Warning: Permanently added '10.128.0.110' (ECDSA) to the list of known hosts. [ 39.162135] random: sshd: uninitialized urandom read (32 bytes read) 2019/09/15 16:33:49 fuzzer started [ 39.363740] audit: type=1400 audit(1568565229.327:36): avc: denied { map } for pid=6823 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16480 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 39.746819] random: cc1: uninitialized urandom read (8 bytes read) 2019/09/15 16:33:50 dialing manager at 10.128.0.105:34685 2019/09/15 16:33:50 syscalls: 2466 2019/09/15 16:33:50 code coverage: enabled 2019/09/15 16:33:50 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/09/15 16:33:50 extra coverage: extra coverage is not supported by the kernel 2019/09/15 16:33:50 setuid sandbox: enabled 2019/09/15 16:33:50 namespace sandbox: enabled 2019/09/15 16:33:50 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/15 16:33:50 fault injection: enabled 2019/09/15 16:33:50 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/15 16:33:50 net packet injection: enabled 2019/09/15 16:33:50 net device setup: enabled [ 41.639844] random: crng init done 16:35:31 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={[], [], @multicast2}, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 16:35:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xb, 0x11, r3, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x0, 0x0, 0x1}}, 0x50) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:35:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000000)="ddd6", 0x2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000480)="81793ab9ea1fe92b2fbcb21892f06c6cee94a11d9951b270f29bb67f2ae559ffb236079b93b0a1f9ad302992682736052ab29e57cd4aeb20d445f4ad9b2717281393846552af37b1ba031dde1cdce39cac5843b0bbf07ff5673c85c4df210b3b3f84b508a519c47b7fcbe919c8b4ba07bbd1c82b198c2ad95407c9c1001a44889479202d5feaa5b9819664c9b20f96e678e9c01f3540561fcbed907f81adfeb9a3408d29c175afbd8e8695aedf3b2d153f32b1174d33c444de3d095401612c7a128d02000262551e82c10f4374a25f0749876c", 0xd3, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 16:35:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x300cce, &(0x7f0000000080)={@local, @empty=[0x7, 0x80350000, 0xe80, 0x4000000, 0x7, 0x800000000000e012], [{}], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300543, 0x2b, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x0, 0xe80, 0x0, 0xe80], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x3a, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x7, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 16:35:31 executing program 3: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0xffffffffffffff4a, &(0x7f0000000200)={&(0x7f0000000080)={0x18, 0x16, 0xa01}, 0x18}}, 0x0) 16:35:31 executing program 4: r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0x1c) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) accept$alg(r1, 0x713000, 0x715000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) [ 141.836156] audit: type=1400 audit(1568565331.797:37): avc: denied { map } for pid=6823 comm="syz-fuzzer" path="/root/syzkaller-shm519591731" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 141.869397] audit: type=1400 audit(1568565331.817:38): avc: denied { map } for pid=6841 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13809 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 142.021621] IPVS: ftp: loaded support on port[0] = 21 [ 142.787048] chnl_net:caif_netlink_parms(): no params data found [ 142.794583] IPVS: ftp: loaded support on port[0] = 21 [ 142.826279] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.832968] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.839852] device bridge_slave_0 entered promiscuous mode [ 142.846586] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.853061] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.859793] device bridge_slave_1 entered promiscuous mode [ 142.875781] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 142.885740] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 142.909507] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 142.916610] team0: Port device team_slave_0 added [ 142.923590] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 142.930789] team0: Port device team_slave_1 added [ 142.937578] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 142.946439] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 142.957953] IPVS: ftp: loaded support on port[0] = 21 [ 143.012138] device hsr_slave_0 entered promiscuous mode [ 143.050327] device hsr_slave_1 entered promiscuous mode [ 143.090537] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 143.099497] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 143.121385] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.127928] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.134708] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.141050] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.177567] chnl_net:caif_netlink_parms(): no params data found [ 143.235155] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.241758] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.248539] device bridge_slave_0 entered promiscuous mode [ 143.259739] IPVS: ftp: loaded support on port[0] = 21 [ 143.266853] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.273595] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.280929] device bridge_slave_1 entered promiscuous mode [ 143.305312] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 143.319063] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 143.365784] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 143.374363] team0: Port device team_slave_0 added [ 143.379861] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 143.387019] team0: Port device team_slave_1 added [ 143.392049] chnl_net:caif_netlink_parms(): no params data found [ 143.400224] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 143.414271] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 143.437173] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 143.444023] 8021q: adding VLAN 0 to HW filter on device bond0 [ 143.454395] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 143.502838] device hsr_slave_0 entered promiscuous mode [ 143.540272] device hsr_slave_1 entered promiscuous mode [ 143.584552] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 143.593396] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 143.600119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 143.607932] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.625154] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.634009] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.641602] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.648559] device bridge_slave_0 entered promiscuous mode [ 143.656818] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.663291] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.670261] device bridge_slave_1 entered promiscuous mode [ 143.686703] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 143.692941] 8021q: adding VLAN 0 to HW filter on device team0 [ 143.707684] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 143.716669] IPVS: ftp: loaded support on port[0] = 21 [ 143.720651] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 143.734175] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.742159] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.748515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.757514] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 143.793782] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 143.801262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.808770] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.815143] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.823551] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.831620] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 143.852708] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 143.876745] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 143.884452] team0: Port device team_slave_0 added [ 143.906987] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 143.913814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 143.921585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 143.931455] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 143.939969] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 143.951160] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 143.957156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 143.964547] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 143.972930] team0: Port device team_slave_1 added [ 143.998553] chnl_net:caif_netlink_parms(): no params data found [ 144.007176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 144.014776] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 144.026620] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 144.033961] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 144.041454] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 144.049572] 8021q: adding VLAN 0 to HW filter on device bond0 [ 144.066254] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 144.098968] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 16:35:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x100000000000000, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x2000000}, 0x3c) [ 144.162703] IPVS: ftp: loaded support on port[0] = 21 [ 144.168116] device hsr_slave_0 entered promiscuous mode 16:35:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x11, 0x0, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:35:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) ioctl$int_in(r1, 0x5452, &(0x7f00000001c0)=0x9) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 144.210635] device hsr_slave_1 entered promiscuous mode [ 144.240573] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 144.253192] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 144.273046] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 144.280227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 144.287145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.303195] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 144.309457] 8021q: adding VLAN 0 to HW filter on device team0 [ 144.333438] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.339802] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.347118] device bridge_slave_0 entered promiscuous mode [ 144.354439] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.362035] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.370685] device bridge_slave_1 entered promiscuous mode 16:35:34 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000280)={0x0, [], 0x7}) [ 144.379682] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 144.393318] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 144.423502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 16:35:34 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000240)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) [ 144.437535] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.457382] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.463793] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.513879] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 144.526686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 144.543868] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 144.559930] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 144.572172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 144.582475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.591580] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.598124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.608414] chnl_net:caif_netlink_parms(): no params data found [ 144.639718] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 144.647232] team0: Port device team_slave_0 added [ 144.655309] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 144.673088] IPVS: ftp: loaded support on port[0] = 21 [ 144.678826] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 144.686280] team0: Port device team_slave_1 added [ 144.691877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 144.705360] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 144.717559] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 144.725212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 144.742620] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 144.749928] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 144.779799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 144.789182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 144.800347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 144.809575] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 144.873799] device hsr_slave_0 entered promiscuous mode [ 144.910379] device hsr_slave_1 entered promiscuous mode [ 144.951213] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 144.968235] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.975792] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.982795] device bridge_slave_0 entered promiscuous mode [ 144.989049] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 144.996705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 145.005062] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 145.012558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 145.019904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 145.028716] 8021q: adding VLAN 0 to HW filter on device bond0 [ 145.037337] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 145.044709] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 145.074348] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.080896] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.087713] device bridge_slave_1 entered promiscuous mode [ 145.094065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 145.103585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 145.112988] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 145.119596] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 145.126312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 145.165114] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 145.195297] chnl_net:caif_netlink_parms(): no params data found [ 145.208286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.217698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.225988] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 145.236027] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 145.253963] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 145.260129] 8021q: adding VLAN 0 to HW filter on device team0 [ 145.268660] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 145.287808] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 145.296407] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 145.305718] 8021q: adding VLAN 0 to HW filter on device batadv0 16:35:35 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xc8f) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, 0x0) socket$alg(0x26, 0x5, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) read(r2, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) [ 145.323177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 145.334444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 145.342224] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.348587] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.362811] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 145.386990] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 145.394779] team0: Port device team_slave_0 added [ 145.406272] audit: type=1400 audit(1568565335.367:39): avc: denied { create } for pid=6902 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 145.435688] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 145.443387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.451498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.459063] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.465528] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.478138] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 145.491417] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 145.498506] team0: Port device team_slave_1 added [ 145.508809] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 145.523054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 145.538645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 145.549300] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 145.560905] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.567256] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.574544] device bridge_slave_0 entered promiscuous mode [ 145.583375] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 145.597163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 145.606753] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 145.613842] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.620727] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.627660] device bridge_slave_1 entered promiscuous mode [ 145.646695] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 145.673692] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 145.682176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 145.696853] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 145.707471] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 16:35:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x20000000080003, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005780)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 145.753442] device hsr_slave_0 entered promiscuous mode [ 145.800479] device hsr_slave_1 entered promiscuous mode [ 145.841536] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 145.848800] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 145.859975] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 145.867976] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 145.876176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.883528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 16:35:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x20000000080003, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005780)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 145.890610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 145.898104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 145.906904] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 145.914375] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 145.925012] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 145.934350] 8021q: adding VLAN 0 to HW filter on device team0 [ 145.948349] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 145.966463] hrtimer: interrupt took 38838 ns [ 145.993341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 146.001198] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.011066] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 146.018781] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 146.027500] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 146.035003] team0: Port device team_slave_0 added [ 146.040628] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 146.047933] team0: Port device team_slave_1 added [ 146.053470] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 146.061450] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 146.068982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 146.077290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.089530] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.095911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.104195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 146.111709] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.121634] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 146.129066] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 146.136038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 146.154195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 146.161377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 146.168985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 146.176586] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.182968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.192016] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 146.204012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 146.218865] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 146.230919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 146.274239] device hsr_slave_0 entered promiscuous mode [ 146.320341] device hsr_slave_1 entered promiscuous mode [ 146.380767] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 146.388476] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 146.398265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 146.408143] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 146.418439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 146.427133] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 146.436271] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 146.446878] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 146.461614] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 146.481071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 146.489545] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 146.501035] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 146.511053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 146.518545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.527796] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 146.539440] 8021q: adding VLAN 0 to HW filter on device bond0 [ 146.547560] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 146.562519] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 146.575635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 146.583539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.596749] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 146.604984] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 146.613425] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 146.628301] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 146.640893] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 146.646981] 8021q: adding VLAN 0 to HW filter on device team0 [ 146.654905] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 146.661576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 146.668359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 146.688983] 8021q: adding VLAN 0 to HW filter on device bond0 [ 146.698184] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 146.705948] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 146.715257] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 146.728681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 146.737407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.747476] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.753902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.761520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 146.771815] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 16:35:36 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 146.785626] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 146.794463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 146.803130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 146.810725] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.817059] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.825284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 146.835105] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 146.845575] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 146.864833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 146.872220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 146.879003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 146.888171] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 146.894574] 8021q: adding VLAN 0 to HW filter on device team0 [ 146.903449] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 146.914356] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 146.921966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 146.929557] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 146.937948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 146.946248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.954483] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.960861] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.002636] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 147.013976] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 147.022186] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 147.034557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 147.045926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 147.058617] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 147.066254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 147.078773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.086950] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.093325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.108133] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 147.117224] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 147.124859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 147.133139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 147.141019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.150538] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 147.159524] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 147.168629] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 147.176789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 147.185178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 147.197008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 147.216748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 147.242493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 147.252844] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 147.262978] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 147.268967] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 147.279485] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 147.286789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 147.295163] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 147.306119] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 147.318525] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 147.325808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 147.333560] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.343144] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 147.355711] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 147.362508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 147.375693] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 147.385128] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 147.396735] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 147.422451] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 147.449948] 8021q: adding VLAN 0 to HW filter on device batadv0 16:35:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905090af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3494fcf78a4d8b2c4f5c89d0e574092c82ca3c22e31ebc6da732ee3d854a1d3b9b3c0875a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae300003e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae63383315926d787838c32a71fd772e5ae946083f89c0ac4d0d917c3ba6416ff694b272dfa8c7b9b39630a94050deb366b0278733a1cb1a56a2750b57ab3d4220e81b966b0e84a7f0321a9c73fe2f5fbed25ecfdc81a031cbcf3b2f1c988a84918b4274a759875e3872d198bd2d497317254fb0077b12dfe8bf55373608099afee69df6943d1f9090df039", 0x136}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ptrace$cont(0x1f, r0, 0x0, 0x0) 16:35:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x50}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 16:35:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905090af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3494fcf78a4d8b2c4f5c89d0e574092c82ca3c22e31ebc6da732ee3d854a1d3b9b3c0875a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae300003e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2aa7f74ae63383315926d787838c32a71fd772e5ae946083f89c0ac4d0d917c3ba6416ff694b272dfa8c7b9b39630a94050deb366b0278733a1cb1a56a2750b57ab3", 0xe9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ptrace$cont(0x1f, r0, 0x0, 0x0) 16:35:38 executing program 0: r0 = memfd_create(&(0x7f0000000040)='vboxndt1\x00\xd9\xa1>L{\xcfb\xeb\xba^pA#\a[\xf1\xf9-F=e\xaeT\x0e\xa0K\"\xb4\xd4\x91\xeb|7hmOj8\x88\xfd\xd5\xd9Z\xf9\xdaza\x88\xed\xf8\xa5[\x1c\x1f\xa8\xe4\x05+\xe4\xbe\xdb\x9eW\x8c\\0\xa4\xe3c\xb8]G\xcd\x87\'\x8b3\xb8\x84\x8d\x14\x06\x0e\xef \xf8\x9e\xac\x8c\xf7\xb8\x14\x99\r\xb6\x04u\x92\x92_\x18\xb9\xc8\x9d\xb9\x98\xaf\x03dE\xa2\x11%\x8f\xc6\xf9\xa0Qt\xb3N\x81ohil\'\xb9\xee]\xc4Gu\xe2n\xe0\xf1\x9cr\x97+\b\bm$,\xe7\xd3\xfb\x86\xdd\xc3\xb3\xa1\x00E\xcc\xa9\xfa\x9cq\xd8\x88Z\xe3\x1fa\x9b\x8c\x0f\x83\xa0\xf4\xe6\xfb\x9c\xfc\x9cW%\xa8\r;\x1f\xb0\xd0\xa3', 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xfffffffffffffffe, 0x4) 16:35:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 16:35:38 executing program 4: inotify_init() pipe(&(0x7f0000000700)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 16:35:38 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) 16:35:38 executing program 5: ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) inotify_init() pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000240)) 16:35:38 executing program 1: pipe(&(0x7f0000000700)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:35:38 executing program 0: r0 = memfd_create(&(0x7f0000000040)='vboxndt1\x00\xd9\xa1>L{\xcfb\xeb\xba^pA#\a[\xf1\xf9-F=e\xaeT\x0e\xa0K\"\xb4\xd4\x91\xeb|7hmOj8\x88\xfd\xd5\xd9Z\xf9\xdaza\x88\xed\xf8\xa5[\x1c\x1f\xa8\xe4\x05+\xe4\xbe\xdb\x9eW\x8c\\0\xa4\xe3c\xb8]G\xcd\x87\'\x8b3\xb8\x84\x8d\x14\x06\x0e\xef \xf8\x9e\xac\x8c\xf7\xb8\x14\x99\r\xb6\x04u\x92\x92_\x18\xb9\xc8\x9d\xb9\x98\xaf\x03dE\xa2\x11%\x8f\xc6\xf9\xa0Qt\xb3N\x81ohil\'\xb9\xee]\xc4Gu\xe2n\xe0\xf1\x9cr\x97+\b\bm$,\xe7\xd3\xfb\x86\xdd\xc3\xb3\xa1\x00E\xcc\xa9\xfa\x9cq\xd8\x88Z\xe3\x1fa\x9b\x8c\x0f\x83\xa0\xf4\xe6\xfb\x9c\xfc\x9cW%\xa8\r;\x1f\xb0\xd0\xa3', 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0xfffffffffffffffe, 0x4) 16:35:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7bf070") r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x0, 0x0, @loopback={0xff00000000000000}}, 0x1c) [ 148.768485] audit: type=1400 audit(1568565338.727:40): avc: denied { map } for pid=6997 comm="syz-executor.3" path="/dev/binder3" dev="devtmpfs" ino=917 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 148.810952] binder_alloc: binder_alloc_mmap_handler: 6997 20ffd000-21000000 already mapped failed -16 16:35:38 executing program 4: prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) socket(0x11, 0x0, 0x200) r0 = socket(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf79e, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0xe4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x0, 0x79ca}, r2, 0x0, r1, 0x0) fcntl$getflags(0xffffffffffffffff, 0xb) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x15000000000000, 0x485, 0x0, 0x0) [ 148.856699] audit: type=1400 audit(1568565338.807:41): avc: denied { node_bind } for pid=7010 comm="syz-executor.4" saddr=ff00::1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 16:35:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x200000000000002) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000280)) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f00000000c0)=0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x840000000002, 0x3, 0x6) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r2, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000100)={0x8001, 0x8, [0x6, 0x9, 0x4, 0x8000, 0x1], 0xffffffffffffff7f}) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x20000, 0x49) 16:35:41 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)='iC;`\xb6p+\x10', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x200, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x59cb, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x2000, 0x7, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, @perf_bp={&(0x7f0000000100), 0x9}}, r0, 0x3, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) sendfile(r1, r1, 0x0, 0x2000005) 16:35:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r3) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sendmsg$netlink(r6, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r2]}}], 0x38}, 0x0) recvmmsg(r4, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:35:41 executing program 4: prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) socket(0x11, 0x0, 0x200) r0 = socket(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf79e, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0xe4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x0, 0x79ca}, r2, 0x0, r1, 0x0) fcntl$getflags(0xffffffffffffffff, 0xb) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x15000000000000, 0x485, 0x0, 0x0) 16:35:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005780)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8}]]}}}]}, 0x3c}}, 0x0) 16:35:41 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000001300)={{}, {0x0, 0x1c9c380}}, 0x0) 16:35:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:35:41 executing program 3: inotify_init() pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:35:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="00007a01000100000000005292d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "", [[]]}, 0x158) io_setup(0xff, &(0x7f0000000380)=0x0) io_submit(r2, 0x27f, &(0x7f0000001440)=[&(0x7f0000000200)={0x5000000, 0x0, 0x700000000000000, 0x0, 0x0, r1, &(0x7f0000000340), 0xfdef}]) 16:35:41 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 16:35:41 executing program 1: ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000200)={0x34, 0x0, &(0x7f00000001c0)}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xffffffffffffff77, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000000c0)="25f78be5a68cb2a4a10f245b4e41edf114358e51921827ec679344d8e59ed0cbefba6fbaa31a9babc97e068c37b519d809b9", 0x0}, 0x206) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000040)=0x1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:35:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) 16:35:42 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x0, 0x20}, 0xc) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0x34000) 16:35:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x84}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 16:35:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ptrace$cont(0x1f, r0, 0x0, 0x0) 16:35:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000040)=0x500) 16:35:42 executing program 1: r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0x0, 0x1, 0x0, [], &(0x7f00000000c0)={0x98f905, 0x0, [], @p_u8=0x0}}) 16:35:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "6c48a3", 0x14, 0x82f, 0x0, @dev, @dev, {[], @tcp={{0x689, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:35:42 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xc8f) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000580)={"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"}) r2 = socket$alg(0x26, 0x5, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000400)={{0x0, @name="f40d8d948e14a21e22f3d685f40ae0116a2ac05cbbcece4f28dc5513953ee25b"}, 0x8}) syz_open_dev$midi(0x0, 0x0, 0x40040) r4 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000004c0)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) read(r4, 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x4) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 16:35:42 executing program 3: read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x2, 0x14, 0xfd}}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x84, @local, 0x4e20, 0x4, 'l\x02p\xaa[\xbb$\xf5\x9c\x00\x00\x04\x00', 0x17, 0x1f}, 0x8b) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) sendto$inet(r2, &(0x7f0000001300)="64c8574d1e3167bd094392e3ed2522d9b4dfa0f40f844d104af0", 0x1a, 0x28080000, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) write$cgroup_int(r0, &(0x7f00000000c0)=0x4, 0x12) r3 = open(&(0x7f0000000080)='./file0\x00', 0x98940, 0x0) fcntl$setlease(r3, 0x400, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 16:35:42 executing program 1: ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) inotify_init() pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:35:42 executing program 0: clone(0xa12338fd91634f12, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x760030) 16:35:42 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'mangle\x00'}, &(0x7f0000000140)=0x54) 16:35:42 executing program 2: setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b90003fffff00000009e40f008001fffffe100004000632f77fbac141414e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 152.530924] ubi0: attaching mtd0 [ 152.537280] ubi0 error: ubi_attach_mtd_dev: bad VID header (8) or data offsets (72) [ 152.587889] ubi0: attaching mtd0 [ 152.591409] ubi0 error: ubi_attach_mtd_dev: bad VID header (8) or data offsets (72) 16:35:42 executing program 3: creat(0x0, 0x248) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe(0x0) fallocate(r1, 0x0, 0x4000003, 0xc0e) fallocate(r0, 0x0, 0x0, 0x110001) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 16:35:42 executing program 0: [ 152.762837] IPVS: ftp: loaded support on port[0] = 21 16:35:45 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000280)={0x0, [], 0x5}) 16:35:45 executing program 0: 16:35:45 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000100)={0x0, 0x1, 0x0, [], &(0x7f00000000c0)={0x98f905, 0x6, [], @p_u8=0x0}}) 16:35:45 executing program 2: setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b90003fffff00000009e40f008001fffffe100004000632f77fbac141414e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 16:35:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000780)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = accept4$unix(r0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000100), 0x1b5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)={0x14, 0x0, 0x4, 0x70bd2d, 0x25dfdbff}, 0x14}}, 0x0) 16:35:45 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init() pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001a40)=ANY=[@ANYBLOB], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:35:45 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:35:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000040)={0x1, {{0x2, 0x0, @multicast2}}, 0x0, 0x1, [{{0x2, 0x0, @empty}}]}, 0x110) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) 16:35:45 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) inotify_init() pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000080)={0x800}, 0x8) pipe(&(0x7f0000000240)) [ 155.308382] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 155.329954] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:35:45 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') read$alg(r3, &(0x7f0000000280)=""/193, 0xc1) sendfile(r0, r3, 0x0, 0x1000003) 16:35:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) readv(r0, &(0x7f0000000640)=[{&(0x7f00000003c0)=""/232, 0xe8}], 0x1) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0xd3, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffce8, 0x0, 0x0, 0x289) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) 16:35:45 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000040)={0x1, {{0x2, 0x0, @multicast2}}, 0x0, 0x2, [{{0x2, 0x0, @empty}}, {{0x2, 0x0, @remote}}]}, 0x190) dup3(r0, r2, 0x0) [ 155.549973] audit: type=1800 audit(1568565345.507:42): pid=7194 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16593 res=0 16:35:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) [ 155.594914] audit: type=1804 audit(1568565345.537:43): pid=7194 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir901347186/syzkaller.1N7ii8/10/file0" dev="sda1" ino=16593 res=1 16:35:45 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 16:35:45 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") connect$rose(r0, &(0x7f0000000000)=@full={0xb, @dev, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, [@default, @remote, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}, 0x40) 16:35:45 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x84000) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) creat(&(0x7f0000000500)='./file0/bus\x00', 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) inotify_init() inotify_rm_watch(0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 16:35:45 executing program 1: r0 = socket$packet(0x11, 0x2000100000000a, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0x20}, {0x80000006}]}, 0x10) 16:35:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "6c48a3", 0x4, 0x82f, 0x0, @dev, @dev, {[], @tcp={{0x689, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 155.827987] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 155.916988] kasan: CONFIG_KASAN_INLINE enabled [ 155.922871] protocol 88fb is buggy, dev hsr_slave_0 [ 155.923491] protocol 88fb is buggy, dev hsr_slave_1 [ 155.949333] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 155.961464] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 155.967704] Modules linked in: [ 155.970901] CPU: 1 PID: 7211 Comm: syz-executor.5 Not tainted 4.14.143 #0 [ 155.977819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.987166] task: ffff8880598ca680 task.stack: ffff8880598d0000 [ 155.993227] RIP: 0010:do_tcp_sendpages+0x33d/0x18f0 [ 155.998287] RSP: 0018:ffff8880598d7898 EFLAGS: 00010202 [ 156.003644] RAX: 0000000000000010 RBX: 0000000000000000 RCX: ffffc90007e5d000 [ 156.010905] RDX: 0000000000000847 RSI: ffffffff8523f03b RDI: 0000000000000080 [ 156.018264] RBP: ffff8880598d79c0 R08: ffff8880598ca680 R09: 0000000000000001 [ 156.025558] R10: 0000000000000000 R11: ffff8880598ca680 R12: 0000000000005555 [ 156.032836] R13: 0000000000000000 R14: dffffc0000000000 R15: ffff88805a8aec40 [ 156.040099] FS: 00007f3fe4a31700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 156.048319] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 156.054180] CR2: 0000000000aaa0b8 CR3: 0000000092aaa000 CR4: 00000000001406e0 [ 156.061447] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 156.068701] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 156.075961] Call Trace: [ 156.078547] ? kfree+0x196/0x270 [ 156.081915] ? sk_stream_alloc_skb+0x780/0x780 [ 156.086499] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 156.091691] tls_push_sg+0x1e1/0x660 [ 156.095407] tls_push_record+0xa4a/0x1210 [ 156.099556] tls_sw_sendmsg+0x9e8/0x1020 [ 156.103620] ? selinux_tun_dev_create+0xc0/0xc0 [ 156.108290] ? alloc_encrypted_sg+0x100/0x100 [ 156.112785] inet_sendmsg+0x122/0x500 [ 156.116583] ? inet_recvmsg+0x500/0x500 [ 156.120553] sock_sendmsg+0xce/0x110 [ 156.124269] SYSC_sendto+0x206/0x310 [ 156.127976] ? SYSC_connect+0x2d0/0x2d0 [ 156.129411] kobject: 'loop3' (ffff8880a4a6b7e0): kobject_uevent_env [ 156.131948] ? kasan_check_read+0x11/0x20 [ 156.131958] ? _copy_to_user+0x87/0xd0 [ 156.131970] ? put_timespec64+0xb4/0x100 [ 156.131989] ? nsecs_to_jiffies+0x30/0x30 [ 156.131999] ? SyS_clock_gettime+0xf8/0x180 [ 156.132009] SyS_sendto+0x40/0x50 [ 156.145825] kobject: 'loop3' (ffff8880a4a6b7e0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 156.146401] ? SyS_getpeername+0x30/0x30 [ 156.146413] do_syscall_64+0x1e8/0x640 [ 156.161879] kobject: 'loop0' (ffff8880a496d6a0): kobject_uevent_env [ 156.162322] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 156.187092] kobject: 'loop0' (ffff8880a496d6a0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 156.190880] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 156.190888] RIP: 0033:0x4598e9 [ 156.190892] RSP: 002b:00007f3fe4a30c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 156.190901] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004598e9 [ 156.190906] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000004 [ 156.190910] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 156.190917] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f3fe4a316d4 [ 156.245538] R13: 00000000004c7880 R14: 00000000004dd188 R15: 00000000ffffffff 16:35:46 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'mangle\x00'}, &(0x7f0000000140)=0x54) socket$inet6_dccp(0xa, 0x6, 0x0) 16:35:46 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x760030) 16:35:46 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000001480)=ANY=[@ANYRESDEC=0x0], 0x14) shutdown(r0, 0x1) 16:35:46 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='c\"uset.effective_mems\x00', 0xe0ff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000412ff8), 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) accept(0xffffffffffffffff, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, 0x0, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000412ff8)='6e', 0x2) r5 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000540)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r5, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b500)=""/153, 0x34000}], 0x1}, 0x0) r6 = socket(0xa, 0x3, 0x9) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000800)="86025c556b25046c6a92973c3ca3f93e19c182413459753d7857fe208d8af43add44de7bfff8ec54a57168a4dbf6ae2852407f70e4d58bf9fc47f7d3d8bb417c4c8b0ddadcfb015e00d9574e9a", 0x4d) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'bridge0\x00\x00\x01\x00', 0x8000000000000040}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000280)=0x73) ioctl$sock_inet6_SIOCDELRT(r6, 0x890c, &(0x7f00000002c0)={@rand_addr="4b6b6374dab150c89c42adaef6fdc718", @loopback, @local, 0x4, 0x78, 0x0, 0x100, 0x1, 0x40, r7}) write$cgroup_int(r3, &(0x7f0000000080), 0x2001007f) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg$sock(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 156.252809] Code: ff ff 48 0f 44 d8 e8 43 f2 38 fc 4d 85 e4 0f 84 9b 03 00 00 e8 35 f2 38 fc 48 8d bb 80 00 00 00 44 8b 65 a8 48 89 f8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 74 08 3c 03 0f 8e 85 11 00 00 44 2b a3 80 [ 156.272090] RIP: do_tcp_sendpages+0x33d/0x18f0 RSP: ffff8880598d7898 [ 156.287009] protocol 88fb is buggy, dev hsr_slave_0 [ 156.292479] protocol 88fb is buggy, dev hsr_slave_1 [ 156.300036] protocol 88fb is buggy, dev hsr_slave_0 [ 156.313798] protocol 88fb is buggy, dev hsr_slave_1 [ 156.322289] audit: type=1400 audit(1568565346.137:44): avc: denied { name_bind } for pid=7227 comm="syz-executor.3" src=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 156.347378] audit: type=1400 audit(1568565346.137:45): avc: denied { name_connect } for pid=7227 comm="syz-executor.3" dest=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 156.371151] audit: type=1800 audit(1568565346.147:46): pid=7229 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name=6322757365742E6566666563746976655F6D656D73 dev="sda1" ino=16594 res=0 [ 156.405520] ---[ end trace 8eb1dfc6ffa1d0c3 ]--- [ 156.407298] kobject: 'loop4' (ffff8880a4aa51e0): kobject_uevent_env [ 156.411917] Kernel panic - not syncing: Fatal exception [ 156.419497] kobject: 'loop4' (ffff8880a4aa51e0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 156.423512] Kernel Offset: disabled [ 156.436562] Rebooting in 86400 seconds..