[   41.737329][   T26] audit: type=1800 audit(1562002936.896:27): pid=7708 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0
[   41.758560][   T26] audit: type=1800 audit(1562002936.896:28): pid=7708 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.
[   42.322315][   T26] audit: type=1800 audit(1562002937.546:29): pid=7708 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0
[   42.341740][   T26] audit: type=1800 audit(1562002937.546:30): pid=7708 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0

Debian GNU/Linux 7 syzkaller ttyS0

Warning: Permanently added '10.128.10.60' (ECDSA) to the list of known hosts.
2019/07/01 17:42:27 fuzzer started
2019/07/01 17:42:29 dialing manager at 10.128.0.26:42425
2019/07/01 17:42:29 syscalls: 2465
2019/07/01 17:42:29 code coverage: enabled
2019/07/01 17:42:29 comparison tracing: enabled
2019/07/01 17:42:29 extra coverage: extra coverage is not supported by the kernel
2019/07/01 17:42:29 setuid sandbox: enabled
2019/07/01 17:42:29 namespace sandbox: enabled
2019/07/01 17:42:29 Android sandbox: /sys/fs/selinux/policy does not exist
2019/07/01 17:42:29 fault injection: enabled
2019/07/01 17:42:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/07/01 17:42:29 net packet injection: enabled
2019/07/01 17:42:29 net device setup: enabled
17:43:43 executing program 0:
mkdir(&(0x7f0000000440)='./file1\x00', 0x0)
mkdir(&(0x7f0000000340)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1'])
r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
renameat(r0, &(0x7f0000000240)='./file1\x00', r0, &(0x7f0000000840)='./file0/f.le.\x00')

syzkaller login: [  127.934082][ T7872] IPVS: ftp: loaded support on port[0] = 21
17:43:43 executing program 1:
mkdir(&(0x7f0000000440)='./file1\x00', 0x0)
mkdir(&(0x7f0000000340)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1'])
r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
geteuid()
lstat(&(0x7f0000000280)='./file0/f.le.\x00', &(0x7f0000000580))
setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000006c0)={{}, {}, [], {0x4, 0x3}, [{}], {0x10, 0x2}}, 0x2c, 0x3)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
renameat(r0, &(0x7f0000000240)='./file1\x00', r0, &(0x7f0000000840)='./file0/f.le.\x00')

[  128.029617][ T7872] chnl_net:caif_netlink_parms(): no params data found
[  128.092682][ T7872] bridge0: port 1(bridge_slave_0) entered blocking state
[  128.102030][ T7872] bridge0: port 1(bridge_slave_0) entered disabled state
[  128.110365][ T7872] device bridge_slave_0 entered promiscuous mode
[  128.120133][ T7872] bridge0: port 2(bridge_slave_1) entered blocking state
[  128.127259][ T7872] bridge0: port 2(bridge_slave_1) entered disabled state
[  128.135617][ T7872] device bridge_slave_1 entered promiscuous mode
[  128.158168][ T7872] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  128.170414][ T7872] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  128.205029][ T7872] team0: Port device team_slave_0 added
[  128.212865][ T7872] team0: Port device team_slave_1 added
[  128.224352][ T7875] IPVS: ftp: loaded support on port[0] = 21
17:43:43 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)

[  128.311445][ T7872] device hsr_slave_0 entered promiscuous mode
[  128.348998][ T7872] device hsr_slave_1 entered promiscuous mode
17:43:43 executing program 3:
mkdir(&(0x7f0000000440)='./file1\x00', 0x0)
symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000000)='.//ile0\x00')
mkdir(&(0x7f0000000340)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1'])
r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
geteuid()
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6}, 0x0, @in=@multicast1}}, 0x0)
lstat(&(0x7f0000000280)='./file0/f.le.\x00', &(0x7f0000000580))
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400), 0x0)
setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x3)
getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000740), 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
renameat(r0, &(0x7f0000000240)='./file1\x00', r0, &(0x7f0000000840)='./file0/f.le.\x00')

[  128.477763][ T7877] IPVS: ftp: loaded support on port[0] = 21
[  128.494749][ T7872] bridge0: port 2(bridge_slave_1) entered blocking state
[  128.502111][ T7872] bridge0: port 2(bridge_slave_1) entered forwarding state
[  128.509922][ T7872] bridge0: port 1(bridge_slave_0) entered blocking state
[  128.517083][ T7872] bridge0: port 1(bridge_slave_0) entered forwarding state
[  128.638155][ T7880] IPVS: ftp: loaded support on port[0] = 21
[  128.734659][ T7875] chnl_net:caif_netlink_parms(): no params data found
17:43:44 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x400, 0x0)
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2)
r1 = socket$inet6(0xa, 0x1, 0x8010000000000084)
bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
listen(r1, 0x8)
r2 = socket$inet6_sctp(0xa, 0x5, 0x84)
r3 = accept4(r1, 0x0, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f0000000080)=""/55, &(0x7f00000000c0)=0x37)

[  128.867126][ T7872] 8021q: adding VLAN 0 to HW filter on device bond0
[  128.905551][ T7875] bridge0: port 1(bridge_slave_0) entered blocking state
[  128.922109][ T7875] bridge0: port 1(bridge_slave_0) entered disabled state
[  128.930388][ T7875] device bridge_slave_0 entered promiscuous mode
[  128.937872][ T7877] chnl_net:caif_netlink_parms(): no params data found
[  128.959046][ T7875] bridge0: port 2(bridge_slave_1) entered blocking state
[  128.966129][ T7875] bridge0: port 2(bridge_slave_1) entered disabled state
[  128.977748][ T7884] IPVS: ftp: loaded support on port[0] = 21
[  128.988367][ T7875] device bridge_slave_1 entered promiscuous mode
[  129.004514][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  129.026037][   T22] bridge0: port 1(bridge_slave_0) entered disabled state
[  129.034232][   T22] bridge0: port 2(bridge_slave_1) entered disabled state
[  129.045219][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
17:43:44 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x1, 0x8010000000000084)
bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
listen(r0, 0x8)
r1 = socket$inet6_sctp(0xa, 0x5, 0x84)
r2 = accept4(r0, 0x0, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xa4}, 0x98)

[  129.070521][ T7872] 8021q: adding VLAN 0 to HW filter on device team0
[  129.103186][ T7875] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  129.116677][ T7875] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  129.177829][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  129.189559][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  129.197948][ T3486] bridge0: port 1(bridge_slave_0) entered blocking state
[  129.205083][ T3486] bridge0: port 1(bridge_slave_0) entered forwarding state
[  129.212652][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  129.221312][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  129.229605][ T3486] bridge0: port 2(bridge_slave_1) entered blocking state
[  129.236639][ T3486] bridge0: port 2(bridge_slave_1) entered forwarding state
[  129.244273][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  129.273870][ T7877] bridge0: port 1(bridge_slave_0) entered blocking state
[  129.282171][ T7877] bridge0: port 1(bridge_slave_0) entered disabled state
[  129.291336][ T7877] device bridge_slave_0 entered promiscuous mode
[  129.305387][ T7875] team0: Port device team_slave_0 added
[  129.315581][ T7875] team0: Port device team_slave_1 added
[  129.331652][ T7877] bridge0: port 2(bridge_slave_1) entered blocking state
[  129.339313][ T7877] bridge0: port 2(bridge_slave_1) entered disabled state
[  129.346847][ T7877] device bridge_slave_1 entered promiscuous mode
[  129.363231][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  129.383940][ T7872] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  129.394499][ T7872] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  129.430363][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  129.439353][ T7887] IPVS: ftp: loaded support on port[0] = 21
[  129.447470][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  129.455831][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  129.464482][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  129.472798][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  129.481122][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  129.489773][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  129.497904][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  129.506207][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  129.514010][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  129.561717][ T7875] device hsr_slave_0 entered promiscuous mode
[  129.599802][ T7875] device hsr_slave_1 entered promiscuous mode
[  129.640907][ T7877] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  129.649615][ T7880] chnl_net:caif_netlink_parms(): no params data found
[  129.694447][ T7877] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  129.745404][ T7872] 8021q: adding VLAN 0 to HW filter on device batadv0
[  129.759882][ T7880] bridge0: port 1(bridge_slave_0) entered blocking state
[  129.767019][ T7880] bridge0: port 1(bridge_slave_0) entered disabled state
[  129.775576][ T7880] device bridge_slave_0 entered promiscuous mode
[  129.784242][ T7877] team0: Port device team_slave_0 added
[  129.816075][ T7880] bridge0: port 2(bridge_slave_1) entered blocking state
[  129.823384][ T7880] bridge0: port 2(bridge_slave_1) entered disabled state
[  129.835009][ T7880] device bridge_slave_1 entered promiscuous mode
[  129.843018][ T7877] team0: Port device team_slave_1 added
[  129.876705][ T7884] chnl_net:caif_netlink_parms(): no params data found
[  129.912940][ T7880] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  129.951686][ T7880] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  129.998466][ T7898] overlayfs: lowerdir is in-use as upperdir/workdir
17:43:45 executing program 0:
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0)
mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0)
umount2(&(0x7f0000000280)='./file0/file0\x00', 0x0)

[  130.040823][ T7877] device hsr_slave_0 entered promiscuous mode
[  130.062330][ T7899] overlayfs: lowerdir is in-use as upperdir/workdir
[  130.080748][ T7877] device hsr_slave_1 entered promiscuous mode
[  130.129357][ T7884] bridge0: port 1(bridge_slave_0) entered blocking state
[  130.137955][ T7884] bridge0: port 1(bridge_slave_0) entered disabled state
[  130.147076][ T7884] device bridge_slave_0 entered promiscuous mode
[  130.156301][ T7884] bridge0: port 2(bridge_slave_1) entered blocking state
[  130.164366][ T7884] bridge0: port 2(bridge_slave_1) entered disabled state
[  130.172997][ T7884] device bridge_slave_1 entered promiscuous mode
17:43:45 executing program 0:

[  130.184953][ T7880] team0: Port device team_slave_0 added
[  130.197002][ T7880] team0: Port device team_slave_1 added
[  130.218475][ T7884] bond0: Enslaving bond_slave_0 as an active interface with an up link
17:43:45 executing program 0:

17:43:45 executing program 0:

17:43:45 executing program 0:

[  130.283892][ T7880] device hsr_slave_0 entered promiscuous mode
17:43:45 executing program 0:

[  130.349117][ T7880] device hsr_slave_1 entered promiscuous mode
17:43:45 executing program 0:

[  130.392798][ T7884] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  130.461103][ T7875] 8021q: adding VLAN 0 to HW filter on device bond0
[  130.533904][ T7879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  130.541935][ T7879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  130.551472][ T7884] team0: Port device team_slave_0 added
[  130.558487][ T7884] team0: Port device team_slave_1 added
[  130.570386][ T7887] chnl_net:caif_netlink_parms(): no params data found
[  130.586469][ T7875] 8021q: adding VLAN 0 to HW filter on device team0
[  130.618356][ T7877] 8021q: adding VLAN 0 to HW filter on device bond0
[  130.627466][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  130.637018][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  130.645606][   T22] bridge0: port 1(bridge_slave_0) entered blocking state
[  130.652730][   T22] bridge0: port 1(bridge_slave_0) entered forwarding state
[  130.661489][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  130.741159][ T7884] device hsr_slave_0 entered promiscuous mode
[  130.768886][ T7884] device hsr_slave_1 entered promiscuous mode
[  130.808930][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  130.817546][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  130.826025][   T17] bridge0: port 2(bridge_slave_1) entered blocking state
[  130.833206][   T17] bridge0: port 2(bridge_slave_1) entered forwarding state
[  130.851907][ T7887] bridge0: port 1(bridge_slave_0) entered blocking state
[  130.859272][ T7887] bridge0: port 1(bridge_slave_0) entered disabled state
[  130.866851][ T7887] device bridge_slave_0 entered promiscuous mode
[  130.874678][ T7887] bridge0: port 2(bridge_slave_1) entered blocking state
[  130.882236][ T7887] bridge0: port 2(bridge_slave_1) entered disabled state
[  130.891312][ T7887] device bridge_slave_1 entered promiscuous mode
[  130.910823][ T7877] 8021q: adding VLAN 0 to HW filter on device team0
[  130.936257][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  130.944079][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  130.966285][ T7887] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  130.976553][ T7887] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  130.991194][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  131.022480][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  131.031115][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  131.040169][   T17] bridge0: port 1(bridge_slave_0) entered blocking state
[  131.047204][   T17] bridge0: port 1(bridge_slave_0) entered forwarding state
[  131.054965][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  131.063943][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  131.072528][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  131.080783][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  131.089722][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  131.099487][ T7887] team0: Port device team_slave_0 added
[  131.107398][ T7880] 8021q: adding VLAN 0 to HW filter on device bond0
[  131.121336][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  131.129893][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  131.137456][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  131.147212][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  131.155675][   T17] bridge0: port 2(bridge_slave_1) entered blocking state
[  131.162770][   T17] bridge0: port 2(bridge_slave_1) entered forwarding state
[  131.171656][ T7887] team0: Port device team_slave_1 added
[  131.193840][ T7880] 8021q: adding VLAN 0 to HW filter on device team0
[  131.206237][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  131.214141][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  131.221774][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  131.231120][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  131.239532][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  131.256716][ T7875] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  131.271933][ T7875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  131.333074][ T7887] device hsr_slave_0 entered promiscuous mode
[  131.378987][ T7887] device hsr_slave_1 entered promiscuous mode
[  131.462135][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  131.471609][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  131.480336][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  131.488495][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  131.497261][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  131.506186][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  131.514806][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  131.524223][ T3003] bridge0: port 1(bridge_slave_0) entered blocking state
[  131.532027][ T3003] bridge0: port 1(bridge_slave_0) entered forwarding state
[  131.540211][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  131.548888][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  131.557231][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  131.565157][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  131.596228][ T7877] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  131.607236][ T7877] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  131.620088][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  131.628579][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  131.637469][    T5] bridge0: port 2(bridge_slave_1) entered blocking state
[  131.644573][    T5] bridge0: port 2(bridge_slave_1) entered forwarding state
[  131.652367][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  131.661730][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  131.670003][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  131.678292][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  131.686903][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  131.695708][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  131.714464][ T7875] 8021q: adding VLAN 0 to HW filter on device batadv0
[  131.752013][ T7884] 8021q: adding VLAN 0 to HW filter on device bond0
[  131.771140][ T7877] 8021q: adding VLAN 0 to HW filter on device batadv0
[  131.782098][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  131.794648][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  131.805719][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  131.814431][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  131.836846][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  131.856636][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  131.872576][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  131.881015][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  131.889603][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  131.897389][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  131.905143][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  131.913807][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  131.936327][ T7880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  131.960378][ T7884] 8021q: adding VLAN 0 to HW filter on device team0
[  132.017492][ T7887] 8021q: adding VLAN 0 to HW filter on device bond0
[  132.038266][ T7887] 8021q: adding VLAN 0 to HW filter on device team0
[  132.062090][ T7929] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.
[  132.073073][ T7932] overlayfs: lowerdir is in-use as upperdir/workdir
[  132.078642][    C1] hrtimer: interrupt took 34436 ns
[  132.097823][ T7880] 8021q: adding VLAN 0 to HW filter on device batadv0
17:43:47 executing program 1:

[  132.134121][ T7934] overlayfs: lowerdir is in-use as upperdir/workdir
[  132.141553][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  132.158595][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  132.185581][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  132.203804][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  132.230766][   T17] bridge0: port 1(bridge_slave_0) entered blocking state
[  132.237853][   T17] bridge0: port 1(bridge_slave_0) entered forwarding state
[  132.247002][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  132.257522][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  132.267118][   T17] bridge0: port 2(bridge_slave_1) entered blocking state
[  132.274264][   T17] bridge0: port 2(bridge_slave_1) entered forwarding state
[  132.287773][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  132.296931][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
17:43:47 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)

[  132.337828][ T7884] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  132.364278][ T7884] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  132.378456][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  132.389419][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  132.398271][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  132.407690][   T22] bridge0: port 1(bridge_slave_0) entered blocking state
[  132.414998][   T22] bridge0: port 1(bridge_slave_0) entered forwarding state
[  132.427925][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  132.437270][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  132.446650][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  132.455619][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  132.464658][   T22] bridge0: port 2(bridge_slave_1) entered blocking state
[  132.471969][   T22] bridge0: port 2(bridge_slave_1) entered forwarding state
[  132.480690][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  132.490908][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  132.500451][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  132.509569][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  132.518067][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  132.526945][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  132.553267][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  132.561860][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  132.569957][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  132.578382][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  132.588061][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  132.598475][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  132.614653][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  132.632015][ T7884] 8021q: adding VLAN 0 to HW filter on device batadv0
[  132.656685][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  132.671506][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
17:43:47 executing program 3:

[  132.702608][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  132.703051][ T7952] overlayfs: lowerdir is in-use as upperdir/workdir
[  132.728920][ T7952] overlayfs: lowerdir is in-use as upperdir/workdir
[  132.745120][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  132.761508][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  132.773872][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  132.803363][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  132.815028][ T7887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  132.870698][ T7887] 8021q: adding VLAN 0 to HW filter on device batadv0
17:43:48 executing program 1:

17:43:48 executing program 0:

17:43:48 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070")
mmap(&(0x7f0000000000/0xb36000)=nil, 0x7fffdffff000, 0x0, 0x8031, 0xffffffffffffffff, 0x0)

17:43:48 executing program 2:

17:43:48 executing program 3:

17:43:48 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000308ffff808fdb003d88c8f00010ae1b"], 0x14}}, 0x0)

17:43:48 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x200, 0x5)
ioctl$FS_IOC_FSGETXATTR(r0, 0x8004551a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2})

17:43:48 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
connect(r0, &(0x7f0000000000)=@l2={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc7}}, 0x80)
close(r0)

17:43:48 executing program 3:
perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(0xffffffffffffffff)
bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
timer_create(0x0, 0x0, 0x0)
sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0xc10496740acafe84)
recvmmsg(r1, &(0x7f0000009f80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}}], 0x1, 0x0, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0)
mount(0x0, 0x0, 0x0, 0x0, 0x0)
setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0)
lseek(0xffffffffffffffff, 0x0, 0x0)
open(0x0, 0x141042, 0x0)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xa02, 0x2ba)
symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='./file0\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
keyctl$clear(0x7, 0x0)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0)
timer_create(0x0, 0x0, 0x0)
getpgrp(0xffffffffffffffff)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@local, @in=@dev}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, 0x0)

17:43:48 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
syz_open_dev$vcsn(0x0, 0x3, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x8912, &(0x7f0000000180)="11dca5055e0bcfec7be070")
r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(r3, 0xae80, 0x0)

17:43:48 executing program 1:
perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x2b, 0x8000000000001, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x5, 0x3, 0x0, [{0x0, 0x3}]}]}}, &(0x7f0000000140)=""/4096, 0x32, 0x1000, 0x1}, 0x20)

17:43:48 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070")
mmap(&(0x7f0000000000/0xb36000)=nil, 0x7fffdffff000, 0x0, 0x8031, 0xffffffffffffffff, 0x0)

17:43:48 executing program 2:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$kcm(0x10, 0x0, 0x10)
r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$kcm(0xa, 0x0, 0x11)
setsockopt$sock_attach_bpf(r1, 0x29, 0x49, 0x0, 0xfffffffffffffff9)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
r3 = gettid()
perf_event_open(0x0, 0x0, 0x0, r0, 0x0)
r4 = socket$kcm(0x10, 0x3, 0x0)
recvmsg(0xffffffffffffffff, 0x0, 0x12000)
sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10)
ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000480)={'veth1_to_hsr\x00', 0x200})
sendmsg$kcm(r4, &(0x7f0000002b00)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000002980)="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", 0xfb}], 0x1}, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0)
openat$cgroup(0xffffffffffffffff, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0)
perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x6, 0x10000, 0x5, 0x0, 0x0, 0xfff, 0x10400, 0xa, 0x2, 0x4, 0x5, 0x0, 0x1000, 0x1000, 0xbbb, 0x0, 0x0, 0x9, 0x0, 0x80000001, 0x2, 0x3c78000000, 0x6, 0x100, 0x15c, 0xd14c, 0x52, 0x2, 0x9, 0x1000, 0x60000000000, 0x8, 0x0, 0x8, 0xfde0, 0x9f0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x20, 0xff, 0x3ff, 0x65a4a2d45d0898cf, 0x1, 0x6, 0x8}, r3, 0x2, r0, 0x0)
getpid()

17:43:49 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="11dca5055e0b00ec7be070")
clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0f34"], 0x2}}, 0x0)
ptrace$setopts(0x4206, r1, 0x0, 0x0)
tkill(r1, 0x38)
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]})
sched_setattr(0x0, 0x0, 0x0)
ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r1, 0x0, 0x0)

[  133.750302][ T8009] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
[  133.772004][ T8012] kasan: CONFIG_KASAN_INLINE enabled
[  133.777369][ T8012] kasan: GPF could be caused by NULL-ptr deref or user memory access
17:43:49 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070")
mmap(&(0x7f0000000000/0xb36000)=nil, 0x7fffdffff000, 0x0, 0x8031, 0xffffffffffffffff, 0x0)

[  133.889549][ T8025] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.2'.
[  133.905071][ T8012] general protection fault: 0000 [#1] PREEMPT SMP KASAN
[  133.912199][ T8012] CPU: 1 PID: 8012 Comm: syz-executor.1 Not tainted 5.2.0-rc7 #12
[  133.914031][ T3879] kobject: 'loop4' (00000000d1d5021d): kobject_uevent_env
[  133.920083][ T8012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  133.920102][ T8012] RIP: 0010:btf_struct_resolve+0x42d/0xfc0
[  133.920115][ T8012] Code: e8 03 42 80 3c 28 00 4d 89 e7 74 08 48 89 df e8 a9 5b 25 00 4c 8b 23 49 8d 5c 24 04 48 89 d8 48 c1 e8 03 48 89 85 68 ff ff ff <42> 0f b6 04 28 84 c0 48 8b 55 c8 0f 85 19 04 00 00 4c 8d 6a fc 48
[  133.920121][ T8012] RSP: 0018:ffff88805ca275f0 EFLAGS: 00010247
[  133.920129][ T8012] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000040000
[  133.920135][ T8012] RDX: ffffc90007ff6000 RSI: 000000000000094f RDI: 0000000000000950
[  133.920142][ T8012] RBP: ffff88805ca27690 R08: ffffffff81897f18 R09: fffffbfff1178ed9
[  133.920149][ T8012] R10: fffffbfff1178ed9 R11: 1ffffffff1178ed8 R12: 0000000000000000
[  133.920156][ T8012] R13: dffffc0000000000 R14: ffff888098debe40 R15: ffff8880972c3500
[  133.920165][ T8012] FS:  00007feafe3c8700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000
[  133.920171][ T8012] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  133.920183][ T8012] CR2: 00000000200001c0 CR3: 0000000095f83000 CR4: 00000000001426e0
[  133.939815][ T3879] kobject: 'loop4' (00000000d1d5021d): fill_kobj_path: path = '/devices/virtual/block/loop4'
[  133.943186][ T8012] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  133.943192][ T8012] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  133.943196][ T8012] Call Trace:
[  133.943221][ T8012]  btf_resolve+0x3ed/0xda0
[  133.975139][ T8008] kobject: 'kvm' (000000006e092e4c): kobject_uevent_env
[  133.977365][ T8012]  ? btf_sec_info_cmp+0x110/0x110
[  133.977376][ T8012]  ? kasan_kmalloc+0x9/0x10
[  133.977397][ T8012]  ? __kmalloc_node+0x4d/0x60
[  133.993925][ T8009] kobject: 'integrity' (000000002737d05c): kobject_uevent_env
[  134.001327][ T8012]  btf_new_fd+0x216a/0x37b0
[  134.001346][ T8012]  ? __might_fault+0xf9/0x160
[  134.001356][ T8012]  ? btf_release+0xd0/0xd0
[  134.001371][ T8012]  __do_sys_bpf+0x1212/0xc5d0
[  134.001388][ T8012]  ? __bfs+0x550/0x550
[  134.012852][ T8008] kobject: 'kvm' (000000006e092e4c): fill_kobj_path: path = '/devices/virtual/misc/kvm'
[  134.018278][ T8012]  ? handle_futex_death+0x3f0/0x3f0
[  134.018289][ T8012]  ? _copy_to_user+0xca/0xf0
[  134.018299][ T8012]  ? __bpf_prog_put_rcu+0x320/0x320
[  134.018315][ T8012]  ? sock_do_ioctl+0x264/0x300
[  134.037543][ T8009] kobject: 'integrity' (000000002737d05c): kobject_uevent_env: filter function caused the event to drop!
[  134.042982][ T8012]  ? __lock_acquire+0xcf7/0x1a40
[  134.043000][ T8012]  ? trace_lock_acquire+0x190/0x190
[  134.043011][ T8012]  ? sock_ioctl+0x4f8/0x730
[  134.043021][ T8012]  ? sock_poll+0x2a0/0x2a0
[  134.043032][ T8012]  ? tomoyo_check_path_acl+0x180/0x180
[  134.043053][ T8012]  ? __might_fault+0xf9/0x160
[  134.187513][ T8012]  ? kasan_check_read+0x11/0x20
[  134.192354][ T8012]  ? _copy_to_user+0xca/0xf0
[  134.196933][ T8012]  ? put_timespec64+0x106/0x150
[  134.201773][ T8012]  ? ktime_get_raw+0xf0/0xf0
[  134.206357][ T8012]  ? prepare_exit_to_usermode+0x1e1/0x4f0
[  134.212238][ T8012]  ? __x64_sys_clock_gettime+0x1c5/0x220
[  134.217857][ T8012]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  134.223300][ T8012]  ? trace_irq_disable_rcuidle+0x23/0x1c0
[  134.229019][ T8012]  ? do_syscall_64+0x1d/0x140
[  134.233687][ T8012]  __x64_sys_bpf+0x7a/0x90
[  134.238091][ T8012]  do_syscall_64+0xfe/0x140
[  134.242585][ T8012]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  134.248462][ T8012] RIP: 0033:0x459519
[  134.252344][ T8012] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  134.272803][ T8012] RSP: 002b:00007feafe3c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  134.281208][ T8012] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459519
[  134.289170][ T8012] RDX: 0000000000000020 RSI: 0000000020001140 RDI: 0000000000000012
[  134.297140][ T8012] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  134.305278][ T8012] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feafe3c86d4
[  134.313238][ T8012] R13: 00000000004bf726 R14: 00000000004d0fe0 R15: 00000000ffffffff
[  134.321205][ T8012] Modules linked in:
[  134.328320][ T8009] kobject: 'integrity' (000000002737d05c): kobject_cleanup, parent 000000001eb8ce57
[  134.357131][ T8019] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.2'.
[  134.367530][ T8012] ---[ end trace acefdf1a655fcedb ]---
[  134.367550][ T8012] RIP: 0010:btf_struct_resolve+0x42d/0xfc0
[  134.367560][ T8012] Code: e8 03 42 80 3c 28 00 4d 89 e7 74 08 48 89 df e8 a9 5b 25 00 4c 8b 23 49 8d 5c 24 04 48 89 d8 48 c1 e8 03 48 89 85 68 ff ff ff <42> 0f b6 04 28 84 c0 48 8b 55 c8 0f 85 19 04 00 00 4c 8d 6a fc 48
[  134.367566][ T8012] RSP: 0018:ffff88805ca275f0 EFLAGS: 00010247
[  134.367574][ T8012] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000040000
[  134.367580][ T8012] RDX: ffffc90007ff6000 RSI: 000000000000094f RDI: 0000000000000950
[  134.367586][ T8012] RBP: ffff88805ca27690 R08: ffffffff81897f18 R09: fffffbfff1178ed9
[  134.367592][ T8012] R10: fffffbfff1178ed9 R11: 1ffffffff1178ed8 R12: 0000000000000000
[  134.367598][ T8012] R13: dffffc0000000000 R14: ffff888098debe40 R15: ffff8880972c3500
[  134.367607][ T8012] FS:  00007feafe3c8700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000
[  134.367613][ T8012] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  134.367619][ T8012] CR2: 0000000000000004 CR3: 0000000095f83000 CR4: 00000000001426e0
[  134.367631][ T8012] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  134.367636][ T8012] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  134.367642][ T8012] Kernel panic - not syncing: Fatal exception
[  134.368644][ T8012] Kernel Offset: disabled
[  134.517498][ T8012] Rebooting in 86400 seconds..