syzkaller login: [ 63.433207][ T38] audit: type=1400 audit(1575023014.646:41): avc: denied { map } for pid=7780 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '[localhost]:27977' (ECDSA) to the list of known hosts. 2019/11/29 10:23:40 fuzzer started [ 68.914439][ T38] audit: type=1400 audit(1575023020.136:42): avc: denied { map } for pid=7797 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16525 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2019/11/29 10:23:42 dialing manager at 10.0.2.10:46599 2019/11/29 10:23:42 syscalls: 2543 2019/11/29 10:23:42 code coverage: enabled 2019/11/29 10:23:42 comparison tracing: enabled 2019/11/29 10:23:42 extra coverage: extra coverage is not supported by the kernel 2019/11/29 10:23:42 setuid sandbox: enabled 2019/11/29 10:23:42 namespace sandbox: enabled 2019/11/29 10:23:42 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/29 10:23:42 fault injection: enabled 2019/11/29 10:23:42 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/29 10:23:42 net packet injection: enabled 2019/11/29 10:23:42 net device setup: enabled 2019/11/29 10:23:42 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/29 10:23:42 devlink PCI setup: PCI device 0000:00:10.0 is not available 10:23:57 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x1f, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$smack_xattr_label(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) [ 85.799703][ T38] audit: type=1400 audit(1575023037.016:43): avc: denied { map } for pid=7817 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16734 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 10:23:57 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0xa) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0xfffffffffffffffe) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000580)="940bbfd6932287ccd20d7fbd2b3bf02b972cd0a4a7153f091edbfe909abc1b95db851334ca7cbe1ab4ca6d8645ad0d9feb195fc72d15459f058edafaf4bb6d1437a12d28d4933d671fea3ba132dab981ecda0ae935bcd678472044fc8dbe0fce37eb02051864f807f58f7e7d65224b9c75a48d4b445f96b2dffa6098b28c34d73066d08e090736d5b4d06c967587225f4d5b13844192e4f315a094b3e617c581a25c58ead87f9ad67ea2e0ed04a29eaeca45ac88346bfd7d71a6d1ff92c580cf2aac3c5420c6314ffe43672db221091f3089ca6d42fc87b15fc0b1846f81eac9780d7a4380957337d92ccda8bb401f7f103c4a54", 0xf4, r1) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x1ff) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r6 = perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x112}, 0x0, 0x5, 0xffffffffffffffff, 0x0) dup2(r6, 0xffffffffffffffff) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) dup2(r3, r8) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x4e23, @multicast2}}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x38a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x200000000, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) [ 85.949980][ T7818] IPVS: ftp: loaded support on port[0] = 21 [ 85.991754][ T7820] IPVS: ftp: loaded support on port[0] = 21 [ 86.035668][ T7818] chnl_net:caif_netlink_parms(): no params data found 10:23:57 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0xfffffffffffffffe) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000580)="940bbfd6932287ccd20d7fbd2b3bf02b972cd0a4a7153f091edbfe909abc1b95db851334ca7cbe1ab4ca6d8645ad0d9feb195fc72d15459f058edafaf4bb6d1437a12d28d4933d671fea3ba132dab981ecda0ae935bcd678472044fc8dbe0fce37eb02051864f807f58f7e7d65224b9c75a48d4b445f96b2dffa6098b28c34d73066d08e090736d5b4d06c967587225f4d5b13844192e4f315a094b3e617c581a25c58ead87f9ad67ea2e0ed04a29eaeca45ac88346bfd7d71a6d1ff92c580cf2aac3c5420c6314ffe43672db221091f3089ca6d42fc87b15fc0b1846f81eac9780d7a4380957337d92ccda8bb401f7f103c4a54", 0xf4, r0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x1ff) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x112}, 0x0, 0x5, 0xffffffffffffffff, 0x0) dup2(r4, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) dup2(r2, r6) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x38a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x200000000, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) [ 86.079774][ T7818] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.088079][ T7818] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.097321][ T7818] device bridge_slave_0 entered promiscuous mode [ 86.111320][ T7818] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.119803][ T7818] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.128991][ T7818] device bridge_slave_1 entered promiscuous mode [ 86.150951][ T7818] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.172251][ T7818] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.199823][ T7820] chnl_net:caif_netlink_parms(): no params data found [ 86.217124][ T7823] IPVS: ftp: loaded support on port[0] = 21 10:23:57 executing program 3: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x01\x00') r1 = gettid() tkill(r1, 0x30) fstat(r0, &(0x7f0000000040)) [ 86.252718][ T7818] team0: Port device team_slave_0 added [ 86.262190][ T7818] team0: Port device team_slave_1 added [ 86.319134][ T7820] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.328317][ T7820] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.339263][ T7820] device bridge_slave_0 entered promiscuous mode [ 86.351166][ T7820] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.359181][ T7820] bridge0: port 2(bridge_slave_1) entered disabled state 10:23:57 executing program 4: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0xa) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000580)="940bbfd6932287ccd20d7fbd2b3bf02b972cd0a4a7153f091edbfe909abc1b95db851334ca7cbe1ab4ca6d8645ad0d9feb195fc72d15459f058edafaf4bb6d1437a12d28d4933d671fea3ba132dab981ecda0ae935bcd678472044fc8dbe0fce37eb02051864f807f58f7e7d65224b9c75a48d4b445f96b2dffa", 0x7a, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) dup2(r4, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r2, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x4e23, @multicast2}}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x38a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x200000000, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) [ 86.368331][ T7820] device bridge_slave_1 entered promiscuous mode [ 86.476020][ T7818] device hsr_slave_0 entered promiscuous mode 10:23:57 executing program 5: r0 = gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x10, 0x0, 0x0) socket(0x10, 0x80002, 0x40) recvmmsg(0xffffffffffffffff, &(0x7f00000028c0), 0x0, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0xfffffffffffffd7e, 0x4) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x3) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x20}) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000200)=0x7) ioctl$DRM_IOCTL_GET_UNIQUE(r2, 0xc0106401, &(0x7f0000000300)={0xb, &(0x7f0000000240)=""/11}) write$cgroup_type(r1, &(0x7f00000000c0)='\xde\xaareaded\x00', 0xfffffffffffffe0a) fallocate(r1, 0x0, 0x0, 0xfff9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000340)="4c0000001200ff09fffefd956fa283b7270fd917df226c24a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f", 0x4c}], 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x12184, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dd23eea16f99d3, @perf_bp={0x0}, 0x1, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r3, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) syz_emit_ethernet(0x1, &(0x7f0000001640)=ANY=[@ANYRESDEC], 0x0) [ 86.556901][ T7818] device hsr_slave_1 entered promiscuous mode [ 86.650275][ T7827] IPVS: ftp: loaded support on port[0] = 21 [ 86.650690][ T7829] IPVS: ftp: loaded support on port[0] = 21 [ 86.656680][ T7831] IPVS: ftp: loaded support on port[0] = 21 [ 86.687443][ T7820] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.703694][ T7820] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.751296][ T38] audit: type=1400 audit(1575023037.966:44): avc: denied { create } for pid=7818 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 86.778691][ T38] audit: type=1400 audit(1575023037.986:45): avc: denied { write } for pid=7818 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 86.803821][ T38] audit: type=1400 audit(1575023037.986:46): avc: denied { read } for pid=7818 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 86.851180][ T7818] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 86.915587][ T7820] team0: Port device team_slave_0 added [ 86.927797][ T7823] chnl_net:caif_netlink_parms(): no params data found [ 86.937506][ T7818] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 87.008016][ T7818] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 87.087673][ T7818] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 87.155949][ T7820] team0: Port device team_slave_1 added [ 87.285722][ T7820] device hsr_slave_0 entered promiscuous mode [ 87.353803][ T7820] device hsr_slave_1 entered promiscuous mode [ 87.433658][ T7820] debugfs: Directory 'hsr0' with parent '/' already present! [ 87.468587][ T7823] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.476564][ T7823] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.484842][ T7823] device bridge_slave_0 entered promiscuous mode [ 87.499206][ T7823] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.506777][ T7823] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.515037][ T7823] device bridge_slave_1 entered promiscuous mode [ 87.566711][ T7823] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.576477][ T7820] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 87.636048][ T7820] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 87.706666][ T7823] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.720013][ T7820] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 87.806815][ T7820] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 87.909567][ T7827] chnl_net:caif_netlink_parms(): no params data found [ 87.945121][ T7823] team0: Port device team_slave_0 added [ 87.966315][ T7831] chnl_net:caif_netlink_parms(): no params data found [ 87.980128][ T7823] team0: Port device team_slave_1 added [ 87.993257][ T7827] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.001171][ T7827] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.009104][ T7827] device bridge_slave_0 entered promiscuous mode [ 88.085469][ T7823] device hsr_slave_0 entered promiscuous mode [ 88.163750][ T7823] device hsr_slave_1 entered promiscuous mode [ 88.244089][ T7823] debugfs: Directory 'hsr0' with parent '/' already present! [ 88.251993][ T7829] chnl_net:caif_netlink_parms(): no params data found [ 88.263351][ T7827] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.271457][ T7827] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.279752][ T7827] device bridge_slave_1 entered promiscuous mode [ 88.303011][ T7827] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.314619][ T7827] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.351836][ T7829] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.359425][ T7829] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.367408][ T7829] device bridge_slave_0 entered promiscuous mode [ 88.379312][ T7829] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.386539][ T7829] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.394172][ T7829] device bridge_slave_1 entered promiscuous mode [ 88.417719][ T7818] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.439550][ T7831] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.446886][ T7831] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.454692][ T7831] device bridge_slave_0 entered promiscuous mode [ 88.463117][ T7831] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.471204][ T7831] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.479888][ T7831] device bridge_slave_1 entered promiscuous mode [ 88.489111][ T7827] team0: Port device team_slave_0 added [ 88.498068][ T7829] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.512498][ T7829] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.548958][ T7827] team0: Port device team_slave_1 added [ 88.568421][ T7823] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 88.650327][ T7820] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.661305][ T7831] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.676985][ T7829] team0: Port device team_slave_0 added [ 88.686019][ T2782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.694001][ T2782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.703319][ T7818] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.710325][ T7823] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 88.816380][ T7827] device hsr_slave_0 entered promiscuous mode [ 88.854100][ T7827] device hsr_slave_1 entered promiscuous mode [ 88.903563][ T7827] debugfs: Directory 'hsr0' with parent '/' already present! [ 88.912428][ T7831] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.927261][ T7829] team0: Port device team_slave_1 added [ 89.005491][ T7829] device hsr_slave_0 entered promiscuous mode [ 89.063731][ T7829] device hsr_slave_1 entered promiscuous mode [ 89.113559][ T7829] debugfs: Directory 'hsr0' with parent '/' already present! [ 89.121453][ T7823] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 89.205900][ T7823] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 89.262011][ T7831] team0: Port device team_slave_0 added [ 89.270458][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.279226][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.288016][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.295396][ T369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.304793][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.321279][ T7831] team0: Port device team_slave_1 added [ 89.330157][ T4280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.338435][ T4280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.346412][ T4280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.355282][ T4280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.363926][ T4280] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.371105][ T4280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.455649][ T7831] device hsr_slave_0 entered promiscuous mode [ 89.513730][ T7831] device hsr_slave_1 entered promiscuous mode [ 89.603698][ T7831] debugfs: Directory 'hsr0' with parent '/' already present! [ 89.611448][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 89.621530][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 89.631334][ T7820] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.639377][ T7827] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 89.706236][ T7827] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 89.797515][ T7827] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 89.858490][ T7827] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 89.928485][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.937112][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.945652][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.952805][ T369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.960533][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.983172][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 89.992061][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 90.001174][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.010004][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.018755][ T369] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.026079][ T369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.033892][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 90.042424][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 90.051811][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 90.068891][ T7829] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 90.163223][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 90.171583][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.180333][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 90.188597][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.197650][ T7829] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 90.247508][ T7829] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 90.326174][ T7829] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 90.396053][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 90.406155][ T7831] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 90.457300][ T7831] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 90.515084][ T7831] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 90.626059][ T7831] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 90.723056][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 90.750213][ T7823] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.764559][ T7818] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 90.771741][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 90.779947][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 90.787703][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 90.796553][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 90.805226][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 90.813913][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 90.823266][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 90.831294][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 90.839922][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.862497][ T38] audit: type=1400 audit(1575023042.076:47): avc: denied { associate } for pid=7818 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 90.901365][ T7827] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.912450][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 90.921324][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.930057][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.938066][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.948656][ T7820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 90.968512][ T7823] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.976711][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.984910][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.998164][ T38] audit: type=1400 audit(1575023042.216:48): avc: denied { open } for pid=7842 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 91.024125][ T38] audit: type=1400 audit(1575023042.216:49): avc: denied { kernel } for pid=7842 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 91.028626][ T7820] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 91.059375][ T7827] 8021q: adding VLAN 0 to HW filter on device team0 [ 91.076856][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 91.084771][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 91.092227][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 91.101352][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 91.109942][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.117225][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.150503][ T7838] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.158681][ T7838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 91.169494][ T7838] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 91.178678][ T7838] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.185942][ T7838] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.194446][ T7838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 91.203097][ T7838] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.211687][ T7838] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.218972][ T7838] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.226895][ T7838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 91.235992][ T7838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 91.244592][ T7838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 91.253252][ T7838] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.262062][ T7838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.270809][ T7838] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.279442][ T7838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.287482][ T7838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.296283][ T7838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.305635][ T7838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.314508][ T7838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 91.322794][ T7838] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.332153][ T7838] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.339320][ T7838] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.349563][ T7831] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.375772][ T7823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 10:24:02 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x1f, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$smack_xattr_label(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) [ 91.405309][ T7846] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.414812][ T7846] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.428176][ T7846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 91.437555][ T7846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 91.446524][ T7846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 91.455320][ T7846] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.464223][ T7846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.473057][ T7846] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.490809][ T7829] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.502532][ T7846] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.510767][ T7846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 91.519236][ T7846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 91.527065][ T7846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 10:24:02 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x1f, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$smack_xattr_label(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) [ 91.538142][ T7846] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.556223][ T7846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.566506][ T7846] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.976741][ C0] hrtimer: interrupt took 25305 ns [ 93.601349][ T7829] 8021q: adding VLAN 0 to HW filter on device team0 [ 93.632325][ T7829] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 93.643322][ T7829] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 93.666463][ T7829] 8021q: adding VLAN 0 to HW filter on device batadv0 10:24:07 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x1f, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$smack_xattr_label(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) [ 205.253387][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 205.254050][ C1] rcu: 1-....: (1 GPs behind) idle=cca/1/0x4000000000000002 softirq=7241/7242 fqs=4723 [ 205.254050][ C1] (t=10502 jiffies g=5441 q=1176) [ 205.254050][ C1] NMI backtrace for cpu 1 [ 205.254050][ C1] CPU: 1 PID: 7858 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 205.254050][ C1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 205.254050][ C1] Call Trace: [ 205.254050][ C1] [ 205.254050][ C1] dump_stack+0x197/0x210 [ 205.254050][ C1] nmi_cpu_backtrace.cold+0x70/0xb2 [ 205.254050][ C1] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 205.254050][ C1] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 205.254050][ C1] arch_trigger_cpumask_backtrace+0x14/0x20 [ 205.254050][ C1] rcu_dump_cpu_stacks+0x183/0x1cf [ 205.254050][ C1] ? find_next_bit+0x107/0x130 [ 205.254050][ C1] rcu_sched_clock_irq.cold+0x509/0xc02 [ 205.254050][ C1] ? raise_softirq+0x138/0x340 [ 205.254050][ C1] update_process_times+0x2d/0x70 [ 205.254050][ C1] tick_sched_handle+0xa2/0x190 [ 205.254050][ C1] tick_sched_timer+0x53/0x140 [ 205.254050][ C1] __hrtimer_run_queues+0x364/0xe40 [ 205.254050][ C1] ? tick_sched_do_timer+0x1b0/0x1b0 [ 205.254050][ C1] ? hrtimer_init+0x330/0x330 [ 205.254050][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 205.254050][ C1] ? ktime_get_update_offsets_now+0x2ce/0x430 [ 205.254050][ C1] hrtimer_interrupt+0x314/0x770 [ 205.254050][ C1] smp_apic_timer_interrupt+0x160/0x610 [ 205.254050][ C1] apic_timer_interrupt+0xf/0x20 [ 205.254050][ C1] [ 205.254050][ C1] RIP: 0010:preempt_schedule_irq+0xab/0x160 [ 205.254050][ C1] Code: 00 00 e8 d8 d8 d4 f9 e8 43 b5 fe f9 4c 89 f0 48 c1 e8 03 80 3c 18 00 75 7d 48 83 3d 96 81 97 01 00 74 6f fb 66 0f 1f 44 00 00 01 00 00 00 e8 0b d2 ff ff 48 c7 c0 60 34 13 89 48 c1 e8 03 80 [ 205.254050][ C1] RSP: 0018:ffff88806a897658 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 205.254050][ C1] RAX: 1ffffffff122668d RBX: dffffc0000000000 RCX: 0000000000000000 [ 205.254050][ C1] RDX: 0000000000000000 RSI: 0000000000000006 RDI: ffff88806abd4994 [ 205.254050][ C1] RBP: ffff88806a897678 R08: ffff88806abd4100 R09: 0000000000000000 [ 205.254050][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: ffffed100d57a820 [ 205.254050][ C1] R13: ffff88806abd4100 R14: ffffffff89133468 R15: 0000000000000000 [ 205.254050][ C1] ? preempt_schedule_irq+0x8d/0x160 [ 205.254050][ C1] retint_kernel+0x1b/0x2b [ 205.254050][ C1] RIP: 0010:unmap_page_range+0x8a7/0x2ac0 [ 205.254050][ C1] Code: ff 48 bb 00 00 00 00 00 ea ff ff 48 8b 38 e8 60 a2 ff ff 48 c1 e0 06 48 01 c3 48 8d 7b 28 48 89 f8 48 c1 e8 03 42 80 3c 28 00 <0f> 85 3b 20 00 00 48 8b 5b 28 48 8b b5 50 ff ff ff 48 8b bd 58 ff [ 205.254050][ C1] RSP: 0018:ffff88806a897730 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 205.254050][ C1] RAX: 1ffffd40003ca785 RBX: ffffea0001e53c00 RCX: 0000000000000000 [ 205.254050][ C1] RDX: dffffc0000000000 RSI: ffffffff81a16ece RDI: ffffea0001e53c28 [ 205.254050][ C1] RBP: ffff88806a897898 R08: ffff88806abd4100 R09: ffff88806a897830 [ 205.254050][ C1] R10: ffffed100d512f07 R11: ffff88806a89783f R12: 0000000000000001 [ 205.254050][ C1] R13: dffffc0000000000 R14: 00007f142f000000 R15: 00007f142ef97000 [ 205.254050][ C1] ? pmd_pfn+0x12e/0x1d0 [ 205.254050][ C1] ? lockdep_hardirqs_on+0x421/0x5e0 [ 205.254050][ C1] ? retint_kernel+0x2b/0x2b [ 205.254050][ C1] ? vm_normal_page_pmd+0x420/0x420 [ 205.254050][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 205.254050][ C1] ? uprobe_munmap+0xad/0x320 [ 205.254050][ C1] unmap_single_vma+0x19d/0x300 [ 205.254050][ C1] unmap_vmas+0x184/0x2f0 [ 205.254050][ C1] ? zap_vma_ptes+0x110/0x110 [ 205.254050][ C1] ? pagevec_lru_move_fn+0x215/0x2a0 [ 205.254050][ C1] ? __kasan_check_write+0x14/0x20 [ 205.254050][ C1] exit_mmap+0x2ba/0x530 [ 205.254050][ C1] ? __ia32_sys_munmap+0x80/0x80 [ 205.254050][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 205.254050][ C1] ? __khugepaged_exit+0xcf/0x410 [ 205.254050][ C1] mmput+0x179/0x4d0 [ 205.254050][ C1] do_exit+0x806/0x2ef0 [ 205.254050][ C1] ? mm_update_next_owner+0x7c0/0x7c0 [ 205.254050][ C1] ? lock_downgrade+0x920/0x920 [ 205.254050][ C1] ? _raw_spin_unlock_irq+0x23/0x80 [ 205.254050][ C1] ? get_signal+0x392/0x24f0 [ 205.254050][ C1] ? _raw_spin_unlock_irq+0x23/0x80 [ 205.254050][ C1] do_group_exit+0x135/0x360 [ 205.254050][ C1] get_signal+0x47c/0x24f0 [ 205.254050][ C1] ? __fd_install+0x1fb/0x640 [ 205.254050][ C1] ? fd_install+0x4d/0x60 [ 205.254050][ C1] do_signal+0x87/0x1700 [ 205.254050][ C1] ? perf_event_set_output+0x4e0/0x4e0 [ 205.254050][ C1] ? setup_sigcontext+0x7d0/0x7d0 [ 205.254050][ C1] ? put_timespec64+0xda/0x140 [ 205.254050][ C1] ? exit_to_usermode_loop+0x43/0x380 [ 205.254050][ C1] ? do_syscall_64+0x676/0x790 [ 205.254050][ C1] ? exit_to_usermode_loop+0x43/0x380 [ 205.254050][ C1] ? lockdep_hardirqs_on+0x421/0x5e0 [ 205.254050][ C1] ? trace_hardirqs_on+0x67/0x240 [ 205.254050][ C1] exit_to_usermode_loop+0x286/0x380 [ 205.254050][ C1] do_syscall_64+0x676/0x790 [ 205.254050][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 205.254050][ C1] RIP: 0033:0x45a759 [ 205.254050][ C1] Code: Bad RIP value. [ 205.254050][ C1] RSP: 002b:00007f142ef32c88 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 205.254050][ C1] RAX: 0000000000000008 RBX: 000000000071c0f8 RCX: 000000000045a759 [ 205.254050][ C1] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 000000002001d000 [ 205.254050][ C1] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 205.254050][ C1] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f142ef336d4 [ 205.254050][ C1] R13: 00000000004aec17 R14: 00000000006f1cb0 R15: 00000000ffffffff