[ 1236.125279] ? context_struct_to_string+0x401/0x900 [ 1236.130369] context_struct_to_string+0x401/0x900 [ 1236.135268] ? get_permissions_callback+0xb0/0xb0 [ 1236.140152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1236.145733] ? sidtab_search_core+0x21f/0x3b0 [ 1236.150301] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1236.156242] security_sid_to_context+0x35/0x40 [ 1236.160885] selinux_getprocattr+0x3cb/0x8b0 [ 1236.165369] ? selinux_socket_post_create+0x990/0x990 [ 1236.170600] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1236.175554] ? kasan_check_read+0x11/0x20 [ 1236.179740] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1236.185066] ? find_vpid+0xf0/0xf0 [ 1236.188653] security_getprocattr+0x66/0xc0 [ 1236.193013] proc_pid_attr_read+0x158/0x2e0 [ 1236.197374] ? oom_adj_read+0x260/0x260 [ 1236.201373] ? security_file_permission+0x1c2/0x220 [ 1236.206436] ? rw_verify_area+0x118/0x360 [ 1236.210650] do_iter_read+0x4a3/0x650 [ 1236.214516] vfs_readv+0x175/0x1c0 [ 1236.214545] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1236.223470] ? fget_raw+0x20/0x20 [ 1236.226958] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1236.232522] ? check_preemption_disabled+0x48/0x280 [ 1236.237581] ? __sb_end_write+0xd9/0x110 [ 1236.241694] do_preadv+0x1cc/0x280 [ 1236.242628] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1236.245406] ? do_readv+0x310/0x310 [ 1236.245425] ? __ia32_sys_read+0xb0/0xb0 [ 1236.245446] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1236.245500] ? trace_hardirqs_off_caller+0x310/0x310 [ 1236.245534] __x64_sys_preadv+0x9a/0xf0 [ 1236.262435] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1236.266492] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1236.266768] do_syscall_64+0x1b9/0x820 [ 1236.266796] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1236.266822] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1236.266845] ? trace_hardirqs_off_thunk+0x1a/0x1c 02:54:01 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000005c0)={{0x2, 0x0, 0x0, 0x0, 0x5}}) read(r0, &(0x7f0000000700)=""/74, 0x4a) dup(0xffffffffffffffff) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) 02:54:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1236.273775] audit: type=1400 audit(1545188041.903:4106): avc: denied { map } for pid=5832 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1236.275943] ? trace_hardirqs_on_caller+0x310/0x310 [ 1236.275966] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1236.275990] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1236.276021] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1236.353874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1236.359087] RIP: 0033:0x457669 [ 1236.362307] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1236.382843] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1236.390570] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1236.390583] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1236.390595] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1236.390606] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 02:54:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1236.390618] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1236.419767] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1236.463693] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1236.469233] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:02 executing program 5 (fault-call:4 fault-nth:27): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1236.552213] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1236.616108] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1236.624561] FAULT_INJECTION: forcing a failure. [ 1236.624561] name failslab, interval 1, probability 0, space 0, times 0 [ 1236.624588] CPU: 1 PID: 5856 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1236.643040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1236.652396] Call Trace: [ 1236.652419] dump_stack+0x244/0x39d [ 1236.652441] ? dump_stack_print_info.cold.1+0x20/0x20 02:54:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1236.652460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1236.652481] ? check_preemption_disabled+0x48/0x280 [ 1236.663882] should_fail.cold.4+0xa/0x17 [ 1236.674441] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1236.683599] ? lock_is_held_type+0x210/0x210 [ 1236.688031] ? mark_held_locks+0x130/0x130 [ 1236.692287] ? zap_class+0x640/0x640 [ 1236.696021] ? __lock_acquire+0x62f/0x4c20 [ 1236.700294] ? is_bpf_text_address+0xac/0x170 [ 1236.704813] ? lock_downgrade+0x900/0x900 [ 1236.704832] ? check_preemption_disabled+0x48/0x280 [ 1236.704854] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1236.719656] ? check_preemption_disabled+0x48/0x280 [ 1236.724699] ? debug_smp_processor_id+0x1c/0x20 [ 1236.729392] ? perf_trace_lock+0x14d/0x7a0 [ 1236.733660] ? lock_is_held_type+0x210/0x210 [ 1236.738087] ? check_preemption_disabled+0x48/0x280 [ 1236.743122] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1236.748066] ? kasan_check_read+0x11/0x20 [ 1236.752226] ? zap_class+0x640/0x640 [ 1236.755984] __should_failslab+0x124/0x180 [ 1236.760245] should_failslab+0x9/0x14 02:54:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x38) [ 1236.764089] __kmalloc+0x70/0x760 [ 1236.767574] ? context_struct_to_string+0x401/0x900 [ 1236.772616] context_struct_to_string+0x401/0x900 [ 1236.777498] ? get_permissions_callback+0xb0/0xb0 [ 1236.782355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1236.787921] ? sidtab_search_core+0x21f/0x3b0 [ 1236.792441] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1236.798337] security_sid_to_context+0x35/0x40 [ 1236.802913] selinux_getprocattr+0x3cb/0x8b0 [ 1236.807313] ? selinux_socket_post_create+0x990/0x990 [ 1236.812498] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1236.817417] ? kasan_check_read+0x11/0x20 [ 1236.821562] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1236.826841] ? find_vpid+0xf0/0xf0 [ 1236.830378] security_getprocattr+0x66/0xc0 [ 1236.834704] proc_pid_attr_read+0x158/0x2e0 [ 1236.839033] ? oom_adj_read+0x260/0x260 [ 1236.842991] ? security_file_permission+0x1c2/0x220 [ 1236.848012] ? rw_verify_area+0x118/0x360 [ 1236.852148] do_iter_read+0x4a3/0x650 [ 1236.855947] vfs_readv+0x175/0x1c0 [ 1236.859494] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1236.864854] ? fget_raw+0x20/0x20 [ 1236.868304] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1236.873858] ? check_preemption_disabled+0x48/0x280 [ 1236.878872] ? __sb_end_write+0xd9/0x110 [ 1236.882929] do_preadv+0x1cc/0x280 [ 1236.886460] ? do_readv+0x310/0x310 [ 1236.890091] ? __ia32_sys_read+0xb0/0xb0 [ 1236.894158] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1236.899513] ? trace_hardirqs_off_caller+0x310/0x310 [ 1236.904637] __x64_sys_preadv+0x9a/0xf0 [ 1236.908638] do_syscall_64+0x1b9/0x820 [ 1236.912517] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1236.917870] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1236.922791] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1236.927626] ? trace_hardirqs_on_caller+0x310/0x310 [ 1236.932640] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1236.937662] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1236.942670] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1236.947522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1236.952697] RIP: 0033:0x457669 [ 1236.955877] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1236.974783] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1236.982478] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1236.989744] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1236.997026] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1237.004287] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 02:54:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1237.011544] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1237.045282] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1237.070205] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:02 executing program 0: pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000380)=0x20000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x800, 0x0) r3 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000240)={{0x0, 0x1, 0x80, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r3, 0x7, 0x2, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x03\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00'], 0x4d, [], [0x3, 0x800000000000, 0x3, 0x8000000000100]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000940)=0xffffffffffffffc9) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r4 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r4, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, 0x0) r6 = dup2(r1, r1) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000001c0)={r5, @loopback, @rand_addr=0x1cb}, 0xc) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r6, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @empty, 0x2d1}, 0x1c) timerfd_create(0xfffffffffffffffe, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) r9 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r8, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) timer_create(0x4, &(0x7f0000000180), &(0x7f00000001c0)) fcntl$getown(r9, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000100)={0x3}) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r10 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x4, @ipv4={[], [], @remote}}, 0x1c) connect$l2tp(r10, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r8, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r7, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000500)="01fd80bab99ea1b1633ff0ea2e5e30bccb80d0338af8292cdc317ab6a11a5552e0f8107bf146bb70310c7cc34e91c1e8ff8b1355d8627d79bff88a87868162a30ff15763ae5236759324c364e45beda372e18d39a330890b045e00d691640009ae723734f32e96e59f55b59ad669bb59506272596acdc7c9b8433e9985355018ad635ad6cf68e31f2faa529b1500fd2f8427bfc062c7aa57885e165178625afc9d3cac16077c72699867fc2ef566bd35371ce61bd07b0539047a8468606c1cc88fc694f363e95af75ea88c6e113d44ed626d1906b3954e1fca5e9c01e2084cb7795bc91e"}, {&(0x7f0000000980)="e641cdfe497365915a6b5357feef37f83ff75a877db216ded8d41f208b19b58e0915227a44b7e227d503d0b90c3296c5bc7fc5848f204e402b9e1f2cbb7118a7ff87799704e54a8cbe145601b885b79a1f2ef9b8273d5963e4bca877d6acba3474c2f8b4d578f4d6a0b9d6bbf5a5d5847c05af7b2997e632f5"}, {&(0x7f0000000a00)="b18506109b872439f88cbdac65b46c694d71ea6a2de9150a9b9dcc6aaefcbd2120761dc299bda0b1f9feda28f793a1164d456a6ef8fa1c97dc15a16507d508728d499308801ec5557c2a1c60ed51f6da397abe9114feb9f2d1ce6b81afd6eaf4e8805d80"}, {&(0x7f0000000a80)="989ce1d339b75e135a64010f2d4a39db89fdca0a3a85d27110f553a258efc5405d63bb8ce18654dceaba0256fb9ecbd2ba15ebad94ffc1d06292ed213371ef20c7dd60a7cb513ea5eed5a3309c6be33a6497c1d3a127f3b959369017d23e67924c1d2328d71cc9bcca6673e6d42a8d10dd7ef8c625a5f28a7e43486db05b4e8b15de085abbbbc38572f0e7d6a449c97e7d4aa307d8d89d3a90"}, {&(0x7f0000000b40)="86e8bcf699a987c7a2fd75365aefaaae32eccc01dbda13e1108d5dc5e75b942c5b9c3966d8582d5eb56a390f12f982f49682924728387b607e37e9ea04c5a07bdf021dbe817c37"}, {&(0x7f0000000bc0)="e9624115bed39f0cde1e9ce7e02a260f5f882bcd6711a3316ab453c93b89c4d11149435fb5482738f32b321ed231ebe61bb8ea2acce42f5df48b769efdc839bfad913172bdfdfae04edc91d6c615897fc301f3f13674c09406c800b07ca8e3cc1ca7ec320df25a37ec7388274a7c6f5b17d39952bffe28fa146fa976d406c004950cbf0dccde379d9d03942e266fe0507793da62adedcd15f78c5950e3892190f94a886d7b41ada7b6d508c8f5e6328fdae3108ba675e0ba6c44c3352dcbdcdca95747c30b580306ad4186b9f8c7f2401da2f1cc0751ae"}, {&(0x7f0000000cc0)="06c0259fa024e35e7e6d122e4b8996f18d16b291427212b0e5bfb4b768597a461ca02c5200370da5e0aa9b25f8e5b198e7186269f8aaff4d14c61ccf6e2630181729a58c8fdb7cc9d59db8d23e8d46744ff196a637c08f3269ba7c77e1e4d9a52430f9fa"}, {&(0x7f0000000d40)="31062f953bdc2a798c678c4062cf0fc71f1f7b06c67d18a6a458bbf22703da759d3a6eb0c889be4df999ce1bfd58b9b6108f6c908ea247d185106afb8334ce6f72389a61ec4861d69d6d73800f8b9276a60212af24cefdddfb674fbb07f6342d624dddb8a88b99e7b1a145fe7889e3615bdc758fafb39cc87db2696fc0387135c9b9b4bc42e1c3"}], 0x0, &(0x7f0000000e80)=[{0x0, 0x84, 0xfffffffffffffffc, "de976a98f95ea9e2cfe3bcfce70864b2dc7b3bca43e2fe874a4593ae61a1c7dac3899914acd096706d4c06f784a1cc96580131d8f890c0a8052a9e719e1a73f1220eb4dc4b426ee004676ee0593cbe754ebc3b280bf32a0bb519eca0632469c9136e78f41fcd7d4f4c1071cfa12cecae13f9732c01dda0917731136a8cf7a7ab753dfae8fb089f90853ab8710835de4ea5d25c37428c39e618376362a16ba17f54f9f373a1c2d557e0cf6902fa7045b5b7c7967203a3e29be6695087599d057e904a3dec4d3c6a3bbace3824a819c010aa051dd96ed12e654486b9"}, {0x0, 0x0, 0x8, "e8611dede144a58a4d8eea68eae79f1051a5fce6df1c5044ce1b79b2e43df5339e46b08bc9d388dc550f5ab5127b346e2c288419c2205b4fd749b55280f273c72394c688a8db3fdd37cf1d09876b406f1d74c67ca2fd27ea0810474176136e769c"}, {0x0, 0x18b, 0x7, "bbf562043a36d3448410d125440f240822a02ecc19caabdafd4b1fd13798159c04698236800e92be"}, {0x0, 0x6, 0x5, "ba49a209f292af3fb84a3692cca35aee92d0146b08882f390585cf51adbdcc03754f6b31c675f4b32c373f2373bde14068c292597b8fa05f9c6cb4edbc979ca03b96349ddcc566f1828e8832405bbac4ca54da7dcd0bc9955844231f868dc3abc1322ac355681efc57708f044cdc378a8bfbb67d"}, {0x0, 0x107, 0xfffffffffffffff8, "31b82420bba0801bad8b"}, {0x0, 0x107, 0x200, "c7bf175c492fdf67bf7e8410582fd67ce3"}, {0x0, 0x11f, 0x60bc, "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"}]}, 0x1}, {{&(0x7f0000002100)=@in6={0xa, 0x4e23, 0x9, @local, 0x100000001}, 0x0, &(0x7f0000000400)=[{&(0x7f0000002180)="593f786c5408e9ed521f4e160066856913315979fbc97fb6891fbbc3ac4bb36c20fd6c568ae045685f3639a00b7fb417c641cb2f06451d87fecebb5dd0bdc7f960c4bbe1f5e59f70dc0d4a7707724df36f34513c42ab6843471819d16c0277c4ef6bbd734167cc96c1180fc683659a41dc84958aaadac33fdfda2e456f610db447b59ed71588"}, {&(0x7f0000002240)="a3edc957bc5ea031919ebfcbd672ba9667625c581e9d2711266abe70ce691a03c3bba0cb739262ba7c681caa73c4555200419573164aadb8c4b4ce5d195abc646ec4021655a2cc4eed2640aa306c5eb30d7ca5f7ba16e35acf6209f5dafc55634420cd1fded5a233fa18f46e59e74f2cd1d7449fa7027be4d194d803841585a5cd0e2425f421d10e90eb9038630a1828242253f10b4c0d4d795f02b86b"}, {&(0x7f0000000000)="559a87c3072e0b3227443df496d616e199282c3ff09804bf9fc23a5ffa9466fa8fb43bc8b58f"}], 0x0, &(0x7f0000002300)=[{0x0, 0x1ff, 0x0, "fa62d6aa18878c02bd0ebfb2ce677462f343616a9d8d0c53eecb47b0e22c8fcab11b4d1abe704334672967eb7fb554a4fae7f97ae0b95873e40f2d300e0a65"}, {0x0, 0x1ff, 0x7fffffff, "06e6951e5c57efad225b2160ead3b8dd1959f07463b9f2be0559c82d02405301c634a2b73a96a4d990f241b1c2fba6bc71b935aa7cd054c8863769357d47f006a48e03e44d816e106c8be6d68cc5b2430e28e13b549d3bd611a9605dd9a04294d8d3d6a78e6e5e502ac5bb6db20fc3e4ed9fa9dfd7ba9da0341e30"}, {0x0, 0x19f, 0x10000, "9a05919aa5eb06bec020eb38f0a59ca5f64417490a8e0a3ce97c43928f4509d5c471e8c2f0a49e99b1c8"}, {0x0, 0x0, 0xfffffffffffff771, "2a2fbd1f24f154a85ba297a33e988b070592887b1232d5e8381a1cd61b4101fb60892ca661aa39436ac307c458c0cbc1d87e61824a4c1078e9880de749af34ec8e6e38397927fdeaf21907bce8df87fb2caf3d73a303cb38a299ccec4ac9293bb68808a09d4a2baf4e3447c65a4afe0f622c375b30840b1d3766bb2ae38f87d2a459167063fed24d678531cc0c575969ee802fac2ad35500a9f03c17a71d76a887590748a731ef014ad3cc142ddc10107e5db10a2d49"}]}, 0x80}, {{&(0x7f0000002500)=@generic={0x1b, "971ec9179626566cddd5394ded81a291b5c33c75bb224bc3533b6fffafdc4a7968d3cbf24f22fde8933cb4fbf1ace72b270e98760010d74091ed9f3b06c15c56025d19882bbe3d3cc0d07e89230bc4314bb6712d6a4e33a9d111e4f690382baf67e38192ab95046ff60371f06a578ae571b88a47724e93a194744c6d43ab"}, 0x0, &(0x7f0000002740)=[{&(0x7f0000002580)="1a404c5db795c93ccd5242dd9269026eb4e785bd573d307f3052a2a207bef4424412a9c814001fcd2e0d3c933a42c0402a4d1205dffe5c5759069f205ffc06825b293c15a78ded6d422c21cc9a889d9e360ff268f596dfd41fb6fc881f3ceb5f6c85a62364bf55de9e0bb63bce6a40d8c6aaa0fff4e2850f933254c776b0d34be9663fbac5926a6099984f3fb44d795a1db4d2fc68153d3313ee30167b658c6acae4197275890ea9210e73c0381812b2a2adecc23206c3899173431945d130e4ed6cc273942e84b4f8ad304086b1c00cf0b2c5c4ced665bb8447e42c"}, {&(0x7f0000000600)="5c0ed260934af3dca0ef3279b46e42f7288a686f07ed32e6a80f8a1c2096c67db849f95e44f97dc94b02977268606190018475e3e401f52e5443d3e4"}, {&(0x7f0000002680)="9cd857ed01a293737e317b91dccf4969682d85afd6b18c6cc1eb8f068c9e15858fd0b814d61fed28ae9044e874d759d924046d4d4344d2906c75686edc5e3f3e8c69d7d9a8be554060090fd63f0528bd86160fbabaedeabe0954ee0137ee96ffef4cf6fe105c29d7710de1388b6a38daaea69950eb7086d2e9c3c988187febde20cf5ac7a40e140f33b4dc9a47375e23977b6c15b7e686a2661eb99f6c24cb6662ecfed9"}], 0x0, &(0x7f0000002780)=[{0x0, 0x104, 0x2, "6d15b596c5c8f71e3b5751f35454d8a57bd8a2160931a1a310b3a906ea76e273a6b217301d24e68662db50cb7df21c410de978ac66589b29e6e299bb714747a55ff4b859d19ed5e71c0452c4f4c96bbd7a182c43b21fa4d173b7784f9716161016ca42a520aa73a55875c2b3bc8c362ceafbd91bb346a790deb255e7917110ce10d64307a777b461751cd3ef29b07607b53e44baabfada9bcc3ac7aa4b6ec842ac40505d9700fc85c0905cb2"}, {0x0, 0x113, 0x6, "38612b947230573f1a9a0903ef5a862fcb138158eb673e5c0ad0d56593fe743f2cf0ea54b208897d57de4c2f9aa4f4e4526bd82366744982030113381ba6dc8105296fda3a8f0c3f29969fd81079651bb0e14118bb15bdf8567bf4518a5a617ed5efa13208a252ff988d75127147ded723a1d91c65dc6ede719631a393adf42f83eac38cb50b2ef4b097656f"}, {0x0, 0x13f, 0x8, "cd5a9c14b282057a7b2bca6acaf20781f60a8df7ff5c7b4880536c249ca2386b9e4f4647a83b682bcf2e5574634823a0788e38ed3d710728388d8659d0a14ba1f47dad77b346588a1207083ab4289eacef08f0100dac76a512641a032d51ff2b737bb73b22"}, {0x0, 0x109, 0x200, "3baff51b3fedc9aaf8bf27f82e7028"}]}, 0x7f}, {{&(0x7f0000002980)=@xdp={0x2c, 0x4, r5, 0x33}, 0x0, &(0x7f0000004c40)=[{&(0x7f0000002a00)="fdf429aadd"}, {&(0x7f0000002a40)="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"}, {&(0x7f0000002b40)="d79dd442b1c887070a9c965aa7a2f1a168"}, {&(0x7f0000002b80)="4b3f8aef2c65e8929a9bd38ec87999f33e2b97568818b7867e4058138ff3ce33670cfa644c9c701533b2ba29a8631affa58fcc281b66cdfe8be14f85c40b77eb5ebe69be06b7193d59fd9177645a96b19162c477b5c02cefe1e157587b5cdd093334b19d2502dea18f3b0e792f1f8f91e293456b87fb2a5f0f1a4fafcc9b989cb6f84d7413228415"}, {&(0x7f0000002c40)="3ab3618caf349162011d7cd6c7af7e66d3c858e5e1b980070d7c2426348241228aef12f7ea2885e83f4e0b5bbfc5dbed43e0214ecbffe1b99ac1171399b5570a95e6440f8b6cc3cebda1d7079fbc0af998660061670b4b77dc5b0005d931bd674ad7c2b57eb023affdfdc301b25dc98c4d76f2a10294b1f3fb83c1d8b8932964a1cdb3a74088b54fc69f218127806345cb4eef72c763671cb05f9f8c6b0ed8f21d9fd1bd264781441fcf36440be17c46abbd9ab84b86b114a82d195af6a9692d7280249e34a75fe1426e37261f9eb76ecbf6bd90be598c64ac6328bd145c8d32ed1ddeed8470990c0ee24a4b3ba9b05af53c5078efc365bbc7e61aafe9472094d923b6e71eeace228388270ba76c42f6f8a7ce53166331e1077d2b1c9f63f23dca595697c808fc448b172e122e3a591e4280f37f78be4c2d0d450b4159aa9839aa6ae6a6a386c600ab9becad25c0e3dc7771fe1230550e81981c12a9b14e7659c730e73f14084c6cffedddff41804081afd7f7f733e6f8672c61bd2b615720564177a54f4b509123c4c7743ac79759e2533bf4d6486ecdc8eee0016c84f8df3dbfd4e55a719d4b446f3d848af04947a8ab98695942295576170f74e798f21c8e1d4992dd69140db81e45c37302989a0a959546ade974324e0ea856cac1ba724536458fb0cfe9f0e2ecc51bae3c55b5a1c1e0ec1254916bfd59ab525f7eee64da025856501e7e908ed62db4193bca97a659e59aa246dd538c293ba16464a4fdb95a523e80e57827a896c7aa1bfe81ba4bb826375fcbfdb99a6a8ef6cfa26a49d24e610f84610c04b8b509706a5173f948064502835c9cd43a14cd1f0207c49c1d8fd8feae47c2b70f9f15f3da5930b449212015c9f8950f5ae92413118182a3cb70c1cfe120b8ce37b538bd7df13c45633663c5714f2c092be5dbda0ef01fa2eec9974a7f430b3d8b69c6e8a1298ef278a3bf354c66bc1428a06f435dbbadb0927f6d4de80966d85273da112645617e6a050feb94721a08083be01d7c072bfc3cd7483d87359fc3f9ed302a7e4a25003e9326b756143606a0428c5186bd1447d340939e135ad5d58acc8ff05e41fb3410989d10a2d6cf9339bcef88aac2a4f709267e83ce4aa5bf96fb6161c1031c13c8b017e3fdd972ddd30cbe84bf788bb4a8699713bbd0640ac77cb4d9327952c53e0f9edaff48c7c7cb9ecfb859b27208d36bbd2c216d2bbf58c33bd9c66e4abb94c55e2c141178a3bf8dcb32933d4c6d7fa378b7ded2f5da9a711737424cdba1e54c644047a06ce6dc7dc07916278976efcd1d0968f8152db5c6d28900ced3fb1a60c7aa7bd4528dd5a87c7099efa0e7baa88bfe4a54b22913157d6e85defc2e6069766580ce02cd05b43106727e65b7bfe1ab5f36e5033ecdcfb01be514600d5078cc1f85f60367b2d9ef9cae762a62bf12788128f35f7b75dec61642d004bdf36ba9ede13caf4ced9a417788505e8a525a2a7b7ab7e488b27e80638a425caf8d9f6d2b6c437df4cd3e512c237b75614a0d3fc7b2e6c954c999276dc1152d2c768955aa674c3b626472cf145820de2cc79766eff97ed8559ef952e8f424491862b8055f72fec0b7e99364a03e6b6b0316e704de118d3821398638e63014f89726a5dad882db8b90442968e7d9ad96aeef475ce9a154a5249be6ee2bca8a21d27d35d0a06604cd504283e5d491c56bf18bf35e76f13e8c612dea9c56c9caa4ea09dabe55f7df640c1338298ff00881c79f21395885399c3a823d71aff7afc4c8ee22a61dae63ef2f23a9a9be0b04b64fd6e7c34b6391338fd178c290c63c68a3067f47c5e8e507881be42224d1f080963c60b892f7471502c0c8ab68bce9cfc9906245bfed95bfecc4929bfc6ab63f9987d5ddf5610c0776e2fd68cf77497cb3f571c596dce9ec6a9755ebae2ad55c016d092768043d22c62ff3622e555454efc565a809c5c81111128d81fdab991b533fe03bd4aa18be57b24af526a35a7e34b42dcb01b7836a0c2df80bf85ebbc9a000bdb995a8e7e6520df9029a612b72d5bd8e215b31681b71c36a9f48de3c93f43d3a62f10d91c425137d5dac42db8000b7ea2073886ae14beff81d2f941537238d82919c27edb9ff7e2a6f6cdbcba96714046280f8f21f79b843b788d78125b4960b2c0f15c390a5f5f532aa8ddf00d1af9e923e20b51f09384de85c806724224b927d921a9a0f1b9e9953a703ce1fe100b3c63960f9151bb6f2ce1ee621a08eaa3bc17ba5f1d48cbc74ad8010cac48f1153f562ec6574b950d19a1746a1ab3cc56ef3ee8a3b6462485e6c2d7e2f93506c16f709a5b48a0f61706aea7fb4dfa749f0e023c0a951c38f92f00c400748a8f3ac0ba818270c8b96047719a118bcc942f3f57de881d834a65465cc0d8ce83f29566820e2e44a4ac5dc0d5bba3f583a6c237d1ad90abeba6a1653936c2755f5ad439ad4f0ce49adb9781e9b17aedf96e7bcc83101c18b1bd228de4d448cad5dc9675a1478b37dfe28e612481a727a99ae70ed04d59e16ba5fa76f8213f954a3e966ab9214e213d228dbcac46ff8d08cc40e15847dad174df4d4a4b22624512dfd09e875717ea72254c72844b08496be033a0c4b72fd34985828a2c6cdabea8eb151596fde9420f8356633b885c71a9b77d49f59f420f5453112616153af44b2bb0d33dbd392c380476b823e1effc6d0b024a8ee50bab64ad80dd826d44e7d6f098eafceb87f9615562b8f5ac380a1d07ed0a26db41f9eee89ffd4ee621eccb13b078ad166d5eb708a910290a2698d554951be6c5e04aa793e270b63af0f2e1e9f152c43e3eb1bd047ec14fe2c877b94d5e81844edae25fcf8ae9ec1f596e393c4b2bd80b56bceb914de203d080d2cae1b82fd02fb5f068af72b8073748c473728cfcc1f6df10fda25feef4dbfa6ee91dd4b57b924d808275085880c9feff88876e4819def5ef90745110338c75e48deb08ea610622b7e254dc33404105aebaac265bb053d9176eddb10b07948f25f8099de616f336f3916ee6810c0978599ca3a0a12c00e13292d931a6ee1c877d29045399f4d75e3ad61199b12850c3de0c783765d09e866d56d3da72bbf4874dc28abcb0a55bf8c0b538a04aba025870fb22474328ed228d8eec023161a900d5b91202ef5140dcb3734cef6be81bf35b9f96b405a6421e9140ceaa8128a178eb6770e8038eded34afab6338f9540675306e41e190306cf939bb006fc840dab2602587b930a6018ea0740e79aa2dc9f04c550483a2dfe645a9cb6704863bb3cdc7b45ba5e9a6292cab79f179915b75149b9bd5782047876d85c1a06e219fbb7e86e0443e16825e7a7acb2f245e47c475bb11460aa31ec3df29a70c5f0c4e768af3991bb06a90a3544cd6944b92c3729c9549e745717552474262f2b82c7fb968125ed84f8f906e26601e0238cc94061aa5cf9a2dae11cc1d06022941dfc20aa2fce30190c2cf061dfe2e95df6df86a32038e79043be9e9df8441b9bdbd316840238786c3cd27aec76e0900218469c9d5c0169e5309c9a6d14b7f9f5035dd8085056a1e142eab1ed833ec19c2cfe6d894fdc006be4ef16c834905d6f293bcd4a745af3ee44e454f0ae8c2bad55d2a5fa6639b2d118b967bedfe2b0511094d97564595a7c3f001e491bfe7f37268354ae2eb66c988e9cd9145fcf2660577bee3f0a97184eebc0df6ad6a7d703e3017369e124a9302bfccee2c348ea94f616754f123d793440c9e7dc96a21d28cd380dbbdc21b69e8cfd781b22f71d48398516a612e73953efe954e5a6f93e87ac5cb6fb2f188435aed7eee672da62f067194f24ef9555d403e103c4b4354c65e45f01cf64dbf49bc9500617c0ad93e4558b6eacab29d6cdb736f5823f672a9ca7d55b7010a5d929984dc3bd8f502246f034de19b65054f3da17fad5433641ab2d6411a604c89e17b1e1711f44571934482185bb5bca98c10130d7e78d7d4098293b944e45969247172216d27f9a8e6d1efed38ba3783c923269961b322cc21c492c883514fb1d5012711eaf99da99005fd7fc40159f9e70275d60140f1602b5f5a7e33145fea52141e29072f696bec387f0ac996c49904c4a8c15a8fa04208547c2a57a147285a3624f3e42795d22559c8864ea2711dc1538ef8042c2c20eb66de0e6505fc04ebb5868603d41c0f01091a804af69335c759dd4cf969335cca8e4d3609ae5f3f5f015f02f066f24fb4d2acbb7a1090696fb44c3854ad529e25d009cb52801499e2dd50c5b69b85e82bd54a36bdc95fe2ad2129f2029cf6f73af0040a67866a0033fe4e6e9cb4565ca5f975e1e416444d19a44b24340f22da50013ced4a5e4436adc7f9fded03b99091c7b4fbf9686ce02df29921e9dc31faca6b3ab8c2f8d0d6d7d3edcc6aad33c11d57a1124e88bb6dc604ad46e91ee5b66c60ecd614c2c260b735f3e25a4b46c753be1c2f2579c49ecea15a6d34eff224404a63deb02d32f2ab905a24ae59baa65311a213819d36eeeb4b380984a40f88458e8f126839093ba6ab201f3e001f92266224c2ff0e7781f2a8c27d336d518d4e3121511f5c4026388625cc792df8dcac2cf5a2272c86f3846c9fddcc5b87c5dc875388793c2cf9513e8ccdeb831f2722be22732d80f4a9d8e1739f20252e6e63f0a1b9e9ae51a23c9ba01859304226fdab84f65860dcc841710e8bb9e0081dbbebe992d732d58e09afa4ada03ee96020a9b727b7fdfcb01121365220e476635b0f1c6bfc03c6fe79b2ced4f9dfde5569ceb91c5328fe201479529a219d114d74f498bc729a129de9e41bbf3a2f8f79faee78488bd06b4f71ca43725a311f504ae67761137fe2e81041c3c7952d98d9f52f379b98e8b1fc15d129bcd8d125dc6ae5da2564d14f0bf0135c2202224da08e420d5314c233f03d1b8122602f614af281e158d65ef9ca9610d2caac9cd83ec6cd3ceae8e4f645eae147805b1a70003129574d446e54e029a85f8404612dad1fa40ea22aea5aee4cdf3790fa17a40a8d00cc88792a84e05e5f6776733c3530787d71ecb07ce418fc1ae799818d8d0db44be18da5b8a03cc9a074fff1ab2fbcef68a764a2679b454256e8f85af3dc0e312a750aa8cc97df8e62e7edeea6cca139a545d9355ce57420a3a5d170f0d718466dd820a3be28321e62e7ef4e78fab746e9d57dd2b7e82c4135084fcf5c0adf7b36dbc3a7cf0719166bc7317614c2b017fee170ca806010daa962ada3c727634430e8fa9469be89cf029e946a0b9243330bf728ae203f150f9d594641e7d8ba007b182116d722ea2531fddc6da6f7b4090fb006d19afdc86cf07e06b99fc0198929acec171ad6a2d64505f6d916c0c312d33dd8ea7a5c402c61b1e42814ea723baeb776db342500996dff769119aacb6db2c3cb97f0ab768821dc9ae4c4ca836299ce9049f0a31c9f22e660c779693939a9ee09ba2bab25a8697e405a79710b4343f020a1cf61ed84ce24d37c7a1bffcc539ea28b9c7570c0010107131d142f92db5f2f8886ff220fc0bbfe01b216d5c4ca6431817f8769a42deea1cf5695b6a3307badb0a845f2dbe5e2a98db8bd2a89325e93c0a380183a4dbde815ec781dbf336ade74907edac3a97d5c8d811d9031fd4c3c22928ad202219cbf327b590737ccc76ac3c0be28fa2b5d9375d061d3a879c3a4f2812694b569a3580d8df6419a8071c486b4830d092fb714345278b648c0c445d4c916eb73ff02dec7fff22aa9ecf8a2a939864d538984b30676b478b44902cb390f24631c"}, {&(0x7f0000003c40)="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"}], 0x0, &(0x7f0000004cc0)=[{0x0, 0x10f, 0xfe, "43c0df23c66c685d3bafa197e94521fac26b4588577fd9ae8a9bbacbfdea05c1ecac42ae6098973081e316a30691b82ce1ec0a8ede855d28ae6841b17db45092124ed4102dd3f5f01f40ac1d4e518bc1"}, {0x0, 0x100, 0x8, "4528f2ffb0dc696422fd7a71f0c4e2945f83ac38dae0c471081038b080ffb0b03f785c38e6e47ff6ddbc17f111f12d3bd6e14c091d54eb9cd935450b6b2d171a712a1ae4627ff242ae51f03b30961d0b854696201813050475959f2570983db8d425ddc8867c1f77066aa1765f1d579d"}]}, 0x4}, {{&(0x7f0000004dc0)=@tipc=@name={0x1e, 0x2, 0x3, {{0x43}, 0x1}}, 0x0, &(0x7f00000051c0)=[{&(0x7f0000004e40)="972721aa890b3de05562534f1cb35ec31bd8ce"}, {&(0x7f0000004e80)="2599e2712b6ee3416a7602d7bc9e4eb1ea3ad3bb6b07827b16e6aea7511389c630b513f8fad7901cd3cebda62b894a0cee98800056aa14ae3e8a14bff6663da8dc3e084496fb6c2895c02983834d25407485aef27a2cce9fd63584005bf6ae6fd9fcc36d99deaf3febf366fafd41ec17348010a91afe8890e9c1f3a3275d4654352eef48ac98fb6156434197a9a064e3ecd5b6e1c4041c042c610be0704c3a03db7a2bd94f8076272413d61e2f92b4e1d5f92748f2a057e50f94f5cb01a2323a7be83fb575eea78c14a82e9eb88ad9144cc8288cb26e2d177f45852678d4ad1f849a58fd5829"}, {&(0x7f0000004f80)="dfb55c96d9f781cb78b14e3984f7d005bcb7bce3387bb53e83c610ad94bff1459a81e68eee340454beb311df18455562d8aff92c8500d459aa6140d48d78061c139ffa2183fc9f482b6d656c47f2"}, {&(0x7f0000005000)="9e1dd6fba427032d31674fd21a1370137157b1ffd003c35a0c0df7f6ffae7738106d436271ebacdce2eaa21cc3b7e4f730476ba07f06eeb3ab4e0853aaad2af1b452a740ef4db0ccb1928d31a28e22a1edd58f32eb25da93569db1ee4a7916a6d654e67eb092b6e2c6d62271216a56b7238d10a7bbfdc3cef29c1e787376d7007c3b40"}, {&(0x7f00000050c0)="d29adcbca8754c8fc0f05867d411dae3ba7a98eff5ee4be073f827257b75a2ca263df6636393"}, {&(0x7f0000005100)="d3302200ad19b88ab2b2736f8344724acdd1f70be8ca32b16195bcd37f1a17e918c2bb3278d8a025d7c17fe4d3718878c1b9f9ecf8"}, {&(0x7f0000005140)="721551e32a0dd68644d0260294aa30bd8ab09d5c58d9dcad5048441f6ed7510f52cc732fb8243b7525aabfc85f07e207599085b76b8679d78beb3fc9d5e6f69da6cc377bdb376a257a0fcd0c92145b2580984df12497d99e939e815af566afbb02aba526"}], 0x0, &(0x7f0000005240)=[{0x0, 0x1, 0x1b73, "a1e0e0183760e43bccdac863e2d7ed981d16df39402a59a10cbe241765d44003f010f79fdbb77e84bf1695fa873b8b7bceb75f693dfb7a7c2d4441a6"}, {0x0, 0x10f, 0xfffffffffffffc4a, "661011a9c34588f050a123b58fd1c5e0598f9fdd1fbb687f98e798"}, {0x0, 0x117, 0x5, "8b02f3e5aa688521ec018abfcaa02cd9a9885d2b652aacdee4c35d64b25388658d376e8b5f8630a6607283c50ddc738cffc8bf11418c1c0c6b48faafb32ecb168708c7e94027bc62acdf1d17efa2c9c0a006f726892af82ce28df743154666ce693e1a765dcb1358727a2dfdda3bb451b7ab4fc1319942d4733c520c676d0687c06ddb692bb4ed3e8ec0055695afda296818ec18fbfd011a046edb8019500b17981cda56b450f4898e11e30cd09d226fefcee398cc8d"}, {0x0, 0x10c, 0x8, "f9"}, {0x0, 0xff, 0x8, "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"}]}, 0x3ff}, {{&(0x7f00000063c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r7, 0x2, 0x4, 0x3, 0x1, {0xa, 0x4e20, 0x1}}}, 0x0, &(0x7f0000006600)=[{&(0x7f0000006440)="96b85af7cf404abd1937929e0ae832c9e7f999a4155af1504724ea2e53da4373338ac1155737564568d6298c77b2e14fad08b4cbe08845b718ad87027aeb31d5759e732f96ffa74bc640cd849c40881ac18a01cb43514e8a60cc4cbec301701799eb33854f3803b3dadcc0caac970d64c95f326ab337277d83dab51a0f4c27504108d1910dce090e09fadc587069041b7701bf2bb89a348bbe7362140965b2ed54cd25336e4667c441bdc6aaf5979fbf2a"}, {&(0x7f0000006500)="2bce3b9333abb39ff8532f9a6ae353690eac465b79bb0243306d4f13e1c7b229223388d60a1331266ea9af56ae826131f972b2abff6aea60985205e272241947e5a034ee81ed8c5b9cfbf720d2fc39758ac369afb7fb8daf4e217f52a226c5ae19f3f967c7b40af77b3ab92a8832d0f95da93090943cad9534e16eb866c7725fc57592306f530d8aee58102dad4efd1938e6360aaf09eb82d134d3c329144c04dc8c1420e22e4674a17c0f38532aced2913b3ac6b6bbda"}, {&(0x7f00000065c0)="7fff4081acdb"}], 0x0, &(0x7f0000006640)=[{0x0, 0x115, 0x9, "4009a7b2511b2aee076b25ff68440312a66f69290ac910ed082ac1cca4f40a73bb06444051e1b7106292b30d7fcd368d10a104c9"}]}, 0xc1}, {{0x0, 0x0, &(0x7f00000067c0)=[{&(0x7f00000066c0)="346c29dd915dacfe87f5b3fdb45c37cc8a53969ab4f1a91ec17b42f1722ca64d795f15ae44b8ed7ff3a956daeb8233c4c7a86f2375208b76d2cd810b0cabd2abc82ccfe1c7609d8f39431f83e78dcd9885fea10b4c552ea84344873059a49c04bf90cfe3a368c70b6910b297ae07f5d419193b10a1fae0acdb87fdec38a0be4d125b46959d447b9275e53eb556f42fa41ed52721352985d38e21e5697c840b1b44264a2e5875cc515cd346f731eccee42d828c81eba1e92d58117ab38a0297031338e9389d58dd4c54779f82c2"}]}, 0x8}, {{0x0, 0x0, &(0x7f0000006a00)=[{&(0x7f0000006800)="da38409b9ddb739a124eba2f69d74eac2d91448256a5bf4dc50990a50d9e9f7b12d2a94df9b35385c61354dea65b9c029772d04c7baeb5fb055ce9adb84677bc4aaf46f50686ed449a9361a095904a1987c697baf231575fe7aeead322a7cdf7e4a697aba710b5a20b2e6cb1e03cca800d718cacfc3f62fe7903c0038d7aff96e368de89673bf7db45cb591bc74e985f16925769f70ccdbe384767d9f6d58e36b418666019"}, {&(0x7f00000068c0)="47cbc53a7a8c5b79ffe169701052e8a4ee4749c7822a9f188e6c0510b28f6aba688785de1dc3d8d3f40d7488904132250e3e8e12e2626d488b15fdcf2901e52c8e5d1321bd99361d0fc6cae07afd615c79a569598babe2cca464a44dd0c09eb3b8f49070c94b5aefd9aefc6aafeadf5026276f9d5db04bef293dc997ac25785188ffd04760e71d6d8291d2eacea58e362896da83307bfc32526c2ba0fc6ce2f504ac0e3ac8e3357e2770aeae390a9894b404bc6c69a57d524349923baefca513652cef3cb5dab8308998b41679dd9ec6430ff80784363c2eeb908d08f6440c976aa3e152613978878b966693e59e"}, {&(0x7f00000069c0)="db660e0d706d5ada5984c9969e59471d4df6ac92e45482df0bf252e34dd5ff96b7ef3a5b05032d4681ec761be3fdb0"}]}, 0x93e8}, {{&(0x7f0000006a40)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l\x00'}, 0x0, &(0x7f0000007e40)=[{&(0x7f0000006ac0)="344c6c1b187c3dce2c2c46f1b6dd22327aaa6dd6593eacacd61ed6fe45c96eb51b9d4512a50cb30381394a74b7bf3a069d063e58b1e21afb410065bc89df15c6994e1ee910bf1778eeba0524777155c8122a02a8c36f34fb847b0aa5d31580bbe84a15767ffc445ded65a9a16f12ce78db0ec750a9f2eeee24783e9f7ac56c6e13e6880fb7680b4c89ada4abe36e342643b752abe388cbe9e16d496a1cf6d1fcdb5455ca0233e5adc9cd6365da97ee9f622038d4a1bbdc09b6ab3f12f354509a98d8f5c336d18b6d19d3e3a215917cfb9e"}, {&(0x7f0000006bc0)="20721376fbeefd41f60821185360db382877b69a6399efe02e0369cf772685119fd32de9b57de177b491c1b68b27b69d413a375728955b6dbb12255920cdab82ae6fe635dbfaeb7f381db7180708e022eec09fc6bd0f0d1eca0a04e842771744f30e7cc4556add38bb0186bd313d1fccc5b7f2cd8aabbacd440ebe3389712113f68547a8ba20e014630684382a7f738dbec13e5efd69a79802e7363e541f67243d4adcbf5a4fc22347d86b5a23beda6bb54e3fbfaec32bf7930b3635ba6dd562bdb3d2ba3669fecbd3520c91d78fa77ce8ac20780f59bfd269ec3d31e4f9c2d75cd51eb35258038bfbb41a1e1a5f538a40cc5cd976"}, {&(0x7f0000006cc0)="bf028f197dce571c33e580c577b26797a6d2fde6a11ca9cd3eb3aec273a001636de545d6f20c9064d0dc8d3078015f33f0260bed05b45571a12ddb242dc2154c1a96e322"}, {&(0x7f0000006d40)="4133a7ce1df630168b49212032c98d2786db32397cd3344109cd2fc94afc5b8bc02de1138313920ea3d6b94560ee45a45dc5e08597a7531baef6e411aedceb167b7bb5a4904db29b73d7d7dff37ff68d3990345474d5011296f28538fee29856cdcb6a6e157cd368ed62719d52dc9a310d30f04d5ef9a5c379e281df096161168b4ed04981c0147fb4d7a9d1cf83d956e621d52bc0743c8e753d291a1ebcd9376bec1ca7a4f419fe93e7eaa8267bf9"}, {&(0x7f0000006e00)="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"}, {&(0x7f0000007e00)="9077051e6dfdf9a6bee3d6f08823ca84297ec68dcce79c1da3678f18b95ee03ed4cd7f86101f57882f"}], 0x0, &(0x7f0000007ec0)}}], 0x40000000000000b, 0x1) socket$can_raw(0x1d, 0x3, 0x1) [ 1237.178007] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1237.183081] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1237.185964] audit: type=1400 audit(1545188042.803:4107): avc: denied { map } for pid=5873 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:54:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:02 executing program 5 (fault-call:4 fault-nth:28): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) [ 1237.250575] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1237.309627] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1237.371639] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1237.375438] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1237.384627] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1237.385319] FAULT_INJECTION: forcing a failure. [ 1237.385319] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.400574] CPU: 0 PID: 5890 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1237.418960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1237.428346] Call Trace: [ 1237.430961] dump_stack+0x244/0x39d [ 1237.434646] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1237.439858] ? memset+0x31/0x40 [ 1237.439903] should_fail.cold.4+0xa/0x17 [ 1237.439933] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1237.439969] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1237.439989] ? lock_is_held_type+0x210/0x210 [ 1237.440015] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1237.467113] ? perf_tp_event+0xc20/0xc20 [ 1237.471201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1237.476785] ? check_preemption_disabled+0x48/0x280 [ 1237.481826] ? __lock_acquire+0x62f/0x4c20 [ 1237.486138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1237.491705] ? check_preemption_disabled+0x48/0x280 [ 1237.496760] ? memset+0x31/0x40 [ 1237.500085] ? perf_trace_lock+0x4a7/0x7a0 [ 1237.504355] ? lock_is_held_type+0x210/0x210 [ 1237.504379] ? check_preemption_disabled+0x48/0x280 [ 1237.504407] ? kasan_check_read+0x11/0x20 [ 1237.513825] ? zap_class+0x640/0x640 [ 1237.513858] __should_failslab+0x124/0x180 02:54:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1237.513886] should_failslab+0x9/0x14 [ 1237.529802] __kmalloc+0x70/0x760 [ 1237.533312] ? context_struct_to_string+0x401/0x900 [ 1237.538366] context_struct_to_string+0x401/0x900 [ 1237.543241] ? get_permissions_callback+0xb0/0xb0 [ 1237.543263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1237.543281] ? sidtab_search_core+0x21f/0x3b0 [ 1237.543321] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1237.543352] security_sid_to_context+0x35/0x40 [ 1237.568697] selinux_getprocattr+0x3cb/0x8b0 02:54:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1237.573144] ? selinux_socket_post_create+0x990/0x990 [ 1237.578361] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1237.583352] ? kasan_check_read+0x11/0x20 [ 1237.587527] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1237.592832] ? find_vpid+0xf0/0xf0 [ 1237.592875] security_getprocattr+0x66/0xc0 [ 1237.592907] proc_pid_attr_read+0x158/0x2e0 [ 1237.600770] ? oom_adj_read+0x260/0x260 [ 1237.600797] ? security_file_permission+0x1c2/0x220 [ 1237.600827] ? rw_verify_area+0x118/0x360 [ 1237.600855] do_iter_read+0x4a3/0x650 [ 1237.622144] vfs_readv+0x175/0x1c0 [ 1237.625716] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1237.625772] ? fget_raw+0x20/0x20 [ 1237.625807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1237.640153] ? check_preemption_disabled+0x48/0x280 [ 1237.640641] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1237.645224] ? __sb_end_write+0xd9/0x110 [ 1237.645266] do_preadv+0x1cc/0x280 [ 1237.645294] ? do_readv+0x310/0x310 [ 1237.664656] ? __ia32_sys_read+0xb0/0xb0 [ 1237.668748] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1237.674167] ? trace_hardirqs_off_caller+0x310/0x310 [ 1237.679316] __x64_sys_preadv+0x9a/0xf0 [ 1237.683357] do_syscall_64+0x1b9/0x820 [ 1237.687269] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1237.692416] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1237.692693] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1237.706065] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1237.709315] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1237.710947] ? trace_hardirqs_on_caller+0x310/0x310 [ 1237.719292] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1237.719317] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1237.719351] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1237.719387] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1237.719418] RIP: 0033:0x457669 [ 1237.719438] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1237.719449] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 02:54:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1237.744517] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1237.744545] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1237.744558] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1237.744571] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1237.744590] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1237.768953] audit: type=1400 audit(1545188043.283:4108): avc: denied { map } for pid=5895 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1237.858993] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1237.860251] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1237.888107] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x20004000) 02:54:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:03 executing program 5 (fault-call:4 fault-nth:29): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1238.037685] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1238.047673] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1238.050881] FAULT_INJECTION: forcing a failure. [ 1238.050881] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.063561] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1238.065660] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1238.067205] CPU: 1 PID: 5918 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1238.091094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1238.100448] Call Trace: [ 1238.103048] dump_stack+0x244/0x39d [ 1238.106694] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1238.111910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1238.117573] ? check_preemption_disabled+0x48/0x280 [ 1238.122617] should_fail.cold.4+0xa/0x17 [ 1238.126731] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1238.131860] ? lock_is_held_type+0x210/0x210 [ 1238.136293] ? mark_held_locks+0x130/0x130 [ 1238.140567] ? zap_class+0x640/0x640 [ 1238.144324] ? __lock_acquire+0x62f/0x4c20 [ 1238.148578] ? is_bpf_text_address+0xac/0x170 [ 1238.153177] ? lock_downgrade+0x900/0x900 [ 1238.153462] audit: type=1400 audit(1545188043.693:4109): avc: denied { map } for pid=5927 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1238.157342] ? check_preemption_disabled+0x48/0x280 [ 1238.184307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1238.189863] ? check_preemption_disabled+0x48/0x280 [ 1238.194907] ? debug_smp_processor_id+0x1c/0x20 [ 1238.199592] ? perf_trace_lock+0x14d/0x7a0 [ 1238.203850] ? lock_is_held_type+0x210/0x210 [ 1238.208282] ? check_preemption_disabled+0x48/0x280 [ 1238.213322] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1238.218263] ? kasan_check_read+0x11/0x20 [ 1238.222433] ? zap_class+0x640/0x640 [ 1238.226176] __should_failslab+0x124/0x180 [ 1238.230432] should_failslab+0x9/0x14 [ 1238.230447] __kmalloc+0x70/0x760 [ 1238.230473] ? context_struct_to_string+0x401/0x900 [ 1238.242739] context_struct_to_string+0x401/0x900 [ 1238.248196] ? get_permissions_callback+0xb0/0xb0 [ 1238.253065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1238.253503] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1238.254726] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1238.258615] ? sidtab_search_core+0x21f/0x3b0 [ 1238.258658] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1238.258713] security_sid_to_context+0x35/0x40 [ 1238.258736] selinux_getprocattr+0x3cb/0x8b0 [ 1238.294742] ? selinux_socket_post_create+0x990/0x990 [ 1238.299979] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1238.304922] ? kasan_check_read+0x11/0x20 [ 1238.309109] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1238.314403] ? find_vpid+0xf0/0xf0 [ 1238.317966] security_getprocattr+0x66/0xc0 [ 1238.322309] proc_pid_attr_read+0x158/0x2e0 [ 1238.326651] ? oom_adj_read+0x260/0x260 [ 1238.330639] ? security_file_permission+0x1c2/0x220 [ 1238.330661] ? rw_verify_area+0x118/0x360 [ 1238.339814] do_iter_read+0x4a3/0x650 [ 1238.339851] vfs_readv+0x175/0x1c0 [ 1238.347193] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1238.352588] ? fget_raw+0x20/0x20 [ 1238.356066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1238.361633] ? check_preemption_disabled+0x48/0x280 [ 1238.366700] ? __sb_end_write+0xd9/0x110 [ 1238.370795] do_preadv+0x1cc/0x280 [ 1238.374362] ? do_readv+0x310/0x310 [ 1238.378002] ? __ia32_sys_read+0xb0/0xb0 [ 1238.382071] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1238.382104] ? trace_hardirqs_off_caller+0x310/0x310 [ 1238.382142] __x64_sys_preadv+0x9a/0xf0 [ 1238.396619] do_syscall_64+0x1b9/0x820 [ 1238.400522] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1238.405901] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1238.406570] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1238.408167] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1238.410846] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1238.410867] ? trace_hardirqs_on_caller+0x310/0x310 [ 1238.410885] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1238.410905] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1238.410927] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1238.452349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1238.457551] RIP: 0033:0x457669 [ 1238.460783] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1238.479696] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 02:54:03 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x400000000000072, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000000), 0x4) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x2) 02:54:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:03 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4000000043) times(&(0x7f0000000a40)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) read(r1, &(0x7f0000000080)=""/21, 0x15) r2 = getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000480)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000540)=0xc) mount$9p_unix(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000940)={'trans=unix,', {[{@dfltuid={'dfltuid', 0x3d, r2}}, {@dfltuid={'dfltuid', 0x3d, r3}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'self-\\\xbf*-'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x7}}, {@fowner_gt={'fowner>', r4}}, {@fowner_lt={'fowner<', r5}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}}) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x12) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x29, 0x1, &(0x7f0000000200), 0x4) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002380), 0x0, &(0x7f0000002400)}, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='bpf\x00', 0x400, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x17) r7 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r7, &(0x7f000087dffe)='F', 0x1, 0x0, 0x0, 0x0) shutdown(r7, 0x2) socket(0x0, 0x0, 0x0) r8 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) shutdown(r8, 0x1) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r8, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 02:54:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1238.487422] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1238.487438] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1238.501970] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1238.509269] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1238.516557] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1238.576864] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1238.617720] audit: type=1400 audit(1545188044.233:4110): avc: denied { map } for pid=5949 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1238.628167] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1238.651496] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1238.669715] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1238.675076] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1008) 02:54:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:05 executing program 5 (fault-call:4 fault-nth:30): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:05 executing program 0: r0 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14, 0x80000) ioctl$int_out(r0, 0x5462, &(0x7f0000000080)) r2 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="55bd9988942eb66e83aabea530abc0e4c394c0d4d90cb7a1ac6f0efe124fefdf9bec99682d7eff61e9a355c1b3d67af274f4064d415bddbb3fb8ad2e2a22048c02e2e3e096cbf1137966628bb51a0ce9ce66c65b7fbde96f3fb34126013648845a20e26448616a077ed45334387076e22374a8248d1ee36850dfc214a667fb952cfc51d198dcb0c3ee8b53d6858cac33ec9aa3fbf4badff637b00c13c759ef73113e10262afbd9efc8ce1af908918038a992a762", 0xb4, 0xfffffffffffffffb) keyctl$get_keyring_id(0x0, r2, 0x9) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x20040, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x101, 0x0, 0x10000, 0x9}) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000280)={0x5, r4, 0x10000, 0x4}) write$UHID_DESTROY(r3, &(0x7f00000002c0), 0x4) ioctl$VIDIOC_G_PRIORITY(r3, 0x80045643, 0x2) getsockopt$inet_udp_int(r3, 0x11, 0x6f, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000380)=0x7ff, 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r3) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f00000003c0)=0xd000) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000400)={{0x2, 0x4e20, @rand_addr=0x5}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x70, {0x2, 0x4e20, @remote}, 'bond0\x00'}) connect$packet(r0, &(0x7f0000000480)={0x11, 0x0, r1, 0x1, 0x4}, 0x14) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000004c0)=@req={0xeaf, 0x2, 0xce3, 0x9}, 0x10) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000500)='tls\x00', 0x4) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000540)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000580)={0x0, 0x80000, r3}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000005c0)={r5, 0x80000, r3}) getgroups(0x2, &(0x7f0000000600)=[0xffffffffffffffff, 0xee00]) setfsgid(r6) ioctl$KVM_DIRTY_TLB(r3, 0x4010aeaa, &(0x7f0000000640)={0x4, 0xf4}) fcntl$setstatus(r0, 0x4, 0x800) ioctl$VT_WAITACTIVE(r3, 0x5607) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000680)={0x3, [0x9, 0xffff, 0x2]}, 0xa) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000006c0)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000700)=0x20) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000740)={r7, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}}, [0x7fffffff, 0xe80d, 0x1000000000000000, 0x2, 0xffffffffffffff49, 0x1, 0x800, 0x1, 0xa96, 0x7, 0x5, 0x79, 0x3, 0x48000, 0x10000]}, &(0x7f0000000840)=0x100) preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000880)=""/145, 0x91}], 0x1, 0x0) fcntl$getown(r0, 0x9) 02:54:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1239.595266] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1239.608370] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1239.611979] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1239.614938] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1239.645495] FAULT_INJECTION: forcing a failure. [ 1239.645495] name failslab, interval 1, probability 0, space 0, times 0 [ 1239.656914] CPU: 1 PID: 5976 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1239.664219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1239.673595] Call Trace: [ 1239.676191] dump_stack+0x244/0x39d [ 1239.679835] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1239.685044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1239.690653] ? check_preemption_disabled+0x48/0x280 [ 1239.695712] should_fail.cold.4+0xa/0x17 [ 1239.699802] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1239.704919] ? lock_is_held_type+0x210/0x210 [ 1239.709355] ? mark_held_locks+0x130/0x130 [ 1239.713615] ? zap_class+0x640/0x640 [ 1239.713636] ? __lock_acquire+0x62f/0x4c20 [ 1239.713656] ? is_bpf_text_address+0xac/0x170 [ 1239.713675] ? lock_downgrade+0x900/0x900 [ 1239.713696] ? check_preemption_disabled+0x48/0x280 [ 1239.721659] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1239.721677] ? check_preemption_disabled+0x48/0x280 02:54:05 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$inet(0x15, 0x5, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) close(r0) 02:54:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1239.721700] ? debug_smp_processor_id+0x1c/0x20 [ 1239.721715] ? perf_trace_lock+0x14d/0x7a0 [ 1239.721745] ? lock_is_held_type+0x210/0x210 [ 1239.759255] ? check_preemption_disabled+0x48/0x280 [ 1239.764298] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1239.769240] ? kasan_check_read+0x11/0x20 [ 1239.773406] ? zap_class+0x640/0x640 [ 1239.773430] __should_failslab+0x124/0x180 [ 1239.773452] should_failslab+0x9/0x14 [ 1239.773473] __kmalloc+0x70/0x760 [ 1239.785225] ? context_struct_to_string+0x401/0x900 02:54:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1239.785251] context_struct_to_string+0x401/0x900 [ 1239.785299] ? get_permissions_callback+0xb0/0xb0 [ 1239.785318] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1239.785337] ? sidtab_search_core+0x21f/0x3b0 [ 1239.813485] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1239.819422] security_sid_to_context+0x35/0x40 [ 1239.824022] selinux_getprocattr+0x3cb/0x8b0 [ 1239.828454] ? selinux_socket_post_create+0x990/0x990 [ 1239.833354] audit: type=1400 audit(1545188045.453:4111): avc: denied { map } for pid=5981 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1239.833674] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1239.860539] ? kasan_check_read+0x11/0x20 [ 1239.864701] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1239.864722] ? find_vpid+0xf0/0xf0 [ 1239.864762] security_getprocattr+0x66/0xc0 [ 1239.864788] proc_pid_attr_read+0x158/0x2e0 [ 1239.864810] ? oom_adj_read+0x260/0x260 [ 1239.886261] ? security_file_permission+0x1c2/0x220 [ 1239.891310] ? rw_verify_area+0x118/0x360 [ 1239.895473] do_iter_read+0x4a3/0x650 [ 1239.895506] vfs_readv+0x175/0x1c0 [ 1239.895528] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1239.895557] ? fget_raw+0x20/0x20 [ 1239.901376] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1239.902899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1239.902919] ? check_preemption_disabled+0x48/0x280 [ 1239.902946] ? __sb_end_write+0xd9/0x110 [ 1239.902972] do_preadv+0x1cc/0x280 [ 1239.938074] ? do_readv+0x310/0x310 [ 1239.941723] ? __ia32_sys_read+0xb0/0xb0 [ 1239.945827] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1239.951211] ? trace_hardirqs_off_caller+0x310/0x310 [ 1239.956378] __x64_sys_preadv+0x9a/0xf0 [ 1239.960386] do_syscall_64+0x1b9/0x820 [ 1239.964378] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1239.969764] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1239.974705] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1239.979562] ? trace_hardirqs_on_caller+0x310/0x310 [ 1239.983317] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1239.984596] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1239.992044] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1239.997944] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1240.011296] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1240.016177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1240.021393] RIP: 0033:0x457669 [ 1240.024595] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:54:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1240.043509] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1240.051232] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1240.058508] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1240.058519] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1240.058529] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1240.058539] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1240.096396] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1240.115684] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1240.188995] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1240.193412] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1010) 02:54:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:06 executing program 0: r0 = socket$inet(0x10, 0x2, 0xc) alarm(0x9) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000010907041dfffd946fa2830020200a0009000100008b2f8ddb1baba20400ff7e", 0x24}], 0x1}, 0x0) sysinfo(&(0x7f0000000000)=""/86) 02:54:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:06 executing program 5 (fault-call:4 fault-nth:31): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) [ 1241.041190] audit: type=1400 audit(1545188046.663:4112): avc: denied { create } for pid=6021 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1241.050116] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1241.051700] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1241.065558] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1241.076257] FAULT_INJECTION: forcing a failure. [ 1241.076257] name failslab, interval 1, probability 0, space 0, times 0 [ 1241.101739] CPU: 1 PID: 6028 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1241.109044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1241.118403] Call Trace: [ 1241.118427] dump_stack+0x244/0x39d [ 1241.118450] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1241.118468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1241.118488] ? check_preemption_disabled+0x48/0x280 [ 1241.118514] should_fail.cold.4+0xa/0x17 [ 1241.129904] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1241.129923] ? lock_is_held_type+0x210/0x210 [ 1241.129954] ? mark_held_locks+0xc7/0x130 [ 1241.129975] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1241.129996] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1241.130011] ? retint_kernel+0x2d/0x2d [ 1241.130029] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1241.130046] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1241.130062] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1241.130083] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1241.146589] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1241.149784] ? debug_smp_processor_id+0x1c/0x20 [ 1241.149802] ? perf_trace_lock+0x14d/0x7a0 [ 1241.149825] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1241.149848] ? retint_kernel+0x2d/0x2d [ 1241.149877] __should_failslab+0x124/0x180 [ 1241.149900] should_failslab+0x9/0x14 02:54:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1241.164830] audit: type=1400 audit(1545188046.783:4113): avc: denied { map } for pid=6033 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1241.167797] __kmalloc+0x70/0x760 [ 1241.167824] ? context_struct_to_string+0x401/0x900 [ 1241.167849] context_struct_to_string+0x401/0x900 [ 1241.167875] ? get_permissions_callback+0xb0/0xb0 [ 1241.167892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1241.167911] ? sidtab_search_core+0x21f/0x3b0 [ 1241.218553] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1241.218579] security_sid_to_context+0x35/0x40 [ 1241.218601] selinux_getprocattr+0x3cb/0x8b0 [ 1241.218622] ? selinux_socket_post_create+0x990/0x990 [ 1241.218639] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1241.218655] ? kasan_check_read+0x11/0x20 [ 1241.218670] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1241.218689] ? find_vpid+0xf0/0xf0 [ 1241.218742] security_getprocattr+0x66/0xc0 [ 1241.218776] proc_pid_attr_read+0x158/0x2e0 [ 1241.226812] ? oom_adj_read+0x260/0x260 [ 1241.289395] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1241.291807] ? security_file_permission+0x1c2/0x220 02:54:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1241.291830] ? rw_verify_area+0x118/0x360 [ 1241.291852] do_iter_read+0x4a3/0x650 [ 1241.291884] vfs_readv+0x175/0x1c0 [ 1241.291907] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1241.291936] ? fget_raw+0x20/0x20 [ 1241.331620] audit: type=1400 audit(1545188046.953:4114): avc: denied { write } for pid=6021 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1241.335777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 02:54:07 executing program 0: syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x32d3, 0x1fffd) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000104000/0x3000)=nil, 0x3000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000280)={@remote, 0x4a3, 0x0, 0x0, 0x0, 0x1, 0x3, 0x8}, 0x20) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000500)={0x0, 0x0, @ioapic={0x0, 0x0, 0x4, 0x367, 0x0, [{0x7f, 0x40, 0x101}, {0x4566, 0x1, 0x2, [], 0x7}, {0x4, 0xe5a4, 0x7fff, [], 0xf2}, {0x8, 0x0, 0x80, [], 0xfffffffffffffff9}, {}, {0x310f1a87, 0x9, 0x862b}, {0x100, 0xde, 0x9}, {0x1f, 0x0, 0x0, [], 0x100000001}, {0x0, 0x0, 0x200, [], 0x100000000}, {0x2, 0x0, 0x0, [], 0x800}, {0x9, 0x3, 0x0, [], 0x100000001}, {0xe96, 0xff, 0x0, [], 0x3e}, {0x6, 0x3, 0x9, [], 0x6}, {0x80000000, 0x0, 0x9, [], 0x81}, {0x5, 0x7fffffff, 0x4, [], 0x5}, {0x8001, 0x40, 0xcecc, [], 0xa20}, {0x40, 0x6}, {0x0, 0x0, 0x7ff}, {0x81, 0xb48, 0x4}, {0x6, 0x5, 0x39a2bdb4, [], 0xfffffffffffffffb}, {0x4, 0x50, 0x7a73, [], 0x4}, {0x100000001, 0x7f, 0x100000000, [], 0x400}, {0x6, 0xfffffffffffffe00, 0x7c, [], 0x100000001}, {0x77, 0xfffffffffffffff7}]}}) r2 = syz_open_procfs(0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_OUTPUT(0xffffffffffffffff, 0x8004562e, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000880)={0xcc, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="00634040000000000000000003000000000000000000000011000000000000000000000018000000000000004800000000000000", @ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="594ca26e2e9c21fd8c05c1636fc6c23fab5b017eb3d71ac854bd2d4e393459ac59481fa666ae2db7a0bc4b013c6a3eefb0edcaa706c92dc10b70b47c158ae9058c4dfc73b53341d17646f9f990306351db28c35610f7aaab", @ANYRES64=r4, @ANYBLOB="0200000000000000"], @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB="000000000000000018000000000000000000000000000000380000000000000038000000000000003800000000000000380000000000000078000000000000002800000000000000"], @ANYBLOB="01634040030000000000000004000000000000000000000010000000000000000000000000000000000000002800000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='8\x00\x00\x00\x00\x00\x00\x00p\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00634040000000000000000001000000000000000000000001000000000000000000000000000000000000001800000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB='`\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x00']], 0x2b, 0x0, &(0x7f0000000840)="4d5c07918b234c133ba519e90125e135414fe1ee945a790e906af277626e95ae87ccc3e412db0e1f16a0c9"}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f00000000c0)) fsetxattr$security_ima(r1, &(0x7f0000000380)='security.ima\x00', &(0x7f00000003c0)=@sha1={0x1, "9dcf426e491d0099587681ad6cdc29e35ba9b315"}, 0x15, 0x3) pipe(&(0x7f0000000000)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in, @in=@remote}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) fstat(r2, 0x0) syz_open_dev$binder(&(0x7f0000000a40)='/dev/binder#\x00', 0x0, 0xaed58a5788e9ec60) sendmsg$unix(r2, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x40}, 0x800) dup2(r0, r3) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x8000, 0x0) gettid() mlockall(0x0) mmap(&(0x7f0000428000/0x2000)=nil, 0x2000, 0x0, 0x8032, 0xffffffffffffffff, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r5, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) [ 1241.335813] ? check_preemption_disabled+0x48/0x280 [ 1241.335840] ? __sb_end_write+0xd9/0x110 [ 1241.335874] do_preadv+0x1cc/0x280 [ 1241.355831] audit: type=1400 audit(1545188046.953:4115): avc: denied { create } for pid=6021 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1241.357770] ? do_readv+0x310/0x310 [ 1241.357786] ? __ia32_sys_read+0xb0/0xb0 [ 1241.357804] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1241.357824] ? trace_hardirqs_off_caller+0x310/0x310 [ 1241.357847] __x64_sys_preadv+0x9a/0xf0 [ 1241.403486] do_syscall_64+0x1b9/0x820 [ 1241.453594] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1241.458975] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1241.463922] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1241.468795] ? trace_hardirqs_on_caller+0x310/0x310 [ 1241.473834] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1241.478873] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1241.481094] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1241.483914] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1241.484955] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1241.492252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1241.492267] RIP: 0033:0x457669 [ 1241.492292] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1241.492302] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1241.492318] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1241.492328] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1241.492343] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1241.532792] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1241.532803] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1241.561150] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1241.590135] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1241.759713] audit: type=1400 audit(1545188047.383:4116): avc: denied { map } for pid=6055 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1241.808828] audit: type=1400 audit(1545188047.383:4117): avc: denied { map } for pid=6055 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1241.815717] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1241.834366] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) fchmod(r0, 0x100) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x1f) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:08 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x800, 0x200) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000080)={0x80000, 0x0, [0x400, 0x8001, 0x5, 0x3, 0x101, 0x1, 0x8000, 0x1ff]}) listen(r0, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) prctl$PR_GET_KEEPCAPS(0x7) sendto$inet6(r2, &(0x7f0000000240)='<', 0x1, 0x0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 02:54:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:08 executing program 5 (fault-call:4 fault-nth:32): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1242.584290] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1242.590730] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1242.592742] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1242.595583] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1242.623402] FAULT_INJECTION: forcing a failure. [ 1242.623402] name failslab, interval 1, probability 0, space 0, times 0 [ 1242.634966] CPU: 0 PID: 6075 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1242.642263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1242.651633] Call Trace: [ 1242.654252] dump_stack+0x244/0x39d [ 1242.657915] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1242.657938] ? memset+0x31/0x40 [ 1242.657979] should_fail.cold.4+0xa/0x17 [ 1242.670528] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1242.675673] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1242.675693] ? lock_is_held_type+0x210/0x210 [ 1242.675720] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1242.675751] ? perf_tp_event+0xc20/0xc20 [ 1242.694437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1242.700007] ? check_preemption_disabled+0x48/0x280 [ 1242.705084] ? __lock_acquire+0x62f/0x4c20 [ 1242.709377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1242.714943] ? check_preemption_disabled+0x48/0x280 [ 1242.720006] ? memset+0x31/0x40 [ 1242.723357] ? perf_trace_lock+0x4a7/0x7a0 [ 1242.727632] ? lock_is_held_type+0x210/0x210 [ 1242.732074] ? check_preemption_disabled+0x48/0x280 [ 1242.734220] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1242.736682] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1242.737131] ? kasan_check_read+0x11/0x20 [ 1242.737155] ? zap_class+0x640/0x640 [ 1242.737186] __should_failslab+0x124/0x180 [ 1242.765914] should_failslab+0x9/0x14 [ 1242.769738] __kmalloc+0x70/0x760 [ 1242.773244] ? context_struct_to_string+0x401/0x900 [ 1242.778313] context_struct_to_string+0x401/0x900 [ 1242.783220] ? get_permissions_callback+0xb0/0xb0 [ 1242.788107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1242.793666] ? sidtab_search_core+0x21f/0x3b0 [ 1242.798201] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1242.804118] security_sid_to_context+0x35/0x40 [ 1242.808749] selinux_getprocattr+0x3cb/0x8b0 [ 1242.813230] ? selinux_socket_post_create+0x990/0x990 [ 1242.818481] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1242.818499] ? kasan_check_read+0x11/0x20 [ 1242.818534] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1242.827715] ? find_vpid+0xf0/0xf0 [ 1242.836547] security_getprocattr+0x66/0xc0 [ 1242.840908] proc_pid_attr_read+0x158/0x2e0 [ 1242.845268] ? oom_adj_read+0x260/0x260 [ 1242.849269] ? security_file_permission+0x1c2/0x220 [ 1242.854346] ? rw_verify_area+0x118/0x360 [ 1242.858529] do_iter_read+0x4a3/0x650 [ 1242.862381] vfs_readv+0x175/0x1c0 [ 1242.862425] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1242.871362] ? fget_raw+0x20/0x20 [ 1242.874848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1242.874876] ? check_preemption_disabled+0x48/0x280 [ 1242.885468] ? __sb_end_write+0xd9/0x110 [ 1242.889572] do_preadv+0x1cc/0x280 [ 1242.893137] ? do_readv+0x310/0x310 [ 1242.893869] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1242.895728] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1242.896804] ? __ia32_sys_read+0xb0/0xb0 [ 1242.896827] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1242.896851] ? trace_hardirqs_off_caller+0x310/0x310 [ 1242.896884] __x64_sys_preadv+0x9a/0xf0 [ 1242.932132] do_syscall_64+0x1b9/0x820 [ 1242.936049] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1242.941480] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1242.946430] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1242.951291] ? trace_hardirqs_on_caller+0x310/0x310 [ 1242.956326] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1242.961362] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1242.966416] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1242.971286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1242.976511] RIP: 0033:0x457669 [ 1242.979722] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1242.998635] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1243.006370] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1243.013650] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1243.020946] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1243.028224] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 02:54:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\xd0', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:08 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400003ff) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="240000005e0007500962cce1da8f340020200a0009000000fffcffffffffffffff00ff7e280000001100ffffba16a0aa1c00a3d6ebea8653b1cc010000000ac47b6268e3966cf055d90f15a1", 0x4c}], 0x1}, 0x0) [ 1243.035541] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1243.047085] audit: type=1400 audit(1545188048.263:4118): avc: denied { map } for pid=6084 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:54:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1243.215998] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1243.235105] audit: type=1400 audit(1545188048.853:4119): avc: denied { map } for pid=6109 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1243.237369] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1243.257905] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1243.258764] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1243.270325] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 1243.336985] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 02:54:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x85f56151771528d6, 0x140) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000340)=""/186) 02:54:11 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)) r0 = getpid() capset(&(0x7f00000003c0)={0x20080522}, &(0x7f0000000400)={0xe609, 0xfffffffffffff026, 0x5, 0x4, 0x0, 0x5}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000000c0)={0x0, 0x81, 0x0, 0x4, &(0x7f0000ffb000/0x3000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0xffffffffffffffff, &(0x7f0000000500)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000280)) r4 = getpid() r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f0000000140)={0x2000}) r6 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r6, 0x7, r3, &(0x7f0000000000)) close(r3) syz_open_procfs(r0, &(0x7f0000000480)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x0, 0x8, 0x2}}, 0x28) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000100)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8028020}, 0xc, &(0x7f0000000340)={&(0x7f00000009c0)=ANY=[@ANYRESDEC=r4], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x4000, 0x0) r7 = socket(0x40000000015, 0x805, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r2, 0x0, 0x1b, 0x1000, &(0x7f0000000180)="8e274900ea0161aa3101ce13026f717da7987418bcf3efa521e104", &(0x7f0000000a00)=""/4096, 0x5}, 0x28) getsockopt(r7, 0x114, 0x271d, &(0x7f0000000040)=""/13, &(0x7f000033bffc)=0xd) 02:54:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:11 executing program 5 (fault-call:4 fault-nth:33): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1246.239823] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1246.249021] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1246.274021] FAULT_INJECTION: forcing a failure. [ 1246.274021] name failslab, interval 1, probability 0, space 0, times 0 [ 1246.285399] CPU: 0 PID: 6125 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1246.292185] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1246.292693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1246.310186] Call Trace: [ 1246.312817] dump_stack+0x244/0x39d [ 1246.316478] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1246.321697] ? memset+0x31/0x40 [ 1246.325023] should_fail.cold.4+0xa/0x17 [ 1246.329122] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1246.334266] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1246.339396] ? lock_is_held_type+0x210/0x210 [ 1246.343856] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1246.349007] ? perf_tp_event+0xc20/0xc20 [ 1246.353109] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1246.358673] ? check_preemption_disabled+0x48/0x280 [ 1246.363730] ? __lock_acquire+0x62f/0x4c20 [ 1246.368012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1246.373578] ? check_preemption_disabled+0x48/0x280 [ 1246.378658] ? memset+0x31/0x40 [ 1246.381995] ? perf_trace_lock+0x4a7/0x7a0 [ 1246.386300] ? lock_is_held_type+0x210/0x210 02:54:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1246.390737] ? check_preemption_disabled+0x48/0x280 [ 1246.395846] ? kasan_check_read+0x11/0x20 [ 1246.400030] ? zap_class+0x640/0x640 [ 1246.403820] __should_failslab+0x124/0x180 [ 1246.408094] should_failslab+0x9/0x14 [ 1246.411926] __kmalloc+0x70/0x760 [ 1246.415422] ? context_struct_to_string+0x401/0x900 [ 1246.420471] context_struct_to_string+0x401/0x900 [ 1246.425359] ? get_permissions_callback+0xb0/0xb0 [ 1246.430227] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1246.435797] ? sidtab_search_core+0x21f/0x3b0 [ 1246.440381] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1246.446302] security_sid_to_context+0x35/0x40 [ 1246.450917] selinux_getprocattr+0x3cb/0x8b0 [ 1246.455357] ? selinux_socket_post_create+0x990/0x990 [ 1246.460571] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1246.465525] ? kasan_check_read+0x11/0x20 [ 1246.469696] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1246.475006] ? find_vpid+0xf0/0xf0 [ 1246.478590] security_getprocattr+0x66/0xc0 [ 1246.482952] proc_pid_attr_read+0x158/0x2e0 [ 1246.487314] ? oom_adj_read+0x260/0x260 [ 1246.491331] ? oom_adj_read+0x260/0x260 [ 1246.495361] do_iter_read+0x4a3/0x650 [ 1246.499219] vfs_readv+0x175/0x1c0 [ 1246.502816] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1246.508236] ? fget_raw+0x20/0x20 [ 1246.511752] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1246.517345] ? check_preemption_disabled+0x48/0x280 [ 1246.522402] ? __sb_end_write+0xd9/0x110 [ 1246.526510] do_preadv+0x1cc/0x280 [ 1246.529334] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1246.530078] ? do_readv+0x310/0x310 [ 1246.541876] ? __ia32_sys_read+0xb0/0xb0 [ 1246.545984] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1246.551377] ? trace_hardirqs_off_caller+0x310/0x310 [ 1246.556519] __x64_sys_preadv+0x9a/0xf0 [ 1246.560531] do_syscall_64+0x1b9/0x820 [ 1246.564458] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1246.569880] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1246.574832] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1246.579696] ? trace_hardirqs_on_caller+0x310/0x310 [ 1246.584765] ? prepare_exit_to_usermode+0x3b0/0x3b0 02:54:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:12 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)) r0 = getpid() capset(&(0x7f00000003c0)={0x20080522}, &(0x7f0000000400)={0xe609, 0xfffffffffffff026, 0x5, 0x4, 0x0, 0x5}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000000c0)={0x0, 0x81, 0x0, 0x4, &(0x7f0000ffb000/0x3000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0xffffffffffffffff, &(0x7f0000000500)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000280)) r4 = getpid() r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f0000000140)={0x2000}) r6 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r6, 0x7, r3, &(0x7f0000000000)) close(r3) syz_open_procfs(r0, &(0x7f0000000480)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x0, 0x8, 0x2}}, 0x28) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000100)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8028020}, 0xc, &(0x7f0000000340)={&(0x7f00000009c0)=ANY=[@ANYRESDEC=r4], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x4000, 0x0) r7 = socket(0x40000000015, 0x805, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r2, 0x0, 0x1b, 0x1000, &(0x7f0000000180)="8e274900ea0161aa3101ce13026f717da7987418bcf3efa521e104", &(0x7f0000000a00)=""/4096, 0x5}, 0x28) getsockopt(r7, 0x114, 0x271d, &(0x7f0000000040)=""/13, &(0x7f000033bffc)=0xd) [ 1246.589842] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1246.594908] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1246.599803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1246.605016] RIP: 0033:0x457669 [ 1246.608238] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1246.627178] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1246.634901] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1246.634914] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1246.634926] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1246.634945] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1246.664077] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1246.666278] audit: type=1400 audit(1545188051.913:4120): avc: denied { create } for pid=6124 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1246.672935] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1246.673661] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1246.746957] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1246.788408] audit: type=1400 audit(1545188051.913:4121): avc: denied { write } for pid=6124 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1246.815569] audit: type=1400 audit(1545188051.913:4122): avc: denied { map } for pid=6131 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:54:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1246.860395] audit: type=1400 audit(1545188051.913:4123): avc: denied { read } for pid=6124 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1246.915601] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1246.923958] audit: type=1400 audit(1545188052.533:4124): avc: denied { create } for pid=6138 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1246.924978] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1247.022841] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1247.027658] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1247.072663] audit: type=1400 audit(1545188052.573:4125): avc: denied { write } for pid=6138 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1247.128622] audit: type=1400 audit(1545188052.623:4126): avc: denied { map } for pid=6158 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1247.151688] audit: type=1400 audit(1545188052.693:4127): avc: denied { read } for pid=6138 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 02:54:13 executing program 1: syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x4, 0x2000) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x21ac21486ec7b926, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) modify_ldt$write2(0x11, &(0x7f0000000000)={0x0, 0x20000800, 0x0, 0x6, 0x6ac, 0x400, 0x400, 0xfffffffffffff7b1, 0x1, 0x1}, 0x10) read$FUSE(r1, &(0x7f0000002000), 0x46d) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r2 = gettid() socket$bt_rfcomm(0x1f, 0x3, 0x3) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x14) read$FUSE(r1, &(0x7f0000003000), 0x1000) r3 = memfd_create(&(0x7f0000000080)='rootmode', 0x7) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f00000000c0)) 02:54:13 executing program 5 (fault-call:4 fault-nth:34): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd0\x02', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cd03300"]) setxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='security.SMACK64IPOUT\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f00000001c0)=0x5, 0x4) [ 1247.634447] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1247.644081] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1247.661318] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1247.669258] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1247.684509] audit: type=1400 audit(1545188053.303:4128): avc: denied { map } for pid=6196 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1247.690346] FAULT_INJECTION: forcing a failure. [ 1247.690346] name failslab, interval 1, probability 0, space 0, times 0 [ 1247.726195] CPU: 1 PID: 6194 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1247.733477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1247.742834] Call Trace: [ 1247.745436] dump_stack+0x244/0x39d [ 1247.749076] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1247.754287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1247.759853] ? check_preemption_disabled+0x48/0x280 [ 1247.764894] should_fail.cold.4+0xa/0x17 [ 1247.768989] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1247.774110] ? lock_is_held_type+0x210/0x210 [ 1247.778539] ? mark_held_locks+0x130/0x130 [ 1247.782798] ? zap_class+0x640/0x640 [ 1247.786531] ? __lock_acquire+0x62f/0x4c20 [ 1247.790785] ? is_bpf_text_address+0xac/0x170 [ 1247.790805] ? lock_downgrade+0x900/0x900 [ 1247.790822] ? check_preemption_disabled+0x48/0x280 [ 1247.790843] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1247.810033] ? check_preemption_disabled+0x48/0x280 [ 1247.815078] ? debug_smp_processor_id+0x1c/0x20 [ 1247.819777] ? perf_trace_lock+0x14d/0x7a0 [ 1247.824048] ? lock_is_held_type+0x210/0x210 [ 1247.824068] ? check_preemption_disabled+0x48/0x280 [ 1247.824091] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1247.838490] ? kasan_check_read+0x11/0x20 [ 1247.842647] ? zap_class+0x640/0x640 [ 1247.842671] __should_failslab+0x124/0x180 [ 1247.842692] should_failslab+0x9/0x14 [ 1247.842711] __kmalloc+0x70/0x760 [ 1247.850687] ? context_struct_to_string+0x401/0x900 [ 1247.862954] context_struct_to_string+0x401/0x900 [ 1247.867820] ? get_permissions_callback+0xb0/0xb0 [ 1247.872679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1247.878241] ? sidtab_search_core+0x21f/0x3b0 02:54:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:13 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'veth0\x00', {0x2, 0x4e24, @local}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r2 = gettid() ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x85f56151771528d6, 0x140) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000340)=""/186) 02:54:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1247.882792] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1247.888705] security_sid_to_context+0x35/0x40 [ 1247.888727] selinux_getprocattr+0x3cb/0x8b0 [ 1247.888747] ? selinux_socket_post_create+0x990/0x990 [ 1247.888775] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1247.907877] ? kasan_check_read+0x11/0x20 [ 1247.912057] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1247.917349] ? find_vpid+0xf0/0xf0 [ 1247.920923] security_getprocattr+0x66/0xc0 [ 1247.925270] proc_pid_attr_read+0x158/0x2e0 [ 1247.929630] ? oom_adj_read+0x260/0x260 [ 1247.933619] ? security_file_permission+0x1c2/0x220 [ 1247.938655] ? rw_verify_area+0x118/0x360 [ 1247.942828] do_iter_read+0x4a3/0x650 [ 1247.946658] vfs_readv+0x175/0x1c0 [ 1247.950227] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1247.953701] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1247.955622] ? fget_raw+0x20/0x20 [ 1247.955649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1247.955669] ? check_preemption_disabled+0x48/0x280 [ 1247.955695] ? __sb_end_write+0xd9/0x110 [ 1247.955720] do_preadv+0x1cc/0x280 [ 1247.981928] ? do_readv+0x310/0x310 [ 1247.981944] ? __ia32_sys_read+0xb0/0xb0 [ 1247.981963] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1247.981982] ? trace_hardirqs_off_caller+0x310/0x310 [ 1247.982010] __x64_sys_preadv+0x9a/0xf0 [ 1247.993249] do_syscall_64+0x1b9/0x820 [ 1247.993265] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1247.993306] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1247.993322] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1247.993346] ? trace_hardirqs_on_caller+0x310/0x310 [ 1248.003865] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1248.008046] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1248.011650] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1248.011670] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1248.011693] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1248.011716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1248.011729] RIP: 0033:0x457669 [ 1248.011744] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1248.011777] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1248.040234] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1248.040246] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1248.040256] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1248.040287] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1248.040297] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 02:54:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1248.060786] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1248.166601] audit: type=1400 audit(1545188053.783:4129): avc: denied { map } for pid=6216 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:54:13 executing program 5 (fault-call:4 fault-nth:35): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1248.216454] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1248.226736] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1248.228015] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1248.330400] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1248.342846] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1248.406537] FAULT_INJECTION: forcing a failure. [ 1248.406537] name failslab, interval 1, probability 0, space 0, times 0 [ 1248.418011] CPU: 1 PID: 6239 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1248.425303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1248.429368] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1248.434679] Call Trace: [ 1248.434705] dump_stack+0x244/0x39d [ 1248.434728] ? dump_stack_print_info.cold.1+0x20/0x20 02:54:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1248.434748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1248.434783] ? check_preemption_disabled+0x48/0x280 [ 1248.464906] should_fail.cold.4+0xa/0x17 [ 1248.468987] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1248.474135] ? mark_held_locks+0xc7/0x130 [ 1248.478343] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1248.483119] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1248.487714] ? retint_kernel+0x2d/0x2d [ 1248.491620] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1248.492733] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1248.496563] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1248.496584] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1248.496600] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1248.496655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1248.525468] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1248.530242] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1248.535723] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1248.540527] ? retint_kernel+0x2d/0x2d [ 1248.544458] ? find_next_bit+0x104/0x130 [ 1248.548540] __should_failslab+0x124/0x180 [ 1248.551641] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1248.552800] should_failslab+0x9/0x14 [ 1248.552818] __kmalloc+0x70/0x760 [ 1248.552843] ? context_struct_to_string+0x401/0x900 [ 1248.552866] context_struct_to_string+0x401/0x900 [ 1248.578150] ? get_permissions_callback+0xb0/0xb0 [ 1248.583009] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1248.588560] ? sidtab_search_core+0x21f/0x3b0 [ 1248.593083] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1248.598990] security_sid_to_context+0x35/0x40 [ 1248.599566] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1248.603590] selinux_getprocattr+0x3cb/0x8b0 [ 1248.603612] ? selinux_socket_post_create+0x990/0x990 [ 1248.603630] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1248.603653] ? kasan_check_read+0x11/0x20 [ 1248.630449] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1248.635785] ? find_vpid+0xf0/0xf0 [ 1248.639425] security_getprocattr+0x66/0xc0 [ 1248.643808] proc_pid_attr_read+0x158/0x2e0 [ 1248.648160] ? oom_adj_read+0x260/0x260 [ 1248.652162] ? security_file_permission+0x1c2/0x220 [ 1248.657202] ? rw_verify_area+0x118/0x360 [ 1248.661385] do_iter_read+0x4a3/0x650 [ 1248.665231] vfs_readv+0x175/0x1c0 [ 1248.668811] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1248.668844] ? fget_raw+0x20/0x20 [ 1248.668870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1248.668890] ? check_preemption_disabled+0x48/0x280 [ 1248.668914] ? __sb_end_write+0xd9/0x110 [ 1248.677786] do_preadv+0x1cc/0x280 [ 1248.677808] ? do_readv+0x310/0x310 [ 1248.677823] ? __ia32_sys_read+0xb0/0xb0 [ 1248.677841] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1248.677861] ? trace_hardirqs_off_caller+0x310/0x310 [ 1248.677883] __x64_sys_preadv+0x9a/0xf0 [ 1248.688429] do_syscall_64+0x1b9/0x820 [ 1248.688446] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1248.688480] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1248.688497] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1248.688516] ? trace_hardirqs_on_caller+0x310/0x310 [ 1248.688535] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1248.688553] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1248.688575] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1248.696175] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1248.696190] RIP: 0033:0x457669 [ 1248.696207] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1248.696217] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1248.696234] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1248.696244] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1248.696260] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1248.814000] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1248.821268] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 02:54:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:16 executing program 5 (fault-call:4 fault-nth:36): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:16 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) capget(&(0x7f00000000c0)={0x20071026, r0}, &(0x7f0000000200)={0xfffffffffffffffb, 0xe, 0x5, 0x6, 0x42e, 0x40}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d5c12875c0ae9f1989e2def2ba90f118d2a5390c5789ae0e7a07b2577b2dc639f290e681f185d71bafa70dae356647aff2987ea45f06acf801da791edca63ca9e93ea5731cf0363e21a1651a88bb18691d2d691286621ab90b046f585df4bbef1004182fd77d7543309f30c32e03afbf3e4b130d8b4c8ba481c867056c4e490ad41d249f257ed45bdf41ff883c3e418bec0b23ec612d5cb0826e676f31cc470086d19f64a32a71935805ab2f7d1ef8ecb5fcdbea5937b5fcf0badf12220bc2da64811c19b0cb52bf58b721ebd9c1792cac737535a52e1f9d6217160472a", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000050c0), 0xfffffffffffffd75) read$FUSE(r1, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x7, &(0x7f0000000280)={0x0, 0x3e, 0x3769f2862249f3a3, @tid=r0}, &(0x7f00000002c0)=0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) timer_settime(r2, 0x1, &(0x7f0000000380)={{0x77359400}, {r3, r4+10000000}}, &(0x7f00000003c0)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r5, 0x14) read$FUSE(r1, &(0x7f0000003000), 0x1000) 02:54:16 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x408200) flistxattr(r0, &(0x7f0000000000)=""/66, 0x42) rt_sigpending(&(0x7f0000000140), 0xffffff6d) [ 1250.966375] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1250.985550] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1250.989723] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1251.006962] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1251.025671] FAULT_INJECTION: forcing a failure. [ 1251.025671] name failslab, interval 1, probability 0, space 0, times 0 [ 1251.038725] CPU: 1 PID: 6264 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1251.038735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1251.038740] Call Trace: [ 1251.038773] dump_stack+0x244/0x39d [ 1251.038797] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1251.038816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1251.038840] ? check_preemption_disabled+0x48/0x280 [ 1251.055480] should_fail.cold.4+0xa/0x17 [ 1251.055504] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1251.055522] ? lock_is_held_type+0x210/0x210 [ 1251.055547] ? mark_held_locks+0x130/0x130 [ 1251.061752] ? zap_class+0x640/0x640 [ 1251.061785] ? __lock_acquire+0x62f/0x4c20 [ 1251.061806] ? is_bpf_text_address+0xac/0x170 [ 1251.061826] ? lock_downgrade+0x900/0x900 [ 1251.103334] ? check_preemption_disabled+0x48/0x280 [ 1251.103356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1251.111982] ? check_preemption_disabled+0x48/0x280 [ 1251.112005] ? debug_smp_processor_id+0x1c/0x20 [ 1251.112021] ? perf_trace_lock+0x14d/0x7a0 [ 1251.112045] ? lock_is_held_type+0x210/0x210 [ 1251.112064] ? check_preemption_disabled+0x48/0x280 [ 1251.112087] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1251.122644] ? kasan_check_read+0x11/0x20 [ 1251.132307] ? zap_class+0x640/0x640 [ 1251.132329] __should_failslab+0x124/0x180 [ 1251.132350] should_failslab+0x9/0x14 02:54:16 executing program 0: seccomp(0xfffffffffffffffd, 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x80, 0x8) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) creat(&(0x7f0000000240)='\x00', 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r0, 0x0, 0x12, &(0x7f0000000000)='procsecuritynodev\x00'}, 0x30) r2 = syz_open_procfs(r1, &(0x7f0000000080)='net/rt6_stats\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x400000, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000200)=0x3f, 0x4) 02:54:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1251.132365] __kmalloc+0x70/0x760 [ 1251.132389] ? context_struct_to_string+0x401/0x900 [ 1251.132411] context_struct_to_string+0x401/0x900 [ 1251.141105] ? get_permissions_callback+0xb0/0xb0 [ 1251.141125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1251.141141] ? sidtab_search_core+0x21f/0x3b0 [ 1251.141166] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1251.151124] security_sid_to_context+0x35/0x40 [ 1251.151147] selinux_getprocattr+0x3cb/0x8b0 [ 1251.151168] ? selinux_socket_post_create+0x990/0x990 [ 1251.151185] ? rcu_read_unlock_special+0x1c0/0x1c0 02:54:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1251.151200] ? kasan_check_read+0x11/0x20 [ 1251.151222] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1251.229596] ? find_vpid+0xf0/0xf0 [ 1251.233185] security_getprocattr+0x66/0xc0 [ 1251.237529] proc_pid_attr_read+0x158/0x2e0 [ 1251.241884] ? oom_adj_read+0x260/0x260 [ 1251.246420] ? security_file_permission+0x1c2/0x220 [ 1251.251476] ? rw_verify_area+0x118/0x360 [ 1251.255632] do_iter_read+0x4a3/0x650 [ 1251.259486] vfs_readv+0x175/0x1c0 [ 1251.263044] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1251.268432] ? fget_raw+0x20/0x20 [ 1251.271907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1251.277493] ? check_preemption_disabled+0x48/0x280 [ 1251.282534] ? __sb_end_write+0xd9/0x110 [ 1251.286650] do_preadv+0x1cc/0x280 [ 1251.290210] ? do_readv+0x310/0x310 [ 1251.293848] ? __ia32_sys_read+0xb0/0xb0 [ 1251.297450] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1251.297957] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1251.311467] ? trace_hardirqs_off_caller+0x310/0x310 [ 1251.316596] __x64_sys_preadv+0x9a/0xf0 [ 1251.320586] do_syscall_64+0x1b9/0x820 [ 1251.324493] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1251.327920] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1251.329878] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1251.329895] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1251.329915] ? trace_hardirqs_on_caller+0x310/0x310 [ 1251.329934] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1251.329954] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1251.329977] ? trace_hardirqs_off_thunk+0x1a/0x1c 02:54:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1251.330003] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1251.330022] RIP: 0033:0x457669 [ 1251.376176] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1251.395085] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1251.402826] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1251.410158] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1251.417441] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1251.424717] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1251.424728] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 02:54:17 executing program 0: r0 = dup(0xffffffffffffffff) recvfrom$inet(r0, &(0x7f0000000000)=""/17, 0x11, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) capset(&(0x7f0000001000)={0x19980330}, &(0x7f0000001040)) syz_read_part_table(0x0, 0x0, 0x0) 02:54:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1251.453707] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1251.465892] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1251.483817] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1251.579742] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1251.611932] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:17 executing program 5 (fault-call:4 fault-nth:37): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) [ 1251.708596] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) [ 1251.716573] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1251.727380] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1251.769229] FAULT_INJECTION: forcing a failure. [ 1251.769229] name failslab, interval 1, probability 0, space 0, times 0 [ 1251.788958] CPU: 1 PID: 6317 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1251.796278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1251.796290] Call Trace: [ 1251.796330] dump_stack+0x244/0x39d [ 1251.796354] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1251.817115] should_fail.cold.4+0xa/0x17 [ 1251.821195] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1251.821215] ? lock_is_held_type+0x210/0x210 [ 1251.821240] ? mark_held_locks+0x130/0x130 [ 1251.830733] ? zap_class+0x640/0x640 [ 1251.830754] ? __lock_acquire+0x62f/0x4c20 [ 1251.830782] ? is_bpf_text_address+0xac/0x170 [ 1251.830799] ? lock_downgrade+0x900/0x900 [ 1251.830816] ? check_preemption_disabled+0x48/0x280 [ 1251.830834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1251.830850] ? check_preemption_disabled+0x48/0x280 [ 1251.830872] ? debug_smp_processor_id+0x1c/0x20 [ 1251.830886] ? perf_trace_lock+0x14d/0x7a0 [ 1251.830910] ? lock_is_held_type+0x210/0x210 [ 1251.830928] ? check_preemption_disabled+0x48/0x280 [ 1251.830963] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1251.830994] ? kasan_check_read+0x11/0x20 [ 1251.831011] ? zap_class+0x640/0x640 [ 1251.831052] __should_failslab+0x124/0x180 [ 1251.842283] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) [ 1251.843213] should_failslab+0x9/0x14 [ 1251.843230] __kmalloc+0x70/0x760 [ 1251.843256] ? context_struct_to_string+0x401/0x900 [ 1251.843302] context_struct_to_string+0x401/0x900 [ 1251.862460] ? get_permissions_callback+0xb0/0xb0 [ 1251.862479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1251.862495] ? sidtab_search_core+0x21f/0x3b0 [ 1251.862524] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1251.872223] security_sid_to_context+0x35/0x40 [ 1251.872246] selinux_getprocattr+0x3cb/0x8b0 [ 1251.872266] ? selinux_socket_post_create+0x990/0x990 [ 1251.872291] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1251.967303] ? kasan_check_read+0x11/0x20 [ 1251.971475] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1251.976776] ? find_vpid+0xf0/0xf0 [ 1251.980342] security_getprocattr+0x66/0xc0 [ 1251.980367] proc_pid_attr_read+0x158/0x2e0 [ 1251.980389] ? oom_adj_read+0x260/0x260 [ 1251.980405] ? security_file_permission+0x1c2/0x220 [ 1251.980442] ? rw_verify_area+0x118/0x360 [ 1251.980461] do_iter_read+0x4a3/0x650 [ 1252.006044] vfs_readv+0x175/0x1c0 [ 1252.009616] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1252.015012] ? fget_raw+0x20/0x20 [ 1252.018489] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1252.024046] ? check_preemption_disabled+0x48/0x280 [ 1252.029055] ? __sb_end_write+0xd9/0x110 [ 1252.033114] do_preadv+0x1cc/0x280 [ 1252.036644] ? do_readv+0x310/0x310 [ 1252.040273] ? __ia32_sys_read+0xb0/0xb0 [ 1252.044361] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1252.049754] ? trace_hardirqs_off_caller+0x310/0x310 [ 1252.054901] __x64_sys_preadv+0x9a/0xf0 [ 1252.058872] do_syscall_64+0x1b9/0x820 [ 1252.062767] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1252.068129] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1252.073059] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1252.077903] ? trace_hardirqs_on_caller+0x310/0x310 [ 1252.082911] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1252.087917] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1252.092931] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1252.097778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1252.102981] RIP: 0033:0x457669 [ 1252.106174] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1252.125174] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1252.132871] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1252.140136] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1252.147420] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1252.154674] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1252.161931] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 02:54:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="49a8"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:20 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000000)="5d8c1f590624e5c53c776cb480d47ee36145d1ce55e67267d8bb33c3db14d967a9bd898dff95ca858d337cc41a1309e260161fefa594bee4f4e6543f6a32818731c97adea8336c94f96e9151fb94b1768a5203e31f4b752b5b492af9157ece917dc013013b1df2fbc88a5106c2930d59d7d4630420ef44dde7f499f10b3c5541b1a4182a785b50edf9c808f0c04f7d69c874d857ddb920ec8ed35668378f31b14e", 0xa1, 0x80f}, {&(0x7f0000000140)="3c0657616831a342dfda2ec968f14e2e515c263eb74d970ca6b4ff20fa396fd36eebd92a12d461715663eadd003a0910688e3ec03732042c5643d85a2608e0debf4e228ecd8a89424a7048fa6b003e4fe592e79d373cf224a5a2b0076e2a2e856207ed92eba020bfb655411d6409fed721a4865f9971898fd2b957481d98d98a46c54b86570e4231a149f2846fa66e38c076b64fbd38753565ec6c749baa71b69f3e3bdbb41f32f93d9d5140df3d0386ff9eda69e4707697dd7524f0bbafd4ae04ce8f711197ca438cb9a75e81", 0xcd, 0x80000000}]) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000003c0)={0x0, 0x7f, 0x0, {0x2, @win={{}, 0x0, 0x7ff, 0x0, 0x0, 0x0}}}) 02:54:20 executing program 5 (fault-call:4 fault-nth:38): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) [ 1254.662955] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1254.668154] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1254.672522] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1254.685384] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1254.732075] FAULT_INJECTION: forcing a failure. [ 1254.732075] name failslab, interval 1, probability 0, space 0, times 0 [ 1254.743570] CPU: 0 PID: 6328 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1254.750868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1254.760265] Call Trace: [ 1254.762902] dump_stack+0x244/0x39d [ 1254.766570] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1254.771813] ? memset+0x31/0x40 [ 1254.775152] should_fail.cold.4+0xa/0x17 [ 1254.779283] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1254.784422] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1254.789599] ? lock_is_held_type+0x210/0x210 [ 1254.789620] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1254.789647] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1254.789680] ? perf_tp_event+0xc20/0xc20 [ 1254.799018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1254.799046] ? check_preemption_disabled+0x48/0x280 [ 1254.799071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1254.799094] ? check_preemption_disabled+0x48/0x280 [ 1254.816620] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1254.818891] ? memset+0x31/0x40 [ 1254.818928] ? perf_trace_lock+0x4a7/0x7a0 [ 1254.818958] ? __lock_is_held+0xb5/0x140 [ 1254.846643] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1254.849262] ? lock_is_held_type+0x210/0x210 [ 1254.849288] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1254.849313] ? rcu_preempt_deferred_qs_irqrestore+0x8a5/0x1000 [ 1254.849337] ? kasan_check_read+0x11/0x20 [ 1254.849360] ? zap_class+0x640/0x640 [ 1254.849391] __should_failslab+0x124/0x180 [ 1254.885147] should_failslab+0x9/0x14 [ 1254.888996] __kmalloc+0x70/0x760 [ 1254.889030] ? context_struct_to_string+0x401/0x900 [ 1254.889075] context_struct_to_string+0x401/0x900 [ 1254.897559] ? get_permissions_callback+0xb0/0xb0 [ 1254.907228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1254.912812] ? sidtab_search_core+0x21f/0x3b0 [ 1254.917361] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1254.923290] security_sid_to_context+0x35/0x40 [ 1254.927913] selinux_getprocattr+0x3cb/0x8b0 [ 1254.928255] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1254.932396] ? selinux_socket_post_create+0x990/0x990 [ 1254.932419] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1254.932439] ? kasan_check_read+0x11/0x20 [ 1254.932459] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1254.932484] ? find_vpid+0xf0/0xf0 [ 1254.932531] security_getprocattr+0x66/0xc0 [ 1254.968145] proc_pid_attr_read+0x158/0x2e0 [ 1254.972584] ? oom_adj_read+0x260/0x260 [ 1254.976578] ? security_file_permission+0x1c2/0x220 [ 1254.981628] ? rw_verify_area+0x118/0x360 [ 1254.985829] do_iter_read+0x4a3/0x650 [ 1254.989686] vfs_readv+0x175/0x1c0 [ 1254.993282] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1254.993346] ? fget_raw+0x20/0x20 [ 1254.993380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1254.993404] ? check_preemption_disabled+0x48/0x280 [ 1255.007823] ? __sb_end_write+0xd9/0x110 [ 1255.007866] do_preadv+0x1cc/0x280 [ 1255.007899] ? do_readv+0x310/0x310 [ 1255.024260] ? __ia32_sys_read+0xb0/0xb0 [ 1255.028355] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 02:54:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1255.033755] ? trace_hardirqs_off_caller+0x310/0x310 [ 1255.038920] __x64_sys_preadv+0x9a/0xf0 [ 1255.042935] do_syscall_64+0x1b9/0x820 [ 1255.046840] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1255.046867] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1255.046887] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1255.046912] ? trace_hardirqs_on_caller+0x310/0x310 [ 1255.046935] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1255.046958] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1255.061867] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1255.062157] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1255.062196] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1255.062221] RIP: 0033:0x457669 [ 1255.077334] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1255.077347] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1255.077367] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1255.077381] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1255.077394] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1255.077407] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1255.077419] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1255.110259] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1255.111421] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1255.136604] kauditd_printk_skb: 2 callbacks suppressed [ 1255.136619] audit: type=1400 audit(1545188060.763:4132): avc: denied { map } for pid=6352 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1255.144592] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) socket$l2tp(0x18, 0x1, 0x1) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() r2 = dup3(r0, r0, 0x80000) ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0x8) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000080)=0xe09b287) 02:54:20 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000000)="5d8c1f590624e5c53c776cb480d47ee36145d1ce55e67267d8bb33c3db14d967a9bd898dff95ca858d337cc41a1309e260161fefa594bee4f4e6543f6a32818731c97adea8336c94f96e9151fb94b1768a5203e31f4b752b5b492af9157ece917dc013013b1df2fbc88a5106c2930d59d7d4630420ef44dde7f499f10b3c5541b1a4182a785b50edf9c808f0c04f7d69c874d857ddb920ec8ed35668378f31b14e", 0xa1, 0x80f}, {&(0x7f0000000140)="3c0657616831a342dfda2ec968f14e2e515c263eb74d970ca6b4ff20fa396fd36eebd92a12d461715663eadd003a0910688e3ec03732042c5643d85a2608e0debf4e228ecd8a89424a7048fa6b003e4fe592e79d373cf224a5a2b0076e2a2e856207ed92eba020bfb655411d6409fed721a4865f9971898fd2b957481d98d98a46c54b86570e4231a149f2846fa66e38c076b64fbd38753565ec6c749baa71b69f3e3bdbb41f32f93d9d5140df3d0386ff9eda69e4707697dd7524f0bbafd4ae04ce8f711197ca438cb9a75e81", 0xcd, 0x80000000}]) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000003c0)={0x0, 0x7f, 0x0, {0x2, @win={{}, 0x0, 0x7ff, 0x0, 0x0, 0x0}}}) 02:54:20 executing program 5 (fault-call:4 fault-nth:39): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1255.306936] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1255.334909] audit: type=1400 audit(1545188060.953:4133): avc: denied { map } for pid=6362 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:54:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00F\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:21 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x100000005, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = getpgrp(0xffffffffffffffff) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000000)=r1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, &(0x7f00000000c0)) 02:54:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1255.438979] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1255.440172] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1255.541869] FAULT_INJECTION: forcing a failure. [ 1255.541869] name failslab, interval 1, probability 0, space 0, times 0 [ 1255.545115] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1255.553379] CPU: 1 PID: 6380 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1255.568712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1255.578105] Call Trace: [ 1255.580822] dump_stack+0x244/0x39d [ 1255.584476] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1255.589703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1255.595269] ? check_preemption_disabled+0x48/0x280 [ 1255.600358] should_fail.cold.4+0xa/0x17 [ 1255.604441] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1255.609584] ? lock_is_held_type+0x210/0x210 [ 1255.614037] ? mark_held_locks+0x130/0x130 [ 1255.618292] ? zap_class+0x640/0x640 [ 1255.622026] ? __lock_acquire+0x62f/0x4c20 [ 1255.626309] ? is_bpf_text_address+0xac/0x170 [ 1255.630857] ? lock_downgrade+0x900/0x900 [ 1255.635025] ? check_preemption_disabled+0x48/0x280 [ 1255.640122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1255.645677] ? check_preemption_disabled+0x48/0x280 [ 1255.650713] ? debug_smp_processor_id+0x1c/0x20 [ 1255.655411] ? perf_trace_lock+0x14d/0x7a0 [ 1255.659686] ? lock_is_held_type+0x210/0x210 [ 1255.664113] ? check_preemption_disabled+0x48/0x280 [ 1255.669151] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1255.669508] audit: type=1400 audit(1545188061.293:4134): avc: denied { map } for pid=6383 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1255.674097] ? kasan_check_read+0x11/0x20 02:54:21 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x0, 0x0, 0x0) set_mempolicy(0x1, &(0x7f0000000040)=0x7fffffff, 0x3) 02:54:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1255.674117] ? zap_class+0x640/0x640 [ 1255.674140] __should_failslab+0x124/0x180 [ 1255.674181] should_failslab+0x9/0x14 [ 1255.712105] __kmalloc+0x70/0x760 [ 1255.715618] ? context_struct_to_string+0x401/0x900 [ 1255.716737] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1255.720687] context_struct_to_string+0x401/0x900 [ 1255.734012] ? get_permissions_callback+0xb0/0xb0 [ 1255.738868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1255.744438] ? sidtab_search_core+0x21f/0x3b0 [ 1255.744467] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1255.744492] security_sid_to_context+0x35/0x40 [ 1255.744514] selinux_getprocattr+0x3cb/0x8b0 [ 1255.744534] ? selinux_socket_post_create+0x990/0x990 [ 1255.754641] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1255.769150] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1255.782412] ? kasan_check_read+0x11/0x20 [ 1255.782429] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1255.782449] ? find_vpid+0xf0/0xf0 [ 1255.782477] security_getprocattr+0x66/0xc0 02:54:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1255.782502] proc_pid_attr_read+0x158/0x2e0 [ 1255.782523] ? oom_adj_read+0x260/0x260 [ 1255.782543] ? security_file_permission+0x1c2/0x220 [ 1255.813179] ? rw_verify_area+0x118/0x360 [ 1255.817345] do_iter_read+0x4a3/0x650 [ 1255.821190] vfs_readv+0x175/0x1c0 [ 1255.824785] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1255.830210] ? fget_raw+0x20/0x20 [ 1255.833692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1255.839251] ? check_preemption_disabled+0x48/0x280 [ 1255.844306] ? __sb_end_write+0xd9/0x110 [ 1255.848398] do_preadv+0x1cc/0x280 [ 1255.851959] ? do_readv+0x310/0x310 [ 1255.855600] ? __ia32_sys_read+0xb0/0xb0 [ 1255.859687] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1255.865085] ? trace_hardirqs_off_caller+0x310/0x310 [ 1255.870235] __x64_sys_preadv+0x9a/0xf0 [ 1255.874244] do_syscall_64+0x1b9/0x820 [ 1255.878147] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1255.883522] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1255.888490] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1255.893340] ? trace_hardirqs_on_caller+0x310/0x310 [ 1255.898380] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1255.903402] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1255.908427] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1255.913393] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1255.918588] RIP: 0033:0x457669 [ 1255.921818] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1255.940718] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1255.948449] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1255.955752] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1255.963031] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1255.970323] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1255.977625] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 02:54:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1256.029503] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1256.030349] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1256.037864] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1256.099212] audit: type=1400 audit(1545188061.723:4135): avc: denied { map } for pid=6405 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1256.137428] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x19) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:21 executing program 5 (fault-call:4 fault-nth:40): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1256.224138] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1256.256386] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = dup(r0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000500)=0x7) syz_open_pts(r0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000380)=""/140) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0xffffffffffffffdd) syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') socket$inet(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x1e9, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200)={0x0, r3+30000000}, &(0x7f0000000300)={&(0x7f0000000080), 0x8}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, 0x0) [ 1256.260808] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1256.311146] FAULT_INJECTION: forcing a failure. [ 1256.311146] name failslab, interval 1, probability 0, space 0, times 0 [ 1256.322589] CPU: 0 PID: 6424 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1256.329141] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1256.329890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1256.329900] Call Trace: [ 1256.329927] dump_stack+0x244/0x39d [ 1256.329957] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1256.358890] ? memset+0x31/0x40 [ 1256.362215] should_fail.cold.4+0xa/0x17 [ 1256.366358] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1256.371495] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1256.376626] ? lock_is_held_type+0x210/0x210 02:54:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1256.381074] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1256.386225] ? perf_tp_event+0xc20/0xc20 [ 1256.386614] audit: type=1400 audit(1545188061.953:4136): avc: denied { create } for pid=6429 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1256.390309] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1256.390334] ? check_preemption_disabled+0x48/0x280 [ 1256.390352] ? __lock_acquire+0x62f/0x4c20 [ 1256.390375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1256.419910] ? check_preemption_disabled+0x48/0x280 [ 1256.429162] ? memset+0x31/0x40 [ 1256.429197] ? perf_trace_lock+0x4a7/0x7a0 [ 1256.447285] ? lock_is_held_type+0x210/0x210 [ 1256.451729] ? check_preemption_disabled+0x48/0x280 [ 1256.456819] ? kasan_check_read+0x11/0x20 [ 1256.461006] ? zap_class+0x640/0x640 [ 1256.464771] __should_failslab+0x124/0x180 [ 1256.469049] should_failslab+0x9/0x14 [ 1256.472874] __kmalloc+0x70/0x760 [ 1256.475537] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1256.476361] ? context_struct_to_string+0x401/0x900 [ 1256.476403] context_struct_to_string+0x401/0x900 [ 1256.486911] audit: type=1400 audit(1545188061.953:4137): avc: denied { write } for pid=6429 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1256.489582] ? get_permissions_callback+0xb0/0xb0 [ 1256.489605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 02:54:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1256.489624] ? sidtab_search_core+0x21f/0x3b0 [ 1256.489663] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1256.498345] audit: type=1400 audit(1545188061.953:4138): avc: denied { read } for pid=6429 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1256.518353] security_sid_to_context+0x35/0x40 [ 1256.518383] selinux_getprocattr+0x3cb/0x8b0 [ 1256.518409] ? selinux_socket_post_create+0x990/0x990 [ 1256.528965] audit: type=1400 audit(1545188061.953:4139): avc: denied { map } for pid=6434 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1256.533310] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1256.533330] ? kasan_check_read+0x11/0x20 [ 1256.533350] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1256.533376] ? find_vpid+0xf0/0xf0 [ 1256.572073] security_getprocattr+0x66/0xc0 [ 1256.572110] proc_pid_attr_read+0x158/0x2e0 [ 1256.599272] ? oom_adj_read+0x260/0x260 [ 1256.599289] ? security_file_permission+0x1c2/0x220 [ 1256.599323] ? rw_verify_area+0x118/0x360 [ 1256.639126] do_iter_read+0x4a3/0x650 [ 1256.643009] vfs_readv+0x175/0x1c0 [ 1256.645532] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1256.646585] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1256.646637] ? fget_raw+0x20/0x20 [ 1256.663669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1256.669243] ? check_preemption_disabled+0x48/0x280 [ 1256.674356] ? __sb_end_write+0xd9/0x110 [ 1256.678463] do_preadv+0x1cc/0x280 02:54:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1256.682037] ? do_readv+0x310/0x310 [ 1256.685691] ? __ia32_sys_read+0xb0/0xb0 [ 1256.689803] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1256.695215] ? trace_hardirqs_off_caller+0x310/0x310 [ 1256.700403] __x64_sys_preadv+0x9a/0xf0 [ 1256.704414] do_syscall_64+0x1b9/0x820 [ 1256.708387] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1256.708414] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1256.708433] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1256.708458] ? trace_hardirqs_on_caller+0x310/0x310 [ 1256.708480] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1256.718799] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1256.718833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1256.743657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1256.748892] RIP: 0033:0x457669 [ 1256.752145] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1256.758935] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1256.771063] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1256.771083] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1256.771097] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1256.771109] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1256.771122] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1256.771134] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1256.854353] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1256.856211] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1256.875677] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1256.917334] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1256.967783] audit: type=1400 audit(1545188062.583:4140): avc: denied { map } for pid=6458 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1256.980949] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1256.985499] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1257.172944] audit: type=1400 audit(1545188062.793:4141): avc: denied { create } for pid=6429 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 02:54:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000,00000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:25 executing program 5 (fault-call:4 fault-nth:41): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:25 executing program 0: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000000c0)={'\x00', &(0x7f0000000140)=@ethtool_flash={0x33, 0xb65b, "c93adf0919bc47ed2233066520cd1d1b757b239d941321160461ab882f546a57d45dad42e7a93bc104dd39413e8b006282177c57aab706d41dbdca2a4245ecc4e78bc876e2988a19a8f61ace20574321832cebb4baa701b8d29dc18c8092c640e07ba97464693df931b72f23732e492302229b56f6d46a74275e2aed17e35926"}}) r1 = memfd_create(&(0x7f0000000000)='bridge0\x00\x00\x00\x00\x80\x00', 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 1259.956758] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1259.958369] FAULT_INJECTION: forcing a failure. [ 1259.958369] name failslab, interval 1, probability 0, space 0, times 0 [ 1259.976266] CPU: 0 PID: 6471 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1259.983559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1259.992931] Call Trace: [ 1259.995542] dump_stack+0x244/0x39d [ 1259.999202] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1260.004416] ? memset+0x31/0x40 [ 1260.007745] should_fail.cold.4+0xa/0x17 [ 1260.011855] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1260.016988] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1260.022124] ? mark_held_locks+0xc7/0x130 [ 1260.022153] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1260.031084] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1260.035687] ? retint_kernel+0x2d/0x2d [ 1260.035711] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1260.035736] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1260.035760] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1260.035802] ? memset+0x31/0x40 [ 1260.035840] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1260.062900] ? retint_kernel+0x2d/0x2d [ 1260.066843] ? find_next_bit+0xf0/0x130 [ 1260.070862] __should_failslab+0x124/0x180 [ 1260.075132] should_failslab+0x9/0x14 [ 1260.078960] __kmalloc+0x70/0x760 [ 1260.082466] ? context_struct_to_string+0x401/0x900 [ 1260.084781] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1260.087611] context_struct_to_string+0x401/0x900 [ 1260.087647] ? get_permissions_callback+0xb0/0xb0 [ 1260.087675] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1260.087695] ? sidtab_search_core+0x21f/0x3b0 [ 1260.087731] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1260.122004] security_sid_to_context+0x35/0x40 [ 1260.126622] selinux_getprocattr+0x3cb/0x8b0 [ 1260.131064] ? selinux_socket_post_create+0x990/0x990 [ 1260.136280] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1260.141234] ? kasan_check_read+0x11/0x20 [ 1260.145409] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1260.150710] ? find_vpid+0xf0/0xf0 [ 1260.150753] security_getprocattr+0x66/0xc0 [ 1260.150817] proc_pid_attr_read+0x158/0x2e0 [ 1260.150846] ? oom_adj_read+0x260/0x260 [ 1260.158704] ? security_file_permission+0x1c2/0x220 [ 1260.158735] ? rw_verify_area+0x118/0x360 [ 1260.158776] do_iter_read+0x4a3/0x650 [ 1260.158833] vfs_readv+0x175/0x1c0 [ 1260.158864] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1260.158909] ? fget_raw+0x20/0x20 [ 1260.192530] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1260.198098] ? check_preemption_disabled+0x48/0x280 [ 1260.203160] ? __sb_end_write+0xd9/0x110 [ 1260.207267] do_preadv+0x1cc/0x280 [ 1260.210846] ? do_readv+0x310/0x310 [ 1260.214503] ? __ia32_sys_read+0xb0/0xb0 [ 1260.218596] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1260.223276] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1260.223987] ? trace_hardirqs_off_caller+0x310/0x310 [ 1260.224023] __x64_sys_preadv+0x9a/0xf0 [ 1260.224053] do_syscall_64+0x1b9/0x820 [ 1260.224071] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1260.224096] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1260.224119] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1260.260486] ? trace_hardirqs_on_caller+0x310/0x310 [ 1260.265540] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1260.270590] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1260.275646] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1260.280525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1260.280543] RIP: 0033:0x457669 [ 1260.280563] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:54:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1260.280579] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1260.307901] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1260.307915] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1260.307927] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1260.307940] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1260.307953] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1260.310088] kauditd_printk_skb: 2 callbacks suppressed 02:54:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1260.310104] audit: type=1400 audit(1545188065.603:4144): avc: denied { map } for pid=6484 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1260.316654] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1260.341283] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1260.355296] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:26 executing program 5 (fault-call:4 fault-nth:42): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1260.496716] audit: type=1400 audit(1545188066.113:4145): avc: denied { map } for pid=6500 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:54:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000480)={0x8, 0x0, [{0xd, 0xc84, 0x1, 0x6, 0x800, 0x100000000, 0x2}, {0x269a60c644b448e2, 0x1, 0x0, 0x3, 0x80000001, 0x10001, 0xe2a2}, {0x40000001, 0x9, 0x0, 0x9, 0x4, 0x9, 0xffffffffffffffc1}, {0x8000000f, 0x0, 0x5, 0x80000001, 0xfffffffffffeffff, 0x1000, 0x6}, {0x40000002, 0x800000000, 0x1, 0x9, 0x10000000, 0x101, 0x44}, {0xc0000001, 0x6, 0x2, 0x20, 0x7fff, 0x8, 0x51}, {0x0, 0x9, 0x2, 0x782, 0x80000000, 0x6, 0x9}, {0xc000000a, 0x37, 0x6, 0x3, 0x7, 0x20d7b9e, 0x2}]}) tkill(r1, 0x17) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:26 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x807, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000240)={0xb, @sliced={0x7, [0x800, 0xe2, 0x80000001, 0xfffffffffffffffb, 0x1, 0xfffffffffffffffe, 0x9, 0x8, 0x1a7, 0x8001, 0x2, 0x7, 0x61, 0x401, 0xfffffffffffffffb, 0x0, 0x20, 0x7, 0x100000000, 0x7f, 0x1f, 0x40, 0x1ff, 0x9, 0x4, 0x7fffffff, 0x33, 0x8, 0x100000000, 0x1, 0x0, 0xfffffffffffffffb, 0xfffffffffffffff7, 0x3, 0x200, 0x4, 0x80000001, 0x100000000, 0x6, 0x9, 0x5, 0x2, 0x5, 0x0, 0x10000, 0x6, 0xe850], 0x7}}) [ 1260.543642] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1260.549582] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1260.571049] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1260.640645] FAULT_INJECTION: forcing a failure. [ 1260.640645] name failslab, interval 1, probability 0, space 0, times 0 [ 1260.652068] CPU: 1 PID: 6508 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1260.659355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1260.668718] Call Trace: [ 1260.671323] dump_stack+0x244/0x39d [ 1260.674964] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1260.680165] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1260.685719] ? check_preemption_disabled+0x48/0x280 02:54:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="c2647d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)=0x0) r2 = gettid() timer_settime(r1, 0x0, &(0x7f00000016c0)={{0x0, 0x989680}}, 0x0) tkill(r2, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:26 executing program 0: socket(0x200000000000011, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000000)={0x2, 0x0, [0x0, 0x0]}) r2 = syz_open_pts(r0, 0x5) r3 = dup3(r2, r0, 0x0) write$UHID_INPUT(r3, &(0x7f0000001640)={0x8, "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", 0x1000}, 0x1006) [ 1260.690759] should_fail.cold.4+0xa/0x17 [ 1260.694852] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1260.699973] ? lock_is_held_type+0x210/0x210 [ 1260.704411] ? mark_held_locks+0x130/0x130 [ 1260.708668] ? zap_class+0x640/0x640 [ 1260.712407] ? __lock_acquire+0x62f/0x4c20 [ 1260.716663] ? is_bpf_text_address+0xac/0x170 [ 1260.717595] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1260.721174] ? lock_downgrade+0x900/0x900 [ 1260.721193] ? check_preemption_disabled+0x48/0x280 [ 1260.721212] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1260.721229] ? check_preemption_disabled+0x48/0x280 [ 1260.721252] ? debug_smp_processor_id+0x1c/0x20 [ 1260.721269] ? perf_trace_lock+0x14d/0x7a0 [ 1260.721300] ? lock_is_held_type+0x210/0x210 [ 1260.762429] ? check_preemption_disabled+0x48/0x280 [ 1260.767467] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1260.772409] ? kasan_check_read+0x11/0x20 [ 1260.776581] ? zap_class+0x640/0x640 [ 1260.780328] __should_failslab+0x124/0x180 [ 1260.784589] should_failslab+0x9/0x14 [ 1260.788403] __kmalloc+0x70/0x760 [ 1260.791889] ? context_struct_to_string+0x401/0x900 [ 1260.796934] context_struct_to_string+0x401/0x900 [ 1260.801811] ? get_permissions_callback+0xb0/0xb0 [ 1260.806665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1260.812215] ? sidtab_search_core+0x21f/0x3b0 [ 1260.812244] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1260.812270] security_sid_to_context+0x35/0x40 [ 1260.812300] selinux_getprocattr+0x3cb/0x8b0 [ 1260.812321] ? selinux_socket_post_create+0x990/0x990 02:54:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1260.836929] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1260.841871] ? kasan_check_read+0x11/0x20 [ 1260.846040] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1260.851342] ? find_vpid+0xf0/0xf0 [ 1260.854912] security_getprocattr+0x66/0xc0 [ 1260.859261] proc_pid_attr_read+0x158/0x2e0 [ 1260.863615] ? oom_adj_read+0x260/0x260 [ 1260.867602] ? security_file_permission+0x1c2/0x220 [ 1260.872645] ? rw_verify_area+0x118/0x360 [ 1260.876832] do_iter_read+0x4a3/0x650 [ 1260.880662] vfs_readv+0x175/0x1c0 [ 1260.880684] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1260.880703] ? trace_hardirqs_on+0x310/0x310 [ 1260.880729] ? fget_raw+0x20/0x20 [ 1260.897476] ? retint_kernel+0x2d/0x2d [ 1260.898434] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1260.901390] ? fput+0x1f/0x1a0 [ 1260.901420] do_preadv+0x1cc/0x280 [ 1260.901440] ? do_readv+0x310/0x310 [ 1260.901461] ? __ia32_sys_read+0xb0/0xb0 [ 1260.924023] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1260.929410] ? trace_hardirqs_off_caller+0x310/0x310 [ 1260.934542] __x64_sys_preadv+0x9a/0xf0 [ 1260.938575] do_syscall_64+0x1b9/0x820 [ 1260.942486] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1260.945475] audit: type=1400 audit(1545188066.563:4146): avc: denied { map } for pid=6526 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1260.947872] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1260.947890] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1260.947911] ? trace_hardirqs_on_caller+0x310/0x310 [ 1260.947929] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1260.947950] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1260.975333] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1260.982221] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1260.986956] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1260.986984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1260.986998] RIP: 0033:0x457669 02:54:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1260.987015] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1260.987024] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1261.053528] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1261.060815] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1261.068101] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1261.075452] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1261.082735] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1261.141153] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:26 executing program 5 (fault-call:4 fault-nth:43): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:26 executing program 0: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) r3 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000100)={0x2, 0x0, 0x9126f12, 0x4, 0x0, 0x1f}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:54:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1261.186295] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1261.187681] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1261.189283] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1261.303340] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1261.304860] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1261.342234] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1261.372211] FAULT_INJECTION: forcing a failure. [ 1261.372211] name failslab, interval 1, probability 0, space 0, times 0 [ 1261.383735] CPU: 0 PID: 6550 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1261.391053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1261.400426] Call Trace: [ 1261.403040] dump_stack+0x244/0x39d [ 1261.406702] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1261.411917] ? memset+0x31/0x40 [ 1261.415249] should_fail.cold.4+0xa/0x17 [ 1261.419349] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1261.424487] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1261.429618] ? lock_is_held_type+0x210/0x210 [ 1261.434064] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1261.439204] ? perf_tp_event+0xc20/0xc20 [ 1261.439230] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1261.448838] ? check_preemption_disabled+0x48/0x280 [ 1261.448858] ? __lock_acquire+0x62f/0x4c20 [ 1261.448881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1261.448903] ? check_preemption_disabled+0x48/0x280 [ 1261.468713] ? memset+0x31/0x40 [ 1261.472036] ? perf_trace_lock+0x4a7/0x7a0 [ 1261.476317] ? lock_is_held_type+0x210/0x210 [ 1261.480775] ? check_preemption_disabled+0x48/0x280 [ 1261.485837] ? kasan_check_read+0x11/0x20 [ 1261.490014] ? zap_class+0x640/0x640 [ 1261.493775] __should_failslab+0x124/0x180 [ 1261.498047] should_failslab+0x9/0x14 [ 1261.501894] __kmalloc+0x70/0x760 [ 1261.505390] ? context_struct_to_string+0x401/0x900 [ 1261.510463] context_struct_to_string+0x401/0x900 [ 1261.515377] ? get_permissions_callback+0xb0/0xb0 [ 1261.520253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1261.525845] ? sidtab_search_core+0x21f/0x3b0 [ 1261.530389] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1261.536333] security_sid_to_context+0x35/0x40 [ 1261.540952] selinux_getprocattr+0x3cb/0x8b0 [ 1261.545396] ? selinux_socket_post_create+0x990/0x990 [ 1261.550612] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1261.555582] ? kasan_check_read+0x11/0x20 [ 1261.559759] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1261.565080] ? find_vpid+0xf0/0xf0 [ 1261.568669] security_getprocattr+0x66/0xc0 [ 1261.573030] proc_pid_attr_read+0x158/0x2e0 [ 1261.577390] ? oom_adj_read+0x260/0x260 [ 1261.581388] ? security_file_permission+0x1c2/0x220 [ 1261.586436] ? rw_verify_area+0x118/0x360 [ 1261.590620] do_iter_read+0x4a3/0x650 [ 1261.594487] vfs_readv+0x175/0x1c0 [ 1261.598068] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1261.603488] ? fget_raw+0x20/0x20 [ 1261.606980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1261.612548] ? check_preemption_disabled+0x48/0x280 [ 1261.617607] ? __sb_end_write+0xd9/0x110 [ 1261.621714] do_preadv+0x1cc/0x280 [ 1261.625285] ? do_readv+0x310/0x310 [ 1261.628944] ? __ia32_sys_read+0xb0/0xb0 [ 1261.633033] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1261.638428] ? trace_hardirqs_off_caller+0x310/0x310 [ 1261.643573] __x64_sys_preadv+0x9a/0xf0 [ 1261.647583] do_syscall_64+0x1b9/0x820 [ 1261.651511] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1261.656934] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1261.661886] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1261.666785] ? trace_hardirqs_on_caller+0x310/0x310 [ 1261.671842] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1261.676904] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1261.681964] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1261.686876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1261.692088] RIP: 0033:0x457669 [ 1261.695314] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1261.714238] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1261.721970] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1261.729261] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1261.736578] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1261.743867] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 02:54:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1261.751155] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1261.777481] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x5, 0x28002) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000340)={{0xa, 0x4e23, 0x10001, @mcast2, 0xff}, {0xa, 0x4e21, 0x7, @mcast2, 0x1ff}, 0x3ff, [0x8, 0xb5, 0x0, 0x8, 0x10001, 0x7, 0x7, 0x400]}, 0x5c) r2 = gettid() clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{r3, r4+10000000}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd0', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:29 executing program 5 (fault-call:4 fault-nth:44): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:29 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xa) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") syz_emit_ethernet(0x3a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008004600102c00000000006c9078ac141400ac1414bb860300000e00907800000000000000000000000000000000d731f8ec8c55e7"], &(0x7f0000000100)={0x0, 0x3, [0x0, 0x57]}) [ 1263.806233] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1263.812587] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1263.821626] audit: type=1400 audit(1545188069.433:4147): avc: denied { map } for pid=6571 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1263.822074] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1263.871633] FAULT_INJECTION: forcing a failure. [ 1263.871633] name failslab, interval 1, probability 0, space 0, times 0 [ 1263.876543] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1263.883031] CPU: 1 PID: 6577 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1263.898354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1263.898361] Call Trace: [ 1263.898384] dump_stack+0x244/0x39d [ 1263.898406] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1263.898432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1263.910372] ? check_preemption_disabled+0x48/0x280 [ 1263.910402] should_fail.cold.4+0xa/0x17 [ 1263.919231] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1263.938933] ? lock_is_held_type+0x210/0x210 [ 1263.943371] ? mark_held_locks+0x130/0x130 [ 1263.945153] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1263.947633] ? zap_class+0x640/0x640 [ 1263.947655] ? __lock_acquire+0x62f/0x4c20 [ 1263.947675] ? is_bpf_text_address+0xac/0x170 [ 1263.947694] ? lock_downgrade+0x900/0x900 02:54:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1263.947711] ? check_preemption_disabled+0x48/0x280 [ 1263.947732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1263.983052] ? check_preemption_disabled+0x48/0x280 [ 1263.988107] ? debug_smp_processor_id+0x1c/0x20 [ 1263.992814] ? perf_trace_lock+0x14d/0x7a0 [ 1263.997083] ? lock_is_held_type+0x210/0x210 [ 1264.001505] ? check_preemption_disabled+0x48/0x280 [ 1264.006542] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1264.011502] ? kasan_check_read+0x11/0x20 [ 1264.015666] ? zap_class+0x640/0x640 02:54:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1264.019421] __should_failslab+0x124/0x180 [ 1264.023694] should_failslab+0x9/0x14 [ 1264.027503] __kmalloc+0x70/0x760 [ 1264.027543] ? context_struct_to_string+0x401/0x900 [ 1264.027566] context_struct_to_string+0x401/0x900 [ 1264.041775] ? get_permissions_callback+0xb0/0xb0 [ 1264.041796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1264.041812] ? sidtab_search_core+0x21f/0x3b0 [ 1264.041840] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1264.041865] security_sid_to_context+0x35/0x40 [ 1264.067228] selinux_getprocattr+0x3cb/0x8b0 02:54:29 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x0) read(r0, &(0x7f00000003c0)=""/87, 0x57) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {r2, 0x53, "c97eeb", "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"}}, 0x110) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000), 0x4) [ 1264.071671] ? selinux_socket_post_create+0x990/0x990 [ 1264.076884] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1264.081834] ? kasan_check_read+0x11/0x20 [ 1264.085999] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1264.091300] ? find_vpid+0xf0/0xf0 [ 1264.094865] security_getprocattr+0x66/0xc0 [ 1264.099211] proc_pid_attr_read+0x158/0x2e0 [ 1264.103548] ? oom_adj_read+0x260/0x260 [ 1264.107535] ? security_file_permission+0x1c2/0x220 [ 1264.112574] ? rw_verify_area+0x118/0x360 [ 1264.116912] do_iter_read+0x4a3/0x650 [ 1264.120748] vfs_readv+0x175/0x1c0 [ 1264.120781] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1264.120813] ? fget_raw+0x20/0x20 [ 1264.120843] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1264.138753] ? check_preemption_disabled+0x48/0x280 [ 1264.143831] ? __sb_end_write+0xd9/0x110 [ 1264.147921] do_preadv+0x1cc/0x280 [ 1264.151483] ? do_readv+0x310/0x310 [ 1264.152317] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1264.155122] ? __ia32_sys_read+0xb0/0xb0 [ 1264.155142] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1264.155162] ? trace_hardirqs_off_caller+0x310/0x310 [ 1264.155187] __x64_sys_preadv+0x9a/0xf0 [ 1264.155209] do_syscall_64+0x1b9/0x820 [ 1264.155225] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1264.155248] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1264.196112] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1264.200978] ? trace_hardirqs_on_caller+0x310/0x310 [ 1264.206011] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1264.211050] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1264.216083] ? trace_hardirqs_off_thunk+0x1a/0x1c 02:54:29 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x4000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) clock_gettime(0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}, {0x0, 0x0, 0x800}], 0x2, &(0x7f00000002c0)) connect$l2tp(0xffffffffffffffff, &(0x7f00000003c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x4, 0x0, 0x0, {0xa, 0x4e20, 0x4, @mcast2, 0x6}}}, 0xfffffff7) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) rt_sigtimedwait(&(0x7f0000000580), 0x0, &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) setsockopt$inet6_int(r0, 0x29, 0x38, &(0x7f00000001c0)=0xfffffffffffffffc, 0x4) openat$cuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) wait4(r1, &(0x7f0000000380), 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000004c0)=[@in6={0xa, 0x0, 0x80000000, @remote, 0x6}], 0x1c) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x839, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc0585604, &(0x7f0000000500)={0x0, 0x0, {0x401, 0x0, 0x301f, 0x7, 0x8, 0x0, 0x3, 0x7}}) [ 1264.220950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1264.226151] RIP: 0033:0x457669 [ 1264.229360] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1264.248747] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1264.256476] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1264.263751] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 02:54:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1264.271037] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1264.278320] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1264.285609] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 02:54:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1264.302643] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1264.322201] audit: type=1400 audit(1545188069.943:4148): avc: denied { map } for pid=6598 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1264.413258] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1264.429683] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:30 executing program 5 (fault-call:4 fault-nth:45): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x401, 0x2000) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x2000, 0x10) linkat(r2, &(0x7f0000000080)='./file0\x00', r3, &(0x7f0000000200)='./file0\x00', 0x400) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000280)={0x0, 0x1, 0xb67, 0x382}) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:30 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x4000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) clock_gettime(0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}, {0x0, 0x0, 0x800}], 0x2, &(0x7f00000002c0)) connect$l2tp(0xffffffffffffffff, &(0x7f00000003c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x4, 0x0, 0x0, {0xa, 0x4e20, 0x4, @mcast2, 0x6}}}, 0xfffffff7) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) rt_sigtimedwait(&(0x7f0000000580), 0x0, &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) setsockopt$inet6_int(r0, 0x29, 0x38, &(0x7f00000001c0)=0xfffffffffffffffc, 0x4) openat$cuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) wait4(r1, &(0x7f0000000380), 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000004c0)=[@in6={0xa, 0x0, 0x80000000, @remote, 0x6}], 0x1c) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x839, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc0585604, &(0x7f0000000500)={0x0, 0x0, {0x401, 0x0, 0x301f, 0x7, 0x8, 0x0, 0x3, 0x7}}) [ 1264.759864] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1264.771085] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1264.772746] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1264.781343] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1264.821135] FAULT_INJECTION: forcing a failure. [ 1264.821135] name failslab, interval 1, probability 0, space 0, times 0 [ 1264.832473] CPU: 0 PID: 6623 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1264.839757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1264.839774] Call Trace: [ 1264.839806] dump_stack+0x244/0x39d [ 1264.839836] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1264.839857] ? memset+0x31/0x40 [ 1264.839900] should_fail.cold.4+0xa/0x17 [ 1264.839928] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1264.839948] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1264.839967] ? lock_is_held_type+0x210/0x210 [ 1264.839991] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1264.855566] ? perf_tp_event+0xc20/0xc20 [ 1264.855587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1264.855610] ? check_preemption_disabled+0x48/0x280 [ 1264.855627] ? __lock_acquire+0x62f/0x4c20 [ 1264.855665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1264.855702] ? check_preemption_disabled+0x48/0x280 [ 1264.855725] ? memset+0x31/0x40 [ 1264.868272] ? perf_trace_lock+0x4a7/0x7a0 [ 1264.868311] ? lock_is_held_type+0x210/0x210 [ 1264.868333] ? check_preemption_disabled+0x48/0x280 [ 1264.868363] ? kasan_check_read+0x11/0x20 [ 1264.868386] ? zap_class+0x640/0x640 [ 1264.868415] __should_failslab+0x124/0x180 [ 1264.878673] should_failslab+0x9/0x14 [ 1264.878693] __kmalloc+0x70/0x760 [ 1264.878726] ? context_struct_to_string+0x401/0x900 [ 1264.878761] context_struct_to_string+0x401/0x900 [ 1264.878810] ? get_permissions_callback+0xb0/0xb0 [ 1264.888301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1264.888321] ? sidtab_search_core+0x21f/0x3b0 [ 1264.888362] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1264.888397] security_sid_to_context+0x35/0x40 [ 1264.888426] selinux_getprocattr+0x3cb/0x8b0 [ 1264.888454] ? selinux_socket_post_create+0x990/0x990 [ 1264.888476] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1264.888497] ? kasan_check_read+0x11/0x20 [ 1264.898120] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1264.898146] ? find_vpid+0xf0/0xf0 02:54:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1264.898203] security_getprocattr+0x66/0xc0 [ 1264.898234] proc_pid_attr_read+0x158/0x2e0 [ 1264.907482] ? oom_adj_read+0x260/0x260 [ 1264.907502] ? security_file_permission+0x1c2/0x220 [ 1264.907532] ? rw_verify_area+0x118/0x360 [ 1264.907562] do_iter_read+0x4a3/0x650 [ 1264.907608] vfs_readv+0x175/0x1c0 [ 1264.918173] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1264.918250] ? fget_raw+0x20/0x20 [ 1264.918295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1264.918332] ? check_preemption_disabled+0x48/0x280 [ 1264.918367] ? __sb_end_write+0xd9/0x110 [ 1264.925890] do_preadv+0x1cc/0x280 [ 1264.925934] ? do_readv+0x310/0x310 [ 1264.925952] ? __ia32_sys_read+0xb0/0xb0 [ 1264.925972] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1264.925997] ? trace_hardirqs_off_caller+0x310/0x310 [ 1264.926029] __x64_sys_preadv+0x9a/0xf0 [ 1264.939604] do_syscall_64+0x1b9/0x820 [ 1264.939623] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1264.939648] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1264.939667] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1264.939707] ? trace_hardirqs_on_caller+0x310/0x310 02:54:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1264.939729] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1264.939751] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1264.947711] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1264.947749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1264.947776] RIP: 0033:0x457669 [ 1264.947803] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1264.947818] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1264.979856] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1264.979870] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1264.979882] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1264.979895] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1264.979907] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 02:54:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1265.040727] audit: type=1400 audit(1545188070.613:4149): avc: denied { map } for pid=6634 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1265.047665] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1265.183959] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1265.185225] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x5, 0x28002) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000340)={{0xa, 0x4e23, 0x10001, @mcast2, 0xff}, {0xa, 0x4e21, 0x7, @mcast2, 0x1ff}, 0x3ff, [0x8, 0xb5, 0x0, 0x8, 0x10001, 0x7, 0x7, 0x400]}, 0x5c) r2 = gettid() clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{r3, r4+10000000}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) [ 1265.284115] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1265.315387] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1265.350541] audit: type=1400 audit(1545188070.973:4150): avc: denied { map } for pid=6656 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:54:31 executing program 5 (fault-call:4 fault-nth:46): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1265.396433] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1265.403564] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x20c300, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0xfffffffffffffc00, 0x30}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={r1, 0x7e}, 0x8) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r2, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r3 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r3, 0x14) read$FUSE(r2, &(0x7f0000003000), 0x1000) 02:54:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1265.460556] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1265.507125] audit: type=1400 audit(1545188071.123:4151): avc: denied { map } for pid=6666 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1265.561371] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1265.568208] FAULT_INJECTION: forcing a failure. [ 1265.568208] name failslab, interval 1, probability 0, space 0, times 0 [ 1265.580804] CPU: 1 PID: 6668 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1265.588107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1265.597468] Call Trace: [ 1265.600076] dump_stack+0x244/0x39d [ 1265.603734] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1265.608957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1265.614529] ? check_preemption_disabled+0x48/0x280 [ 1265.619583] should_fail.cold.4+0xa/0x17 [ 1265.623666] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1265.628839] ? lock_is_held_type+0x210/0x210 [ 1265.628868] ? mark_held_locks+0x130/0x130 [ 1265.628885] ? zap_class+0x640/0x640 [ 1265.628906] ? __lock_acquire+0x62f/0x4c20 [ 1265.628925] ? is_bpf_text_address+0xac/0x170 [ 1265.628944] ? lock_downgrade+0x900/0x900 [ 1265.628968] ? check_preemption_disabled+0x48/0x280 [ 1265.645554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1265.645573] ? check_preemption_disabled+0x48/0x280 [ 1265.645597] ? debug_smp_processor_id+0x1c/0x20 [ 1265.645613] ? perf_trace_lock+0x14d/0x7a0 [ 1265.645638] ? lock_is_held_type+0x210/0x210 [ 1265.664825] ? check_preemption_disabled+0x48/0x280 [ 1265.664847] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1265.664865] ? kasan_check_read+0x11/0x20 [ 1265.664883] ? zap_class+0x640/0x640 [ 1265.664906] __should_failslab+0x124/0x180 [ 1265.664926] should_failslab+0x9/0x14 [ 1265.709170] __kmalloc+0x70/0x760 [ 1265.712649] ? context_struct_to_string+0x401/0x900 [ 1265.717692] context_struct_to_string+0x401/0x900 [ 1265.722554] ? get_permissions_callback+0xb0/0xb0 [ 1265.722574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1265.722605] ? sidtab_search_core+0x21f/0x3b0 [ 1265.722632] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1265.722654] security_sid_to_context+0x35/0x40 [ 1265.732135] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1265.733079] selinux_getprocattr+0x3cb/0x8b0 02:54:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1265.733101] ? selinux_socket_post_create+0x990/0x990 [ 1265.733119] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1265.733134] ? kasan_check_read+0x11/0x20 [ 1265.733154] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1265.756268] ? find_vpid+0xf0/0xf0 [ 1265.756306] security_getprocattr+0x66/0xc0 [ 1265.756331] proc_pid_attr_read+0x158/0x2e0 [ 1265.756352] ? oom_adj_read+0x260/0x260 [ 1265.796514] ? security_file_permission+0x1c2/0x220 [ 1265.801551] ? rw_verify_area+0x118/0x360 [ 1265.805725] do_iter_read+0x4a3/0x650 02:54:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1265.809549] vfs_readv+0x175/0x1c0 [ 1265.809572] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1265.809601] ? fget_raw+0x20/0x20 [ 1265.809630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1265.827522] ? check_preemption_disabled+0x48/0x280 [ 1265.832559] ? __sb_end_write+0xd9/0x110 [ 1265.836664] do_preadv+0x1cc/0x280 [ 1265.840216] ? do_readv+0x310/0x310 [ 1265.840232] ? __ia32_sys_read+0xb0/0xb0 [ 1265.840250] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1265.840269] ? trace_hardirqs_off_caller+0x310/0x310 [ 1265.840300] __x64_sys_preadv+0x9a/0xf0 [ 1265.840322] do_syscall_64+0x1b9/0x820 [ 1265.840336] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1265.840355] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1265.840371] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1265.840391] ? trace_hardirqs_on_caller+0x310/0x310 [ 1265.876660] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1265.886504] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1265.886529] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1265.886555] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1265.886568] RIP: 0033:0x457669 [ 1265.886585] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1265.886600] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1265.914732] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1265.928731] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1265.928742] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 02:54:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) [ 1265.928753] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1265.928763] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1265.928784] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1265.989275] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1265.999263] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1266.104762] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1266.114668] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1266.130118] audit: type=1400 audit(1545188071.753:4152): avc: denied { map } for pid=6699 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:54:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x5, 0x28002) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000340)={{0xa, 0x4e23, 0x10001, @mcast2, 0xff}, {0xa, 0x4e21, 0x7, @mcast2, 0x1ff}, 0x3ff, [0x8, 0xb5, 0x0, 0x8, 0x10001, 0x7, 0x7, 0x400]}, 0x5c) r2 = gettid() clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{r3, r4+10000000}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:31 executing program 5 (fault-call:4 fault-nth:47): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1266.133226] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1266.226267] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1266.283248] FAULT_INJECTION: forcing a failure. [ 1266.283248] name failslab, interval 1, probability 0, space 0, times 0 [ 1266.294571] CPU: 1 PID: 6707 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1266.301857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1266.311220] Call Trace: [ 1266.313837] dump_stack+0x244/0x39d [ 1266.317491] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1266.322699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1266.322720] ? check_preemption_disabled+0x48/0x280 [ 1266.322747] should_fail.cold.4+0xa/0x17 [ 1266.322795] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1266.342506] ? lock_is_held_type+0x210/0x210 [ 1266.342534] ? mark_held_locks+0x130/0x130 [ 1266.342551] ? zap_class+0x640/0x640 [ 1266.342572] ? __lock_acquire+0x62f/0x4c20 [ 1266.354921] ? is_bpf_text_address+0xac/0x170 [ 1266.354942] ? lock_downgrade+0x900/0x900 [ 1266.354960] ? check_preemption_disabled+0x48/0x280 [ 1266.354978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1266.354999] ? check_preemption_disabled+0x48/0x280 [ 1266.372840] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1266.372877] ? debug_smp_processor_id+0x1c/0x20 [ 1266.396224] ? perf_trace_lock+0x14d/0x7a0 [ 1266.400539] ? lock_is_held_type+0x210/0x210 [ 1266.404983] ? check_preemption_disabled+0x48/0x280 [ 1266.410015] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1266.410034] ? kasan_check_read+0x11/0x20 [ 1266.410051] ? zap_class+0x640/0x640 [ 1266.410072] __should_failslab+0x124/0x180 [ 1266.419151] should_failslab+0x9/0x14 02:54:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1266.419167] __kmalloc+0x70/0x760 [ 1266.419192] ? context_struct_to_string+0x401/0x900 [ 1266.419216] context_struct_to_string+0x401/0x900 [ 1266.419239] ? get_permissions_callback+0xb0/0xb0 [ 1266.449079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1266.454628] ? sidtab_search_core+0x21f/0x3b0 [ 1266.459151] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1266.465060] security_sid_to_context+0x35/0x40 [ 1266.469675] selinux_getprocattr+0x3cb/0x8b0 [ 1266.474102] ? selinux_socket_post_create+0x990/0x990 [ 1266.479315] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1266.484259] ? kasan_check_read+0x11/0x20 [ 1266.488427] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1266.493724] ? find_vpid+0xf0/0xf0 [ 1266.497324] security_getprocattr+0x66/0xc0 [ 1266.501680] proc_pid_attr_read+0x158/0x2e0 [ 1266.502795] audit: type=1400 audit(1545188072.123:4153): avc: denied { map } for pid=6718 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1266.506018] ? oom_adj_read+0x260/0x260 02:54:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1266.506035] ? security_file_permission+0x1c2/0x220 [ 1266.506058] ? rw_verify_area+0x118/0x360 [ 1266.506079] do_iter_read+0x4a3/0x650 [ 1266.506115] vfs_readv+0x175/0x1c0 [ 1266.548601] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1266.548632] ? fget_raw+0x20/0x20 [ 1266.557443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1266.562996] ? check_preemption_disabled+0x48/0x280 [ 1266.568040] ? __sb_end_write+0xd9/0x110 [ 1266.572153] do_preadv+0x1cc/0x280 [ 1266.575717] ? do_readv+0x310/0x310 [ 1266.579373] ? __ia32_sys_read+0xb0/0xb0 [ 1266.583469] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1266.588871] ? trace_hardirqs_off_caller+0x310/0x310 [ 1266.590083] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1266.593993] __x64_sys_preadv+0x9a/0xf0 [ 1266.594016] do_syscall_64+0x1b9/0x820 [ 1266.594032] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1266.594052] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1266.594068] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1266.594087] ? trace_hardirqs_on_caller+0x310/0x310 [ 1266.594109] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1266.635347] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1266.640402] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1266.645285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1266.650514] RIP: 0033:0x457669 [ 1266.653720] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1266.659515] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1266.672651] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1266.672668] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1266.672679] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1266.672689] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1266.672699] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1266.672709] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1266.699700] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1266.706464] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1266.800937] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1266.860884] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1266.862552] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66643d17abd7f4c1697c0756c1c1a60382d2b622032c2d318e1fc6aa920b853e9a9184f920feabdbc15b6e81e4d7a6124b8957d858789911cd5e64e92dd76e2e0374c69d4a4de3e35c57a922377ac81ab6fa794a3d4eae21494718b7da2e1a7508384800a07f25e47572fd75136bbb87ec8829ddabb3a51c7865d193b0be6d8521e4b121c9de1329c0f367017f55332114538642d70b0636d2437704a539ed8f91146674b95200000000000000000000", @ANYRESHEX=r0, @ANYBLOB="2c3452c7a3d21e55f3e775b037726f67746d6f64653d3030303030303030303030ecc9d59c81fcb4070000000000000030303030303063bd063d5376ebc66acfd7ab4d7ff8e8b85806ab685efe60edc82761e51a28ebe41942901a9b84f9ad355581ecbe97635a981635be0a39673e11cf278ab1a49c939a9620118f508cac5f97b86350489edc4b390ef3e936c53b9f020ec921d5763785c150cda8ef615998ee3d2fe3679b8f6c78cd1c0e5027708a3f26aff79254131bce00614c2cf32c77163a0736f78a44995a8a44ec4b67e82440d137fdcac72cfb94cd66184b4edf2552f8272b04159a9babc829ad", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) getuid() 02:54:32 executing program 5 (fault-call:4 fault-nth:48): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1267.049485] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1267.050996] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1267.083086] FAULT_INJECTION: forcing a failure. 02:54:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x5, 0x28002) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000340)={{0xa, 0x4e23, 0x10001, @mcast2, 0xff}, {0xa, 0x4e21, 0x7, @mcast2, 0x1ff}, 0x3ff, [0x8, 0xb5, 0x0, 0x8, 0x10001, 0x7, 0x7, 0x400]}, 0x5c) r2 = gettid() clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{r3, r4+10000000}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1267.083086] name failslab, interval 1, probability 0, space 0, times 0 [ 1267.091534] CPU: 1 PID: 6745 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1267.091545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1267.091551] Call Trace: [ 1267.091574] dump_stack+0x244/0x39d [ 1267.091597] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1267.091626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1267.119492] ? check_preemption_disabled+0x48/0x280 [ 1267.119533] should_fail.cold.4+0xa/0x17 [ 1267.119553] ? fault_create_debugfs_attr+0x1f0/0x1f0 02:54:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1267.119569] ? lock_is_held_type+0x210/0x210 [ 1267.119593] ? mark_held_locks+0x130/0x130 [ 1267.119611] ? zap_class+0x640/0x640 [ 1267.157642] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1267.159336] ? __lock_acquire+0x62f/0x4c20 [ 1267.159357] ? is_bpf_text_address+0xac/0x170 [ 1267.159376] ? lock_downgrade+0x900/0x900 [ 1267.159410] ? check_preemption_disabled+0x48/0x280 [ 1267.159427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1267.159445] ? check_preemption_disabled+0x48/0x280 [ 1267.159476] ? debug_smp_processor_id+0x1c/0x20 [ 1267.194706] ? perf_trace_lock+0x14d/0x7a0 [ 1267.204386] ? lock_is_held_type+0x210/0x210 [ 1267.204407] ? check_preemption_disabled+0x48/0x280 [ 1267.204433] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1267.211395] audit: type=1400 audit(1545188072.833:4154): avc: denied { map } for pid=6747 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1267.213061] ? kasan_check_read+0x11/0x20 [ 1267.213080] ? zap_class+0x640/0x640 [ 1267.213104] __should_failslab+0x124/0x180 [ 1267.213125] should_failslab+0x9/0x14 [ 1267.260945] __kmalloc+0x70/0x760 [ 1267.264426] ? context_struct_to_string+0x401/0x900 [ 1267.269484] context_struct_to_string+0x401/0x900 [ 1267.274358] ? get_permissions_callback+0xb0/0xb0 [ 1267.279230] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1267.283761] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1267.284826] ? sidtab_search_core+0x21f/0x3b0 02:54:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1267.285787] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1267.297655] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1267.311878] security_sid_to_context+0x35/0x40 [ 1267.316517] selinux_getprocattr+0x3cb/0x8b0 [ 1267.320962] ? selinux_socket_post_create+0x990/0x990 [ 1267.326159] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1267.331102] ? kasan_check_read+0x11/0x20 [ 1267.335286] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1267.340589] ? find_vpid+0xf0/0xf0 [ 1267.344157] security_getprocattr+0x66/0xc0 [ 1267.348501] proc_pid_attr_read+0x158/0x2e0 [ 1267.352879] ? oom_adj_read+0x260/0x260 [ 1267.356864] ? security_file_permission+0x1c2/0x220 [ 1267.361904] ? rw_verify_area+0x118/0x360 [ 1267.366079] do_iter_read+0x4a3/0x650 [ 1267.366569] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1267.369047] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1267.369916] vfs_readv+0x175/0x1c0 [ 1267.369941] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1267.369973] ? fget_raw+0x20/0x20 02:54:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1267.369996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1267.404530] ? check_preemption_disabled+0x48/0x280 [ 1267.409589] ? __sb_end_write+0xd9/0x110 [ 1267.413678] do_preadv+0x1cc/0x280 [ 1267.417239] ? do_readv+0x310/0x310 [ 1267.420883] ? __ia32_sys_read+0xb0/0xb0 [ 1267.424958] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1267.430352] ? trace_hardirqs_off_caller+0x310/0x310 [ 1267.435505] __x64_sys_preadv+0x9a/0xf0 [ 1267.439515] do_syscall_64+0x1b9/0x820 [ 1267.443414] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1267.448818] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1267.453757] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1267.453787] ? trace_hardirqs_on_caller+0x310/0x310 [ 1267.453806] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1267.453826] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1267.453848] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1267.473734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1267.473748] RIP: 0033:0x457669 [ 1267.473775] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1267.473789] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1267.491806] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1267.493233] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1267.505894] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1267.505905] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1267.505915] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 02:54:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1267.505926] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1267.505936] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 02:54:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:33 executing program 5 (fault-call:4 fault-nth:49): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) [ 1267.703338] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1267.777032] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1267.777108] audit: type=1400 audit(1545188073.393:4155): avc: denied { map } for pid=6785 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1267.812179] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1267.852143] FAULT_INJECTION: forcing a failure. [ 1267.852143] name failslab, interval 1, probability 0, space 0, times 0 [ 1267.860620] CPU: 1 PID: 6794 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1267.879102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1267.879109] Call Trace: [ 1267.879134] dump_stack+0x244/0x39d [ 1267.879158] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1267.879196] should_fail.cold.4+0xa/0x17 [ 1267.891152] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1267.891170] ? trace_hardirqs_on_caller+0x310/0x310 [ 1267.891204] ? mark_held_locks+0xc7/0x130 [ 1267.918324] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1267.923105] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1267.927702] ? retint_kernel+0x2d/0x2d [ 1267.931610] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1267.936582] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1267.941359] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1267.946818] ? find_held_lock+0x36/0x1c0 [ 1267.950928] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1267.955699] ? retint_kernel+0x2d/0x2d [ 1267.959605] __should_failslab+0x124/0x180 [ 1267.963851] should_failslab+0x9/0x14 [ 1267.967656] __kmalloc+0x70/0x760 [ 1267.971125] ? context_struct_to_string+0x401/0x900 [ 1267.976175] context_struct_to_string+0x401/0x900 [ 1267.981036] ? get_permissions_callback+0xb0/0xb0 [ 1267.985887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1267.991432] ? sidtab_search_core+0x21f/0x3b0 [ 1267.995958] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1268.001860] security_sid_to_context+0x35/0x40 [ 1268.006457] selinux_getprocattr+0x3cb/0x8b0 [ 1268.010876] ? selinux_socket_post_create+0x990/0x990 [ 1268.016075] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1268.021012] ? kasan_check_read+0x11/0x20 [ 1268.025166] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1268.030450] ? find_vpid+0xf0/0xf0 [ 1268.034014] security_getprocattr+0x66/0xc0 [ 1268.038356] proc_pid_attr_read+0x158/0x2e0 [ 1268.042691] ? oom_adj_read+0x260/0x260 [ 1268.046697] ? security_file_permission+0x1c2/0x220 [ 1268.051726] ? rw_verify_area+0x118/0x360 [ 1268.055886] do_iter_read+0x4a3/0x650 [ 1268.059713] vfs_readv+0x175/0x1c0 [ 1268.063269] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1268.068661] ? fget_raw+0x20/0x20 [ 1268.072143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1268.077704] ? check_preemption_disabled+0x48/0x280 [ 1268.082737] ? __sb_end_write+0xd9/0x110 [ 1268.086826] do_preadv+0x1cc/0x280 [ 1268.090391] ? do_readv+0x310/0x310 [ 1268.094053] ? __ia32_sys_read+0xb0/0xb0 [ 1268.098119] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1268.103492] ? trace_hardirqs_off_caller+0x310/0x310 [ 1268.108615] __x64_sys_preadv+0x9a/0xf0 [ 1268.112630] do_syscall_64+0x1b9/0x820 [ 1268.116523] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1268.121901] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1268.126843] ? trace_hardirqs_on_caller+0x310/0x310 [ 1268.131870] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1268.136917] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1268.143589] ? __switch_to_asm+0x40/0x70 [ 1268.147668] ? __switch_to_asm+0x34/0x70 [ 1268.151744] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1268.156625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1268.161818] RIP: 0033:0x457669 [ 1268.165020] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1268.183970] RSP: 002b:00007fc451f87c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1268.191693] RAX: ffffffffffffffda RBX: 00007fc451f87c90 RCX: 0000000000457669 [ 1268.198969] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1268.206240] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1268.213514] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451f886d4 [ 1268.220795] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 02:54:34 executing program 0: mkdir(&(0x7f0000000880)='./file0\x00', 0x800000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0), 0x0, 0xfffffffffffffffe}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}}}}, 0xa5e0936e7f46bf5c) fchmodat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000008c0)={0x0, 0x0}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7ff) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0xfffffffffffff800, 0x73e}) ioprio_get$pid(0x1, r0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000000)={0x5, 0xfffffffffffffd14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8000000000000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000600)={0x6fd3}, 0x4) clone(0x3003, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="907d32897043a75d2f4c569388262e458697c5d606004f09cce744b2a8b4873892d4721fd9210f316f8696183f86767590199b8d4f8c8a9e9f031d57d6cdbdd601b7e03f1fe51f18238c09de02b24990e8e6f51686e111845b21e238", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000001c0)=0x4) rt_sigreturn() getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={r3, 0x10, &(0x7f0000000380)=[@in={0x2, 0x4e22, @local}]}, &(0x7f0000000540)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000480), &(0x7f0000000400)=0xffffffffffffffd7) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000002c0)={0x7, 0x70, 0x6, 0x7, 0x5, 0x8, 0x0, 0x3, 0x80000, 0xf, 0x8, 0x3, 0x8, 0x3, 0xfff, 0x3, 0x5, 0x100, 0x3cb6, 0x0, 0x5, 0xfffffffffffffffa, 0xfffffffffffffffb, 0x80000000, 0x8, 0x3, 0xd9, 0xfffffffffffffffa, 0xc6, 0xfffffffffffffffc, 0xdb, 0x8, 0x9, 0xff, 0x4, 0x9, 0x5, 0x9, 0x0, 0x400, 0x5, @perf_config_ext={0x1, 0x1}, 0x2000, 0x0, 0x1, 0xd, 0x86, 0x4, 0x5}) getpid() write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000440)={0xffffffffffffffa0, 0x11, 0x2, {0x20}}, 0x14) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 02:54:34 executing program 5 (fault-call:4 fault-nth:50): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x6000000, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x100000000000000, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1268.490168] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1268.492307] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1268.499167] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1268.530234] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1268.561716] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1268.575833] audit: type=1400 audit(1545188074.193:4156): avc: denied { create } for pid=6808 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1268.578403] FAULT_INJECTION: forcing a failure. [ 1268.578403] name failslab, interval 1, probability 0, space 0, times 0 [ 1268.611127] CPU: 1 PID: 6807 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1268.618412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1268.627781] Call Trace: [ 1268.630405] dump_stack+0x244/0x39d [ 1268.634052] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1268.639263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1268.644837] ? check_preemption_disabled+0x48/0x280 [ 1268.649869] should_fail.cold.4+0xa/0x17 [ 1268.649891] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1268.649918] ? mark_held_locks+0xc7/0x130 [ 1268.663230] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1268.668006] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1268.672604] ? retint_kernel+0x2d/0x2d [ 1268.672622] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1268.672640] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1268.672658] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1268.672675] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1268.672693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1268.672713] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1268.689249] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1268.696664] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1268.696687] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1268.696725] ? retint_kernel+0x2d/0x2d [ 1268.704427] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1268.729430] ? find_next_bit+0x26/0x130 [ 1268.732423] audit: type=1400 audit(1545188074.353:4157): avc: denied { map } for pid=6811 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1268.737780] ? find_next_bit+0x34/0x130 [ 1268.737805] __should_failslab+0x124/0x180 [ 1268.737827] should_failslab+0x9/0x14 [ 1268.737842] __kmalloc+0x70/0x760 [ 1268.737866] ? context_struct_to_string+0x401/0x900 [ 1268.766128] context_struct_to_string+0x401/0x900 [ 1268.766152] ? get_permissions_callback+0xb0/0xb0 [ 1268.766169] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1268.766185] ? sidtab_search_core+0x21f/0x3b0 [ 1268.766210] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1268.812251] security_sid_to_context+0x35/0x40 [ 1268.816861] selinux_getprocattr+0x3cb/0x8b0 [ 1268.816884] ? selinux_socket_post_create+0x990/0x990 [ 1268.816901] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1268.816918] ? kasan_check_read+0x11/0x20 [ 1268.816971] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1268.840938] ? find_vpid+0xf0/0xf0 [ 1268.844523] security_getprocattr+0x66/0xc0 [ 1268.848883] proc_pid_attr_read+0x158/0x2e0 [ 1268.853226] ? oom_adj_read+0x260/0x260 [ 1268.853243] ? security_file_permission+0x1c2/0x220 02:54:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0xd002000000000000, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1268.853266] ? rw_verify_area+0x118/0x360 [ 1268.853288] do_iter_read+0x4a3/0x650 [ 1268.853327] vfs_readv+0x175/0x1c0 [ 1268.853348] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1268.879257] ? fget_raw+0x20/0x20 [ 1268.882736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1268.888319] ? check_preemption_disabled+0x48/0x280 [ 1268.893358] ? __sb_end_write+0xd9/0x110 [ 1268.893386] do_preadv+0x1cc/0x280 [ 1268.893407] ? do_readv+0x310/0x310 [ 1268.893431] ? __ia32_sys_read+0xb0/0xb0 [ 1268.893451] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1268.914142] ? trace_hardirqs_off_caller+0x310/0x310 [ 1268.919273] __x64_sys_preadv+0x9a/0xf0 [ 1268.923274] do_syscall_64+0x1b9/0x820 [ 1268.927178] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1268.932560] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1268.937504] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1268.942362] ? trace_hardirqs_on_caller+0x310/0x310 [ 1268.947389] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1268.952431] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1268.957469] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1268.962339] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1268.967543] RIP: 0033:0x457669 [ 1268.970747] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1268.983013] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1268.989662] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1268.989679] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1268.989689] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1268.989699] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1268.989709] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1268.989719] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1268.992712] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1268.993818] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1269.012742] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0000004c17fe", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="000019c5fde21193b32a0342a17dde62e398e1a67a6361e034f641dcd2a04132b65e02315ee7c0ad6896519143e0d6a4d286f19c35d97dac18db4a777e5128da7ba0dbf5cf5db3ece0bbc0ea"]) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4dd39763, 0x0, 0x0, 0x4, 0xf, 0x14, "5872edc211e4159d284f2f7557c59c3bed2546fbd0c859847eb3bee73fa076bcb63ffe7500a25b3cdc7813b22b4f0c230dca82553246f9bc56b8fcf4f61003b5", "9160c3b4cda4a82c5a88ed7efe370e27032afac26e7ef820888c7678f7cfac95f26e16cdc2421baceb734733731a8b5816a4eea9363a6b50e1e3a86e2748a311", "9952b4c5417638e27b88619367970080139d333c5e9b3b2bee0e223917646ebe", [0x1, 0x3]}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x402080, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)={{}, {r4, r5/1000+30000}}) tkill(r2, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x7000000, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:34 executing program 0: mkdir(&(0x7f0000000880)='./file0\x00', 0x800000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0), 0x0, 0xfffffffffffffffe}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}}}}, 0xa5e0936e7f46bf5c) fchmodat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000008c0)={0x0, 0x0}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7ff) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0xfffffffffffff800, 0x73e}) ioprio_get$pid(0x1, r0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000000)={0x5, 0xfffffffffffffd14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8000000000000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000600)={0x6fd3}, 0x4) clone(0x3003, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="907d32897043a75d2f4c569388262e458697c5d606004f09cce744b2a8b4873892d4721fd9210f316f8696183f86767590199b8d4f8c8a9e9f031d57d6cdbdd601b7e03f1fe51f18238c09de02b24990e8e6f51686e111845b21e238", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000001c0)=0x4) rt_sigreturn() getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={r3, 0x10, &(0x7f0000000380)=[@in={0x2, 0x4e22, @local}]}, &(0x7f0000000540)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000480), &(0x7f0000000400)=0xffffffffffffffd7) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000002c0)={0x7, 0x70, 0x6, 0x7, 0x5, 0x8, 0x0, 0x3, 0x80000, 0xf, 0x8, 0x3, 0x8, 0x3, 0xfff, 0x3, 0x5, 0x100, 0x3cb6, 0x0, 0x5, 0xfffffffffffffffa, 0xfffffffffffffffb, 0x80000000, 0x8, 0x3, 0xd9, 0xfffffffffffffffa, 0xc6, 0xfffffffffffffffc, 0xdb, 0x8, 0x9, 0xff, 0x4, 0x9, 0x5, 0x9, 0x0, 0x400, 0x5, @perf_config_ext={0x1, 0x1}, 0x2000, 0x0, 0x1, 0xd, 0x86, 0x4, 0x5}) getpid() write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000440)={0xffffffffffffffa0, 0x11, 0x2, {0x20}}, 0x14) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1269.117751] audit: type=1400 audit(1545188074.733:4158): avc: denied { map } for pid=6833 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:54:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:34 executing program 5 (fault-call:4 fault-nth:51): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) [ 1269.157928] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1269.161723] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1269.230479] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0xd0020000, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1269.365781] audit: type=1400 audit(1545188074.983:4159): avc: denied { create } for pid=6839 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1269.401877] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1269.405185] FAULT_INJECTION: forcing a failure. [ 1269.405185] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.421679] CPU: 0 PID: 6849 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1269.428971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1269.432758] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1269.437513] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1269.438336] Call Trace: [ 1269.438379] dump_stack+0x244/0x39d [ 1269.438410] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1269.438433] ? memset+0x31/0x40 [ 1269.438475] should_fail.cold.4+0xa/0x17 [ 1269.473891] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1269.479025] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1269.484153] ? lock_is_held_type+0x210/0x210 [ 1269.488589] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1269.488624] ? perf_tp_event+0xc20/0xc20 [ 1269.488647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1269.503360] ? check_preemption_disabled+0x48/0x280 [ 1269.503380] ? __lock_acquire+0x62f/0x4c20 [ 1269.503408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1269.518216] ? check_preemption_disabled+0x48/0x280 [ 1269.523268] ? memset+0x31/0x40 [ 1269.526609] ? perf_trace_lock+0x4a7/0x7a0 [ 1269.530893] ? lock_is_held_type+0x210/0x210 [ 1269.535333] ? check_preemption_disabled+0x48/0x280 [ 1269.540392] ? kasan_check_read+0x11/0x20 [ 1269.544567] ? zap_class+0x640/0x640 [ 1269.547678] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1269.548311] __should_failslab+0x124/0x180 [ 1269.548340] should_failslab+0x9/0x14 [ 1269.548361] __kmalloc+0x70/0x760 [ 1269.568052] ? context_struct_to_string+0x401/0x900 [ 1269.573129] context_struct_to_string+0x401/0x900 [ 1269.578026] ? get_permissions_callback+0xb0/0xb0 [ 1269.582893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1269.588456] ? sidtab_search_core+0x21f/0x3b0 [ 1269.592995] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1269.598958] security_sid_to_context+0x35/0x40 [ 1269.603583] selinux_getprocattr+0x3cb/0x8b0 [ 1269.608042] ? selinux_socket_post_create+0x990/0x990 [ 1269.613256] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1269.618208] ? kasan_check_read+0x11/0x20 [ 1269.622377] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1269.627697] ? find_vpid+0xf0/0xf0 [ 1269.631276] security_getprocattr+0x66/0xc0 [ 1269.631309] proc_pid_attr_read+0x158/0x2e0 [ 1269.631337] ? oom_adj_read+0x260/0x260 [ 1269.643959] ? security_file_permission+0x1c2/0x220 [ 1269.649009] ? rw_verify_area+0x118/0x360 [ 1269.653209] do_iter_read+0x4a3/0x650 [ 1269.657094] vfs_readv+0x175/0x1c0 [ 1269.660669] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1269.666094] ? fget_raw+0x20/0x20 [ 1269.669595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1269.675210] ? check_preemption_disabled+0x48/0x280 [ 1269.680276] ? __sb_end_write+0xd9/0x110 [ 1269.684418] do_preadv+0x1cc/0x280 [ 1269.687992] ? do_readv+0x310/0x310 [ 1269.688482] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1269.691638] ? __ia32_sys_read+0xb0/0xb0 [ 1269.691660] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1269.691685] ? trace_hardirqs_off_caller+0x310/0x310 [ 1269.691719] __x64_sys_preadv+0x9a/0xf0 [ 1269.691746] do_syscall_64+0x1b9/0x820 [ 1269.722265] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1269.727660] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1269.732616] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1269.737484] ? trace_hardirqs_on_caller+0x310/0x310 [ 1269.742552] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1269.747600] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1269.752651] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1269.757532] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1269.762766] RIP: 0033:0x457669 [ 1269.765988] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1269.766001] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1269.766021] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1269.766035] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1269.766047] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 02:54:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x400000000000000, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1269.766060] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1269.766076] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1269.835427] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='gd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000080)=0x1, 0x4) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000600), 0x10ac) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x7) tkill(r2, 0x14) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x6, 0x80000) sendmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f0000000340)=@in6={0xa, 0x4e21, 0x5, @mcast2, 0x7f69}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000200)="7684b973892f0ab203a5dfe5e3ca91484abe2ae89e258e98a03a3396f7760e18eca7", 0x22}, {&(0x7f00000003c0)="5f26bbe1a3127ee3eab79ed43063f71ccc68f89ff683e2cc8e8d62e5b034ad0c097f191b54271053199891d5144de2d08ed5d0455c6a8463292bcd1f122f5f4b301e11c52fc27f59458faf2fa4a15c9aa45dc881f12ed7b61fcb75bb954bb23f1ed221779cc1d029605fff3d03120c82", 0x70}, {&(0x7f0000000440)="a408319fb4f476f5efcdad87e9ada67b03979513d4aa695748b856738bc964f19d7b1109608c6e790f6a54f1f8a54eaadda9c06d74121e80cdbf2b836dde0e2b883fef7efe331b5d062fcf033833a450e5e1c8985f0060d63ef64b2231a5ff0af304b8afee8db5ad619a239cb9703ead066a704ea6bfb6f682e148443c7c5df4a740a07765f3c240b09b499cfbc2b47ae0ad8a3e03f85d3c639325c9cc48f46de2b4a41d4028fd616fdfdcfdeba9b0c0b1b4", 0xb2}, {&(0x7f0000000500)="be0fa5572c8324f211cbf92adaab78a7f1fb0bea21499bc31f97c19ccb8ed7dc43217f84b5cf07096193f3607b8aef452302098937e9dc21a6c111384c99dff5501932a6a19cc9c66f7ffbf1b4bf76ed8172cb77b77c67a21d4b9dc59d4da59178694093d876945d05d21ffd655d5794fab4ac664f7027c0f58b0a29efeaeb33e6d735292a02732eb178c836a217429e5b72e56932b5342823ee40a8dbe5065819ae811fd501cb7159b602708e8f49", 0xaf}], 0x4, &(0x7f0000001980)=[{0x70, 0x11b, 0x10000, "f4ba6fba990c9f6dfb6546ba07e1fbfa79bd9a4e13d701416635ffa06d53caa3b62b4214be952921de11404d23de7a254767e13002a2b9f21be83e22b31869d9721a3e03fb771bc307fb8de9e18629119f0d54fdc4cf9e0abf8e42393946c915"}, {0x100, 0x118, 0xd60, "5c0e269c6040662f1d749673fa6ed9fcc2d639ed2e05a8899e6107bc2f656e83b2fee3db4fa9d245899b5018c41390861248dfc5994cf578ee91f92f21b0cebc468853c238c2c47c16974fbfe5b69d24a9e45008ac0bcc1ebe0dfc58c6a10aff5b92cb74dc429201d2f065f87240a2fe5bb0e97c3e38cd2cd69249da7a99face0e9d4fcc5deb7918d4b99905a264f3f13656b9999c9bf56d9342979db469c997395d331d52ec5fbe6576b560da7078643bd5a1267ee79ca97a9b17f1bf64681afd74839aa7ef5ee765a376f2ba3d12a02362d4c547790ce03bf5a771a10976f4cf15b28c762c8a7db002e2"}, {0xf0, 0x10f, 0x81, "89b1f16b0f3f8124810579eae113b204aa74cc99e5870d647eab27c0a14c652d885b9cff283b903a96d65e32b616ea1aae594a5016a017de247d280a2b66ff42ba9e3eb475fb916c058c91fc6928605d6b8c398a5c8806fef4f03cca3e23c94124576f7713d9af2ada9f2d321b39e4cdb18d30f75a9537bcf224310234673da2b211fcc4a4256f60c115c9d26765e3e05519ca9b2f967f0c12640fa276c560bbf04b38d21ff65d375ea89d9ca529c05d908177bd318188e74fa0cd62873690819ed8869c19cda279cbeb49a407565aa70b8ae92277fdf7187d179b1d"}, {0xb8, 0x11f, 0x4, "678be4f1501ab1fcc6a0afaecbc9c4bd9975a646e5e62489506fdef25768c325db5ee22ff02a9d89f3ad757481c5ef58448e983ff419690af6bac3984eb1a289a1e5e9b3475d8afe55f14423cf5d4aeec70c2830291eaad165131e9ca4c80604511bca74533f7f6ddcbe3489d3a53fd25a12731021af24c4355abd0e55e951ff62669e63307041cc06ea0e4889279c76661f4a3f8d5750ee37b389faa540a42315"}, {0x1010, 0x0, 0x0, "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"}], 0x1328}, 0x8010) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000001600)={0x3f, {{0xa, 0x4e24, 0xffff, @mcast1, 0x7}}}, 0x88) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:35 executing program 0: mkdir(&(0x7f0000000880)='./file0\x00', 0x800000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0), 0x0, 0xfffffffffffffffe}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}}}}, 0xa5e0936e7f46bf5c) fchmodat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000008c0)={0x0, 0x0}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7ff) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0xfffffffffffff800, 0x73e}) ioprio_get$pid(0x1, r0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000000)={0x5, 0xfffffffffffffd14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8000000000000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000600)={0x6fd3}, 0x4) clone(0x3003, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="907d32897043a75d2f4c569388262e458697c5d606004f09cce744b2a8b4873892d4721fd9210f316f8696183f86767590199b8d4f8c8a9e9f031d57d6cdbdd601b7e03f1fe51f18238c09de02b24990e8e6f51686e111845b21e238", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000001c0)=0x4) rt_sigreturn() getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={r3, 0x10, &(0x7f0000000380)=[@in={0x2, 0x4e22, @local}]}, &(0x7f0000000540)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000480), &(0x7f0000000400)=0xffffffffffffffd7) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000002c0)={0x7, 0x70, 0x6, 0x7, 0x5, 0x8, 0x0, 0x3, 0x80000, 0xf, 0x8, 0x3, 0x8, 0x3, 0xfff, 0x3, 0x5, 0x100, 0x3cb6, 0x0, 0x5, 0xfffffffffffffffa, 0xfffffffffffffffb, 0x80000000, 0x8, 0x3, 0xd9, 0xfffffffffffffffa, 0xc6, 0xfffffffffffffffc, 0xdb, 0x8, 0x9, 0xff, 0x4, 0x9, 0x5, 0x9, 0x0, 0x400, 0x5, @perf_config_ext={0x1, 0x1}, 0x2000, 0x0, 0x1, 0xd, 0x86, 0x4, 0x5}) getpid() write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000440)={0xffffffffffffffa0, 0x11, 0x2, {0x20}}, 0x14) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1269.855340] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1269.861032] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:35 executing program 5 (fault-call:4 fault-nth:52): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) [ 1269.912114] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x2000000, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) gettid() mq_getsetattr(r0, &(0x7f0000000580)={0xfffffffffffffff9, 0x3, 0x387, 0x3, 0xffff, 0x7ff, 0x906d, 0x7}, &(0x7f00000005c0)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="646c0e", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r2 = gettid() r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x18d602, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0xe4, r4, 0x21a, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff4a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xa44}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffffd}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x40851}, 0x44) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x14) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x4, 0x8, 0x615, 0x9}, {0x0, 0xff, 0x1, 0x9}, {0x68, 0x5, 0x40, 0x8}, {0x400, 0x8, 0x5, 0x4}, {0x43a8, 0x7fffffff, 0x8001, 0x3}]}, 0x10) read$FUSE(r1, &(0x7f0000003000), 0x1000) 02:54:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1270.139695] FAULT_INJECTION: forcing a failure. [ 1270.139695] name failslab, interval 1, probability 0, space 0, times 0 [ 1270.151140] CPU: 1 PID: 6891 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1270.158456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1270.167833] Call Trace: [ 1270.170436] dump_stack+0x244/0x39d [ 1270.174091] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1270.179317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1270.184872] ? check_preemption_disabled+0x48/0x280 02:54:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) r1 = syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x7f, 0x105802) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000380)={0x72fe, 0x200}) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x80800) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000200), &(0x7f0000000280)=0x4) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r3 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r3, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) [ 1270.189910] should_fail.cold.4+0xa/0x17 [ 1270.193993] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1270.199113] ? lock_is_held_type+0x210/0x210 [ 1270.203551] ? mark_held_locks+0x130/0x130 [ 1270.207811] ? zap_class+0x640/0x640 [ 1270.211666] ? __lock_acquire+0x62f/0x4c20 [ 1270.215918] ? is_bpf_text_address+0xac/0x170 [ 1270.220437] ? lock_downgrade+0x900/0x900 [ 1270.223010] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1270.224690] ? check_preemption_disabled+0x48/0x280 [ 1270.230425] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1270.238035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1270.252016] ? check_preemption_disabled+0x48/0x280 [ 1270.257057] ? debug_smp_processor_id+0x1c/0x20 [ 1270.261737] ? perf_trace_lock+0x14d/0x7a0 [ 1270.265353] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1270.266008] ? lock_is_held_type+0x210/0x210 [ 1270.278563] ? check_preemption_disabled+0x48/0x280 [ 1270.283610] ? rcu_read_unlock_special+0x1c0/0x1c0 02:54:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x5000000, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1270.288569] ? kasan_check_read+0x11/0x20 [ 1270.292750] ? zap_class+0x640/0x640 [ 1270.296488] __should_failslab+0x124/0x180 [ 1270.300756] should_failslab+0x9/0x14 [ 1270.304594] __kmalloc+0x70/0x760 [ 1270.308074] ? context_struct_to_string+0x401/0x900 [ 1270.313114] context_struct_to_string+0x401/0x900 [ 1270.317985] ? get_permissions_callback+0xb0/0xb0 [ 1270.322847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1270.328401] ? sidtab_search_core+0x21f/0x3b0 [ 1270.332932] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1270.338877] security_sid_to_context+0x35/0x40 [ 1270.343524] selinux_getprocattr+0x3cb/0x8b0 [ 1270.347971] ? selinux_socket_post_create+0x990/0x990 [ 1270.353173] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1270.358112] ? kasan_check_read+0x11/0x20 [ 1270.362279] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1270.367595] ? find_vpid+0xf0/0xf0 [ 1270.371167] security_getprocattr+0x66/0xc0 [ 1270.375507] proc_pid_attr_read+0x158/0x2e0 [ 1270.379885] ? oom_adj_read+0x260/0x260 [ 1270.383879] ? security_file_permission+0x1c2/0x220 02:54:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1270.388919] ? rw_verify_area+0x118/0x360 [ 1270.393091] do_iter_read+0x4a3/0x650 [ 1270.396936] vfs_readv+0x175/0x1c0 [ 1270.400495] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1270.405889] ? fget_raw+0x20/0x20 [ 1270.409362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1270.414918] ? check_preemption_disabled+0x48/0x280 [ 1270.419957] ? __sb_end_write+0xd9/0x110 [ 1270.419986] do_preadv+0x1cc/0x280 [ 1270.420006] ? do_readv+0x310/0x310 [ 1270.420021] ? __ia32_sys_read+0xb0/0xb0 [ 1270.420038] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1270.420058] ? trace_hardirqs_off_caller+0x310/0x310 [ 1270.420083] __x64_sys_preadv+0x9a/0xf0 [ 1270.420105] do_syscall_64+0x1b9/0x820 [ 1270.449840] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1270.449861] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1270.449877] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1270.449897] ? trace_hardirqs_on_caller+0x310/0x310 [ 1270.449916] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1270.449935] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1270.449959] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1270.449983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1270.449997] RIP: 0033:0x457669 [ 1270.450016] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1270.459252] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1270.459268] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1270.459278] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 02:54:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) [ 1270.459289] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1270.459310] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1270.469062] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1270.573561] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:36 executing program 5 (fault-call:4 fault-nth:53): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1270.574324] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1270.598554] kauditd_printk_skb: 4 callbacks suppressed [ 1270.598568] audit: type=1400 audit(1545188076.223:4164): avc: denied { map } for pid=6913 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1270.603586] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1270.694924] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1270.748050] FAULT_INJECTION: forcing a failure. [ 1270.748050] name failslab, interval 1, probability 0, space 0, times 0 [ 1270.759504] CPU: 1 PID: 6926 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1270.766796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1270.776171] Call Trace: [ 1270.778787] dump_stack+0x244/0x39d [ 1270.782437] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1270.787646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1270.793206] ? check_preemption_disabled+0x48/0x280 02:54:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1270.798263] should_fail.cold.4+0xa/0x17 [ 1270.802355] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1270.807486] ? lock_is_held_type+0x210/0x210 [ 1270.811930] ? mark_held_locks+0x130/0x130 [ 1270.816178] ? zap_class+0x640/0x640 [ 1270.819913] ? __lock_acquire+0x62f/0x4c20 [ 1270.824180] ? is_bpf_text_address+0xac/0x170 [ 1270.828689] ? lock_downgrade+0x900/0x900 [ 1270.832857] ? check_preemption_disabled+0x48/0x280 [ 1270.837882] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1270.840974] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1270.843363] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1270.843464] ? check_preemption_disabled+0x48/0x280 [ 1270.865186] ? debug_smp_processor_id+0x1c/0x20 [ 1270.869877] ? perf_trace_lock+0x14d/0x7a0 [ 1270.874149] ? lock_is_held_type+0x210/0x210 [ 1270.878593] ? check_preemption_disabled+0x48/0x280 [ 1270.883633] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1270.888576] ? kasan_check_read+0x11/0x20 [ 1270.892745] ? zap_class+0x640/0x640 02:54:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1270.896493] __should_failslab+0x124/0x180 [ 1270.900749] should_failslab+0x9/0x14 [ 1270.904616] __kmalloc+0x70/0x760 [ 1270.908091] ? context_struct_to_string+0x401/0x900 [ 1270.913134] context_struct_to_string+0x401/0x900 [ 1270.917231] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1270.918002] ? get_permissions_callback+0xb0/0xb0 [ 1270.918021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1270.918037] ? sidtab_search_core+0x21f/0x3b0 [ 1270.918064] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1270.946960] security_sid_to_context+0x35/0x40 [ 1270.951567] selinux_getprocattr+0x3cb/0x8b0 [ 1270.956007] ? selinux_socket_post_create+0x990/0x990 [ 1270.961214] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1270.961230] ? kasan_check_read+0x11/0x20 [ 1270.961246] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1270.961265] ? find_vpid+0xf0/0xf0 [ 1270.961302] security_getprocattr+0x66/0xc0 [ 1270.961325] proc_pid_attr_read+0x158/0x2e0 [ 1270.970416] ? oom_adj_read+0x260/0x260 [ 1270.970433] ? security_file_permission+0x1c2/0x220 [ 1270.970455] ? rw_verify_area+0x118/0x360 [ 1270.970475] do_iter_read+0x4a3/0x650 [ 1270.970509] vfs_readv+0x175/0x1c0 [ 1270.985241] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1270.987995] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1270.988027] ? fget_raw+0x20/0x20 [ 1271.025432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1271.031002] ? check_preemption_disabled+0x48/0x280 [ 1271.036045] ? __sb_end_write+0xd9/0x110 [ 1271.040127] do_preadv+0x1cc/0x280 [ 1271.043698] ? do_readv+0x310/0x310 02:54:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1271.047340] ? __ia32_sys_read+0xb0/0xb0 [ 1271.051436] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1271.056822] ? trace_hardirqs_off_caller+0x310/0x310 [ 1271.061960] __x64_sys_preadv+0x9a/0xf0 [ 1271.065971] do_syscall_64+0x1b9/0x820 [ 1271.069870] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1271.075274] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1271.080242] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1271.085105] ? trace_hardirqs_on_caller+0x310/0x310 [ 1271.090135] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1271.095173] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1271.100233] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1271.101513] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1271.105125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1271.113446] RIP: 0033:0x457669 [ 1271.113464] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1271.113473] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1271.113489] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1271.113499] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1271.113509] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1271.113524] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1271.140806] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1271.146943] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1271.162938] audit: type=1400 audit(1545188076.773:4165): avc: denied { map } for pid=6934 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1271.178393] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="8513d1d869c7c9f538768e480d05ba38d6c527ce942b75df5ab987e51d936127187934476d0df4583dc608fce2ab3e731d5f7e9a7d12e31c0f31da2e4388c66ac3ce11ad742087901c14676fe3d681022f038b436649b15a6a57ae1e52b4002e4af21bace17198aca3a297c8e49a101dad1dc899cfde5b0a463f52db02c9f1bfa25e39601893e040d4289d415ca69b1adff450ab6861a1ec116b2c27400ec4066436dc34297b7720345dac6af28ff7fac452c3340000e9211208ba7fceed", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x6, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:39 executing program 5 (fault-call:4 fault-nth:54): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1273.460464] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1273.469444] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1273.470956] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1273.472306] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1273.545355] FAULT_INJECTION: forcing a failure. [ 1273.545355] name failslab, interval 1, probability 0, space 0, times 0 [ 1273.556909] CPU: 0 PID: 6969 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1273.564205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1273.573578] Call Trace: [ 1273.576193] dump_stack+0x244/0x39d [ 1273.579869] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1273.585103] ? memset+0x31/0x40 [ 1273.588460] should_fail.cold.4+0xa/0x17 [ 1273.592558] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1273.597685] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1273.602831] ? lock_is_held_type+0x210/0x210 [ 1273.607275] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1273.612424] ? perf_tp_event+0xc20/0xc20 [ 1273.616532] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1273.618498] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1273.622093] ? check_preemption_disabled+0x48/0x280 [ 1273.622112] ? __lock_acquire+0x62f/0x4c20 [ 1273.622135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 02:54:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1273.622155] ? check_preemption_disabled+0x48/0x280 [ 1273.622178] ? memset+0x31/0x40 [ 1273.634085] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1273.635367] ? perf_trace_lock+0x4a7/0x7a0 [ 1273.635408] ? lock_is_held_type+0x210/0x210 [ 1273.635431] ? check_preemption_disabled+0x48/0x280 [ 1273.675398] ? kasan_check_read+0x11/0x20 [ 1273.679569] ? zap_class+0x640/0x640 [ 1273.683331] __should_failslab+0x124/0x180 [ 1273.687598] should_failslab+0x9/0x14 [ 1273.691437] __kmalloc+0x70/0x760 [ 1273.694954] ? context_struct_to_string+0x401/0x900 [ 1273.700017] context_struct_to_string+0x401/0x900 [ 1273.704896] ? get_permissions_callback+0xb0/0xb0 [ 1273.704919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1273.704938] ? sidtab_search_core+0x21f/0x3b0 [ 1273.704977] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1273.719870] security_sid_to_context+0x35/0x40 [ 1273.719901] selinux_getprocattr+0x3cb/0x8b0 [ 1273.719960] ? selinux_socket_post_create+0x990/0x990 [ 1273.719981] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1273.720002] ? kasan_check_read+0x11/0x20 [ 1273.749230] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1273.753728] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1273.754545] ? find_vpid+0xf0/0xf0 [ 1273.754589] security_getprocattr+0x66/0xc0 [ 1273.754621] proc_pid_attr_read+0x158/0x2e0 [ 1273.754650] ? oom_adj_read+0x260/0x260 02:54:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1273.767180] audit: type=1400 audit(1545188079.183:4166): avc: denied { map } for pid=6981 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1273.770654] ? security_file_permission+0x1c2/0x220 [ 1273.770685] ? rw_verify_area+0x118/0x360 [ 1273.770715] do_iter_read+0x4a3/0x650 [ 1273.770762] vfs_readv+0x175/0x1c0 [ 1273.784063] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1273.801016] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1273.801066] ? fget_raw+0x20/0x20 [ 1273.801099] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1273.801121] ? check_preemption_disabled+0x48/0x280 02:54:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1273.801155] ? __sb_end_write+0xd9/0x110 [ 1273.849272] do_preadv+0x1cc/0x280 [ 1273.852854] ? do_readv+0x310/0x310 [ 1273.856505] ? __ia32_sys_read+0xb0/0xb0 [ 1273.860604] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1273.866005] ? trace_hardirqs_off_caller+0x310/0x310 [ 1273.871142] __x64_sys_preadv+0x9a/0xf0 [ 1273.875153] do_syscall_64+0x1b9/0x820 [ 1273.879064] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1273.884514] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1273.889485] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1273.894358] ? trace_hardirqs_on_caller+0x310/0x310 [ 1273.899409] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1273.904490] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1273.905726] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1273.909543] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1273.909580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1273.909597] RIP: 0033:0x457669 [ 1273.909631] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1273.909663] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1273.957682] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1273.964974] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1273.972290] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1273.973569] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1273.979569] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1273.979582] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 02:54:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1274.098182] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x300, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:39 executing program 5 (fault-call:4 fault-nth:55): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1274.290892] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1274.290967] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1274.308806] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1274.323839] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1274.337338] FAULT_INJECTION: forcing a failure. [ 1274.337338] name failslab, interval 1, probability 0, space 0, times 0 [ 1274.348859] CPU: 1 PID: 7005 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1274.356141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1274.356152] Call Trace: [ 1274.368114] dump_stack+0x244/0x39d [ 1274.371760] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1274.377005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1274.382556] ? check_preemption_disabled+0x48/0x280 [ 1274.387593] should_fail.cold.4+0xa/0x17 [ 1274.387617] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1274.387638] ? lock_is_held_type+0x210/0x210 [ 1274.401221] ? mark_held_locks+0x130/0x130 [ 1274.405477] ? zap_class+0x640/0x640 [ 1274.409211] ? __lock_acquire+0x62f/0x4c20 [ 1274.412618] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1274.413475] ? is_bpf_text_address+0xac/0x170 [ 1274.413495] ? lock_downgrade+0x900/0x900 [ 1274.413512] ? check_preemption_disabled+0x48/0x280 [ 1274.413535] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 02:54:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x4000000, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1274.440881] ? check_preemption_disabled+0x48/0x280 [ 1274.445935] ? debug_smp_processor_id+0x1c/0x20 [ 1274.450620] ? perf_trace_lock+0x14d/0x7a0 [ 1274.454885] ? lock_is_held_type+0x210/0x210 [ 1274.459316] ? check_preemption_disabled+0x48/0x280 [ 1274.464351] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1274.469289] ? kasan_check_read+0x11/0x20 [ 1274.469316] ? zap_class+0x640/0x640 [ 1274.469338] __should_failslab+0x124/0x180 [ 1274.481468] should_failslab+0x9/0x14 [ 1274.485305] __kmalloc+0x70/0x760 02:54:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1274.488795] ? context_struct_to_string+0x401/0x900 [ 1274.493837] context_struct_to_string+0x401/0x900 [ 1274.498705] ? get_permissions_callback+0xb0/0xb0 [ 1274.498723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1274.498738] ? sidtab_search_core+0x21f/0x3b0 [ 1274.498765] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1274.498815] security_sid_to_context+0x35/0x40 [ 1274.498838] selinux_getprocattr+0x3cb/0x8b0 [ 1274.498859] ? selinux_socket_post_create+0x990/0x990 [ 1274.509246] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1274.538734] ? kasan_check_read+0x11/0x20 [ 1274.538752] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1274.538782] ? find_vpid+0xf0/0xf0 [ 1274.538811] security_getprocattr+0x66/0xc0 [ 1274.538836] proc_pid_attr_read+0x158/0x2e0 [ 1274.538859] ? oom_adj_read+0x260/0x260 [ 1274.538875] ? security_file_permission+0x1c2/0x220 [ 1274.538897] ? rw_verify_area+0x118/0x360 [ 1274.560533] do_iter_read+0x4a3/0x650 [ 1274.577521] vfs_readv+0x175/0x1c0 [ 1274.581081] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1274.586476] ? fget_raw+0x20/0x20 02:54:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1274.586501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1274.586521] ? check_preemption_disabled+0x48/0x280 [ 1274.586547] ? __sb_end_write+0xd9/0x110 [ 1274.586572] do_preadv+0x1cc/0x280 [ 1274.608161] ? do_readv+0x310/0x310 [ 1274.611833] ? __ia32_sys_read+0xb0/0xb0 [ 1274.615934] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1274.621323] ? trace_hardirqs_off_caller+0x310/0x310 [ 1274.626453] __x64_sys_preadv+0x9a/0xf0 [ 1274.630523] do_syscall_64+0x1b9/0x820 [ 1274.630538] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1274.630587] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1274.630604] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1274.630624] ? trace_hardirqs_on_caller+0x310/0x310 [ 1274.630643] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1274.630662] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1274.630686] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1274.630716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1274.654790] RIP: 0033:0x457669 [ 1274.654807] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1274.654832] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1274.654848] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1274.654859] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1274.654869] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1274.654880] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1274.654890] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1274.672272] audit: type=1400 audit(1545188080.293:4167): avc: denied { map } for pid=7020 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1274.714752] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1274.723622] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1274.729005] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x700, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1274.745341] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1274.880820] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1274.898081] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1274.904241] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1275.155725] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1275.164924] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1275.195542] audit: type=1400 audit(1545188080.813:4168): avc: denied { map } for pid=7050 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:54:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x4002011, r2, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) write$P9_RLOCK(r3, &(0x7f0000000040)={0x8, 0x35, 0x1, 0x3}, 0x8) 02:54:41 executing program 5 (fault-call:4 fault-nth:56): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0xffffff89, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0xb, 0x4, [@loopback]}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643dfeb8ca8dcb4816d094a393", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="6c004e3c8af752b5e1eadb96a06fd6d545f35c7c5523398695bf89dd8b3b22b17237b5e58eaaeae595cee8be240ccaa0a3146c8b9a8304b88d6238826e3a80e1a9438f318224f9dc28e332dca36d3c189d0c7abb29214b4e1e6ccc8c84b9a127daad5e8d6752eedb5a6fb4846323b11a2eb89bba2953b4a4e4a319e296ed4994b8825bc9d500e1c18a1a34b19857d5ca0844a23501b6"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x101000, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000540)={{0xa, 0x4e21, 0xfffffffffffffff8, @remote, 0x1}, {0xa, 0x4e21, 0x100000000, @empty, 0x1}, 0x6, [0x7ff, 0x9, 0x0, 0x8001, 0x3, 0x80000001, 0x7fff, 0x8]}, 0x5c) wait4(r1, &(0x7f0000000040), 0x4, &(0x7f0000000480)) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x600, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x500, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1275.572503] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1275.576174] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1275.577683] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1275.590630] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1275.615724] FAULT_INJECTION: forcing a failure. 02:54:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1275.615724] name failslab, interval 1, probability 0, space 0, times 0 [ 1275.627260] CPU: 0 PID: 7056 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1275.634554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1275.643924] Call Trace: [ 1275.646540] dump_stack+0x244/0x39d [ 1275.650207] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1275.655424] ? memset+0x31/0x40 [ 1275.658751] should_fail.cold.4+0xa/0x17 [ 1275.662873] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1275.668002] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1275.673135] ? lock_is_held_type+0x210/0x210 [ 1275.677574] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1275.682715] ? perf_tp_event+0xc20/0xc20 [ 1275.686826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1275.692401] ? check_preemption_disabled+0x48/0x280 [ 1275.697439] ? __lock_acquire+0x62f/0x4c20 [ 1275.701703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1275.706111] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1275.707272] ? check_preemption_disabled+0x48/0x280 [ 1275.712529] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1275.720634] ? memset+0x31/0x40 [ 1275.732269] ? perf_trace_lock+0x4a7/0x7a0 [ 1275.736587] ? lock_is_held_type+0x210/0x210 [ 1275.741033] ? check_preemption_disabled+0x48/0x280 [ 1275.746087] ? kasan_check_read+0x11/0x20 [ 1275.750279] ? zap_class+0x640/0x640 [ 1275.754032] __should_failslab+0x124/0x180 [ 1275.758321] should_failslab+0x9/0x14 [ 1275.762157] __kmalloc+0x70/0x760 [ 1275.765651] ? context_struct_to_string+0x401/0x900 02:54:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x7, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1275.770710] context_struct_to_string+0x401/0x900 [ 1275.771378] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1275.775597] ? get_permissions_callback+0xb0/0xb0 [ 1275.775620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1275.775639] ? sidtab_search_core+0x21f/0x3b0 [ 1275.775677] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1275.804587] security_sid_to_context+0x35/0x40 [ 1275.809209] selinux_getprocattr+0x3cb/0x8b0 [ 1275.813656] ? selinux_socket_post_create+0x990/0x990 [ 1275.818875] ? rcu_read_unlock_special+0x1c0/0x1c0 02:54:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1275.823860] ? kasan_check_read+0x11/0x20 [ 1275.828049] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1275.833363] ? find_vpid+0xf0/0xf0 [ 1275.836951] security_getprocattr+0x66/0xc0 [ 1275.841312] proc_pid_attr_read+0x158/0x2e0 [ 1275.845671] ? oom_adj_read+0x260/0x260 [ 1275.849676] ? security_file_permission+0x1c2/0x220 [ 1275.854727] ? rw_verify_area+0x118/0x360 [ 1275.855547] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1275.858910] do_iter_read+0x4a3/0x650 02:54:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1275.859418] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1275.871099] vfs_readv+0x175/0x1c0 [ 1275.883004] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1275.883053] ? fget_raw+0x20/0x20 [ 1275.891884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1275.897461] ? check_preemption_disabled+0x48/0x280 [ 1275.902510] ? __sb_end_write+0xd9/0x110 [ 1275.902564] do_preadv+0x1cc/0x280 [ 1275.910204] ? do_readv+0x310/0x310 [ 1275.913857] ? __ia32_sys_read+0xb0/0xb0 [ 1275.917946] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 02:54:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x700000000000000, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1275.923340] ? trace_hardirqs_off_caller+0x310/0x310 [ 1275.928488] __x64_sys_preadv+0x9a/0xf0 [ 1275.928518] do_syscall_64+0x1b9/0x820 [ 1275.928536] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1275.928559] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1275.928578] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1275.928600] ? trace_hardirqs_on_caller+0x310/0x310 [ 1275.946779] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1275.946812] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1275.946844] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1275.971590] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1275.976821] RIP: 0033:0x457669 [ 1275.977024] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1275.980032] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1275.980045] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1275.980064] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1275.980078] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1275.980090] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1275.980103] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1275.980115] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1276.094759] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1276.105418] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1276.120864] audit: type=1400 audit(1545188081.743:4169): avc: denied { map } for pid=7086 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:54:41 executing program 0: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000300)=0xab, &(0x7f0000000340)=0x4) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') r0 = creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000001440), 0x401, 0x5) r1 = getpid() sched_setscheduler(r1, 0xecaca9d6e352cf68, &(0x7f0000000380)=0x1) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x1, &(0x7f0000000940)=[{&(0x7f00000008c0)}], 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) ioctl$RTC_UIE_ON(r0, 0x7003) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9097e"]) creat(&(0x7f0000000440)='./file1/file0\x00', 0x4a) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f0000000cc0)={0x900000000000, 0x0, 0x6, 'queue1\x00'}) fallocate(0xffffffffffffffff, 0x40, 0x44, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174001004010002000270", 0x14}], 0x0, 0x0) 02:54:41 executing program 5 (fault-call:4 fault-nth:57): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) [ 1276.299658] FAULT_INJECTION: forcing a failure. [ 1276.299658] name failslab, interval 1, probability 0, space 0, times 0 [ 1276.311011] CPU: 1 PID: 7097 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1276.318302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1276.327661] Call Trace: [ 1276.330265] dump_stack+0x244/0x39d [ 1276.333916] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1276.333941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1276.333975] ? check_preemption_disabled+0x48/0x280 [ 1276.334001] should_fail.cold.4+0xa/0x17 [ 1276.344724] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1276.344743] ? lock_is_held_type+0x210/0x210 [ 1276.344777] ? mark_held_locks+0x130/0x130 [ 1276.344795] ? zap_class+0x640/0x640 [ 1276.344816] ? __lock_acquire+0x62f/0x4c20 [ 1276.344836] ? is_bpf_text_address+0xac/0x170 [ 1276.344859] ? lock_downgrade+0x900/0x900 [ 1276.384180] ? check_preemption_disabled+0x48/0x280 [ 1276.389203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1276.394728] ? check_preemption_disabled+0x48/0x280 [ 1276.399738] ? debug_smp_processor_id+0x1c/0x20 [ 1276.404397] ? perf_trace_lock+0x14d/0x7a0 [ 1276.408626] ? lock_is_held_type+0x210/0x210 [ 1276.413023] ? check_preemption_disabled+0x48/0x280 [ 1276.418044] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1276.422978] ? kasan_check_read+0x11/0x20 [ 1276.427119] ? zap_class+0x640/0x640 [ 1276.430829] __should_failslab+0x124/0x180 [ 1276.435070] should_failslab+0x9/0x14 [ 1276.438867] __kmalloc+0x70/0x760 [ 1276.442316] ? context_struct_to_string+0x401/0x900 [ 1276.447342] context_struct_to_string+0x401/0x900 [ 1276.452194] ? get_permissions_callback+0xb0/0xb0 [ 1276.457027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1276.462579] ? sidtab_search_core+0x21f/0x3b0 [ 1276.464039] overlayfs: failed to resolve './file1': -2 [ 1276.467121] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1276.467148] security_sid_to_context+0x35/0x40 [ 1276.467176] selinux_getprocattr+0x3cb/0x8b0 [ 1276.487320] ? selinux_socket_post_create+0x990/0x990 [ 1276.492499] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1276.497458] ? kasan_check_read+0x11/0x20 [ 1276.501622] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1276.506891] ? find_vpid+0xf0/0xf0 [ 1276.510443] security_getprocattr+0x66/0xc0 [ 1276.514757] proc_pid_attr_read+0x158/0x2e0 [ 1276.519095] ? oom_adj_read+0x260/0x260 [ 1276.523070] ? security_file_permission+0x1c2/0x220 [ 1276.528079] ? rw_verify_area+0x118/0x360 [ 1276.532233] do_iter_read+0x4a3/0x650 [ 1276.536032] vfs_readv+0x175/0x1c0 [ 1276.539579] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1276.544942] ? fget_raw+0x20/0x20 [ 1276.548389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1276.553918] ? check_preemption_disabled+0x48/0x280 [ 1276.558929] ? __sb_end_write+0xd9/0x110 [ 1276.562984] do_preadv+0x1cc/0x280 [ 1276.566516] ? do_readv+0x310/0x310 [ 1276.570148] ? __ia32_sys_read+0xb0/0xb0 [ 1276.574247] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1276.579617] ? trace_hardirqs_off_caller+0x310/0x310 [ 1276.584713] __x64_sys_preadv+0x9a/0xf0 [ 1276.588695] do_syscall_64+0x1b9/0x820 [ 1276.592585] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1276.597951] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1276.602888] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1276.607719] ? trace_hardirqs_on_caller+0x310/0x310 [ 1276.612738] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1276.617743] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1276.622758] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1276.627630] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1276.632821] RIP: 0033:0x457669 [ 1276.636006] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1276.654898] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1276.662604] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1276.669862] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1276.677119] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1276.684385] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1276.691640] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1276.731828] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 1276.802215] overlayfs: failed to resolve './file0': -2 02:54:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x232, 0xfffffffffffffffc, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) close(r0) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0xffffffff00000000, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:44 executing program 5 (fault-call:4 fault-nth:58): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x1) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x10) [ 1278.615148] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1278.621822] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1278.637488] audit: type=1400 audit(1545188084.263:4170): avc: denied { map } for pid=7124 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1278.640218] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1278.652840] FAULT_INJECTION: forcing a failure. [ 1278.652840] name failslab, interval 1, probability 0, space 0, times 0 [ 1278.661414] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1278.678478] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1278.679597] CPU: 1 PID: 7126 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1278.703286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1278.712656] Call Trace: [ 1278.715261] dump_stack+0x244/0x39d [ 1278.718920] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1278.724132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1278.729685] ? check_preemption_disabled+0x48/0x280 [ 1278.734725] should_fail.cold.4+0xa/0x17 [ 1278.738817] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1278.743965] ? lock_is_held_type+0x210/0x210 [ 1278.748395] ? mark_held_locks+0x130/0x130 [ 1278.748412] ? zap_class+0x640/0x640 [ 1278.748433] ? __lock_acquire+0x62f/0x4c20 [ 1278.748449] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1278.748469] ? trace_hardirqs_on+0xbd/0x310 [ 1278.748485] ? kasan_check_read+0x11/0x20 [ 1278.748504] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1278.748522] ? check_preemption_disabled+0x48/0x280 [ 1278.748546] ? debug_smp_processor_id+0x1c/0x20 [ 1278.748562] ? perf_trace_lock+0x14d/0x7a0 [ 1278.748586] ? lock_is_held_type+0x210/0x210 [ 1278.765342] ? check_preemption_disabled+0x48/0x280 [ 1278.765364] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1278.765380] ? kasan_check_read+0x11/0x20 [ 1278.765399] ? zap_class+0x640/0x640 [ 1278.784435] __should_failslab+0x124/0x180 [ 1278.797752] should_failslab+0x9/0x14 [ 1278.797769] __kmalloc+0x70/0x760 [ 1278.797806] ? context_struct_to_string+0x401/0x900 [ 1278.797831] context_struct_to_string+0x401/0x900 [ 1278.797854] ? get_permissions_callback+0xb0/0xb0 [ 1278.815674] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1278.815691] ? sidtab_search_core+0x21f/0x3b0 [ 1278.815720] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1278.815745] security_sid_to_context+0x35/0x40 [ 1278.827258] selinux_getprocattr+0x3cb/0x8b0 [ 1278.827303] ? selinux_socket_post_create+0x990/0x990 [ 1278.827335] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1278.827350] ? kasan_check_read+0x11/0x20 [ 1278.827382] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1278.837252] ? find_vpid+0xf0/0xf0 [ 1278.837282] security_getprocattr+0x66/0xc0 [ 1278.837314] proc_pid_attr_read+0x158/0x2e0 [ 1278.837335] ? oom_adj_read+0x260/0x260 [ 1278.862678] ? security_file_permission+0x1c2/0x220 [ 1278.862701] ? rw_verify_area+0x118/0x360 [ 1278.862724] do_iter_read+0x4a3/0x650 02:54:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) r2 = gettid() rt_tgsigqueueinfo(r1, r2, 0x1d, &(0x7f0000000080)={0x25, 0x4, 0x280000000000000}) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r3 = gettid() r4 = open(&(0x7f0000000200)='./file0\x00', 0x80803, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r4, 0x10f, 0x83, &(0x7f0000000280), &(0x7f0000000340)=0x4) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r3, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1278.862761] vfs_readv+0x175/0x1c0 [ 1278.877352] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1278.877385] ? fget_raw+0x20/0x20 [ 1278.877410] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1278.877431] ? check_preemption_disabled+0x48/0x280 [ 1278.938847] ? __sb_end_write+0xd9/0x110 [ 1278.942941] do_preadv+0x1cc/0x280 [ 1278.946516] ? do_readv+0x310/0x310 [ 1278.950182] ? __ia32_sys_read+0xb0/0xb0 [ 1278.954287] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1278.959675] ? trace_hardirqs_off_caller+0x310/0x310 02:54:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x600000000000000, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1278.964812] __x64_sys_preadv+0x9a/0xf0 [ 1278.968820] do_syscall_64+0x1b9/0x820 [ 1278.972726] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1278.978117] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1278.983068] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1278.984348] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1278.987929] ? trace_hardirqs_on_caller+0x310/0x310 [ 1278.987949] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1278.987970] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1278.987994] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1278.988018] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1279.021337] RIP: 0033:0x457669 [ 1279.024545] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1279.030541] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1279.043453] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1279.043470] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 02:54:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1279.043480] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1279.043491] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1279.043501] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1279.043512] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1279.058681] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x500000000000000, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1279.060456] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1279.131567] audit: type=1400 audit(1545188084.743:4171): avc: denied { map } for pid=7147 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:54:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000180)="0fae0165260fc79ff17c3e64f20f5f9ab94666b92d0200000f3266b80000aac60f23c00f21f86635030002000f23f826670f01cfb880068ec866b9800000c00f326635004000000f300f229b0f2297", 0x4f}], 0x1, 0x20, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe2(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r4, &(0x7f0000011fd2), 0xffffffee) read(r3, &(0x7f0000000000)=""/126, 0xfffffeab) [ 1279.243554] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:44 executing program 5 (fault-call:4 fault-nth:59): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) [ 1279.299321] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1279.329850] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1279.331430] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1279.440482] audit: type=1400 audit(1545188085.063:4172): avc: denied { map } for pid=7174 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1279.476684] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1279.486426] FAULT_INJECTION: forcing a failure. [ 1279.486426] name failslab, interval 1, probability 0, space 0, times 0 [ 1279.497947] CPU: 0 PID: 7177 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1279.505241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1279.514620] Call Trace: [ 1279.517232] dump_stack+0x244/0x39d [ 1279.520914] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1279.526176] ? memset+0x31/0x40 [ 1279.529544] should_fail.cold.4+0xa/0x17 [ 1279.529563] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1279.541815] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1279.546945] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1279.552072] ? lock_is_held_type+0x210/0x210 [ 1279.556514] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1279.561678] ? perf_tp_event+0xc20/0xc20 [ 1279.565792] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1279.571365] ? check_preemption_disabled+0x48/0x280 [ 1279.576402] ? __lock_acquire+0x62f/0x4c20 [ 1279.580679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1279.586239] ? check_preemption_disabled+0x48/0x280 [ 1279.591290] ? memset+0x31/0x40 [ 1279.594614] ? perf_trace_lock+0x4a7/0x7a0 [ 1279.598893] ? lock_is_held_type+0x210/0x210 [ 1279.603331] ? check_preemption_disabled+0x48/0x280 [ 1279.608382] ? kasan_check_read+0x11/0x20 [ 1279.612555] ? zap_class+0x640/0x640 [ 1279.616332] __should_failslab+0x124/0x180 [ 1279.620606] should_failslab+0x9/0x14 [ 1279.624446] __kmalloc+0x70/0x760 [ 1279.627944] ? context_struct_to_string+0x401/0x900 [ 1279.632999] context_struct_to_string+0x401/0x900 [ 1279.637884] ? get_permissions_callback+0xb0/0xb0 [ 1279.642808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1279.648379] ? sidtab_search_core+0x21f/0x3b0 [ 1279.652930] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1279.658858] security_sid_to_context+0x35/0x40 [ 1279.663492] selinux_getprocattr+0x3cb/0x8b0 [ 1279.667932] ? selinux_socket_post_create+0x990/0x990 [ 1279.673149] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1279.678177] ? kasan_check_read+0x11/0x20 [ 1279.682383] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1279.687690] ? find_vpid+0xf0/0xf0 [ 1279.691278] security_getprocattr+0x66/0xc0 [ 1279.695643] proc_pid_attr_read+0x158/0x2e0 [ 1279.700001] ? oom_adj_read+0x260/0x260 [ 1279.704003] ? security_file_permission+0x1c2/0x220 [ 1279.709317] ? rw_verify_area+0x118/0x360 [ 1279.713502] do_iter_read+0x4a3/0x650 [ 1279.717382] vfs_readv+0x175/0x1c0 [ 1279.720967] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1279.726416] ? fget_raw+0x20/0x20 [ 1279.726459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1279.735446] ? check_preemption_disabled+0x48/0x280 [ 1279.740510] ? __sb_end_write+0xd9/0x110 [ 1279.744616] do_preadv+0x1cc/0x280 [ 1279.748197] ? do_readv+0x310/0x310 [ 1279.751861] ? __ia32_sys_read+0xb0/0xb0 [ 1279.755945] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1279.761348] ? trace_hardirqs_off_caller+0x310/0x310 [ 1279.766512] __x64_sys_preadv+0x9a/0xf0 [ 1279.770544] do_syscall_64+0x1b9/0x820 [ 1279.774468] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1279.779872] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1279.784832] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1279.789705] ? trace_hardirqs_on_caller+0x310/0x310 [ 1279.794743] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1279.799871] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1279.799905] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1279.799938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1279.809807] RIP: 0033:0x457669 [ 1279.809828] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:54:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1279.809840] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1279.809863] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1279.852146] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1279.859454] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1279.866742] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1279.874029] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1279.878354] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x100) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000340)) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r2 = gettid() r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) connect$packet(r3, &(0x7f0000000200)={0x11, 0x10, r4, 0x1, 0x1, 0x6, @random="98e1d0bc6246"}, 0x14) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0xd002, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:45 executing program 5 (fault-call:4 fault-nth:60): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:45 executing program 0: 02:54:45 executing program 0: [ 1280.166851] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1280.175695] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1280.180136] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1280.213316] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1280.216905] FAULT_INJECTION: forcing a failure. [ 1280.216905] name failslab, interval 1, probability 0, space 0, times 0 [ 1280.236740] CPU: 1 PID: 7200 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1280.244039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1280.244046] Call Trace: [ 1280.244071] dump_stack+0x244/0x39d [ 1280.244094] ? dump_stack_print_info.cold.1+0x20/0x20 02:54:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1280.244117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1280.270560] ? check_preemption_disabled+0x48/0x280 [ 1280.275595] should_fail.cold.4+0xa/0x17 [ 1280.275618] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1280.275640] ? lock_is_held_type+0x210/0x210 [ 1280.289229] ? mark_held_locks+0x130/0x130 [ 1280.293479] ? zap_class+0x640/0x640 [ 1280.294139] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1280.297207] ? __lock_acquire+0x62f/0x4c20 [ 1280.297226] ? is_bpf_text_address+0xac/0x170 02:54:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1280.297243] ? lock_downgrade+0x900/0x900 [ 1280.297265] ? check_preemption_disabled+0x48/0x280 [ 1280.323315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1280.323335] ? check_preemption_disabled+0x48/0x280 [ 1280.323360] ? debug_smp_processor_id+0x1c/0x20 [ 1280.323377] ? perf_trace_lock+0x14d/0x7a0 [ 1280.323401] ? lock_is_held_type+0x210/0x210 [ 1280.342836] ? check_preemption_disabled+0x48/0x280 [ 1280.342857] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1280.342874] ? kasan_check_read+0x11/0x20 [ 1280.342892] ? zap_class+0x640/0x640 02:54:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1280.342918] __should_failslab+0x124/0x180 [ 1280.367657] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1280.369373] should_failslab+0x9/0x14 [ 1280.371672] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1280.381492] __kmalloc+0x70/0x760 [ 1280.393323] ? context_struct_to_string+0x401/0x900 [ 1280.398381] context_struct_to_string+0x401/0x900 [ 1280.403245] ? get_permissions_callback+0xb0/0xb0 [ 1280.408158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1280.413710] ? sidtab_search_core+0x21f/0x3b0 02:54:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x2d0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1280.418247] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1280.424157] security_sid_to_context+0x35/0x40 [ 1280.428764] selinux_getprocattr+0x3cb/0x8b0 [ 1280.433246] ? selinux_socket_post_create+0x990/0x990 [ 1280.438494] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1280.443490] ? kasan_check_read+0x11/0x20 [ 1280.447650] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1280.448394] audit: type=1400 audit(1545188086.003:4173): avc: denied { map } for pid=7204 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1280.452943] ? find_vpid+0xf0/0xf0 [ 1280.478466] security_getprocattr+0x66/0xc0 [ 1280.482820] proc_pid_attr_read+0x158/0x2e0 [ 1280.487160] ? oom_adj_read+0x260/0x260 [ 1280.491154] ? security_file_permission+0x1c2/0x220 [ 1280.496220] ? rw_verify_area+0x118/0x360 [ 1280.500388] do_iter_read+0x4a3/0x650 [ 1280.504236] vfs_readv+0x175/0x1c0 [ 1280.507845] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1280.513239] ? fget_raw+0x20/0x20 02:54:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1280.516726] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1280.522326] ? check_preemption_disabled+0x48/0x280 [ 1280.527437] ? __sb_end_write+0xd9/0x110 [ 1280.531565] do_preadv+0x1cc/0x280 [ 1280.535131] ? do_readv+0x310/0x310 [ 1280.538799] ? __ia32_sys_read+0xb0/0xb0 [ 1280.538817] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1280.538836] ? trace_hardirqs_off_caller+0x310/0x310 [ 1280.538860] __x64_sys_preadv+0x9a/0xf0 [ 1280.538883] do_syscall_64+0x1b9/0x820 [ 1280.538898] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1280.538918] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1280.538938] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1280.576475] ? trace_hardirqs_on_caller+0x310/0x310 [ 1280.581504] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1280.581525] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1280.581551] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1280.581577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1280.581594] RIP: 0033:0x457669 [ 1280.591627] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1280.591637] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1280.591654] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1280.591665] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1280.591675] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1280.591692] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1280.591702] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1280.630262] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1280.647274] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1280.648484] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1280.682965] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmod0000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:47 executing program 0: 02:54:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00F\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x5, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:47 executing program 5 (fault-call:4 fault-nth:61): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) [ 1281.634396] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1281.662307] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1281.675967] FAULT_INJECTION: forcing a failure. 02:54:47 executing program 0: [ 1281.675967] name failslab, interval 1, probability 0, space 0, times 0 [ 1281.679114] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1281.687270] CPU: 1 PID: 7241 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1281.702876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1281.712228] Call Trace: [ 1281.712252] dump_stack+0x244/0x39d [ 1281.712275] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1281.712305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1281.712329] ? check_preemption_disabled+0x48/0x280 [ 1281.734258] should_fail.cold.4+0xa/0x17 [ 1281.738345] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1281.743465] ? lock_is_held_type+0x210/0x210 [ 1281.747922] ? mark_held_locks+0x130/0x130 [ 1281.752183] ? zap_class+0x640/0x640 [ 1281.755922] ? __lock_acquire+0x62f/0x4c20 [ 1281.760193] ? is_bpf_text_address+0xac/0x170 [ 1281.764709] ? lock_downgrade+0x900/0x900 [ 1281.768869] ? check_preemption_disabled+0x48/0x280 [ 1281.773909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1281.779463] ? check_preemption_disabled+0x48/0x280 02:54:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:47 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x101001) getsockopt$inet_tcp_buf(r1, 0x6, 0x21, &(0x7f0000000200)=""/44, &(0x7f0000000240)=0x2c) r3 = dup2(r2, r1) fchdir(0xffffffffffffffff) pselect6(0x0, 0x0, &(0x7f0000000340)={0x4, 0x0, 0x800, 0xfffffffffffffffe, 0x7f, 0x200, 0x8152, 0x100000001}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, &(0x7f0000000440)={&(0x7f0000000400), 0x8}) tee(r0, r0, 0xeba, 0x7) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^\xc8g,\x934\x0fd:fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,Q\xf0\x1b\x7f\v\x01O\x9f\x91\xee\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x8f\xaf\x8f\xb5t\xdb\xcf\xa6\xdcM'}) geteuid() r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) umount2(&(0x7f0000000380)='./bus\x00', 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x2, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) mremap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000005000/0x2000)=nil) msgget(0x1, 0x240) stat(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000500)) [ 1281.784504] ? debug_smp_processor_id+0x1c/0x20 [ 1281.789188] ? perf_trace_lock+0x14d/0x7a0 [ 1281.793495] ? lock_is_held_type+0x210/0x210 [ 1281.797921] ? check_preemption_disabled+0x48/0x280 [ 1281.802977] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1281.807924] ? kasan_check_read+0x11/0x20 [ 1281.812092] ? zap_class+0x640/0x640 [ 1281.812116] __should_failslab+0x124/0x180 [ 1281.812138] should_failslab+0x9/0x14 [ 1281.812153] __kmalloc+0x70/0x760 [ 1281.812177] ? context_struct_to_string+0x401/0x900 [ 1281.820120] context_struct_to_string+0x401/0x900 [ 1281.820146] ? get_permissions_callback+0xb0/0xb0 [ 1281.820165] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1281.820180] ? sidtab_search_core+0x21f/0x3b0 [ 1281.820211] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1281.837332] security_sid_to_context+0x35/0x40 [ 1281.837355] selinux_getprocattr+0x3cb/0x8b0 [ 1281.837381] ? selinux_socket_post_create+0x990/0x990 [ 1281.858109] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1281.858126] ? kasan_check_read+0x11/0x20 [ 1281.858143] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1281.858162] ? find_vpid+0xf0/0xf0 [ 1281.858190] security_getprocattr+0x66/0xc0 [ 1281.894591] proc_pid_attr_read+0x158/0x2e0 [ 1281.898937] ? oom_adj_read+0x260/0x260 [ 1281.902925] ? security_file_permission+0x1c2/0x220 [ 1281.907968] ? rw_verify_area+0x118/0x360 [ 1281.908455] audit: type=1400 audit(1545188087.313:4174): avc: denied { map } for pid=7251 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1281.912144] do_iter_read+0x4a3/0x650 [ 1281.912177] vfs_readv+0x175/0x1c0 [ 1281.912199] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1281.912227] ? fget_raw+0x20/0x20 [ 1281.950314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1281.955873] ? check_preemption_disabled+0x48/0x280 [ 1281.960916] ? __sb_end_write+0xd9/0x110 [ 1281.965025] do_preadv+0x1cc/0x280 [ 1281.968447] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1281.968580] ? do_readv+0x310/0x310 [ 1281.980343] ? __ia32_sys_read+0xb0/0xb0 02:54:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1281.984440] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1281.989830] ? trace_hardirqs_off_caller+0x310/0x310 [ 1281.994956] __x64_sys_preadv+0x9a/0xf0 [ 1281.998953] do_syscall_64+0x1b9/0x820 [ 1282.002862] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1282.008252] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1282.013282] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1282.018162] ? trace_hardirqs_on_caller+0x310/0x310 [ 1282.023197] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1282.028239] ? prepare_exit_to_usermode+0x291/0x3b0 02:54:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x7fffffe, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1282.033291] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1282.038203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1282.043400] RIP: 0033:0x457669 [ 1282.046622] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1282.065530] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1282.065548] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 02:54:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1282.065558] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1282.065575] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1282.095084] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1282.102373] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1282.156975] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1282.167239] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1282.191661] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) ptrace$cont(0x3f, r0, 0x81, 0x80) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x26, 0x0, 0x1, "432b441817b7b245439b04e0765e7780", "728750bc86e611b38463d70b785d9c1fd2"}, 0x26, 0x1) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x14) read$FUSE(r1, &(0x7f0000003000), 0x1000) 02:54:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0xfeffff0700000000, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1282.193414] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1282.369857] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1282.404037] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:48 executing program 5 (fault-call:4 fault-nth:62): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) [ 1282.422649] audit: type=1400 audit(1545188088.043:4175): avc: denied { map } for pid=7276 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:54:48 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x101001) getsockopt$inet_tcp_buf(r1, 0x6, 0x21, &(0x7f0000000200)=""/44, &(0x7f0000000240)=0x2c) r3 = dup2(r2, r1) fchdir(0xffffffffffffffff) pselect6(0x0, 0x0, &(0x7f0000000340)={0x4, 0x0, 0x800, 0xfffffffffffffffe, 0x7f, 0x200, 0x8152, 0x100000001}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, &(0x7f0000000440)={&(0x7f0000000400), 0x8}) tee(r0, r0, 0xeba, 0x7) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^\xc8g,\x934\x0fd:fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,Q\xf0\x1b\x7f\v\x01O\x9f\x91\xee\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x8f\xaf\x8f\xb5t\xdb\xcf\xa6\xdcM'}) geteuid() r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) umount2(&(0x7f0000000380)='./bus\x00', 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x2, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) mremap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000005000/0x2000)=nil) msgget(0x1, 0x240) stat(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000500)) 02:54:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1282.529898] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1282.569660] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1282.584336] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1282.625628] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1282.632920] FAULT_INJECTION: forcing a failure. [ 1282.632920] name failslab, interval 1, probability 0, space 0, times 0 [ 1282.645279] CPU: 0 PID: 7290 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1282.652576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1282.661945] Call Trace: [ 1282.664571] dump_stack+0x244/0x39d [ 1282.668230] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1282.673452] ? memset+0x31/0x40 [ 1282.676803] should_fail.cold.4+0xa/0x17 [ 1282.680909] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1282.680930] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1282.680961] ? mark_held_locks+0xc7/0x130 [ 1282.680987] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1282.700132] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1282.704760] ? retint_kernel+0x2d/0x2d [ 1282.708703] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1282.713659] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1282.718261] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1282.718284] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1282.718305] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1282.718327] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1282.718361] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1282.718413] ? retint_kernel+0x2d/0x2d [ 1282.743611] ? find_next_bit+0x77/0x130 [ 1282.743651] __should_failslab+0x124/0x180 [ 1282.743678] should_failslab+0x9/0x14 [ 1282.743699] __kmalloc+0x70/0x760 [ 1282.759654] ? context_struct_to_string+0x401/0x900 [ 1282.759689] context_struct_to_string+0x401/0x900 [ 1282.759722] ? get_permissions_callback+0xb0/0xb0 [ 1282.759744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1282.783529] ? sidtab_search_core+0x21f/0x3b0 [ 1282.788070] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1282.793998] security_sid_to_context+0x35/0x40 [ 1282.798617] selinux_getprocattr+0x3cb/0x8b0 [ 1282.799290] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1282.803058] ? selinux_socket_post_create+0x990/0x990 [ 1282.803087] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1282.803107] ? kasan_check_read+0x11/0x20 [ 1282.803127] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1282.803158] ? find_vpid+0xf0/0xf0 [ 1282.834436] security_getprocattr+0x66/0xc0 [ 1282.838808] proc_pid_attr_read+0x158/0x2e0 [ 1282.843167] ? oom_adj_read+0x260/0x260 [ 1282.847168] ? security_file_permission+0x1c2/0x220 [ 1282.848417] audit: type=1400 audit(1545188088.403:4176): avc: denied { map } for pid=7300 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:54:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x300000000000000, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1282.852233] ? rw_verify_area+0x118/0x360 [ 1282.852280] do_iter_read+0x4a3/0x650 [ 1282.852330] vfs_readv+0x175/0x1c0 [ 1282.852374] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1282.893567] ? fget_raw+0x20/0x20 [ 1282.897062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1282.900080] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1282.902624] ? check_preemption_disabled+0x48/0x280 [ 1282.902664] ? __sb_end_write+0xd9/0x110 [ 1282.915524] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1282.920088] do_preadv+0x1cc/0x280 [ 1282.920475] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1282.928425] ? do_readv+0x310/0x310 [ 1282.928443] ? __ia32_sys_read+0xb0/0xb0 [ 1282.928492] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1282.928516] ? trace_hardirqs_off_caller+0x310/0x310 [ 1282.928549] __x64_sys_preadv+0x9a/0xf0 [ 1282.940251] do_syscall_64+0x1b9/0x820 [ 1282.966265] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1282.971665] ? syscall_return_slowpath+0x5e0/0x5e0 02:54:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x200000000000000, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1282.976635] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1282.981561] ? trace_hardirqs_on_caller+0x310/0x310 [ 1282.986603] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1282.991650] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1282.996733] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1283.001635] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1283.006851] RIP: 0033:0x457669 [ 1283.010070] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1283.017626] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1283.028988] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1283.029008] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1283.029020] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1283.029032] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1283.029044] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1283.029057] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1283.132435] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1283.139274] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00efd56f1d2d1a5c4524d5ff4149841a04000000029898d03138bb4b099befc7af546088c334093a0405a57f499e11083787401e"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:49 executing program 5 (fault-call:4 fault-nth:63): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0xfeffff07, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x101001) getsockopt$inet_tcp_buf(r1, 0x6, 0x21, &(0x7f0000000200)=""/44, &(0x7f0000000240)=0x2c) r3 = dup2(r2, r1) fchdir(0xffffffffffffffff) pselect6(0x0, 0x0, &(0x7f0000000340)={0x4, 0x0, 0x800, 0xfffffffffffffffe, 0x7f, 0x200, 0x8152, 0x100000001}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, &(0x7f0000000440)={&(0x7f0000000400), 0x8}) tee(r0, r0, 0xeba, 0x7) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^\xc8g,\x934\x0fd:fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,Q\xf0\x1b\x7f\v\x01O\x9f\x91\xee\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x8f\xaf\x8f\xb5t\xdb\xcf\xa6\xdcM'}) geteuid() r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) umount2(&(0x7f0000000380)='./bus\x00', 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x2, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) mremap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000005000/0x2000)=nil) msgget(0x1, 0x240) stat(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000500)) [ 1283.411428] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1283.426864] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1283.445063] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x1000000, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1283.449578] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1283.532460] audit: type=1400 audit(1545188089.153:4177): avc: denied { map } for pid=7339 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1283.541848] FAULT_INJECTION: forcing a failure. [ 1283.541848] name failslab, interval 1, probability 0, space 0, times 0 [ 1283.565732] CPU: 1 PID: 7333 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1283.573093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1283.582474] Call Trace: [ 1283.585122] dump_stack+0x244/0x39d [ 1283.588788] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1283.588808] ? print_usage_bug+0xc0/0xc0 [ 1283.588828] ? check_preemption_disabled+0x48/0x280 [ 1283.588857] should_fail.cold.4+0xa/0x17 [ 1283.588878] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1283.588899] ? lock_is_held_type+0x210/0x210 [ 1283.604021] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1283.607257] ? mark_held_locks+0xc7/0x130 [ 1283.607279] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1283.607321] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1283.607356] ? retint_kernel+0x2d/0x2d [ 1283.642375] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1283.647327] ? is_bpf_text_address+0xac/0x170 [ 1283.651842] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1283.656621] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1283.662091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1283.667640] ? check_preemption_disabled+0x48/0x280 [ 1283.672684] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1283.677486] __should_failslab+0x124/0x180 [ 1283.681739] should_failslab+0x9/0x14 [ 1283.681756] __kmalloc+0x70/0x760 [ 1283.681794] ? context_struct_to_string+0x401/0x900 [ 1283.689044] context_struct_to_string+0x401/0x900 [ 1283.689069] ? get_permissions_callback+0xb0/0xb0 [ 1283.689088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1283.689104] ? sidtab_search_core+0x21f/0x3b0 [ 1283.689132] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1283.689160] security_sid_to_context+0x35/0x40 [ 1283.724362] selinux_getprocattr+0x3cb/0x8b0 [ 1283.727678] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1283.728838] ? selinux_socket_post_create+0x990/0x990 [ 1283.728857] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1283.728874] ? kasan_check_read+0x11/0x20 [ 1283.728890] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1283.728909] ? find_vpid+0xf0/0xf0 [ 1283.728939] security_getprocattr+0x66/0xc0 [ 1283.728962] proc_pid_attr_read+0x158/0x2e0 [ 1283.768828] ? oom_adj_read+0x260/0x260 [ 1283.772816] ? security_file_permission+0x1c2/0x220 [ 1283.777878] ? rw_verify_area+0x118/0x360 [ 1283.782056] do_iter_read+0x4a3/0x650 [ 1283.785902] vfs_readv+0x175/0x1c0 [ 1283.789473] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1283.794876] ? fget_raw+0x20/0x20 [ 1283.798360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1283.798380] ? check_preemption_disabled+0x48/0x280 [ 1283.798405] ? __sb_end_write+0xd9/0x110 [ 1283.798429] do_preadv+0x1cc/0x280 [ 1283.809006] ? do_readv+0x310/0x310 [ 1283.809021] ? __ia32_sys_read+0xb0/0xb0 [ 1283.809038] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1283.809056] ? trace_hardirqs_off_caller+0x310/0x310 [ 1283.809079] __x64_sys_preadv+0x9a/0xf0 [ 1283.809099] do_syscall_64+0x1b9/0x820 [ 1283.809113] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1283.809132] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1283.829961] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1283.834897] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1283.834918] ? trace_hardirqs_on_caller+0x310/0x310 [ 1283.834937] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1283.834958] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1283.834983] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1283.835008] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1283.835027] RIP: 0033:0x457669 [ 1283.875959] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1283.876166] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1283.921500] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 02:54:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1283.929242] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1283.936517] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1283.943808] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1283.951125] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1283.958431] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1283.988740] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1284.027416] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1284.039409] audit: type=1400 audit(1545188089.663:4178): avc: denied { map } for pid=7358 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1284.055185] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x2, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x101001) getsockopt$inet_tcp_buf(r1, 0x6, 0x21, &(0x7f0000000200)=""/44, &(0x7f0000000240)=0x2c) r3 = dup2(r2, r1) fchdir(0xffffffffffffffff) pselect6(0x0, 0x0, &(0x7f0000000340)={0x4, 0x0, 0x800, 0xfffffffffffffffe, 0x7f, 0x200, 0x8152, 0x100000001}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, &(0x7f0000000440)={&(0x7f0000000400), 0x8}) tee(r0, r0, 0xeba, 0x7) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^\xc8g,\x934\x0fd:fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,Q\xf0\x1b\x7f\v\x01O\x9f\x91\xee\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x8f\xaf\x8f\xb5t\xdb\xcf\xa6\xdcM'}) geteuid() r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) umount2(&(0x7f0000000380)='./bus\x00', 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x2, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) mremap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000005000/0x2000)=nil) msgget(0x1, 0x240) stat(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000500)) 02:54:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:50 executing program 5 (fault-call:4 fault-nth:64): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x3000000, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1284.391375] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1284.417153] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1284.428150] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1284.449894] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1284.470801] FAULT_INJECTION: forcing a failure. [ 1284.470801] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.483094] CPU: 1 PID: 7373 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1284.490382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1284.499784] Call Trace: [ 1284.502399] dump_stack+0x244/0x39d [ 1284.506058] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1284.511269] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1284.511290] ? check_preemption_disabled+0x48/0x280 [ 1284.511326] should_fail.cold.4+0xa/0x17 [ 1284.511348] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1284.521891] ? lock_is_held_type+0x210/0x210 [ 1284.521919] ? mark_held_locks+0x130/0x130 02:54:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1284.521938] ? zap_class+0x640/0x640 [ 1284.535501] ? __lock_acquire+0x62f/0x4c20 [ 1284.535519] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1284.535540] ? trace_hardirqs_on+0xbd/0x310 [ 1284.554289] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1284.556659] ? kasan_check_read+0x11/0x20 [ 1284.556679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1284.556702] ? check_preemption_disabled+0x48/0x280 [ 1284.579521] ? debug_smp_processor_id+0x1c/0x20 [ 1284.584223] ? perf_trace_lock+0x14d/0x7a0 02:54:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xfffffffffeffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1284.588481] ? lock_is_held_type+0x210/0x210 [ 1284.592909] ? check_preemption_disabled+0x48/0x280 [ 1284.597946] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1284.602892] ? kasan_check_read+0x11/0x20 [ 1284.607059] ? zap_class+0x640/0x640 [ 1284.610810] __should_failslab+0x124/0x180 [ 1284.615079] should_failslab+0x9/0x14 [ 1284.618887] __kmalloc+0x70/0x760 [ 1284.618912] ? context_struct_to_string+0x401/0x900 [ 1284.618936] context_struct_to_string+0x401/0x900 [ 1284.618962] ? get_permissions_callback+0xb0/0xb0 [ 1284.618980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1284.618999] ? sidtab_search_core+0x21f/0x3b0 [ 1284.642670] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1284.642697] security_sid_to_context+0x35/0x40 [ 1284.642719] selinux_getprocattr+0x3cb/0x8b0 [ 1284.642744] ? selinux_socket_post_create+0x990/0x990 [ 1284.667268] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1284.672216] ? kasan_check_read+0x11/0x20 [ 1284.676377] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1284.676398] ? find_vpid+0xf0/0xf0 [ 1284.676428] security_getprocattr+0x66/0xc0 [ 1284.676453] proc_pid_attr_read+0x158/0x2e0 [ 1284.676479] ? oom_adj_read+0x260/0x260 [ 1284.697907] ? security_file_permission+0x1c2/0x220 [ 1284.702946] ? rw_verify_area+0x118/0x360 [ 1284.707139] do_iter_read+0x4a3/0x650 [ 1284.710975] vfs_readv+0x175/0x1c0 [ 1284.714543] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1284.719939] ? fget_raw+0x20/0x20 [ 1284.723432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1284.728984] ? check_preemption_disabled+0x48/0x280 [ 1284.734026] ? __sb_end_write+0xd9/0x110 [ 1284.738115] do_preadv+0x1cc/0x280 02:54:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1284.740533] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1284.741673] ? do_readv+0x310/0x310 [ 1284.741690] ? __ia32_sys_read+0xb0/0xb0 [ 1284.741708] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1284.741728] ? trace_hardirqs_off_caller+0x310/0x310 [ 1284.741752] __x64_sys_preadv+0x9a/0xf0 [ 1284.741789] do_syscall_64+0x1b9/0x820 [ 1284.761396] kernel msg: ebtables bug: please report to author: bad policy [ 1284.762966] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1284.762988] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1284.763005] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1284.763025] ? trace_hardirqs_on_caller+0x310/0x310 [ 1284.763043] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1284.763065] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1284.787167] kernel msg: ebtables bug: please report to author: bad policy [ 1284.788286] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1284.788321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1284.788334] RIP: 0033:0x457669 [ 1284.788352] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1284.788361] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1284.788377] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1284.788387] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1284.788397] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1284.788414] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 02:54:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1284.889125] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1284.902954] audit: type=1400 audit(1545188090.523:4179): avc: denied { map } for pid=7382 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1284.932219] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1284.993555] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1285.024832] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1285.033165] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="db41c54d9fa845dc838306a4278ebb6f75705f69", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='systek.posix_ac5\x1e\x10_defaul', 0x0, 0xfffffffffffffe9e, 0x3) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="f93025bd7000fddbdf25140000006aab482f9edd1c00060008000100feffffff080001003e47000004000200040002001c0002000800020006000000080002000200000008000200bf0d0000"], 0x4c}, 0x1, 0x0, 0x0, 0x40080}, 0x40000) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:50 executing program 5 (fault-call:4 fault-nth:65): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x300, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:50 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@loopback, @dev, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000380)={@ipv4, @loopback, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}) [ 1285.393427] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain [ 1285.404613] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1285.429395] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1285.430437] audit: type=1400 audit(1545188091.053:4180): avc: denied { map } for pid=7422 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1285.473761] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain [ 1285.516611] FAULT_INJECTION: forcing a failure. [ 1285.516611] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.528150] CPU: 0 PID: 7420 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1285.535478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1285.544861] Call Trace: [ 1285.547489] dump_stack+0x244/0x39d [ 1285.551588] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1285.556826] ? memset+0x31/0x40 [ 1285.560153] should_fail.cold.4+0xa/0x17 02:54:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1285.564252] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1285.565470] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1285.569377] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1285.569398] ? lock_is_held_type+0x210/0x210 [ 1285.569427] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1285.569463] ? perf_tp_event+0xc20/0xc20 [ 1285.569487] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1285.587138] ? check_preemption_disabled+0x48/0x280 [ 1285.601842] ? __lock_acquire+0x62f/0x4c20 [ 1285.611111] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 02:54:51 executing program 0: [ 1285.616677] ? check_preemption_disabled+0x48/0x280 [ 1285.621740] ? memset+0x31/0x40 [ 1285.625072] ? perf_trace_lock+0x4a7/0x7a0 [ 1285.629387] ? lock_is_held_type+0x210/0x210 [ 1285.633839] ? check_preemption_disabled+0x48/0x280 [ 1285.638888] ? kasan_check_read+0x11/0x20 [ 1285.643064] ? zap_class+0x640/0x640 [ 1285.646849] __should_failslab+0x124/0x180 [ 1285.651116] should_failslab+0x9/0x14 [ 1285.654945] __kmalloc+0x70/0x760 [ 1285.658451] ? context_struct_to_string+0x401/0x900 02:54:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1285.663504] context_struct_to_string+0x401/0x900 [ 1285.668394] ? get_permissions_callback+0xb0/0xb0 [ 1285.673294] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1285.678875] ? sidtab_search_core+0x21f/0x3b0 [ 1285.683350] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain [ 1285.683406] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1285.700030] security_sid_to_context+0x35/0x40 [ 1285.704646] selinux_getprocattr+0x3cb/0x8b0 [ 1285.709097] ? selinux_socket_post_create+0x990/0x990 [ 1285.714318] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1285.714339] ? kasan_check_read+0x11/0x20 [ 1285.723446] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1285.728749] ? find_vpid+0xf0/0xf0 [ 1285.728809] security_getprocattr+0x66/0xc0 [ 1285.728841] proc_pid_attr_read+0x158/0x2e0 [ 1285.728872] ? oom_adj_read+0x260/0x260 [ 1285.728893] ? security_file_permission+0x1c2/0x220 [ 1285.750136] ? rw_verify_area+0x118/0x360 [ 1285.754390] do_iter_read+0x4a3/0x650 [ 1285.758259] vfs_readv+0x175/0x1c0 [ 1285.761881] ? compat_rw_copy_check_uvector+0x440/0x440 02:54:51 executing program 0: [ 1285.764273] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain [ 1285.767294] ? fget_raw+0x20/0x20 [ 1285.767327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1285.767352] ? check_preemption_disabled+0x48/0x280 [ 1285.792146] ? __sb_end_write+0xd9/0x110 [ 1285.796297] do_preadv+0x1cc/0x280 [ 1285.799868] ? do_readv+0x310/0x310 [ 1285.803516] ? __ia32_sys_read+0xb0/0xb0 [ 1285.807600] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1285.812991] ? trace_hardirqs_off_caller+0x310/0x310 [ 1285.813027] __x64_sys_preadv+0x9a/0xf0 [ 1285.813058] do_syscall_64+0x1b9/0x820 [ 1285.822134] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1285.822161] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1285.822182] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1285.841188] ? trace_hardirqs_on_caller+0x310/0x310 [ 1285.842854] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1285.846225] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1285.846250] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1285.846280] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1285.869345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1285.874566] RIP: 0033:0x457669 [ 1285.877785] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1285.896714] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1285.904440] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 02:54:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1285.911732] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1285.919067] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1285.926359] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1285.933646] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1286.003509] audit: type=1400 audit(1545188091.623:4181): avc: denied { create } for pid=7423 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1286.060721] audit: type=1400 audit(1545188091.623:4182): avc: denied { write } for pid=7423 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1286.085222] audit: type=1400 audit(1545188091.623:4183): avc: denied { read } for pid=7423 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 02:54:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x256080, 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000080)) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:51 executing program 0: 02:54:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:51 executing program 5 (fault-call:4 fault-nth:66): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) [ 1286.092022] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain 02:54:51 executing program 0: [ 1286.188497] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1286.199544] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1286.235640] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1286.284166] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain [ 1286.291654] FAULT_INJECTION: forcing a failure. [ 1286.291654] name failslab, interval 1, probability 0, space 0, times 0 [ 1286.306363] CPU: 1 PID: 7457 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1286.313656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1286.323011] Call Trace: [ 1286.323035] dump_stack+0x244/0x39d [ 1286.323059] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1286.323077] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1286.323118] ? check_preemption_disabled+0x48/0x280 [ 1286.340070] should_fail.cold.4+0xa/0x17 [ 1286.340093] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1286.340129] ? lock_is_held_type+0x210/0x210 [ 1286.358739] ? mark_held_locks+0x130/0x130 [ 1286.362999] ? zap_class+0x640/0x640 [ 1286.366734] ? __lock_acquire+0x62f/0x4c20 [ 1286.370982] ? is_bpf_text_address+0xac/0x170 [ 1286.375501] ? lock_downgrade+0x900/0x900 [ 1286.379664] ? check_preemption_disabled+0x48/0x280 [ 1286.384697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1286.390242] ? check_preemption_disabled+0x48/0x280 [ 1286.390266] ? debug_smp_processor_id+0x1c/0x20 [ 1286.390282] ? perf_trace_lock+0x14d/0x7a0 [ 1286.390313] ? lock_is_held_type+0x210/0x210 [ 1286.399648] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1286.399986] ? check_preemption_disabled+0x48/0x280 [ 1286.421817] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1286.426757] ? kasan_check_read+0x11/0x20 [ 1286.430938] ? zap_class+0x640/0x640 [ 1286.434675] __should_failslab+0x124/0x180 [ 1286.438924] should_failslab+0x9/0x14 [ 1286.442741] __kmalloc+0x70/0x760 [ 1286.446232] ? context_struct_to_string+0x401/0x900 [ 1286.451292] context_struct_to_string+0x401/0x900 [ 1286.456170] ? get_permissions_callback+0xb0/0xb0 [ 1286.461044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1286.466597] ? sidtab_search_core+0x21f/0x3b0 [ 1286.471129] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1286.477039] security_sid_to_context+0x35/0x40 [ 1286.481652] selinux_getprocattr+0x3cb/0x8b0 [ 1286.481674] ? selinux_socket_post_create+0x990/0x990 [ 1286.481691] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1286.481713] ? kasan_check_read+0x11/0x20 [ 1286.491310] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1286.491331] ? find_vpid+0xf0/0xf0 [ 1286.491360] security_getprocattr+0x66/0xc0 [ 1286.491384] proc_pid_attr_read+0x158/0x2e0 [ 1286.491410] ? oom_adj_read+0x260/0x260 [ 1286.517916] ? security_file_permission+0x1c2/0x220 [ 1286.517940] ? rw_verify_area+0x118/0x360 [ 1286.517961] do_iter_read+0x4a3/0x650 [ 1286.517992] vfs_readv+0x175/0x1c0 [ 1286.526976] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1286.527008] ? fget_raw+0x20/0x20 [ 1286.527035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1286.552845] ? check_preemption_disabled+0x48/0x280 [ 1286.557888] ? __sb_end_write+0xd9/0x110 [ 1286.561977] do_preadv+0x1cc/0x280 [ 1286.565539] ? do_readv+0x310/0x310 [ 1286.569181] ? __ia32_sys_read+0xb0/0xb0 [ 1286.573266] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1286.578651] ? trace_hardirqs_off_caller+0x310/0x310 [ 1286.583787] __x64_sys_preadv+0x9a/0xf0 [ 1286.587795] do_syscall_64+0x1b9/0x820 [ 1286.591702] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1286.597089] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1286.602034] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1286.606895] ? trace_hardirqs_on_caller+0x310/0x310 [ 1286.611930] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1286.612186] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1286.616972] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1286.616998] ? trace_hardirqs_off_thunk+0x1a/0x1c 02:54:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x6, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:52 executing program 0: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x3e8, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xe, 0x4, 0x4000000004, 0xa350, 0x0, 0xffffffffffffffff, 0x200000000000, [0x305f, 0xa]}, 0x2c) 02:54:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1286.617024] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1286.617038] RIP: 0033:0x457669 [ 1286.617054] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1286.617072] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1286.625953] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1286.630221] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 02:54:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1286.630232] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1286.630242] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1286.630252] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1286.630263] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1286.758836] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain [ 1286.778672] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1286.830567] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain 02:54:52 executing program 5 (fault-call:4 fault-nth:67): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:52 executing program 0: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000000c0)=@req={0xfffffffffffffff9, 0x0, 0x0, 0x3ff}, 0x10000023b) sendmmsg(r0, &(0x7f0000008f00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000003c00)=@pppol2tpv3={0x1e, 0x2, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000005ec0)}}], 0x2, 0x0) 02:54:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0400"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0xffffffff, 0x4000) write$P9_RCREATE(r1, &(0x7f0000000280)={0x18, 0x73, 0x2, {{0x0, 0x3, 0x6}, 0x10001}}, 0x18) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) lsetxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='em1I\x00', 0x5, 0x0) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x18c456, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1287.120080] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain [ 1287.133005] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1287.161889] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1287.171944] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain [ 1287.182889] kauditd_printk_skb: 3 callbacks suppressed [ 1287.182904] audit: type=1400 audit(1545188092.793:4187): avc: denied { map } for pid=7503 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1287.220974] FAULT_INJECTION: forcing a failure. [ 1287.220974] name failslab, interval 1, probability 0, space 0, times 0 [ 1287.232506] CPU: 1 PID: 7499 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1287.239802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1287.249165] Call Trace: [ 1287.251770] dump_stack+0x244/0x39d [ 1287.255429] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1287.260649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1287.266203] ? check_preemption_disabled+0x48/0x280 02:54:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0xffffff1f, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1287.271266] should_fail.cold.4+0xa/0x17 [ 1287.275372] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1287.280504] ? lock_is_held_type+0x210/0x210 [ 1287.284943] ? mark_held_locks+0x130/0x130 [ 1287.289190] ? zap_class+0x640/0x640 [ 1287.289211] ? __lock_acquire+0x62f/0x4c20 [ 1287.289230] ? is_bpf_text_address+0xac/0x170 [ 1287.289249] ? lock_downgrade+0x900/0x900 [ 1287.289270] ? check_preemption_disabled+0x48/0x280 [ 1287.297215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1287.316382] ? check_preemption_disabled+0x48/0x280 02:54:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2f8192163b997b7f3a38d32c726f3d3030303030303030303030307f1caef0f0f1a9225030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:52 executing program 0: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000000c0)=@req={0xfffffffffffffff9, 0x0, 0x0, 0x3ff}, 0x10000023b) sendmmsg(r0, &(0x7f0000008f00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000003c00)=@pppol2tpv3={0x1e, 0x2, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000005ec0)}}], 0x2, 0x0) [ 1287.321427] ? debug_smp_processor_id+0x1c/0x20 [ 1287.326107] ? perf_trace_lock+0x14d/0x7a0 [ 1287.330357] ? lock_is_held_type+0x210/0x210 [ 1287.330376] ? check_preemption_disabled+0x48/0x280 [ 1287.330396] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1287.330413] ? kasan_check_read+0x11/0x20 [ 1287.330431] ? zap_class+0x640/0x640 [ 1287.330452] __should_failslab+0x124/0x180 [ 1287.330481] should_failslab+0x9/0x14 [ 1287.330496] __kmalloc+0x70/0x760 [ 1287.330520] ? context_struct_to_string+0x401/0x900 [ 1287.330544] context_struct_to_string+0x401/0x900 [ 1287.330568] ? get_permissions_callback+0xb0/0xb0 [ 1287.330585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1287.330600] ? sidtab_search_core+0x21f/0x3b0 [ 1287.330628] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1287.330651] security_sid_to_context+0x35/0x40 [ 1287.384582] selinux_getprocattr+0x3cb/0x8b0 [ 1287.403992] ? selinux_socket_post_create+0x990/0x990 [ 1287.409212] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1287.411687] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain [ 1287.414157] ? kasan_check_read+0x11/0x20 [ 1287.414174] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1287.414194] ? find_vpid+0xf0/0xf0 [ 1287.414226] security_getprocattr+0x66/0xc0 [ 1287.434384] proc_pid_attr_read+0x158/0x2e0 [ 1287.434407] ? oom_adj_read+0x260/0x260 [ 1287.434424] ? security_file_permission+0x1c2/0x220 [ 1287.434445] ? rw_verify_area+0x118/0x360 [ 1287.434464] do_iter_read+0x4a3/0x650 [ 1287.450613] vfs_readv+0x175/0x1c0 [ 1287.450637] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1287.450672] ? fget_raw+0x20/0x20 [ 1287.475984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1287.481540] ? check_preemption_disabled+0x48/0x280 [ 1287.481578] ? __sb_end_write+0xd9/0x110 [ 1287.481606] do_preadv+0x1cc/0x280 [ 1287.481626] ? do_readv+0x310/0x310 [ 1287.481649] ? __ia32_sys_read+0xb0/0xb0 [ 1287.481667] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1287.481686] ? trace_hardirqs_off_caller+0x310/0x310 [ 1287.481710] __x64_sys_preadv+0x9a/0xf0 [ 1287.490013] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain [ 1287.490806] do_syscall_64+0x1b9/0x820 [ 1287.490823] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1287.490844] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1287.490861] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1287.490880] ? trace_hardirqs_on_caller+0x310/0x310 [ 1287.490901] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1287.505231] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1287.507495] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1287.507521] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1287.507547] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1287.507566] RIP: 0033:0x457669 [ 1287.507583] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1287.507592] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1287.609462] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 02:54:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'i%6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x458000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000080)={0x3, 0x1, 0x21f}) r2 = gettid() syncfs(r1) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) [ 1287.616768] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1287.624060] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1287.624071] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1287.624081] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1287.708587] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1287.709708] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:53 executing program 5 (fault-call:4 fault-nth:68): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:53 executing program 0: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000000c0)=@req={0xfffffffffffffff9, 0x0, 0x0, 0x3ff}, 0x10000023b) sendmmsg(r0, &(0x7f0000008f00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000003c00)=@pppol2tpv3={0x1e, 0x2, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000005ec0)}}], 0x2, 0x0) 02:54:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'i\xa86tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1287.854696] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1287.866428] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1287.875247] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:53 executing program 0: ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f0000000280)={0x0, 0x0, 0x5, 0x0, [], [], [], 0x0, 0x8, 0x0, 0x0, "d780c00f286033084650d622d22e7277"}) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000080)={@local}, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@mcast1, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000e80)=@canfd={{0x0, 0x0, 0x3}, 0xc, 0x3, 0x0, 0x0, "7a407cbe5cca1e2c8d80bfb90887c733d0ea8d5c51e90c6f9d915267309e463b930736d95d71c37b774761dcc3cad449a5a78b27e8a053ae49567a657cd6e906"}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x20008000) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x800, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000200)=0x1000) readv(r1, &(0x7f00000014c0)=[{&(0x7f0000001500)=""/4096, 0x1002}], 0x1) readv(r1, &(0x7f0000000c00)=[{&(0x7f0000000a80)=""/182, 0xb6}, {0x0}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x3) ioctl$TIOCGETD(r0, 0x5424, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x0, 0x4, 0xa94, 0x0, 0xffffffffffffffff, 0x0, [0x7]}, 0x2c) clock_gettime(0x0, &(0x7f0000000bc0)) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000140)={0x4}) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@random="59cc9ee6e8e1", @random="164f1c10fcad", [], {@ipv6={0x86dd, {0x0, 0x6, "05f526", 0x8, 0x11, 0x0, @empty={[0x0, 0x1f4, 0x100000000000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) ioctl$TIOCSBRK(r0, 0x5427) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) 02:54:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1287.877773] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'io6tnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1287.966215] audit: type=1400 audit(1545188093.583:4188): avc: denied { map } for pid=7549 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1288.048470] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1288.060495] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1288.064590] FAULT_INJECTION: forcing a failure. [ 1288.064590] name failslab, interval 1, probability 0, space 0, times 0 [ 1288.080363] CPU: 0 PID: 7548 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1288.087683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1288.097054] Call Trace: [ 1288.099707] dump_stack+0x244/0x39d [ 1288.103370] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1288.108599] ? memset+0x31/0x40 [ 1288.111934] should_fail.cold.4+0xa/0x17 [ 1288.116478] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1288.121625] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1288.126820] ? lock_is_held_type+0x210/0x210 [ 1288.127420] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1288.131261] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1288.132052] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1288.144725] ? perf_tp_event+0xc20/0xc20 [ 1288.157128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1288.162690] ? check_preemption_disabled+0x48/0x280 [ 1288.167733] ? __lock_acquire+0x62f/0x4c20 [ 1288.172059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1288.177661] ? check_preemption_disabled+0x48/0x280 [ 1288.182735] ? memset+0x31/0x40 [ 1288.186074] ? perf_trace_lock+0x4a7/0x7a0 [ 1288.190370] ? lock_is_held_type+0x210/0x210 [ 1288.194824] ? check_preemption_disabled+0x48/0x280 [ 1288.199898] ? kasan_check_read+0x11/0x20 [ 1288.204089] ? zap_class+0x640/0x640 [ 1288.207850] __should_failslab+0x124/0x180 [ 1288.212137] should_failslab+0x9/0x14 [ 1288.215961] __kmalloc+0x70/0x760 [ 1288.219447] ? context_struct_to_string+0x401/0x900 [ 1288.219482] context_struct_to_string+0x401/0x900 [ 1288.219514] ? get_permissions_callback+0xb0/0xb0 [ 1288.234221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1288.239829] ? sidtab_search_core+0x21f/0x3b0 [ 1288.244384] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1288.250315] security_sid_to_context+0x35/0x40 [ 1288.254946] selinux_getprocattr+0x3cb/0x8b0 [ 1288.259405] ? selinux_socket_post_create+0x990/0x990 [ 1288.262318] audit: type=1400 audit(1545188093.703:4189): avc: denied { map_create } for pid=7560 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1288.264620] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1288.264639] ? kasan_check_read+0x11/0x20 [ 1288.264658] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1288.264698] ? find_vpid+0xf0/0xf0 [ 1288.305270] security_getprocattr+0x66/0xc0 [ 1288.309680] proc_pid_attr_read+0x158/0x2e0 [ 1288.314038] ? oom_adj_read+0x260/0x260 [ 1288.318070] ? security_file_permission+0x1c2/0x220 [ 1288.323118] ? rw_verify_area+0x118/0x360 [ 1288.327303] do_iter_read+0x4a3/0x650 [ 1288.331163] vfs_readv+0x175/0x1c0 [ 1288.332911] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1288.334735] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1288.334794] ? fget_raw+0x20/0x20 [ 1288.334831] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1288.343798] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1288.345727] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1288.348345] ? check_preemption_disabled+0x48/0x280 [ 1288.348384] ? __sb_end_write+0xd9/0x110 [ 1288.348426] do_preadv+0x1cc/0x280 [ 1288.348452] ? do_readv+0x310/0x310 [ 1288.390366] ? __ia32_sys_read+0xb0/0xb0 [ 1288.394452] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1288.399858] ? trace_hardirqs_off_caller+0x310/0x310 [ 1288.399895] __x64_sys_preadv+0x9a/0xf0 [ 1288.399924] do_syscall_64+0x1b9/0x820 [ 1288.399948] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1288.409044] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1288.409064] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1288.409090] ? trace_hardirqs_on_caller+0x310/0x310 [ 1288.409113] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1288.409139] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1288.409187] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1288.443246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1288.443266] RIP: 0033:0x457669 [ 1288.453300] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1288.453312] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1288.453332] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1288.453345] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 02:54:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6\nnl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1288.453358] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1288.453377] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1288.512362] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 02:54:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0xf000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r2 = socket(0x1d, 0x80803, 0xa0a) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c023722a00a89303167726f75705fc0c51b03205eef98f56e643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r3 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r3, 0x14) read$FUSE(r1, &(0x7f0000003000), 0x1000) 02:54:54 executing program 0: ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f0000000280)={0x0, 0x0, 0x5, 0x0, [], [], [], 0x0, 0x8, 0x0, 0x0, "d780c00f286033084650d622d22e7277"}) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000080)={@local}, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@mcast1, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000e80)=@canfd={{0x0, 0x0, 0x3}, 0xc, 0x3, 0x0, 0x0, "7a407cbe5cca1e2c8d80bfb90887c733d0ea8d5c51e90c6f9d915267309e463b930736d95d71c37b774761dcc3cad449a5a78b27e8a053ae49567a657cd6e906"}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x20008000) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x800, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000200)=0x1000) readv(r1, &(0x7f00000014c0)=[{&(0x7f0000001500)=""/4096, 0x1002}], 0x1) readv(r1, &(0x7f0000000c00)=[{&(0x7f0000000a80)=""/182, 0xb6}, {0x0}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x3) ioctl$TIOCGETD(r0, 0x5424, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x0, 0x4, 0xa94, 0x0, 0xffffffffffffffff, 0x0, [0x7]}, 0x2c) clock_gettime(0x0, &(0x7f0000000bc0)) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000140)={0x4}) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@random="59cc9ee6e8e1", @random="164f1c10fcad", [], {@ipv6={0x86dd, {0x0, 0x6, "05f526", 0x8, 0x11, 0x0, @empty={[0x0, 0x1f4, 0x100000000000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) ioctl$TIOCSBRK(r0, 0x5427) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) 02:54:54 executing program 5 (fault-call:4 fault-nth:69): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6%nl0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1288.659190] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1288.678975] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1288.690497] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1288.691638] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1288.725917] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1288.760885] FAULT_INJECTION: forcing a failure. [ 1288.760885] name failslab, interval 1, probability 0, space 0, times 0 [ 1288.772213] CPU: 1 PID: 7587 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1288.779512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1288.779520] Call Trace: [ 1288.779543] dump_stack+0x244/0x39d [ 1288.779566] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1288.779585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1288.779606] ? check_preemption_disabled+0x48/0x280 [ 1288.779635] should_fail.cold.4+0xa/0x17 [ 1288.814993] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1288.820119] ? lock_is_held_type+0x210/0x210 [ 1288.824549] ? mark_held_locks+0x130/0x130 [ 1288.828822] ? zap_class+0x640/0x640 [ 1288.832575] ? __lock_acquire+0x62f/0x4c20 [ 1288.836830] ? is_bpf_text_address+0xac/0x170 [ 1288.841350] ? lock_downgrade+0x900/0x900 [ 1288.845519] ? check_preemption_disabled+0x48/0x280 [ 1288.850554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1288.856128] ? check_preemption_disabled+0x48/0x280 [ 1288.861191] ? debug_smp_processor_id+0x1c/0x20 [ 1288.865896] ? perf_trace_lock+0x14d/0x7a0 [ 1288.870153] ? lock_is_held_type+0x210/0x210 [ 1288.874609] ? check_preemption_disabled+0x48/0x280 [ 1288.879649] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1288.884617] ? kasan_check_read+0x11/0x20 [ 1288.888515] audit: type=1400 audit(1545188094.453:4190): avc: denied { map } for pid=7590 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:54:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6t%l0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1288.888788] ? zap_class+0x640/0x640 [ 1288.888813] __should_failslab+0x124/0x180 [ 1288.888840] should_failslab+0x9/0x14 [ 1288.922511] __kmalloc+0x70/0x760 [ 1288.925987] ? context_struct_to_string+0x401/0x900 [ 1288.931026] context_struct_to_string+0x401/0x900 [ 1288.931051] ? get_permissions_callback+0xb0/0xb0 [ 1288.931069] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1288.931100] ? sidtab_search_core+0x21f/0x3b0 [ 1288.931129] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1288.931155] security_sid_to_context+0x35/0x40 [ 1288.931177] selinux_getprocattr+0x3cb/0x8b0 [ 1288.931198] ? selinux_socket_post_create+0x990/0x990 [ 1288.970977] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1288.975923] ? kasan_check_read+0x11/0x20 [ 1288.980089] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1288.985393] ? find_vpid+0xf0/0xf0 [ 1288.988960] security_getprocattr+0x66/0xc0 [ 1288.993312] proc_pid_attr_read+0x158/0x2e0 [ 1288.997658] ? oom_adj_read+0x260/0x260 [ 1289.001651] ? security_file_permission+0x1c2/0x220 [ 1289.006687] ? rw_verify_area+0x118/0x360 [ 1289.010859] do_iter_read+0x4a3/0x650 [ 1289.014691] vfs_readv+0x175/0x1c0 [ 1289.018254] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1289.023673] ? fget_raw+0x20/0x20 [ 1289.024340] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1289.025480] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1289.027166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1289.027185] ? check_preemption_disabled+0x48/0x280 [ 1289.027212] ? __sb_end_write+0xd9/0x110 [ 1289.027239] do_preadv+0x1cc/0x280 02:54:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tn%0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1289.027259] ? do_readv+0x310/0x310 [ 1289.037472] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1289.065500] ? __ia32_sys_read+0xb0/0xb0 [ 1289.077896] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1289.083332] ? trace_hardirqs_off_caller+0x310/0x310 [ 1289.088467] __x64_sys_preadv+0x9a/0xf0 [ 1289.088489] do_syscall_64+0x1b9/0x820 [ 1289.088519] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1289.088539] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1289.088556] ? trace_hardirqs_off_thunk+0x1a/0x1c 02:54:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1289.088574] ? trace_hardirqs_on_caller+0x310/0x310 [ 1289.088592] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1289.088613] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1289.096480] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1289.130589] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1289.131489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1289.131503] RIP: 0033:0x457669 [ 1289.131521] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1289.131530] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1289.131548] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1289.131565] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1289.166965] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1289.166976] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1289.166986] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1289.234849] audit: type=1400 audit(1545188094.853:4191): avc: denied { map } for pid=7596 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:54:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000000), 0x0, 0x0) [ 1289.278114] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1289.284133] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1289.315348] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1289.348208] audit: type=1400 audit(1545188094.853:4192): avc: denied { map_create } for pid=7581 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 02:54:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl\xd0\x02\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:57 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fallocate(r1, 0x0, 0x0, 0x9) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x2, 0xffffffffffffff37) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40042406, &(0x7f00000001c0)='nfs\x00') perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000003c0)) mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video36\x00', 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, &(0x7f0000000080)={0x1, 0x4, 0x4}) ioctl$TCSETS(r4, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) r5 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000640)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c888c9ff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) 02:54:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:57 executing program 5 (fault-call:4 fault-nth:70): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) [ 1291.847542] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1291.863815] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1291.897070] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1291.898683] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1291.907496] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1291.917313] FAULT_INJECTION: forcing a failure. [ 1291.917313] name failslab, interval 1, probability 0, space 0, times 0 [ 1291.935638] CPU: 1 PID: 7631 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1291.942918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1291.942925] Call Trace: [ 1291.942949] dump_stack+0x244/0x39d [ 1291.942972] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1291.942995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1291.963750] ? check_preemption_disabled+0x48/0x280 [ 1291.974317] should_fail.cold.4+0xa/0x17 [ 1291.978395] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1291.978415] ? lock_is_held_type+0x210/0x210 [ 1291.978442] ? mark_held_locks+0x130/0x130 [ 1291.978459] ? zap_class+0x640/0x640 [ 1291.978479] ? __lock_acquire+0x62f/0x4c20 [ 1291.978499] ? is_bpf_text_address+0xac/0x170 [ 1291.978519] ? lock_downgrade+0x900/0x900 [ 1292.004682] ? check_preemption_disabled+0x48/0x280 [ 1292.004704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1292.013860] ? check_preemption_disabled+0x48/0x280 [ 1292.013886] ? debug_smp_processor_id+0x1c/0x20 [ 1292.013903] ? perf_trace_lock+0x14d/0x7a0 [ 1292.013929] ? lock_is_held_type+0x210/0x210 [ 1292.037775] ? check_preemption_disabled+0x48/0x280 [ 1292.042831] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1292.047789] ? kasan_check_read+0x11/0x20 [ 1292.051952] ? zap_class+0x640/0x640 [ 1292.055684] __should_failslab+0x124/0x180 [ 1292.059945] should_failslab+0x9/0x14 [ 1292.063756] __kmalloc+0x70/0x760 [ 1292.067244] ? context_struct_to_string+0x401/0x900 [ 1292.072279] context_struct_to_string+0x401/0x900 [ 1292.077147] ? get_permissions_callback+0xb0/0xb0 [ 1292.082007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1292.087561] ? sidtab_search_core+0x21f/0x3b0 [ 1292.092083] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1292.097993] security_sid_to_context+0x35/0x40 [ 1292.102599] selinux_getprocattr+0x3cb/0x8b0 [ 1292.107031] ? selinux_socket_post_create+0x990/0x990 [ 1292.112237] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1292.117321] ? kasan_check_read+0x11/0x20 [ 1292.121519] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1292.121553] ? find_vpid+0xf0/0xf0 [ 1292.121582] security_getprocattr+0x66/0xc0 [ 1292.121608] proc_pid_attr_read+0x158/0x2e0 [ 1292.121645] ? oom_adj_read+0x260/0x260 [ 1292.121679] ? security_file_permission+0x1c2/0x220 [ 1292.148112] ? rw_verify_area+0x118/0x360 [ 1292.152277] do_iter_read+0x4a3/0x650 [ 1292.156134] vfs_readv+0x175/0x1c0 [ 1292.159697] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1292.165085] ? fget_raw+0x20/0x20 [ 1292.165111] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1292.165129] ? check_preemption_disabled+0x48/0x280 [ 1292.165153] ? __sb_end_write+0xd9/0x110 [ 1292.183206] do_preadv+0x1cc/0x280 [ 1292.186768] ? do_readv+0x310/0x310 [ 1292.190435] ? __ia32_sys_read+0xb0/0xb0 [ 1292.190454] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1292.190474] ? trace_hardirqs_off_caller+0x310/0x310 [ 1292.190500] __x64_sys_preadv+0x9a/0xf0 [ 1292.209003] do_syscall_64+0x1b9/0x820 [ 1292.212909] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1292.218326] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1292.223284] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1292.228163] ? trace_hardirqs_on_caller+0x310/0x310 [ 1292.233200] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1292.238245] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1292.243287] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1292.248720] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1292.253945] RIP: 0033:0x457669 [ 1292.257152] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1292.276088] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1292.283828] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1292.291106] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 02:54:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\a\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1292.298402] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1292.305679] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1292.312956] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1292.367231] audit: type=1400 audit(1545188097.983:4193): avc: denied { map } for pid=7640 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1292.387082] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1292.406080] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:54:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x02\xd0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1292.409280] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1292.412026] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1292.434886] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1292.534645] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1292.545363] xprt_adjust_timeout: rq_timeout = 0! [ 1292.598730] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1292.601521] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1292.605039] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1292.760964] xprt_adjust_timeout: rq_timeout = 0! 02:54:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f00000000c0)={0x26e, 0xb2, 0x9, 0x6, 0x6215f311}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643d78f94f3218e4c513d28ce4336fddf9e5624a49c2522905953d84753c1b00254ec30724bb1f88e66566eff5c946019d0393faa880dab940e2a7606bfc2bc3664075124383936c2100000000000000", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x46d) timer_create(0x6, &(0x7f0000000200)={0x0, 0x8, 0x6, @thr={&(0x7f0000000340)="b00a3a1e797268e7f2cfec7d4c41b1a80f550ea3cc61b54f203268a0fcd86f9e85a2783b79c50ac269b8fb73efc0a6afcb4b089c0ae8ada68388c81b6e9d4e76048a4ef23daede20ab4a7d0f25c10d279968816e70c75ab0aa6bec40a6163390929faf73f10a8a5eed78e532635b2d863bbe580fb28b265c3d977f19378ce951c74ea836a14e0cb65e314cecb5a78351bc8b9edb4729dfaa725c04a8bce11ad2021c92ff726a230b32aa4982186eb8cb38d5a2ca985895801702d25c9a7543aba49bdaa53598abb186a552d3d1ba24c341653bfe322bfb46a8f7c39adbe212f8ec8c9478a5c10f42e6349be822506e86f8", &(0x7f0000000600)="0019242ecb1fc09bc5fe283a9445a9251381beb68165b962f129f651388d4938903aa490fcb7e23434206009db004177aef5ec19e30fea31574aa48ccd28809f6bed9c4e3386f60b6a3fe9136705d7afc7029eb5a695c250821fb545f5c95a47e5541f36c9533affe11be18740b95d1445110988d5f6f1040b749618b4b84c0ad26b44a47bf17ea75a305d0715c62ecfda2ffdb6e6766e45343aaca6405f4416f6d49e704e8b289dd324aabb745c96270c79060f1ef83cd27d696b3ff0cb57badbe9d49b0582dd6167dd818b58"}}, &(0x7f0000000280)) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x14) read$FUSE(r1, &(0x7f0000003000), 0x1000) chdir(&(0x7f0000000040)='./file0/file0\x00') 02:54:58 executing program 5 (fault-call:4 fault-nth:71): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1292.853919] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1292.898197] FAULT_INJECTION: forcing a failure. [ 1292.898197] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.909488] CPU: 1 PID: 7674 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1292.916767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1292.926148] Call Trace: [ 1292.928754] dump_stack+0x244/0x39d [ 1292.932411] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1292.937615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1292.943185] ? check_preemption_disabled+0x48/0x280 [ 1292.948244] should_fail.cold.4+0xa/0x17 [ 1292.952336] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1292.957468] ? lock_is_held_type+0x210/0x210 [ 1292.961902] ? mark_held_locks+0x130/0x130 [ 1292.966151] ? zap_class+0x640/0x640 [ 1292.969884] ? __lock_acquire+0x62f/0x4c20 [ 1292.974137] ? is_bpf_text_address+0xac/0x170 [ 1292.978653] ? lock_downgrade+0x900/0x900 [ 1292.982831] ? check_preemption_disabled+0x48/0x280 [ 1292.987870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1292.993426] ? check_preemption_disabled+0x48/0x280 02:54:58 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fallocate(r1, 0x0, 0x0, 0x9) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x2, 0xffffffffffffff37) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40042406, &(0x7f00000001c0)='nfs\x00') perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000003c0)) mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video36\x00', 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, &(0x7f0000000080)={0x1, 0x4, 0x4}) ioctl$TCSETS(r4, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) r5 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000640)={"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"}) 02:54:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x03\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:54:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1292.998466] ? debug_smp_processor_id+0x1c/0x20 [ 1293.003149] ? perf_trace_lock+0x14d/0x7a0 [ 1293.007411] ? lock_is_held_type+0x210/0x210 [ 1293.011837] ? check_preemption_disabled+0x48/0x280 [ 1293.016877] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1293.021872] ? kasan_check_read+0x11/0x20 [ 1293.026039] ? zap_class+0x640/0x640 [ 1293.029814] __should_failslab+0x124/0x180 [ 1293.034069] should_failslab+0x9/0x14 [ 1293.037883] __kmalloc+0x70/0x760 [ 1293.041372] ? context_struct_to_string+0x401/0x900 [ 1293.046425] context_struct_to_string+0x401/0x900 [ 1293.051320] ? get_permissions_callback+0xb0/0xb0 [ 1293.056179] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1293.061728] ? sidtab_search_core+0x21f/0x3b0 [ 1293.066252] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1293.072180] security_sid_to_context+0x35/0x40 [ 1293.076798] selinux_getprocattr+0x3cb/0x8b0 [ 1293.081228] ? selinux_socket_post_create+0x990/0x990 [ 1293.081694] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1293.086436] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1293.099760] ? kasan_check_read+0x11/0x20 [ 1293.102659] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1293.103933] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1293.113446] audit: type=1400 audit(1545188098.733:4194): avc: denied { map } for pid=7677 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1293.117538] ? find_vpid+0xf0/0xf0 [ 1293.117569] security_getprocattr+0x66/0xc0 02:54:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Dgroup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x7, 0x100) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x8400, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)=0x0) ptrace$pokeuser(0x6, r2, 0x4, 0x100000001) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r3 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r3, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) [ 1293.117593] proc_pid_attr_read+0x158/0x2e0 [ 1293.117614] ? oom_adj_read+0x260/0x260 [ 1293.143789] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1293.147415] ? security_file_permission+0x1c2/0x220 [ 1293.147439] ? rw_verify_area+0x118/0x360 [ 1293.147461] do_iter_read+0x4a3/0x650 [ 1293.147495] vfs_readv+0x175/0x1c0 [ 1293.180425] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1293.185838] ? fget_raw+0x20/0x20 [ 1293.189323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 02:54:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\xd0\x02\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1293.194945] ? check_preemption_disabled+0x48/0x280 [ 1293.200002] ? __sb_end_write+0xd9/0x110 [ 1293.204093] do_preadv+0x1cc/0x280 [ 1293.207651] ? do_readv+0x310/0x310 [ 1293.211290] ? __ia32_sys_read+0xb0/0xb0 [ 1293.213006] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1293.215394] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1293.215415] ? trace_hardirqs_off_caller+0x310/0x310 [ 1293.215440] __x64_sys_preadv+0x9a/0xf0 [ 1293.215462] do_syscall_64+0x1b9/0x820 [ 1293.241985] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1293.247363] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1293.252347] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1293.257209] ? trace_hardirqs_on_caller+0x310/0x310 [ 1293.262250] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1293.267306] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1293.272379] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1293.277246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1293.282464] RIP: 0033:0x457669 02:54:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1293.285666] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1293.304574] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1293.312292] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1293.319581] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1293.326867] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1293.334144] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1293.341427] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 02:54:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1293.448564] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1293.454858] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1293.470327] audit: type=1400 audit(1545188099.093:4195): avc: denied { map } for pid=7701 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1293.481085] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x3ffe}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) sendmsg$key(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x2, 0x3, 0x2, 0x0, 0x15, 0x0, 0x70bd2d, 0x25dfdbfc, [@sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e24, @local}}, @sadb_x_filter={0x5, 0x1a, @in=@loopback, @in=@multicast1, 0x0, 0x4, 0x14}, @sadb_x_sa2={0x2, 0x13, 0x8, 0x0, 0x0, 0x70bd29}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e21, @loopback}}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}]}, 0xa8}}, 0x80) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r2 = gettid() r3 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1, 0x0) write$P9_RLOPEN(r3, &(0x7f0000000080)={0x18, 0xd, 0x1, {{0x0, 0x1, 0x8}, 0x3}}, 0x18) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1293.555246] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:54:59 executing program 5 (fault-call:4 fault-nth:72): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:54:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x06\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1293.679366] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1293.680345] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1293.765990] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1293.769486] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1293.866134] FAULT_INJECTION: forcing a failure. [ 1293.866134] name failslab, interval 1, probability 0, space 0, times 0 [ 1293.877691] CPU: 0 PID: 7727 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1293.881499] xprt_adjust_timeout: rq_timeout = 0! [ 1293.884998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1293.885017] Call Trace: [ 1293.885045] dump_stack+0x244/0x39d [ 1293.885076] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1293.885099] ? memset+0x31/0x40 [ 1293.913979] should_fail.cold.4+0xa/0x17 [ 1293.918080] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1293.923211] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1293.928349] ? lock_is_held_type+0x210/0x210 [ 1293.932806] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1293.937955] ? perf_tp_event+0xc20/0xc20 [ 1293.942041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1293.947604] ? check_preemption_disabled+0x48/0x280 [ 1293.952642] ? __lock_acquire+0x62f/0x4c20 [ 1293.952666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1293.952688] ? check_preemption_disabled+0x48/0x280 [ 1293.952713] ? memset+0x31/0x40 [ 1293.970851] ? perf_trace_lock+0x4a7/0x7a0 [ 1293.975127] ? lock_is_held_type+0x210/0x210 [ 1293.975153] ? check_preemption_disabled+0x48/0x280 [ 1293.975185] ? kasan_check_read+0x11/0x20 [ 1293.975207] ? zap_class+0x640/0x640 [ 1293.992562] __should_failslab+0x124/0x180 [ 1293.992591] should_failslab+0x9/0x14 [ 1293.992610] __kmalloc+0x70/0x760 [ 1293.992643] ? context_struct_to_string+0x401/0x900 [ 1294.004139] context_struct_to_string+0x401/0x900 [ 1294.004175] ? get_permissions_callback+0xb0/0xb0 [ 1294.004198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1294.024434] ? sidtab_search_core+0x21f/0x3b0 [ 1294.028977] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1294.034911] security_sid_to_context+0x35/0x40 [ 1294.039532] selinux_getprocattr+0x3cb/0x8b0 [ 1294.043977] ? selinux_socket_post_create+0x990/0x990 [ 1294.049210] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1294.054166] ? kasan_check_read+0x11/0x20 [ 1294.058336] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1294.063649] ? find_vpid+0xf0/0xf0 [ 1294.067235] security_getprocattr+0x66/0xc0 [ 1294.071594] proc_pid_attr_read+0x158/0x2e0 [ 1294.075952] ? oom_adj_read+0x260/0x260 [ 1294.079950] ? security_file_permission+0x1c2/0x220 [ 1294.084999] ? rw_verify_area+0x118/0x360 [ 1294.089185] do_iter_read+0x4a3/0x650 [ 1294.093038] vfs_readv+0x175/0x1c0 [ 1294.096615] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1294.102032] ? fget_raw+0x20/0x20 [ 1294.105527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1294.111092] ? check_preemption_disabled+0x48/0x280 [ 1294.116650] ? __sb_end_write+0xd9/0x110 [ 1294.120763] do_preadv+0x1cc/0x280 [ 1294.124353] ? do_readv+0x310/0x310 [ 1294.128004] ? __ia32_sys_read+0xb0/0xb0 [ 1294.132090] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1294.137516] ? trace_hardirqs_off_caller+0x310/0x310 [ 1294.142676] __x64_sys_preadv+0x9a/0xf0 [ 1294.146727] do_syscall_64+0x1b9/0x820 [ 1294.150672] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1294.156065] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1294.161015] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1294.165907] ? trace_hardirqs_on_caller+0x310/0x310 [ 1294.170957] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1294.176033] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1294.181086] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1294.185969] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1294.191214] RIP: 0033:0x457669 [ 1294.194461] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:54:59 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fallocate(r1, 0x0, 0x0, 0x9) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x2, 0xffffffffffffff37) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40042406, &(0x7f00000001c0)='nfs\x00') perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000003c0)) mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video36\x00', 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, &(0x7f0000000080)={0x1, 0x4, 0x4}) ioctl$TCSETS(r4, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) r5 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000640)={"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"}) 02:54:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:54:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030df1c30303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)=0x0) r2 = gettid() timer_settime(r1, 0x1, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:54:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x03\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1294.213383] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1294.221131] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1294.228427] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1294.235719] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1294.243006] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1294.250408] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1294.300946] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1294.326868] xprt_adjust_timeout: rq_timeout = 0! 02:55:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1294.362858] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1294.394697] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1294.395448] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x06\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:55:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x256080, 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000080)) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) [ 1294.556475] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:00 executing program 5 (fault-call:4 fault-nth:73): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:55:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1294.630261] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1294.660444] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x03\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1294.668831] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1294.702517] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1294.801229] audit: type=1400 audit(1545188100.423:4196): avc: denied { map } for pid=7769 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1294.840592] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1294.840633] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1294.843444] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1294.851761] FAULT_INJECTION: forcing a failure. [ 1294.851761] name failslab, interval 1, probability 0, space 0, times 0 [ 1294.877130] CPU: 0 PID: 7766 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1294.877838] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1294.884416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1294.884425] Call Trace: [ 1294.884452] dump_stack+0x244/0x39d [ 1294.884501] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1294.884523] ? memset+0x31/0x40 [ 1294.884564] should_fail.cold.4+0xa/0x17 [ 1294.913451] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1294.913473] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1294.913499] ? lock_is_held_type+0x210/0x210 [ 1294.920886] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1294.940607] ? perf_tp_event+0xc20/0xc20 [ 1294.944712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1294.950278] ? check_preemption_disabled+0x48/0x280 [ 1294.955319] ? __lock_acquire+0x62f/0x4c20 [ 1294.959585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1294.965154] ? check_preemption_disabled+0x48/0x280 [ 1294.970205] ? memset+0x31/0x40 [ 1294.973552] ? perf_trace_lock+0x4a7/0x7a0 [ 1294.977857] ? lock_is_held_type+0x210/0x210 [ 1294.982303] ? check_preemption_disabled+0x48/0x280 [ 1294.987357] ? kasan_check_read+0x11/0x20 [ 1294.991559] ? zap_class+0x640/0x640 [ 1294.995308] __should_failslab+0x124/0x180 02:55:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1294.999581] should_failslab+0x9/0x14 [ 1295.003413] __kmalloc+0x70/0x760 [ 1295.006903] ? context_struct_to_string+0x401/0x900 [ 1295.011958] context_struct_to_string+0x401/0x900 [ 1295.016874] ? get_permissions_callback+0xb0/0xb0 [ 1295.021744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1295.027327] ? sidtab_search_core+0x21f/0x3b0 [ 1295.031864] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1295.031900] security_sid_to_context+0x35/0x40 [ 1295.031933] selinux_getprocattr+0x3cb/0x8b0 [ 1295.042447] ? selinux_socket_post_create+0x990/0x990 [ 1295.042469] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1295.042488] ? kasan_check_read+0x11/0x20 [ 1295.042507] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1295.042533] ? find_vpid+0xf0/0xf0 [ 1295.042573] security_getprocattr+0x66/0xc0 [ 1295.074396] proc_pid_attr_read+0x158/0x2e0 [ 1295.078763] ? oom_adj_read+0x260/0x260 [ 1295.082791] ? security_file_permission+0x1c2/0x220 [ 1295.087871] ? rw_verify_area+0x118/0x360 [ 1295.092058] do_iter_read+0x4a3/0x650 [ 1295.095915] vfs_readv+0x175/0x1c0 [ 1295.099496] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1295.099656] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1295.104921] ? fget_raw+0x20/0x20 [ 1295.104955] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1295.104981] ? check_preemption_disabled+0x48/0x280 [ 1295.127175] ? __sb_end_write+0xd9/0x110 [ 1295.131279] do_preadv+0x1cc/0x280 [ 1295.134888] ? do_readv+0x310/0x310 [ 1295.138561] ? __ia32_sys_read+0xb0/0xb0 [ 1295.142644] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1295.148026] ? trace_hardirqs_off_caller+0x310/0x310 [ 1295.148077] __x64_sys_preadv+0x9a/0xf0 [ 1295.148107] do_syscall_64+0x1b9/0x820 [ 1295.148128] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1295.157228] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1295.157249] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1295.157274] ? trace_hardirqs_on_caller+0x310/0x310 [ 1295.157297] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1295.157324] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1295.191416] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1295.196269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1295.201469] RIP: 0033:0x457669 [ 1295.204653] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1295.223560] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1295.231290] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1295.238557] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1295.245834] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1295.253120] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1295.260393] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 02:55:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c94"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x200, 0x4, 0xe00000, r3}, 0x10) tkill(r1, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r7, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_SET_MSRS(r7, 0x4048ae9b, &(0x7f0000000340)=ANY=[@ANYBLOB="010051e151485f5cfaf14b2d5261335482cfad5115462e2ace2a3b573d7c1502ff15fb98c8a6798cd638d6e40bbf9df5ca7c69"]) dup2(r6, r7) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:55:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:55:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:02 executing program 5 (fault-call:4 fault-nth:74): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:55:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:02 executing program 0: lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0xfffffffffffffff8, 0xfffffffffffffff9}, {0x5}]}, 0x14, 0x2) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000100)=0x800000000f57) r2 = add_key(&(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\xf7\xf2\x88\x90y\xcb1b\x1a\xc9\xac\x1a\xac\xcab;m\xa3\x81\xf2R\x85\x0f6A\x11\xf0\x80', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000380)="d152a827554fa09e6006c7d82fee07aa00006f33b1536ce09f60561d77a40ea9b9b129b7b9216ae4d17bd1dd8f420e679544fa2e4d719b12ff602f5dfbf2c0ddbb18938edf05dc3a4fec09cabd45abd71f5c08a5ee30f8bb5652fff22a5dc5776c037d934208ffb1392ba47afc1997d95fec92eaa52e7426362fa9b49624ce7c6da769005d04ecd944906214584acdeb0dcd7cb161aa80365f57cb4c620000000000", 0xa2, 0xfffffffffffffff9) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x5, r2) syncfs(r1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x10300}) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000340)={0x0, @multicast2, 0x4e23, 0x1, 'wlc\x00', 0x1, 0x0, 0x57}, 0x2c) pread64(r1, &(0x7f0000000140)=""/30, 0x1e, 0x0) [ 1297.350654] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1297.363352] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1297.381819] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:03 executing program 0: lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0xfffffffffffffff8, 0xfffffffffffffff9}, {0x5}]}, 0x14, 0x2) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000100)=0x800000000f57) r2 = add_key(&(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\xf7\xf2\x88\x90y\xcb1b\x1a\xc9\xac\x1a\xac\xcab;m\xa3\x81\xf2R\x85\x0f6A\x11\xf0\x80', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000380)="d152a827554fa09e6006c7d82fee07aa00006f33b1536ce09f60561d77a40ea9b9b129b7b9216ae4d17bd1dd8f420e679544fa2e4d719b12ff602f5dfbf2c0ddbb18938edf05dc3a4fec09cabd45abd71f5c08a5ee30f8bb5652fff22a5dc5776c037d934208ffb1392ba47afc1997d95fec92eaa52e7426362fa9b49624ce7c6da769005d04ecd944906214584acdeb0dcd7cb161aa80365f57cb4c620000000000", 0xa2, 0xfffffffffffffff9) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x5, r2) syncfs(r1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x10300}) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000340)={0x0, @multicast2, 0x4e23, 0x1, 'wlc\x00', 0x1, 0x0, 0x57}, 0x2c) pread64(r1, &(0x7f0000000140)=""/30, 0x1e, 0x0) 02:55:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1297.385609] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1297.465919] FAULT_INJECTION: forcing a failure. [ 1297.465919] name failslab, interval 1, probability 0, space 0, times 0 [ 1297.477240] CPU: 1 PID: 7795 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1297.484523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1297.493884] Call Trace: [ 1297.496495] dump_stack+0x244/0x39d [ 1297.500147] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1297.505354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1297.510910] ? check_preemption_disabled+0x48/0x280 [ 1297.515535] audit: type=1400 audit(1545188103.103:4197): avc: denied { map } for pid=7803 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1297.515949] should_fail.cold.4+0xa/0x17 [ 1297.541967] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1297.541986] ? lock_is_held_type+0x210/0x210 [ 1297.542011] ? mark_held_locks+0x130/0x130 [ 1297.555751] ? zap_class+0x640/0x640 [ 1297.559491] ? __lock_acquire+0x62f/0x4c20 [ 1297.559511] ? is_bpf_text_address+0xac/0x170 [ 1297.559530] ? lock_downgrade+0x900/0x900 [ 1297.559552] ? check_preemption_disabled+0x48/0x280 [ 1297.559571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1297.559590] ? check_preemption_disabled+0x48/0x280 [ 1297.559614] ? debug_smp_processor_id+0x1c/0x20 [ 1297.559636] ? perf_trace_lock+0x14d/0x7a0 [ 1297.588075] ? lock_is_held_type+0x210/0x210 [ 1297.588096] ? check_preemption_disabled+0x48/0x280 [ 1297.588117] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1297.588135] ? kasan_check_read+0x11/0x20 [ 1297.588154] ? zap_class+0x640/0x640 [ 1297.611389] __should_failslab+0x124/0x180 [ 1297.611412] should_failslab+0x9/0x14 [ 1297.611429] __kmalloc+0x70/0x760 [ 1297.611455] ? context_struct_to_string+0x401/0x900 [ 1297.611479] context_struct_to_string+0x401/0x900 [ 1297.640720] ? get_permissions_callback+0xb0/0xb0 [ 1297.645585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1297.651138] ? sidtab_search_core+0x21f/0x3b0 [ 1297.655657] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1297.661565] security_sid_to_context+0x35/0x40 [ 1297.666173] selinux_getprocattr+0x3cb/0x8b0 [ 1297.670601] ? selinux_socket_post_create+0x990/0x990 [ 1297.675819] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1297.680765] ? kasan_check_read+0x11/0x20 [ 1297.684938] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1297.690237] ? find_vpid+0xf0/0xf0 [ 1297.693815] security_getprocattr+0x66/0xc0 [ 1297.698165] proc_pid_attr_read+0x158/0x2e0 [ 1297.699592] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1297.702561] ? oom_adj_read+0x260/0x260 [ 1297.703630] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1297.710894] ? security_file_permission+0x1c2/0x220 [ 1297.710917] ? rw_verify_area+0x118/0x360 [ 1297.710939] do_iter_read+0x4a3/0x650 [ 1297.710973] vfs_readv+0x175/0x1c0 [ 1297.710995] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1297.711026] ? fget_raw+0x20/0x20 [ 1297.711051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1297.711072] ? check_preemption_disabled+0x48/0x280 [ 1297.711095] ? __sb_end_write+0xd9/0x110 02:55:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x02\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1297.722292] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1297.763122] do_preadv+0x1cc/0x280 [ 1297.774988] ? do_readv+0x310/0x310 [ 1297.778627] ? __ia32_sys_read+0xb0/0xb0 [ 1297.782706] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1297.788084] ? trace_hardirqs_off_caller+0x310/0x310 [ 1297.793222] __x64_sys_preadv+0x9a/0xf0 [ 1297.797216] do_syscall_64+0x1b9/0x820 [ 1297.801118] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1297.806500] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1297.811451] ? trace_hardirqs_off_thunk+0x1a/0x1c 02:55:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\a\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1297.816320] ? trace_hardirqs_on_caller+0x310/0x310 [ 1297.821393] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1297.826439] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1297.831486] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1297.836356] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1297.841579] RIP: 0033:0x457669 [ 1297.844840] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1297.863747] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1297.863764] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1297.863775] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1297.863794] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1297.863804] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1297.863814] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1297.885959] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x06\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1297.887116] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',roo0000000000000000040000,user_id=\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) read$FUSE(r0, &(0x7f0000000480), 0x1000) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x6) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x7fffffff, &(0x7f0000000040)=""/49) 02:55:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1297.977975] audit: type=1400 audit(1545188103.593:4198): avc: denied { map } for pid=7823 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:55:03 executing program 5 (fault-call:4 fault-nth:75): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:55:03 executing program 0: lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0xfffffffffffffff8, 0xfffffffffffffff9}, {0x5}]}, 0x14, 0x2) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000100)=0x800000000f57) r2 = add_key(&(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\xf7\xf2\x88\x90y\xcb1b\x1a\xc9\xac\x1a\xac\xcab;m\xa3\x81\xf2R\x85\x0f6A\x11\xf0\x80', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000380)="d152a827554fa09e6006c7d82fee07aa00006f33b1536ce09f60561d77a40ea9b9b129b7b9216ae4d17bd1dd8f420e679544fa2e4d719b12ff602f5dfbf2c0ddbb18938edf05dc3a4fec09cabd45abd71f5c08a5ee30f8bb5652fff22a5dc5776c037d934208ffb1392ba47afc1997d95fec92eaa52e7426362fa9b49624ce7c6da769005d04ecd944906214584acdeb0dcd7cb161aa80365f57cb4c620000000000", 0xa2, 0xfffffffffffffff9) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x5, r2) syncfs(r1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x10300}) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000340)={0x0, @multicast2, 0x4e23, 0x1, 'wlc\x00', 0x1, 0x0, 0x57}, 0x2c) pread64(r1, &(0x7f0000000140)=""/30, 0x1e, 0x0) [ 1298.012490] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1298.040378] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1298.047271] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\a\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1298.079052] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1298.230083] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1298.234833] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB="66643d636ba2cc053b0424bec64182cbb3ae0a4f8b83d3381661ba0bdd37461a1abed3a80b3a310f8bd510d8982b9862f9b68af04f9d56ffac2df5a54b5821814b3aa17757b133c7966cc42d7193172a1e5167ea53b3b21daa94ec5e8ccd6d5294dfe29d16b5f0267ecae67bd89508798169de0c9dff452ce6339a5244ceff72d93f9fc86bb71056834e8b38ed399ce72549e20dbb73d6cc896a9993e507ed77", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x100, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) poll(&(0x7f0000000040)=[{r0, 0x10}, {r0, 0x404}], 0x2, 0x1) eventfd(0x2) r2 = gettid() socket$inet6(0xa, 0x2, 0xfff) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0xba2}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000340)={r3, 0x2}, &(0x7f0000000380)=0x8) tkill(r2, 0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001780)={{{@in=@empty, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000001680)={'vcan0\x00', r4}) munlockall() read$FUSE(r0, &(0x7f0000000480), 0xffffffffffffff88) [ 1298.263757] audit: type=1400 audit(1545188103.883:4199): avc: denied { map } for pid=7846 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1298.290317] FAULT_INJECTION: forcing a failure. [ 1298.290317] name failslab, interval 1, probability 0, space 0, times 0 [ 1298.301984] CPU: 0 PID: 7844 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1298.309291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1298.318674] Call Trace: [ 1298.321298] dump_stack+0x244/0x39d [ 1298.324965] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1298.330180] ? memset+0x31/0x40 [ 1298.333522] should_fail.cold.4+0xa/0x17 [ 1298.337626] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1298.342792] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1298.347941] ? lock_is_held_type+0x210/0x210 [ 1298.352394] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1298.357551] ? perf_tp_event+0xc20/0xc20 [ 1298.358828] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1298.361644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1298.361669] ? check_preemption_disabled+0x48/0x280 [ 1298.361689] ? __lock_acquire+0x62f/0x4c20 [ 1298.361712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1298.390292] ? check_preemption_disabled+0x48/0x280 [ 1298.395344] ? memset+0x31/0x40 [ 1298.398660] ? perf_trace_lock+0x4a7/0x7a0 [ 1298.402945] ? lock_is_held_type+0x210/0x210 [ 1298.407393] ? check_preemption_disabled+0x48/0x280 [ 1298.412472] ? kasan_check_read+0x11/0x20 [ 1298.416656] ? zap_class+0x640/0x640 [ 1298.420416] __should_failslab+0x124/0x180 [ 1298.424684] should_failslab+0x9/0x14 [ 1298.424705] __kmalloc+0x70/0x760 [ 1298.424736] ? context_struct_to_string+0x401/0x900 [ 1298.432035] context_struct_to_string+0x401/0x900 [ 1298.432082] ? get_permissions_callback+0xb0/0xb0 [ 1298.446795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1298.446831] ? sidtab_search_core+0x21f/0x3b0 [ 1298.456943] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1298.462882] security_sid_to_context+0x35/0x40 [ 1298.462911] selinux_getprocattr+0x3cb/0x8b0 [ 1298.471931] ? selinux_socket_post_create+0x990/0x990 [ 1298.477146] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1298.477166] ? kasan_check_read+0x11/0x20 [ 1298.477187] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1298.491574] ? find_vpid+0xf0/0xf0 [ 1298.491614] security_getprocattr+0x66/0xc0 [ 1298.491645] proc_pid_attr_read+0x158/0x2e0 [ 1298.491673] ? oom_adj_read+0x260/0x260 [ 1298.507928] ? do_iter_read+0x384/0x650 [ 1298.511952] ? write_comp_data+0x1/0x70 [ 1298.515970] do_iter_read+0x4a3/0x650 [ 1298.519860] vfs_readv+0x175/0x1c0 [ 1298.523443] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1298.528891] ? fget_raw+0x20/0x20 [ 1298.532401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1298.537990] ? check_preemption_disabled+0x48/0x280 [ 1298.543065] ? __sb_end_write+0xd9/0x110 [ 1298.547818] do_preadv+0x1cc/0x280 [ 1298.551414] ? do_readv+0x310/0x310 [ 1298.552474] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1298.555064] ? __ia32_sys_read+0xb0/0xb0 [ 1298.555086] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1298.555111] ? trace_hardirqs_off_caller+0x310/0x310 [ 1298.577843] __x64_sys_preadv+0x9a/0xf0 [ 1298.581864] do_syscall_64+0x1b9/0x820 [ 1298.585774] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1298.591176] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1298.591194] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1298.591220] ? trace_hardirqs_on_caller+0x310/0x310 [ 1298.591241] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1298.611070] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1298.616134] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1298.621023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1298.626238] RIP: 0033:0x457669 02:55:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:04 executing program 0: lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0xfffffffffffffff8, 0xfffffffffffffff9}, {0x5}]}, 0x14, 0x2) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000100)=0x800000000f57) r2 = add_key(&(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\xf7\xf2\x88\x90y\xcb1b\x1a\xc9\xac\x1a\xac\xcab;m\xa3\x81\xf2R\x85\x0f6A\x11\xf0\x80', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000380)="d152a827554fa09e6006c7d82fee07aa00006f33b1536ce09f60561d77a40ea9b9b129b7b9216ae4d17bd1dd8f420e679544fa2e4d719b12ff602f5dfbf2c0ddbb18938edf05dc3a4fec09cabd45abd71f5c08a5ee30f8bb5652fff22a5dc5776c037d934208ffb1392ba47afc1997d95fec92eaa52e7426362fa9b49624ce7c6da769005d04ecd944906214584acdeb0dcd7cb161aa80365f57cb4c620000000000", 0xa2, 0xfffffffffffffff9) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x5, r2) syncfs(r1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x10300}) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000340)={0x0, @multicast2, 0x4e23, 0x1, 'wlc\x00', 0x1, 0x0, 0x57}, 0x2c) pread64(r1, &(0x7f0000000140)=""/30, 0x1e, 0x0) 02:55:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\a\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1298.629454] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1298.648390] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1298.656125] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1298.663424] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1298.670714] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1298.678009] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1298.680764] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1298.685300] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 [ 1298.708660] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:04 executing program 5 (fault-call:4 fault-nth:76): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) [ 1298.713625] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1298.731827] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x02\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:55:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',aroup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:55:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c94"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x200, 0x4, 0xe00000, r3}, 0x10) tkill(r1, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r7, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_SET_MSRS(r7, 0x4048ae9b, &(0x7f0000000340)=ANY=[@ANYBLOB="010051e151485f5cfaf14b2d5261335482cfad5115462e2ace2a3b573d7c1502ff15fb98c8a6798cd638d6e40bbf9df5ca7c69"]) dup2(r6, r7) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:55:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1298.887012] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1298.898489] audit: type=1400 audit(1545188104.523:4200): avc: denied { map } for pid=7876 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:55:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x12) read$FUSE(r0, &(0x7f0000003000), 0x1000) [ 1298.969005] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1298.986839] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x05\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1299.061946] audit: type=1400 audit(1545188104.683:4201): avc: denied { map } for pid=7891 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1299.070997] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x02\xd0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1299.118974] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1299.120387] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00F\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1299.216740] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1299.258177] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1299.266150] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1299.277228] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1299.285029] FAULT_INJECTION: forcing a failure. [ 1299.285029] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.305185] CPU: 0 PID: 7880 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 1299.312474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1299.321844] Call Trace: [ 1299.324462] dump_stack+0x244/0x39d [ 1299.328128] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1299.333343] ? memset+0x31/0x40 [ 1299.336665] should_fail.cold.4+0xa/0x17 [ 1299.340763] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1299.345911] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1299.351039] ? lock_is_held_type+0x210/0x210 [ 1299.355480] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1299.360623] ? perf_tp_event+0xc20/0xc20 [ 1299.360645] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1299.360668] ? check_preemption_disabled+0x48/0x280 [ 1299.360693] ? __lock_acquire+0x62f/0x4c20 [ 1299.370310] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1299.370333] ? check_preemption_disabled+0x48/0x280 [ 1299.370360] ? memset+0x31/0x40 [ 1299.370395] ? perf_trace_lock+0x4a7/0x7a0 [ 1299.370432] ? lock_is_held_type+0x210/0x210 [ 1299.402157] ? check_preemption_disabled+0x48/0x280 [ 1299.407218] ? kasan_check_read+0x11/0x20 [ 1299.411401] ? zap_class+0x640/0x640 [ 1299.415152] __should_failslab+0x124/0x180 [ 1299.419428] should_failslab+0x9/0x14 [ 1299.423254] __kmalloc+0x70/0x760 [ 1299.426754] ? context_struct_to_string+0x401/0x900 [ 1299.431842] context_struct_to_string+0x401/0x900 [ 1299.436730] ? get_permissions_callback+0xb0/0xb0 [ 1299.441606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1299.447171] ? sidtab_search_core+0x21f/0x3b0 [ 1299.451710] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 1299.451742] security_sid_to_context+0x35/0x40 [ 1299.451769] selinux_getprocattr+0x3cb/0x8b0 02:55:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1299.451809] ? selinux_socket_post_create+0x990/0x990 [ 1299.471905] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1299.476865] ? kasan_check_read+0x11/0x20 [ 1299.481041] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1299.486357] ? find_vpid+0xf0/0xf0 [ 1299.489950] security_getprocattr+0x66/0xc0 [ 1299.494317] proc_pid_attr_read+0x158/0x2e0 [ 1299.498674] ? oom_adj_read+0x260/0x260 [ 1299.502679] ? security_file_permission+0x1c2/0x220 [ 1299.507729] ? rw_verify_area+0x118/0x360 [ 1299.510073] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1299.511917] do_iter_read+0x4a3/0x650 [ 1299.511969] vfs_readv+0x175/0x1c0 [ 1299.511998] ? compat_rw_copy_check_uvector+0x440/0x440 [ 1299.532887] ? fget_raw+0x20/0x20 [ 1299.536378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1299.541943] ? check_preemption_disabled+0x48/0x280 [ 1299.547004] ? __sb_end_write+0xd9/0x110 [ 1299.551135] do_preadv+0x1cc/0x280 [ 1299.554701] ? do_readv+0x310/0x310 [ 1299.558374] ? __ia32_sys_read+0xb0/0xb0 [ 1299.562470] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1299.567868] ? trace_hardirqs_off_caller+0x310/0x310 [ 1299.573009] __x64_sys_preadv+0x9a/0xf0 [ 1299.577020] do_syscall_64+0x1b9/0x820 [ 1299.580935] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1299.586332] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1299.591288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1299.596165] ? trace_hardirqs_on_caller+0x310/0x310 [ 1299.601197] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1299.606229] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1299.611264] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1299.616116] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1299.621301] RIP: 0033:0x457669 [ 1299.624494] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1299.643397] RSP: 002b:00007fc451fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1299.651113] RAX: ffffffffffffffda RBX: 00007fc451fa8c90 RCX: 0000000000457669 [ 1299.658400] RDX: 10000000000001e3 RSI: 0000000020000480 RDI: 0000000000000004 [ 1299.665715] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1299.673002] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc451fa96d4 [ 1299.680280] R13: 00000000004c39f2 R14: 00000000004d6438 R15: 0000000000000005 02:55:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 02:55:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\xfe\xff\xff\a\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:55:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c94"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x200, 0x4, 0xe00000, r3}, 0x10) tkill(r1, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r7, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_SET_MSRS(r7, 0x4048ae9b, &(0x7f0000000340)=ANY=[@ANYBLOB="010051e151485f5cfaf14b2d5261335482cfad5115462e2ace2a3b573d7c1502ff15fb98c8a6798cd638d6e40bbf9df5ca7c69"]) dup2(r6, r7) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$FUSE(r0, &(0x7f0000003000), 0x1000) [ 1299.756472] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1299.782181] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1299.785070] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1299.802157] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1299.896982] audit: type=1400 audit(1545188105.513:4202): avc: denied { map } for pid=7937 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:55:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x8}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:55:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x04\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:55:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1299.957116] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1300.029537] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1300.036130] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1300.047187] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000013a, 0x0) 02:55:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\a\xff\xff\xfe\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1300.167924] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1300.213728] audit: type=1400 audit(1545188105.833:4203): avc: denied { map } for pid=7960 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1300.235417] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c94"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x200, 0x4, 0xe00000, r3}, 0x10) tkill(r1, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r7, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_SET_MSRS(r7, 0x4048ae9b, &(0x7f0000000340)=ANY=[@ANYBLOB="010051e151485f5cfaf14b2d5261335482cfad5115462e2ace2a3b573d7c1502ff15fb98c8a6798cd638d6e40bbf9df5ca7c69"]) dup2(r6, r7) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:55:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1300.293220] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1300.294973] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1300.380052] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1300.450874] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1300.509295] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1300.525136] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1300.540740] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1300.550873] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1300.617435] audit: type=1400 audit(1545188106.233:4204): avc: denied { map } for pid=7990 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:55:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB="2c723e8f50949cbc0600003030303f30303030301d303030303030303430f2439d777573654c05b443a8", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c04f9b94be4ae496552fae296c007574f24050b00001eaeceaebca41f3b6f571756cf41"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000740)='system.posix_ac\x05\x00\x00\x00\x00\x00\x00\x00t\x8c\xc3\a5:\xc4\xc2\xccV\x9c\aJ\xa4\xc9i\x1e}\x12\x8b-\x9b\xcb\xcc\xc8\x11\xf1\xc1\xba\xb8\x14t\xc7(\xc0\xe2N\xb8\xbbk\xe4\xbd\xbf\xb5\x94\'\xb5\x14.\x01/\xc0\x87\x97%e\x8c:\xfc\xc4\xa6\xc1\xa4\x15\xa9\xcdQ5\xd9\xafv\xae\xa6{\x98^\x8c\xc5\xb9\xdeC\x02\xe4s\x03v\xc9\b\x97\x16<\x11S\x9e\xa8a\xdf\xc4\x03\xca]\x1a\x91\xe7\t3\x87\xf3\x80\xa6\x04\x00\xd1\xaf\xb9\xb8G\f\xbe\x7f\t\x98L\xb0f#\xf9\xd3\x8c\f\x17\xb0\x8a\xc5\xd2}\xc8`\xf7x\x9d<\xa5kn\x8d\xe6\xde\xfcZ\xe8\x8b\f\x94\x88?\xf3\xc7\xc5\xfdr\x99\xc0-T\xdfc\x94Zb\f\n\x1a_\xb2\x03o\xd8f~\x02\x17\x97i\xd8~:\xd5 \x9fg\xdf\x81V\xe3\xc1\xad\x8a\x813\xaa\xcd\xc4C9\x84\x87\xe1,\xe6\x97\x94\xd7\xfb\x00YWi+$g!]\x8c\xf2\xf2\x1e\xe9\xc0\x17\x15\x84m\x04\x84\xebf\xae\xb3b\xdf\xe6\xa5\xf3oc,\xc8\xb9\xfc\xf5\x1bS\xa7\aPX\xf6N\x11\xcf\xe4NV\x18g\x871\xf55\x00\f\xa3\xfcX\xb79\xdb\xa7\\`<\xed\xbc\xd8s\xdb\x90&\xb4l\xc4\xcb\xd5p\x03\xed\x87\xe47D3\xc4\x96\x8c\xec6/l\x0e\x03\x06\xed3\x96', 0x0, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)=0x10001) r1 = geteuid() getgroups(0x2, &(0x7f0000000440)=[0xee00, 0xffffffffffffffff]) write$P9_RGETATTR(r0, &(0x7f0000000480)={0xa0, 0x19, 0x2, {0x200, {0x40}, 0x100, r1, r2, 0x5, 0x5, 0x7, 0x7, 0x80000001, 0x80000000, 0x883a, 0x101, 0x7, 0x7f, 0x3, 0x10000, 0x7fffffff, 0x5b, 0x5}}, 0xa0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r3 = gettid() syz_open_procfs(r3, &(0x7f0000000280)='net/nfsfs\x00') r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl$KVM_GET_FPU(r4, 0x81a0ae8c, &(0x7f0000000580)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) r5 = semget(0x0, 0x1, 0x0) semctl$IPC_RMID(r5, 0x0, 0x0) fsync(r0) tkill(r3, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) r6 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x840) ioctl$EVIOCGPROP(r6, 0x80404509, &(0x7f0000000400)=""/34) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000200)={0x9, 0x1, 0x3000}, 0x4) 02:55:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:55:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000000cd, 0x0) 02:55:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c94"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x200, 0x4, 0xe00000, r3}, 0x10) tkill(r1, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r7, 0x4400ae8f, &(0x7f0000000a40)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c888c9ff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_SET_MSRS(r7, 0x4048ae9b, &(0x7f0000000340)=ANY=[@ANYBLOB="010051e151485f5cfaf14b2d5261335482cfad5115462e2ace2a3b573d7c1502ff15fb98c8a6798cd638d6e40bbf9df5ca7c69"]) dup2(r6, r7) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 1301.054230] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1301.059027] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1301.072857] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1301.098755] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000000bf, 0x0) [ 1301.127300] audit: type=1400 audit(1545188106.743:4205): avc: denied { map } for pid=8010 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:55:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x01\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:55:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1301.226277] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001a0, 0x0) 02:55:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x10000) ioctl$TIOCCBRK(r0, 0x5428) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r2 = gettid() r3 = dup2(r1, r1) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x14) read$FUSE(r1, &(0x7f0000003000), 0x1000) [ 1301.291913] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1301.293608] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1301.376008] audit: type=1400 audit(1545188106.993:4206): avc: denied { map } for pid=8031 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1301.400908] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x05\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1301.444280] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c94"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x200, 0x4, 0xe00000, r3}, 0x10) tkill(r1, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r6, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_MSRS(r6, 0x4048ae9b, &(0x7f0000000340)=ANY=[@ANYBLOB="010051e151485f5cfaf14b2d5261335482cfad5115462e2ace2a3b573d7c1502ff15fb98c8a6798cd638d6e40bbf9df5ca7c69"]) dup2(r5, r6) 02:55:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1301.549085] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1301.551565] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x04\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1301.668760] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1301.682036] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1301.696763] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1301.701504] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1301.721800] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000016, 0x0) 02:55:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x05\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1301.784311] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1301.861033] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1301.885598] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1301.886852] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x00\a\xff\xff\xfe\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1301.966588] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1302.011396] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1302.012800] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:55:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001b3, 0x0) 02:55:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c94"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x200, 0x4, 0xe00000, r3}, 0x10) tkill(r1, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r6, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_MSRS(r6, 0x4048ae9b, &(0x7f0000000340)=ANY=[@ANYBLOB="010051e151485f5cfaf14b2d5261335482cfad5115462e2ace2a3b573d7c1502ff15fb98c8a6798cd638d6e40bbf9df5ca7c69"]) dup2(r5, r6) 02:55:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x05\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1304.653139] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1304.654565] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1304.668950] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1304.690216] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x04\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1304.723293] kauditd_printk_skb: 1 callbacks suppressed [ 1304.723318] audit: type=1400 audit(1545188110.343:4208): avc: denied { map } for pid=8108 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:55:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1304.799729] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xffff, 0x480000) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000080)={0x7fff, 0xa, 0x7, 0x5, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x14) write$FUSE_BMAP(r0, &(0x7f0000000200)={0x18, 0xffffffffffffffda, 0x1, {0x6}}, 0x18) read$FUSE(r1, &(0x7f0000003000), 0x1000) 02:55:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1304.919028] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1304.933396] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1304.940427] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x02\xd0\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1304.997555] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1305.051134] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001da, 0x0) [ 1305.098165] audit: type=1400 audit(1545188110.713:4209): avc: denied { map } for pid=8139 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1305.105167] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1305.111562] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1305.152048] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c94"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x200, 0x4, 0xe00000, r3}, 0x10) tkill(r1, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r6, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_MSRS(r6, 0x4048ae9b, &(0x7f0000000340)=ANY=[@ANYBLOB="010051e151485f5cfaf14b2d5261335482cfad5115462e2ace2a3b573d7c1502ff15fb98c8a6798cd638d6e40bbf9df5ca7c69"]) dup2(r5, r6) 02:55:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x06\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1305.368550] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1305.385630] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1305.390924] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1305.414177] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x06\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1305.504356] audit: type=1400 audit(1545188111.123:4210): avc: denied { map } for pid=8162 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1305.551279] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1305.594139] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1305.598515] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c94"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x200, 0x4, 0xe00000, r3}, 0x10) tkill(r1, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r7, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_SET_MSRS(r7, 0x4048ae9b, &(0x7f0000000340)=ANY=[@ANYBLOB="010051e151485f5cfaf14b2d5261335482cfad5115462e2ace2a3b573d7c1502ff15fb98c8a6798cd638d6e40bbf9df5ca7c69"]) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 02:55:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:11 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) r1 = geteuid() syz_mount_image$reiserfs(&(0x7f0000000640)='reiserfs\x00', &(0x7f0000000680)='./file0\x00', 0x4, 0x3, &(0x7f0000000840)=[{&(0x7f00000006c0)="21f9549369682c4b0e6eae918602fd75b780d58252d300a9e3cad9bb0ce5fbcac38e", 0x22, 0x6}, {&(0x7f0000000700)="d07d4a117772026293c9e7d583c31b8fa76287d587de0198806b7193ca4e29ffb151fa451ea162c8588f07e43fa050b40c7d", 0x32, 0xa85}, {&(0x7f0000000740)="ef7f66365651cf887595a88d4292534e2c10365d1a954daa218421fffc3e7cd28c146f312b53c4907f1b5aa3bf6d9309ab39550a5f7a3db7a222bd995fe75ef4bf22b1941e64a833b598261799cd28b6316e8b60f23cf0e8d0dedac95bcef95971555d3846e301a81c416a3b96fde421695bc3efa137c271aa15bf59677943404af5d0adcac7eb8b6a7be1549ff3e2cbbd43a29d86bc5b35d7256d2a1cc93832e8fc743cbea955a64486ddf9b2589b2b544c8fdc715e2daab302ea906479e35554b9d66d4267095bfe7b2ada2679476418e52094b14a33ec8c4da54e", 0xdc, 0xfffffffffffffff7}], 0x4800, &(0x7f00000008c0)={[{@noacl='noacl'}, {@usrjquota='usrjquota'}, {@data_writeback='data=writeback'}], [{@subj_type={'subj_type', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}, {@subj_role={'subj_role', 0x3d, 'fuse\x00'}}, {@obj_user={'obj_user', 0x3d, 'defcontext'}}, {@subj_role={'subj_role', 0x3d, 'fuse\x00'}}]}) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0001"]) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000180)) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r2 = gettid() r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x802, 0x0) ioctl$BLKRRPART(r3, 0x125f, 0x0) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x8001, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000340)="b33e44c4a09ff784cdfe99f65ae3241b05076b0529fcf731da24970b4c347cfc885a0e78c50efaf34984c91654ef9bbd965d21ff5d844bd1f57065d339fa49ab35a705281309e65ae075", 0x4a, 0x5}, {&(0x7f0000000480)="1728351e01cd6ca29770b944517c454899ec91d795ecb869a52cf24801c6bc8914a2d287693e60c2fcd4fdc76809f954725b0e942302935d904d5dbe2c8a4b4911c8f2b5181c95f8bb4065aee7b000c869d82041aa65e31563dd7d5b3728281cd3e6e0941dc0164203f071066949d523e3e8b9567988a6ad54d7915e4698ebe4629162ef7f192d00ec1aacf80ed302e6d5c35f9c30a0f2962f0f63eab6d5e7c054c97f79b6a27ad6334b037811e4fae9cb4c3ff8119fbd7462b58139336d322637e068591b200eb79415e9572a69d314fe7fc92aacee4439014aa5c793428a530762bb070640ea72511f79006f1ba1aab855", 0xf2, 0x10001}], 0x20000, &(0x7f0000000580)={[{@nls={'nls', 0x3d, 'cp950'}}, {@nobarrier='nobarrier'}, {@decompose='decompose'}], [{@fsuuid={'fsuuid', 0x3d, {[0x35, 0x7b43f148962b577d, 0x33, 0x3f, 0x66, 0x63, 0x0, 0x62], 0x2d, [0x64, 0x33, 0x79, 0x30], 0x2d, [0x3c, 0x7f, 0x63, 0x7f], 0x2d, [0x37, 0x7f, 0x30, 0x64], 0x2d, [0x36, 0x39, 0x37, 0x7f, 0x79, 0x61, 0x35, 0x30]}}}, {@smackfshat={'smackfshat'}}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@subj_role={'subj_role', 0x3d, '/dev/hwrng\x00'}}]}) tkill(r2, 0x14) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x1000) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) splice(r3, &(0x7f0000000080), r3, &(0x7f00000000c0), 0xffffffffffffff81, 0x1) 02:55:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x02\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:55:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000000d2, 0x0) [ 1305.859670] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1305.862485] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1305.876372] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1305.877891] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1305.890494] audit: type=1400 audit(1545188111.513:4211): avc: denied { map } for pid=8188 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:55:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000179, 0x0) 02:55:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x02\xd0', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1305.959275] REISERFS warning (device loop1): super-6504 reiserfs_getopt: the option "usrjquota" requires an argument [ 1305.959275] 02:55:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1306.049987] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c94"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x200, 0x4, 0xe00000, r3}, 0x10) tkill(r1, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r7, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_SET_MSRS(r7, 0x4048ae9b, &(0x7f0000000340)=ANY=[@ANYBLOB="010051e151485f5cfaf14b2d5261335482cfad5115462e2ace2a3b573d7c1502ff15fb98c8a6798cd638d6e40bbf9df5ca7c69"]) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 1306.100224] audit: type=1400 audit(1545188111.723:4212): avc: denied { map } for pid=8204 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:55:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1306.169224] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1306.176234] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1306.204012] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1306.263682] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue 02:55:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x00\x02\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:55:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1306.290775] audit: type=1400 audit(1545188111.913:4213): avc: denied { map } for pid=8219 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1306.385244] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1306.406593] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() write(0xffffffffffffffff, &(0x7f00004abf1b)="ae", 0x1) clone(0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r2, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r3 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r3, 0x14) read$FUSE(r2, &(0x7f0000003000), 0x1000) 02:55:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1306.479130] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1306.485365] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x00\x03\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1306.540022] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1306.561666] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1306.615096] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000000fc, 0x0) 02:55:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c94"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x200, 0x4, 0xe00000, r3}, 0x10) tkill(r1, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r7, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_SET_MSRS(r7, 0x4048ae9b, &(0x7f0000000340)=ANY=[@ANYBLOB="010051e151485f5cfaf14b2d5261335482cfad5115462e2ace2a3b573d7c1502ff15fb98c8a6798cd638d6e40bbf9df5ca7c69"]) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 1306.683759] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1306.690164] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1306.723385] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x00\x06\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:55:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1306.780507] audit: type=1400 audit(1545188112.403:4214): avc: denied { map } for pid=8256 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1306.873409] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1306.924995] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1306.931414] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1306.944656] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x03\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1307.011285] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1307.017684] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1307.065176] audit: type=1400 audit(1545188112.683:4215): avc: denied { map } for pid=8280 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1307.139438] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1307.141405] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800020}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0xac, r2, 0x402, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x22}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x33a}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x200}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x20008800}, 0x4) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r3 = gettid() write$FUSE_IOCTL(r1, &(0x7f0000000480)={0x20, 0x0, 0x3, {0x4c17, 0x4, 0xed8, 0x5}}, 0x20) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r3, 0x14) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:55:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000013b, 0x0) 02:55:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\xfe\xff\xff\a\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:55:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c94"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x200, 0x4, 0xe00000, r3}, 0x10) tkill(r1, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r7, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MSRS(r7, 0x4048ae9b, &(0x7f0000000340)=ANY=[@ANYBLOB="010051e151485f5cfaf14b2d5261335482cfad5115462e2ace2a3b573d7c1502ff15fb98c8a6798cd638d6e40bbf9df5ca7c69"]) dup2(r6, r7) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 1309.621488] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1309.647378] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1309.666652] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1309.676377] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x00\x02', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:55:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1309.701073] audit: type=1400 audit(1545188115.323:4216): avc: denied { map } for pid=8304 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1309.824619] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1309.847158] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c94"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x200, 0x4, 0xe00000, r3}, 0x10) tkill(r1, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r7, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MSRS(r7, 0x4048ae9b, &(0x7f0000000340)=ANY=[@ANYBLOB="010051e151485f5cfaf14b2d5261335482cfad5115462e2ace2a3b573d7c1502ff15fb98c8a6798cd638d6e40bbf9df5ca7c69"]) dup2(r6, r7) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 1309.855499] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1309.879291] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1309.908511] audit: type=1400 audit(1545188115.523:4217): avc: denied { create } for pid=8305 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 02:55:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x00\x04\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1310.013675] audit: type=1400 audit(1545188115.533:4218): avc: denied { write } for pid=8305 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1310.097485] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1310.111647] audit: type=1400 audit(1545188115.533:4219): avc: denied { read } for pid=8305 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1310.146012] audit: type=1400 audit(1545188115.573:4220): avc: denied { map } for pid=8319 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1310.149425] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1310.168955] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1310.194948] audit: type=1400 audit(1545188115.713:4221): avc: denied { map } for pid=8327 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 02:55:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x14) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x9}}, 0x30) read$FUSE(r0, &(0x7f0000003000), 0x1000) 02:55:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c94"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x200, 0x4, 0xe00000, r3}, 0x10) tkill(r1, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r7, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MSRS(r7, 0x4048ae9b, &(0x7f0000000340)=ANY=[@ANYBLOB="010051e151485f5cfaf14b2d5261335482cfad5115462e2ace2a3b573d7c1502ff15fb98c8a6798cd638d6e40bbf9df5ca7c69"]) dup2(r6, r7) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 02:55:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x00\x05\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) 02:55:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000082, 0x0) [ 1310.629541] audit: type=1400 audit(1545188116.253:4222): avc: denied { create } for pid=8305 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1310.653725] audit: type=1400 audit(1545188116.253:4223): avc: denied { write } for pid=8305 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1310.708188] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1310.711753] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1310.726699] audit: type=1400 audit(1545188116.253:4224): avc: denied { read } for pid=8305 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 02:55:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1310.726758] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1310.752714] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 02:55:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cb33ab840d12", [0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) 02:55:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000019d, 0x0) 02:55:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x2d0, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x11, 0x893f, 'ip6tnl0\x00\x00\x00\x00\a\x00', 'dummy0\x00', 'rose0\x00', 'veth1_to_team\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0xfffffffffffff800}}}}]}]}, 0x348) [ 1310.840682] audit: type=1400 audit(1545188116.463:4225): avc: denied { map } for pid=8352 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1310.926716] kernel msg: ebtables bug: please report to author: Valid hook without chain 02:55:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c94"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x8c', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x10001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x200, 0x4, 0xe00000, r3}, 0x10) tkill(r1, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x2) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_SET_MSRS(r7, 0x4048ae9b, &(0x7f0000000340)=ANY=[@ANYBLOB="010051e151485f5cfaf14b2d5261335482cfad5115462e2ace2a3b573d7c1502ff15fb98c8a6798cd638d6e40bbf9df5ca7c69"]) dup2(r6, r7) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 02:55:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x150, [0x20000240, 0x0, 0x0, 0x20000318, 0x20000348], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x11, 0x40, 0x88ff, 'bridge_slave_1\x00', 'ifb0\x00', 'veth1_to_bridge\x00', 'ipddp0\x00', @empty, [], @random="cb33ab840d12", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x1c8) [ 1310.970603] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1310.983331] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1310.985432] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1310.991879] kasan: CONFIG_KASAN_INLINE enabled [ 1311.037009] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1311.063580] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1311.069914] CPU: 0 PID: 8355 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #157 [ 1311.077201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1311.086654] RIP: 0010:fuse_dev_do_write+0x1dc2/0x3820 [ 1311.091868] Code: 00 48 c1 e0 2a 80 3c 02 00 0f 85 e9 17 00 00 49 8b 9d 58 01 00 00 b8 ff ff 37 00 48 c1 e0 2a 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 8f [ 1311.110783] RSP: 0018:ffff88817a6d74b8 EFLAGS: 00010247 [ 1311.116636] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000806e000 [ 1311.123911] RDX: 0000000000000000 RSI: ffffffff82899843 RDI: 0000000000000004 [ 1311.131184] RBP: ffff88817a6d7a50 R08: ffff8881816c2340 R09: ffffed102f588682 [ 1311.138455] R10: ffffed102f588682 R11: ffff88817ac43413 R12: 0000000000000000 [ 1311.145739] R13: ffff88817ac433f0 R14: 0000000000000000 R15: 0000000000000030 [ 1311.153013] FS: 00007f643af89700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1311.161264] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1311.167145] CR2: 0000000001713d48 CR3: 00000001bfae5000 CR4: 00000000001406f0 [ 1311.174419] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1311.181692] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1311.188964] Call Trace: [ 1311.191571] ? _raw_spin_unlock_irqrestore+0xbb/0xd0 [ 1311.196696] ? fuse_dev_read+0x250/0x250 [ 1311.200768] ? mark_held_locks+0x130/0x130 [ 1311.205094] ? futex_wake+0x613/0x760 [ 1311.208915] ? lock_downgrade+0x900/0x900 [ 1311.213072] ? check_preemption_disabled+0x48/0x280 [ 1311.218095] ? debug_smp_processor_id+0x1c/0x20 [ 1311.222766] ? perf_trace_lock+0x14d/0x7a0 [ 1311.227026] ? debug_smp_processor_id+0x1c/0x20 [ 1311.231699] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1311.236924] ? lock_is_held_type+0x210/0x210 [ 1311.241340] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 1311.246448] ? futex_wake+0x304/0x760 [ 1311.250263] ? zap_class+0x640/0x640 [ 1311.253992] ? __lock_acquire+0x62f/0x4c20 [ 1311.258235] ? find_held_lock+0x36/0x1c0 [ 1311.262310] ? __fget+0x4aa/0x740 [ 1311.265778] ? lock_downgrade+0x900/0x900 [ 1311.269944] ? check_preemption_disabled+0x48/0x280 [ 1311.274968] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1311.279904] ? kasan_check_read+0x11/0x20 [ 1311.284070] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1311.289345] ? rcu_softirq_qs+0x20/0x20 [ 1311.293337] ? __fget+0x4d1/0x740 [ 1311.296821] ? memset+0x31/0x40 [ 1311.300113] fuse_dev_write+0x19a/0x240 [ 1311.304090] ? fuse_dev_splice_write+0xe70/0xe70 [ 1311.308863] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1311.314404] ? iov_iter_init+0xe5/0x210 [ 1311.319171] __vfs_write+0x6b8/0x9f0 [ 1311.322893] ? kernel_read+0x120/0x120 [ 1311.326785] ? __might_sleep+0x95/0x190 [ 1311.330779] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1311.336332] ? __inode_security_revalidate+0xd9/0x120 [ 1311.341531] ? selinux_file_permission+0x90/0x540 [ 1311.346393] ? rw_verify_area+0x118/0x360 [ 1311.350561] vfs_write+0x1fc/0x560 [ 1311.354106] ksys_write+0x101/0x260 [ 1311.357738] ? __ia32_sys_read+0xb0/0xb0 [ 1311.361820] ? trace_hardirqs_off_caller+0x310/0x310 [ 1311.366939] __x64_sys_write+0x73/0xb0 [ 1311.370841] do_syscall_64+0x1b9/0x820 [ 1311.374747] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1311.380114] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1311.385044] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1311.389890] ? trace_hardirqs_on_caller+0x310/0x310 [ 1311.394923] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1311.399945] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1311.404969] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1311.409838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1311.415048] RIP: 0033:0x457669 [ 1311.418265] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1311.437176] RSP: 002b:00007f643af88c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1311.444895] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 1311.452170] RDX: 0000000000000030 RSI: 0000000020000040 RDI: 0000000000000003 [ 1311.459441] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1311.466718] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f643af896d4 [ 1311.473992] R13: 00000000004c5c45 R14: 00000000004da548 R15: 00000000ffffffff [ 1311.481271] Modules linked in: [ 1311.493599] kobject: 'loop4' (00000000369d72da): kobject_uevent_env [ 1311.508124] kobject: 'loop4' (00000000369d72da): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1311.520348] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1311.525369] kobject: 'loop2' (000000007c0e8809): kobject_uevent_env [ 1311.537987] kobject: 'loop2' (000000007c0e8809): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1311.542144] audit: type=1400 audit(1545188117.163:4226): avc: denied { map } for pid=8376 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1311.579119] ---[ end trace 5f1a9d1a8345c012 ]--- [ 1311.582247] kobject: 'loop3' (000000003dbdc364): kobject_uevent_env [ 1311.584446] RIP: 0010:fuse_dev_do_write+0x1dc2/0x3820 [ 1311.596090] Code: 00 48 c1 e0 2a 80 3c 02 00 0f 85 e9 17 00 00 49 8b 9d 58 01 00 00 b8 ff ff 37 00 48 c1 e0 2a 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 8f [ 1311.615137] kobject: 'loop3' (000000003dbdc364): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1311.627309] RSP: 0018:ffff88817a6d74b8 EFLAGS: 00010247 [ 1311.633167] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000806e000 [ 1311.641052] RDX: 0000000000000000 RSI: ffffffff82899843 RDI: 0000000000000004 [ 1311.648708] RBP: ffff88817a6d7a50 R08: ffff8881816c2340 R09: ffffed102f588682 [ 1311.656123] R10: ffffed102f588682 R11: ffff88817ac43413 R12: 0000000000000000 [ 1311.663957] R13: ffff88817ac433f0 R14: 0000000000000000 R15: 0000000000000030 [ 1311.671637] FS: 00007f643af89700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1311.682643] kobject: 'kvm' (0000000042dafccc): kobject_uevent_env [ 1311.683320] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1311.693671] kobject: 'kvm' (0000000042dafccc): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1311.709240] kobject: '0:53' (000000007f0726b2): kobject_add_internal: parent: 'bdi', set: 'devices' [ 1311.709844] kobject: 'loop5' (000000005ad8451a): kobject_uevent_env [ 1311.718781] CR2: 0000000000625208 CR3: 00000001bfae5000 CR4: 00000000001426f0 [ 1311.726534] kobject: 'loop5' (000000005ad8451a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1311.733473] kobject: '0:53' (000000007f0726b2): kobject_uevent_env [ 1311.743271] kobject: 'kvm' (0000000042dafccc): kobject_uevent_env [ 1311.748867] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1311.754671] kobject: 'kvm' (0000000042dafccc): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1311.762796] kobject: '0:53' (000000007f0726b2): fill_kobj_path: path = '/devices/virtual/bdi/0:53' [ 1311.781399] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1311.789525] Kernel panic - not syncing: Fatal exception [ 1311.795987] Kernel Offset: disabled [ 1311.799611] Rebooting in 86400 seconds..