[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 63.414594][ T26] audit: type=1800 audit(1562254079.617:25): pid=8886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 63.457398][ T26] audit: type=1800 audit(1562254079.627:26): pid=8886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 63.479775][ T26] audit: type=1800 audit(1562254079.627:27): pid=8886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.225' (ECDSA) to the list of known hosts. 2019/07/04 15:28:11 fuzzer started 2019/07/04 15:28:15 dialing manager at 10.128.0.26:39581 2019/07/04 15:28:16 syscalls: 2465 2019/07/04 15:28:16 code coverage: enabled 2019/07/04 15:28:16 comparison tracing: enabled 2019/07/04 15:28:16 extra coverage: extra coverage is not supported by the kernel 2019/07/04 15:28:16 setuid sandbox: enabled 2019/07/04 15:28:16 namespace sandbox: enabled 2019/07/04 15:28:16 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/04 15:28:16 fault injection: enabled 2019/07/04 15:28:16 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/04 15:28:16 net packet injection: enabled 2019/07/04 15:28:16 net device setup: enabled 15:30:01 executing program 0: syzkaller login: [ 185.529571][ T9051] IPVS: ftp: loaded support on port[0] = 21 15:30:01 executing program 1: [ 185.692928][ T9051] chnl_net:caif_netlink_parms(): no params data found [ 185.756972][ T9051] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.767092][ T9051] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.775873][ T9051] device bridge_slave_0 entered promiscuous mode [ 185.786654][ T9051] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.792457][ T9054] IPVS: ftp: loaded support on port[0] = 21 [ 185.794319][ T9051] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.809438][ T9051] device bridge_slave_1 entered promiscuous mode 15:30:02 executing program 2: [ 185.852621][ T9051] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.886705][ T9051] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 185.936037][ T9051] team0: Port device team_slave_0 added [ 185.968366][ T9051] team0: Port device team_slave_1 added [ 186.030233][ T9054] chnl_net:caif_netlink_parms(): no params data found [ 186.102286][ T9051] device hsr_slave_0 entered promiscuous mode 15:30:02 executing program 3: socket$netlink(0x10, 0x3, 0x1f) [ 186.179265][ T9051] device hsr_slave_1 entered promiscuous mode [ 186.264915][ T9057] IPVS: ftp: loaded support on port[0] = 21 [ 186.287477][ T9051] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.294827][ T9051] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.302890][ T9051] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.310026][ T9051] bridge0: port 1(bridge_slave_0) entered forwarding state 15:30:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d00000077000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) [ 186.414711][ T9054] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.422890][ T9054] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.438722][ T9054] device bridge_slave_0 entered promiscuous mode [ 186.466596][ T9059] IPVS: ftp: loaded support on port[0] = 21 [ 186.484360][ T9054] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.492433][ T9054] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.507983][ T9054] device bridge_slave_1 entered promiscuous mode [ 186.608049][ T9054] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 186.630796][ T9061] IPVS: ftp: loaded support on port[0] = 21 [ 186.656770][ T9051] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.670093][ T9054] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:30:02 executing program 5: syz_mount_image$ntfs(&(0x7f0000000340)='ntfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB=',umask=00000000000000000000000,show_sys_files=yes,case_sensitive=yes,errors=recover,nls=m']) [ 186.769204][ T3544] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.793330][ T3544] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.807596][ T3544] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 186.837499][ T9051] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.876575][ T9054] team0: Port device team_slave_0 added [ 186.884600][ T3544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.892593][ T3544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.912129][ T9066] IPVS: ftp: loaded support on port[0] = 21 [ 186.940017][ T9054] team0: Port device team_slave_1 added [ 186.965570][ T3544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.974755][ T3544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.983166][ T3544] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.990307][ T3544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.997983][ T3544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.006861][ T3544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.016616][ T3544] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.027592][ T3544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.085914][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.099772][ T9057] chnl_net:caif_netlink_parms(): no params data found [ 187.129048][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.138270][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.149181][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.180667][ T9059] chnl_net:caif_netlink_parms(): no params data found [ 187.197676][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.208171][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.216882][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.282692][ T9054] device hsr_slave_0 entered promiscuous mode [ 187.319501][ T9054] device hsr_slave_1 entered promiscuous mode [ 187.410921][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.423668][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.432412][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.440998][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.465115][ T9057] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.473279][ T9057] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.482491][ T9057] device bridge_slave_0 entered promiscuous mode [ 187.527694][ T9057] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.536169][ T9057] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.544176][ T9057] device bridge_slave_1 entered promiscuous mode [ 187.575734][ T9051] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.603799][ T9057] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.622569][ T9057] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.642318][ T9059] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.651243][ T9059] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.659001][ T9059] device bridge_slave_0 entered promiscuous mode [ 187.666240][ T9061] chnl_net:caif_netlink_parms(): no params data found [ 187.715710][ T9059] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.724286][ T9059] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.734333][ T9059] device bridge_slave_1 entered promiscuous mode [ 187.763296][ T9057] team0: Port device team_slave_0 added [ 187.771444][ T9057] team0: Port device team_slave_1 added [ 187.805620][ T9059] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.817106][ T9059] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.840589][ T9066] chnl_net:caif_netlink_parms(): no params data found [ 187.882804][ T9059] team0: Port device team_slave_0 added [ 187.892843][ T9061] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.900283][ T9061] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.907968][ T9061] device bridge_slave_0 entered promiscuous mode [ 187.918835][ T9051] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.945697][ T9059] team0: Port device team_slave_1 added [ 187.968287][ T9061] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.976412][ T9061] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.984476][ T9061] device bridge_slave_1 entered promiscuous mode [ 188.062089][ T9057] device hsr_slave_0 entered promiscuous mode [ 188.140536][ T9057] device hsr_slave_1 entered promiscuous mode [ 188.243461][ T9059] device hsr_slave_0 entered promiscuous mode [ 188.301823][ T9059] device hsr_slave_1 entered promiscuous mode [ 188.401395][ T9066] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.408576][ T9066] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.416625][ T9066] device bridge_slave_0 entered promiscuous mode [ 188.428443][ T9054] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.448828][ T9061] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 188.459103][ T9066] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.466252][ T9066] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.482967][ T9066] device bridge_slave_1 entered promiscuous mode [ 188.505331][ T9061] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 188.534048][ T9061] team0: Port device team_slave_0 added [ 188.547767][ T9061] team0: Port device team_slave_1 added [ 188.585311][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.593278][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 15:30:04 executing program 0: [ 188.654382][ T9066] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 188.677722][ T9054] 8021q: adding VLAN 0 to HW filter on device team0 15:30:04 executing program 0: 15:30:04 executing program 0: clone(0x281fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 15:30:05 executing program 0: semget(0x2, 0x4, 0x0) [ 188.722072][ T9061] device hsr_slave_0 entered promiscuous mode [ 188.762097][ T9061] device hsr_slave_1 entered promiscuous mode 15:30:05 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)='mountstats\x00') [ 188.840604][ T9066] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 188.869413][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.879680][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 15:30:05 executing program 0: [ 188.888217][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.895397][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.919316][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.928132][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.953006][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.960193][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.989737][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 15:30:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d0000009f000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) [ 189.057643][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.073883][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.085876][ T9066] team0: Port device team_slave_0 added [ 189.127324][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.137577][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.148768][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.165252][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.181227][ T9059] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.190788][ T9066] team0: Port device team_slave_1 added [ 189.215856][ T9054] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 189.229368][ T9054] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 189.243492][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.255445][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.264736][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.277556][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.287227][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.299424][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 189.339992][ T9057] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.382615][ T9066] device hsr_slave_0 entered promiscuous mode [ 189.419528][ T9066] device hsr_slave_1 entered promiscuous mode [ 189.481916][ T9057] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.510133][ T9061] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.517577][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.526290][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.534260][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.543419][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.552151][ T9068] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.559297][ T9068] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.567122][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.574964][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.586905][ T9054] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.609687][ T9059] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.618311][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.626779][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.638495][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.647740][ T9068] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.654888][ T9068] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.678614][ T9061] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.703644][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.712160][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.720533][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.730244][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.738660][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.745845][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.754037][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.763392][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.772880][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.779996][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.787923][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.796905][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.805754][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.829063][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.837924][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.855997][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.865159][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.875193][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.912519][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.935007][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 15:30:06 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0x8, 0x5, 0x0, 0x0, [{}]}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 189.970079][ T9068] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.977176][ T9068] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.985210][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.007356][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.022353][ T9068] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.029558][ T9068] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.052434][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.070543][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.083524][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.093865][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.102567][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.111143][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.122972][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.131475][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.139872][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.148365][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.156937][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.165259][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.174336][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.182719][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.207931][ T9059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.217144][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.226305][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.235008][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.243800][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.271335][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.279791][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.288089][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.296667][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.305331][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.313876][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.322683][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.333092][ T9061] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.346131][ T9066] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.362665][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.371082][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.381983][ T9057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.431191][ T9057] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.438611][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.456779][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.471456][ T9059] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.482425][ T9061] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.494627][ T9066] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.512501][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.522336][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.533033][ T9068] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.540193][ T9068] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.560800][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.576355][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.586280][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.602763][ T2995] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.610381][ T2995] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.618609][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.627858][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.649797][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.658741][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.668140][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.677461][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.686332][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.696641][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.705759][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.728324][ T9066] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.742467][ T9066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.752302][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.777816][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.834052][ T9066] 8021q: adding VLAN 0 to HW filter on device batadv0 15:30:07 executing program 2: syz_emit_ethernet(0x2e, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0x4}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:07 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0x4, 0x5}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d0000009f000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) [ 191.128163][ T9137] __ntfs_error: 3 callbacks suppressed [ 191.128176][ T9137] ntfs: (device loop5): parse_options(): Unrecognized mount option . [ 191.187542][ T9137] ntfs: (device loop5): parse_options(): NLS character set m not found. [ 191.305349][ T9137] ntfs: (device loop5): parse_options(): Unrecognized mount option . [ 191.339210][ T9137] ntfs: (device loop5): parse_options(): NLS character set m not found. 15:30:07 executing program 4: inotify_init1(0xa0800) 15:30:07 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0x8, 0x5, 0x0, 0x0, [{}]}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:07 executing program 2: 15:30:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d0000009f000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:07 executing program 5: 15:30:07 executing program 3: 15:30:07 executing program 2: 15:30:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d0000009f000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:07 executing program 3: 15:30:07 executing program 4: 15:30:07 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0x8, 0x5, 0x0, 0x0, [{}]}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:07 executing program 5: 15:30:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000e30000fa1f1000000000000f9500000000000000"], &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248}, 0x48) 15:30:07 executing program 3: 15:30:08 executing program 4: 15:30:08 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0x8, 0x5, 0x0, 0x0, [{}]}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:08 executing program 5: 15:30:08 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:30:08 executing program 2: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 15:30:08 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x8, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:08 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x4000, 0x0) 15:30:08 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:30:08 executing program 4: setresgid(0x0, 0xee00, 0x0) setuid(0xee01) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200000, 0x0) 15:30:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:08 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 15:30:08 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x8, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:08 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:30:08 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 15:30:08 executing program 5: mlockall(0x1000000480000005) 15:30:08 executing program 4: setuid(0xee01) setresgid(0x0, 0x0, 0x0) 15:30:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:08 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 15:30:08 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x8, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d0000009f000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff620af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:09 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d0000009f000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff620af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:09 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x8, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:09 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:09 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d0000009f000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:09 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 15:30:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff620af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:09 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:30:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:09 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0x8, 0x0, 0x0, 0x0, [{}]}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff620af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:09 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 15:30:09 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:30:09 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:30:09 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0x8, 0x0, 0x0, 0x0, [{}]}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:09 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:30:10 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:30:10 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 15:30:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:10 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:30:10 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0x8, 0x0, 0x0, 0x0, [{}]}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:10 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:30:10 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x8, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:10 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:30:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:10 executing program 1: syz_emit_ethernet(0x2e, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0x4, 0x5}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:10 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x8, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:10 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:30:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:10 executing program 1: syz_emit_ethernet(0x2e, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0x4, 0x5}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:10 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x8, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff620af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:10 executing program 1: syz_emit_ethernet(0x2e, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0x4, 0x5}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:11 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff620af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:11 executing program 1: 15:30:11 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff620af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:11 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:11 executing program 1: 15:30:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:11 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:11 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 15:30:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6406000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:11 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:11 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6403000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff620af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:12 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6403000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:12 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:12 executing program 1: 15:30:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6403000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000001503000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:12 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6403000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:30:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 196.654701][ T9499] ------------[ cut here ]------------ [ 196.705663][ T9499] verifier backtracking bug [ 196.705832][ T9499] WARNING: CPU: 0 PID: 9499 at kernel/bpf/verifier.c:1755 mark_chain_precision+0x15c2/0x18e0 [ 196.720526][ T9499] Kernel panic - not syncing: panic_on_warn set ... [ 196.727226][ T9499] CPU: 0 PID: 9499 Comm: syz-executor.1 Not tainted 5.2.0-rc7-next-20190703 #28 [ 196.730660][ T3879] kobject: 'loop3' (000000004f2fc1f6): kobject_uevent_env [ 196.736300][ T9499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.736308][ T9499] Call Trace: [ 196.736342][ T9499] dump_stack+0x172/0x1f0 [ 196.761184][ T9499] ? mark_chain_precision+0x1520/0x18e0 [ 196.766765][ T9499] panic+0x2dc/0x755 [ 196.770507][ T3879] kobject: 'loop3' (000000004f2fc1f6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 196.770679][ T9499] ? add_taint.cold+0x16/0x16 [ 196.785513][ T9499] ? kasan_check_write+0x14/0x20 [ 196.790473][ T9499] ? __warn.cold+0x5/0x4c [ 196.794823][ T9499] ? mark_chain_precision+0x15c2/0x18e0 [ 196.800394][ T9499] __warn.cold+0x20/0x4c [ 196.804654][ T9499] ? mark_chain_precision+0x15c2/0x18e0 [ 196.810227][ T9499] report_bug+0x263/0x2b0 [ 196.811984][ T3879] kobject: 'loop0' (000000008d6b7058): kobject_uevent_env [ 196.814571][ T9499] do_error_trap+0x11b/0x200 [ 196.814591][ T9499] do_invalid_op+0x37/0x50 [ 196.814608][ T9499] ? mark_chain_precision+0x15c2/0x18e0 [ 196.814625][ T9499] invalid_op+0x14/0x20 [ 196.814649][ T9499] RIP: 0010:mark_chain_precision+0x15c2/0x18e0 [ 196.846578][ T9499] Code: e9 55 f2 ff ff 48 89 df e8 5b c9 2c 00 e9 3a f3 ff ff e8 21 a7 f2 ff 48 c7 c7 60 9d 91 87 c6 05 1e f8 1f 08 01 e8 96 1f c4 ff <0f> 0b 41 be f2 ff ff ff e9 eb f7 ff ff e8 fc a6 f2 ff 45 31 f6 e9 [ 196.857198][ T3879] kobject: 'loop0' (000000008d6b7058): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 196.866196][ T9499] RSP: 0018:ffff88805fed7378 EFLAGS: 00010282 [ 196.866210][ T9499] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 196.866223][ T9499] RDX: 000000000000b0fa RSI: ffffffff815c0c96 RDI: ffffed100bfdae61 [ 196.866231][ T9499] RBP: ffff88805fed74d0 R08: ffff88805fecc380 R09: 0000000000000000 [ 196.866238][ T9499] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 196.866247][ T9499] R13: ffff88805ff0e200 R14: 0000000000000001 R15: dffffc0000000000 [ 196.866279][ T9499] ? vprintk_func+0x86/0x189 [ 196.866301][ T9499] ? mark_chain_precision+0x15c2/0x18e0 [ 196.866335][ T9499] ? mark_reg_unknown+0x50/0x50 [ 196.937996][ T9499] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 196.943824][ T9499] ? bpf_verifier_log_write+0x240/0x240 [ 196.949402][ T9499] ? check_reg_arg+0x1f1/0x480 [ 196.954197][ T9499] check_cond_jmp_op+0xcce/0x3c20 [ 196.959252][ T9499] ? security_capable+0x95/0xc0 [ 196.964131][ T9499] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 196.969785][ T9499] ? find_held_lock+0x35/0x130 [ 196.974568][ T9499] ? __sanitizer_cov_trace_const_cmp2+0x1d/0x20 [ 196.980830][ T9499] ? check_func_arg+0x11b0/0x11b0 [ 196.985870][ T9499] ? fault_create_debugfs_attr+0x180/0x180 [ 196.991701][ T9499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.997981][ T9499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 15:30:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff61a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:30:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 197.004264][ T9499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.010527][ T9499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.016790][ T9499] ? krealloc+0x7b/0xd0 [ 197.020960][ T9499] ? krealloc+0x7b/0xd0 [ 197.025137][ T9499] ? rcu_read_lock_sched_held+0x110/0x130 [ 197.030873][ T9499] ? kfree+0x28b/0x2c0 [ 197.034963][ T9499] do_check+0x6187/0x8990 [ 197.039309][ T9499] ? find_held_lock+0x35/0x130 [ 197.044122][ T9499] ? check_helper_call+0x3210/0x3210 [ 197.049442][ T9499] ? kfree+0x226/0x2c0 [ 197.053626][ T9499] ? kvfree+0x61/0x70 15:30:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 197.057705][ T9499] ? kfree+0x226/0x2c0 [ 197.061900][ T9499] ? lockdep_hardirqs_on+0x418/0x5d0 [ 197.067350][ T9499] ? trace_hardirqs_on+0x67/0x240 [ 197.072512][ T9499] ? kvfree+0x61/0x70 [ 197.076615][ T9499] bpf_check+0x6f99/0x9948 [ 197.081167][ T9499] ? do_check+0x8990/0x8990 [ 197.085807][ T9499] ? lock_downgrade+0x920/0x920 [ 197.090792][ T9499] ? ktime_get_with_offset+0x13a/0x350 [ 197.096374][ T9499] ? bpf_prog_load+0xdce/0x1670 [ 197.101346][ T9499] ? ktime_get_with_offset+0x13a/0x350 15:30:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 197.106919][ T9499] ? lockdep_hardirqs_on+0x418/0x5d0 [ 197.112341][ T9499] ? trace_hardirqs_on+0x67/0x240 [ 197.117491][ T9499] ? memset+0x32/0x40 [ 197.121587][ T9499] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 197.127930][ T9499] ? bpf_obj_name_cpy+0x13f/0x190 [ 197.133057][ T9499] bpf_prog_load+0xe68/0x1670 [ 197.133745][ T3879] kobject: 'loop5' (000000003d52515a): kobject_uevent_env [ 197.137859][ T9499] ? bpf_prog_new_fd+0x60/0x60 [ 197.149899][ T9499] ? lock_downgrade+0x920/0x920 [ 197.154918][ T9499] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 197.161275][ T9499] ? security_bpf+0x8b/0xc0 [ 197.165858][ T9499] __do_sys_bpf+0xa46/0x42f0 [ 197.165872][ T3879] kobject: 'loop5' (000000003d52515a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 197.180670][ T9499] ? bpf_prog_load+0x1670/0x1670 [ 197.185649][ T9499] ? kasan_check_read+0x11/0x20 [ 197.185769][ T3879] kobject: 'loop4' (00000000671329b8): kobject_uevent_env [ 197.190531][ T9499] ? _copy_to_user+0x118/0x160 [ 197.190552][ T9499] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 197.190566][ T9499] ? put_timespec64+0xda/0x140 [ 197.190580][ T9499] ? nsecs_to_jiffies+0x30/0x30 [ 197.190607][ T9499] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.190622][ T9499] ? do_syscall_64+0x26/0x6a0 [ 197.190638][ T9499] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.190651][ T9499] ? do_syscall_64+0x26/0x6a0 [ 197.190670][ T9499] __x64_sys_bpf+0x73/0xb0 [ 197.190688][ T9499] do_syscall_64+0xfd/0x6a0 [ 197.190710][ T9499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.212118][ T3879] kobject: 'loop4' (00000000671329b8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 197.214283][ T9499] RIP: 0033:0x4597c9 [ 197.214301][ T9499] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.214310][ T9499] RSP: 002b:00007efefe62dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 197.214325][ T9499] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004597c9 [ 197.214334][ T9499] RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000005 [ 197.214343][ T9499] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 197.214352][ T9499] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efefe62e6d4 [ 197.214361][ T9499] R13: 00000000004bfc12 R14: 00000000004d15f8 R15: 00000000ffffffff [ 197.220370][ T9499] Kernel Offset: disabled [ 197.342401][ T9499] Rebooting in 86400 seconds..