[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 56.088712][ T26] audit: type=1800 audit(1569453479.016:25): pid=8644 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 56.132365][ T26] audit: type=1800 audit(1569453479.016:26): pid=8644 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 56.166098][ T26] audit: type=1800 audit(1569453479.016:27): pid=8644 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.132' (ECDSA) to the list of known hosts. 2019/09/25 23:18:06 fuzzer started 2019/09/25 23:18:08 dialing manager at 10.128.0.26:33461 2019/09/25 23:18:08 syscalls: 1018 2019/09/25 23:18:08 code coverage: enabled 2019/09/25 23:18:08 comparison tracing: enabled 2019/09/25 23:18:08 extra coverage: extra coverage is not supported by the kernel 2019/09/25 23:18:08 setuid sandbox: enabled 2019/09/25 23:18:08 namespace sandbox: enabled 2019/09/25 23:18:08 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/25 23:18:08 fault injection: enabled 2019/09/25 23:18:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/25 23:18:08 net packet injection: enabled 2019/09/25 23:18:08 net device setup: enabled 23:19:36 executing program 0: 23:19:36 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000004, &(0x7f0000000000)="00009a03", 0x4) syzkaller login: [ 153.641242][ T8812] IPVS: ftp: loaded support on port[0] = 21 [ 153.787727][ T8812] chnl_net:caif_netlink_parms(): no params data found [ 153.795577][ T8815] IPVS: ftp: loaded support on port[0] = 21 23:19:36 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000006, 0x0, 0x0) [ 153.876464][ T8812] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.884695][ T8812] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.897284][ T8812] device bridge_slave_0 entered promiscuous mode [ 153.938225][ T8812] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.953237][ T8812] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.973117][ T8812] device bridge_slave_1 entered promiscuous mode [ 154.033745][ T8812] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 154.051300][ T8812] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 154.067129][ T8817] IPVS: ftp: loaded support on port[0] = 21 [ 154.077561][ T8815] chnl_net:caif_netlink_parms(): no params data found [ 154.098815][ T8812] team0: Port device team_slave_0 added [ 154.120759][ T8812] team0: Port device team_slave_1 added 23:19:37 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000006, &(0x7f0000000000)="00009a03", 0x4) [ 154.224973][ T8812] device hsr_slave_0 entered promiscuous mode [ 154.262394][ T8812] device hsr_slave_1 entered promiscuous mode 23:19:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7b, 0xa, 0xff00}}, &(0x7f0000000000)='PL\x0e\x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 154.388356][ T8820] IPVS: ftp: loaded support on port[0] = 21 [ 154.397316][ T8815] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.405127][ T8815] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.425170][ T8815] device bridge_slave_0 entered promiscuous mode [ 154.447574][ T8812] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.454878][ T8812] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.462886][ T8812] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.469986][ T8812] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.497657][ T8815] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.506997][ T8815] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.522972][ T8815] device bridge_slave_1 entered promiscuous mode [ 154.632394][ T8815] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 154.646394][ T8815] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 154.686008][ T8817] chnl_net:caif_netlink_parms(): no params data found [ 154.694778][ T8824] IPVS: ftp: loaded support on port[0] = 21 23:19:37 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000003, &(0x7f0000000000)="00009a03", 0x4) [ 154.779875][ T8815] team0: Port device team_slave_0 added [ 154.790407][ T8815] team0: Port device team_slave_1 added [ 154.817658][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.839667][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.954272][ T8815] device hsr_slave_0 entered promiscuous mode [ 155.002547][ T8815] device hsr_slave_1 entered promiscuous mode [ 155.042265][ T8815] debugfs: Directory 'hsr0' with parent '/' already present! [ 155.061268][ T8827] IPVS: ftp: loaded support on port[0] = 21 [ 155.105707][ T8817] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.113204][ T8817] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.120839][ T8817] device bridge_slave_0 entered promiscuous mode [ 155.131529][ T8817] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.138655][ T8817] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.146703][ T8817] device bridge_slave_1 entered promiscuous mode [ 155.162214][ T8812] 8021q: adding VLAN 0 to HW filter on device bond0 [ 155.184704][ T8820] chnl_net:caif_netlink_parms(): no params data found [ 155.219860][ T8817] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 155.279228][ T8817] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 155.302568][ T8820] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.309739][ T8820] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.318371][ T8820] device bridge_slave_0 entered promiscuous mode [ 155.326583][ T8820] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.333736][ T8820] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.341853][ T8820] device bridge_slave_1 entered promiscuous mode [ 155.376686][ T8820] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 155.388603][ T8820] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 155.400383][ T8824] chnl_net:caif_netlink_parms(): no params data found [ 155.418225][ T8817] team0: Port device team_slave_0 added [ 155.431652][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.440625][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.452152][ T8812] 8021q: adding VLAN 0 to HW filter on device team0 [ 155.468483][ T8817] team0: Port device team_slave_1 added [ 155.481933][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.490854][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.500373][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.507502][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.534289][ T8820] team0: Port device team_slave_0 added [ 155.556627][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.566232][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.575985][ T8826] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.583127][ T8826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.591261][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 155.600398][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 155.613250][ T8820] team0: Port device team_slave_1 added [ 155.695186][ T8820] device hsr_slave_0 entered promiscuous mode [ 155.732566][ T8820] device hsr_slave_1 entered promiscuous mode [ 155.772233][ T8820] debugfs: Directory 'hsr0' with parent '/' already present! [ 155.815172][ T8817] device hsr_slave_0 entered promiscuous mode [ 155.872542][ T8817] device hsr_slave_1 entered promiscuous mode [ 155.932231][ T8817] debugfs: Directory 'hsr0' with parent '/' already present! [ 155.941297][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 155.950389][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 155.985243][ T8824] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.992634][ T8824] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.000321][ T8824] device bridge_slave_0 entered promiscuous mode [ 156.008225][ T8824] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.016079][ T8824] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.024049][ T8824] device bridge_slave_1 entered promiscuous mode [ 156.031061][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 156.039710][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 156.048536][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 156.069553][ T8827] chnl_net:caif_netlink_parms(): no params data found [ 156.124762][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 156.136824][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.145933][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 156.154462][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.170619][ T8824] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 156.199162][ T8812] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 156.209476][ T8824] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 156.224640][ T8815] 8021q: adding VLAN 0 to HW filter on device bond0 [ 156.267121][ T8815] 8021q: adding VLAN 0 to HW filter on device team0 [ 156.285003][ T8827] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.292851][ T8827] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.300901][ T8827] device bridge_slave_0 entered promiscuous mode [ 156.318075][ T8824] team0: Port device team_slave_0 added [ 156.329267][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.337103][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.351418][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.360930][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.369625][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.376757][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.385073][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.393823][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.402249][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.409295][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.419346][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.428089][ T8827] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.435579][ T8827] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.446742][ T8827] device bridge_slave_1 entered promiscuous mode [ 156.460066][ T8824] team0: Port device team_slave_1 added [ 156.479201][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 156.493333][ T8812] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 156.540323][ T8827] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 156.563100][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 156.571768][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 156.580891][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 156.589909][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 156.598747][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 156.607580][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 156.616069][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.633456][ T8817] 8021q: adding VLAN 0 to HW filter on device bond0 [ 156.643657][ T8827] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 156.668044][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 156.677384][ T8827] team0: Port device team_slave_0 added [ 156.754270][ T8824] device hsr_slave_0 entered promiscuous mode [ 156.802489][ T8824] device hsr_slave_1 entered promiscuous mode [ 156.852440][ T8824] debugfs: Directory 'hsr0' with parent '/' already present! [ 156.866488][ T8827] team0: Port device team_slave_1 added [ 156.891256][ T8817] 8021q: adding VLAN 0 to HW filter on device team0 [ 156.906315][ T8815] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 156.918717][ T8815] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 156.929874][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 156.938526][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.947377][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.955560][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 23:19:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80803, 0x87) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000000041}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@remote, @in6=@loopback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x2b}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x90}}, 0xe8) socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) r4 = accept(r3, 0x0, &(0x7f0000000100)) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) r7 = socket(0xa, 0x1, 0x0) close(r7) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) sendmmsg$inet_sctp(r7, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r7, 0x84, 0x17, &(0x7f0000000180)={r6, 0x0, 0x1, "fe"}, 0x9) socket$rxrpc(0x21, 0x2, 0x7) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000200)={r6, 0x97, "3a33c1ccc740913c981ca5f4dbb6a4e9da5daf6ff2c2f766b3f55b586e0dd1b82754d6a3feaf8ec73245d123f759fdfc005dec5ed56ccbf4bb56c948a0b010b27e19d1c9900888dfcddf2a4cbc5adef64e0a8cf633c6d93910e5ab51b429afcaf0b685b5d65f1fce954d7b0d9fcb03b6fa33c35cd0e167692864a0ba610ea2c6dd822f9ae378960b0bd3dd40d5fef44f9a3828f7eff16e"}, &(0x7f00000002c0)=0x9f) r8 = socket(0xa, 0x1, 0x0) close(r8) connect$inet6(r1, &(0x7f00000000c0), 0x1c) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) [ 157.024032][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 157.041206][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 157.050384][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.057550][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.075915][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 157.085156][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 157.093812][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.100970][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.108720][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 157.117488][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 157.126766][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 157.185354][ T8827] device hsr_slave_0 entered promiscuous mode [ 157.232425][ T8827] device hsr_slave_1 entered promiscuous mode [ 157.273079][ T8827] debugfs: Directory 'hsr0' with parent '/' already present! [ 157.295176][ T8815] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 157.317411][ T8820] 8021q: adding VLAN 0 to HW filter on device bond0 [ 157.325165][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 157.338560][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 157.347455][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 157.356515][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 157.365288][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 157.373927][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.382232][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.390542][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.399892][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 157.408930][ T8817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 157.435835][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 157.444245][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 157.463416][ T8817] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 157.502509][ T8824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 157.514085][ T8820] 8021q: adding VLAN 0 to HW filter on device team0 [ 157.540163][ T8824] 8021q: adding VLAN 0 to HW filter on device team0 [ 157.596462][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 157.604916][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 157.613461][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 157.624763][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 157.633691][ T3004] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.640749][ T3004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.648918][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 157.658153][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 157.666922][ T3004] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.674070][ T3004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.681872][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 157.691606][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 157.700607][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 157.709354][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 157.718440][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 157.726732][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 23:19:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000008000100636273001c000200180001005e588c637918917cbb00000000000000000000001976a806b3fd7cb102ecb563573d9098644130dcc98cc4232f1e2fd3bf1c188a58a6df0895e4332a012a6b79997c2f70f4fb6e57203f7ab2"], 0x48}}, 0x0) [ 157.748711][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 157.760421][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 157.769692][ T8826] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.776911][ T8826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.804043][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 157.820882][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 157.840582][ T8858] kasan: CONFIG_KASAN_INLINE enabled [ 157.846166][ T8858] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 157.854450][ T8858] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 157.861384][ T8858] CPU: 1 PID: 8858 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 157.868831][ T8858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.878910][ T8858] RIP: 0010:__list_del_entry_valid+0x85/0xf5 [ 157.884891][ T8858] Code: 0f 84 e1 00 00 00 48 b8 22 01 00 00 00 00 ad de 49 39 c4 0f 84 e2 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 75 53 49 8b 14 24 4c 39 f2 0f 85 99 00 00 00 49 8d 7d [ 157.904495][ T8858] RSP: 0018:ffff888066eaf450 EFLAGS: 00010246 [ 157.910555][ T8858] RAX: dffffc0000000000 RBX: ffff888087611b00 RCX: ffffffff8159aa5a [ 157.918531][ T8858] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff888087611e68 [ 157.926535][ T8858] RBP: ffff888066eaf468 R08: 0000000000000004 R09: ffffed100cdd5e7d [ 157.934502][ T8858] R10: ffffed100cdd5e7c R11: 0000000000000003 R12: 0000000000000000 [ 157.942464][ T8858] R13: 0000000000000000 R14: ffff888087611e60 R15: ffff888087611dc0 [ 157.950439][ T8858] FS: 00007ff7137c7700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 157.959356][ T8858] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 157.965927][ T8858] CR2: 0000001b32921000 CR3: 0000000087119000 CR4: 00000000001406e0 [ 157.973886][ T8858] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 157.981843][ T8858] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 157.989821][ T8858] Call Trace: [ 157.993116][ T8858] cbs_destroy+0x7d/0x2a0 [ 157.997437][ T8858] ? cbs_init+0x25d/0x450 [ 158.001750][ T8858] ? cbs_dequeue_soft+0x410/0x410 [ 158.006762][ T8858] qdisc_create+0xbc6/0x1210 [ 158.011338][ T8858] ? tc_get_qdisc+0xc10/0xc10 [ 158.016018][ T8858] ? __nla_parse+0x43/0x60 [ 158.020428][ T8858] tc_modify_qdisc+0x524/0x1c50 [ 158.025277][ T8858] ? qdisc_create+0x1210/0x1210 [ 158.030140][ T8858] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 158.036368][ T8858] ? qdisc_create+0x1210/0x1210 [ 158.041208][ T8858] rtnetlink_rcv_msg+0x463/0xb00 [ 158.046148][ T8858] ? rtnetlink_put_metrics+0x580/0x580 [ 158.051598][ T8858] ? netlink_deliver_tap+0x22d/0xbf0 [ 158.056871][ T8858] ? find_held_lock+0x35/0x130 [ 158.061632][ T8858] netlink_rcv_skb+0x177/0x450 [ 158.066393][ T8858] ? rtnetlink_put_metrics+0x580/0x580 [ 158.071928][ T8858] ? netlink_ack+0xb30/0xb30 [ 158.076511][ T8858] ? __kasan_check_read+0x11/0x20 [ 158.081523][ T8858] ? netlink_deliver_tap+0x254/0xbf0 [ 158.086839][ T8858] rtnetlink_rcv+0x1d/0x30 [ 158.091261][ T8858] netlink_unicast+0x531/0x710 [ 158.096010][ T8858] ? netlink_attachskb+0x7c0/0x7c0 [ 158.101121][ T8858] ? _copy_from_iter_full+0x25d/0x8a0 [ 158.106491][ T8858] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 158.112222][ T8858] ? __check_object_size+0x3d/0x437 [ 158.117433][ T8858] netlink_sendmsg+0x8a5/0xd60 [ 158.122200][ T8858] ? netlink_unicast+0x710/0x710 [ 158.127145][ T8858] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 158.132694][ T8858] ? apparmor_socket_sendmsg+0x2a/0x30 [ 158.138158][ T8858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 158.144412][ T8858] ? security_socket_sendmsg+0x8d/0xc0 [ 158.149876][ T8858] ? netlink_unicast+0x710/0x710 [ 158.154824][ T8858] sock_sendmsg+0xd7/0x130 [ 158.159230][ T8858] ___sys_sendmsg+0x803/0x920 [ 158.163899][ T8858] ? copy_msghdr_from_user+0x440/0x440 [ 158.169352][ T8858] ? __kasan_check_read+0x11/0x20 [ 158.174380][ T8858] ? __fget+0x384/0x560 [ 158.178526][ T8858] ? ksys_dup3+0x3e0/0x3e0 [ 158.182940][ T8858] ? __fget_light+0x1a9/0x230 [ 158.187604][ T8858] ? __fdget+0x1b/0x20 [ 158.191677][ T8858] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 158.197905][ T8858] __sys_sendmsg+0x105/0x1d0 [ 158.202580][ T8858] ? __sys_sendmsg_sock+0xd0/0xd0 [ 158.207612][ T8858] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 158.213069][ T8858] ? do_syscall_64+0x26/0x760 [ 158.213318][ T3891] kobject: 'loop0' (000000006eb5d4d5): kobject_uevent_env [ 158.217757][ T8858] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 158.230921][ T8858] ? do_syscall_64+0x26/0x760 [ 158.235613][ T8858] __x64_sys_sendmsg+0x78/0xb0 [ 158.240387][ T8858] do_syscall_64+0xfa/0x760 [ 158.244896][ T8858] entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:19:41 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000140)={'teql0\x00', 0x5d39}) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg(r0, &(0x7f00000004c0)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @rand_addr=0x6}, 0x0, 0x2, 0x0, 0x2}}, 0x80, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000340)="a1c24e9ba4d605c20cd3b7e844354053f447ed7329dc", 0x16}], 0x2}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000600)={@local, 0x0, 0x2, 0x3, 0x6, 0x6, 0x2}, 0x20) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, &(0x7f0000000380)) accept(0xffffffffffffffff, &(0x7f00000001c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, &(0x7f00000002c0)=0x80) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000500)={0x2, 0x0, @multicast1}, 0x10) ppoll(&(0x7f0000000040)=[{r0, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='cpuacct.usage_pe\x00\x90\x02\x00\x00', 0x26e1, 0x25fa) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x8) r2 = socket$inet(0x2, 0x3, 0x19) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000100)={'veth0_to_bond\x00', &(0x7f00000002c0)=@ethtool_perm_addr={0x20, 0x6, "098d8eb13ca3"}}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000300)={0x0, 0x5, 0x3, 0x521, 0xfff, 0xffff385b}, &(0x7f00000003c0)=0x14) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={r4, 0xfd, 0x8, 0x80000000}, &(0x7f0000000440)=0x10) ppoll(&(0x7f0000000080)=[{r0, 0x80}], 0x1, &(0x7f00000000c0)={0x77359400}, 0x0, 0x20000000) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000580)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="199e31332e14344b26a749fc824cc89f", @remote, 0x0, 0x2, 0x5, 0x400, 0x7, 0x1000000}) accept4$rose(r1, &(0x7f0000000540)=@short={0xb, @dev, @remote, 0x1, @null}, &(0x7f0000000180)=0x1c, 0x80800) [ 158.248636][ T3891] kobject: 'loop0' (000000006eb5d4d5): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 158.250799][ T8858] RIP: 0033:0x459a29 [ 158.250812][ T8858] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 158.250824][ T8858] RSP: 002b:00007ff7137c6c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 158.292851][ T8858] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 158.300830][ T8858] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 158.308816][ T8858] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 158.316799][ T8858] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff7137c76d4 [ 158.324778][ T8858] R13: 00000000004c7967 R14: 00000000004dd348 R15: 00000000ffffffff [ 158.332770][ T8858] Modules linked in: [ 158.336801][ T8858] ---[ end trace 9189b33f3914ae90 ]--- [ 158.342297][ T8858] RIP: 0010:__list_del_entry_valid+0x85/0xf5 [ 158.348361][ T8858] Code: 0f 84 e1 00 00 00 48 b8 22 01 00 00 00 00 ad de 49 39 c4 0f 84 e2 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 75 53 49 8b 14 24 4c 39 f2 0f 85 99 00 00 00 49 8d 7d [ 158.368017][ T8858] RSP: 0018:ffff888066eaf450 EFLAGS: 00010246 [ 158.374131][ T8858] RAX: dffffc0000000000 RBX: ffff888087611b00 RCX: ffffffff8159aa5a [ 158.382160][ T8858] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff888087611e68 [ 158.390145][ T8858] RBP: ffff888066eaf468 R08: 0000000000000004 R09: ffffed100cdd5e7d [ 158.398184][ T8858] R10: ffffed100cdd5e7c R11: 0000000000000003 R12: 0000000000000000 [ 158.406195][ T8858] R13: 0000000000000000 R14: ffff888087611e60 R15: ffff888087611dc0 [ 158.414245][ T8858] FS: 00007ff7137c7700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 158.423216][ T8858] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 158.429834][ T8858] CR2: 0000001b32921000 CR3: 0000000087119000 CR4: 00000000001406e0 [ 158.437858][ T8858] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 158.445903][ T8858] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 158.453905][ T8858] Kernel panic - not syncing: Fatal exception [ 158.461440][ T8858] Kernel Offset: disabled [ 158.465774][ T8858] Rebooting in 86400 seconds..