sk_perm+0x7ab/0x9e0 [ 343.799086] ? compat_packet_setsockopt+0x360/0x360 [ 343.804113] sock_write_iter+0x3f4/0x4f0 [ 343.808236] ? sock_read_iter+0x4e0/0x4e0 [ 343.812400] do_iter_readv_writev+0x822/0xac0 [ 343.816950] ? sock_read_iter+0x4e0/0x4e0 [ 343.821112] do_iter_write+0x302/0xd80 [ 343.825050] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 343.830515] ? import_iovec+0x41f/0x680 [ 343.834535] do_writev+0x397/0x860 [ 343.838128] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 343.843595] ? prepare_exit_to_usermode+0x137/0x460 [ 343.848626] ? syscall_return_slowpath+0x50/0x680 [ 343.853495] __se_sys_writev+0x9b/0xb0 [ 343.857406] __x64_sys_writev+0x4a/0x70 [ 343.861390] do_syscall_64+0xcd/0x110 [ 343.865208] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 343.870413] RIP: 0033:0x457669 [ 343.873614] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 343.892521] RSP: 002b:00007fd6ec06bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 343.900255] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 343.907535] RDX: 0000000000000001 RSI: 00000000200003c0 RDI: 0000000000000003 [ 343.914831] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 343.922104] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd6ec06c6d4 [ 343.929411] R13: 00000000004c39e8 R14: 00000000004dae38 R15: 00000000ffffffff [ 343.937719] Kernel Offset: disabled [ 343.941353] Rebooting in 86400 seconds..