Warning: Permanently added '[localhost]:43750' (ECDSA) to the list of known hosts. [ 77.389382][ T38] audit: type=1400 audit(1575024693.110:42): avc: denied { map } for pid=7842 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16525 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2019/11/29 10:51:33 fuzzer started 2019/11/29 10:51:33 dialing manager at 10.0.2.10:46599 2019/11/29 10:51:33 syscalls: 2543 2019/11/29 10:51:33 code coverage: enabled 2019/11/29 10:51:33 comparison tracing: enabled 2019/11/29 10:51:33 extra coverage: extra coverage is not supported by the kernel 2019/11/29 10:51:33 setuid sandbox: enabled 2019/11/29 10:51:33 namespace sandbox: enabled 2019/11/29 10:51:33 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/29 10:51:33 fault injection: enabled 2019/11/29 10:51:33 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/29 10:51:33 net packet injection: enabled 2019/11/29 10:51:33 net device setup: enabled 2019/11/29 10:51:33 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/29 10:51:33 devlink PCI setup: PCI device 0000:00:10.0 is not available 10:51:50 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x200006) splice(r0, 0x0, r1, 0x0, 0x55aa40be, 0x0) [ 94.289063][ T38] audit: type=1400 audit(1575024710.010:43): avc: denied { map } for pid=7863 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=17654 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 10:51:50 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000000)={0x7}, 0x7) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000100) r3 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r3, 0x0) [ 94.440114][ T7864] IPVS: ftp: loaded support on port[0] = 21 [ 94.526349][ T7866] IPVS: ftp: loaded support on port[0] = 21 10:51:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x0) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f00000003c0)) syz_open_procfs(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) [ 94.534007][ T7864] chnl_net:caif_netlink_parms(): no params data found [ 94.599258][ T7864] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.609300][ T7864] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.617757][ T7864] device bridge_slave_0 entered promiscuous mode [ 94.628810][ T7864] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.636606][ T7864] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.644151][ T7864] device bridge_slave_1 entered promiscuous mode [ 94.668209][ T7864] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 10:51:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x200006) splice(r0, 0x0, r1, 0x0, 0x55aa40be, 0x0) [ 100.004117][ T7878] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 100.014113][ T7878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 100.022893][ T7878] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 100.034556][ T7876] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.035039][ C1] hrtimer: interrupt took 80458 ns [ 100.048857][ T7874] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 100.069227][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 100.079462][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 100.087346][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 100.087946][ T38] audit: type=1804 audit(1575024715.810:50): pid=7903 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir823992038/syzkaller.vdVXEr/0/bus" dev="sda1" ino=16566 res=1 [ 100.094847][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 10:51:55 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000000)={0x7}, 0x7) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000100) r3 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r3, 0x0) [ 100.132413][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.140345][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 100.148750][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.150218][ T38] audit: type=1804 audit(1575024715.860:51): pid=7907 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir823992038/syzkaller.vdVXEr/1/bus" dev="sda1" ino=16566 res=1 [ 100.156915][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.193604][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 10:51:55 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000000)={0x7}, 0x7) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000100) r3 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r3, 0x0) [ 100.202291][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.209531][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.218179][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 100.258603][ T38] audit: type=1804 audit(1575024715.980:52): pid=7909 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir823992038/syzkaller.vdVXEr/2/bus" dev="sda1" ino=16566 res=1 [ 100.262339][ T7873] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 10:51:56 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000000)={0x7}, 0x7) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000100) r3 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r3, 0x0) [ 100.295752][ T7873] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 100.306807][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.306894][ T38] audit: type=1804 audit(1575024716.030:53): pid=7912 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir774085577/syzkaller.RCBWrg/2/bus" dev="sda1" ino=16567 res=1 [ 100.314642][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 10:51:56 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000000)={0x7}, 0x7) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000100) r3 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r3, 0x0) 10:51:56 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000000)={0x7}, 0x7) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000100) r3 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r3, 0x0) [ 100.360549][ T38] audit: type=1804 audit(1575024716.080:54): pid=7915 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir774085577/syzkaller.RCBWrg/3/bus" dev="sda1" ino=16567 res=1 [ 100.372172][ T2781] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.372200][ T2781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.372444][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 10:51:56 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000000)={0x7}, 0x7) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000100) r3 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r3, 0x0) [ 100.372746][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.372970][ T2781] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.372987][ T2781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.373194][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 100.373611][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 100.374041][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.374370][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.374595][ T2781] bridge0: port 2(bridge_slave_1) entered blocking state 10:51:56 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000000)={0x7}, 0x7) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000100) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, 0xffffffffffffffff, 0x0) [ 100.374612][ T2781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.374845][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 100.375460][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 100.375835][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 100.376289][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 100.376646][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 100.376940][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.377249][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 100.377529][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.377816][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 100.378115][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.378496][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 100.378821][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.379165][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 100.379527][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 100.380148][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 100.400367][ T38] audit: type=1804 audit(1575024716.120:55): pid=7917 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir823992038/syzkaller.vdVXEr/3/bus" dev="sda1" ino=16563 res=1 [ 100.418060][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 100.446673][ T7879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 100.447285][ T7879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 100.474437][ T7879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 100.477889][ T38] audit: type=1804 audit(1575024716.190:56): pid=7919 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir774085577/syzkaller.RCBWrg/4/bus" dev="sda1" ino=16567 res=1 [ 100.488070][ T7879] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 100.533253][ T7879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 100.549693][ T7879] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 100.566034][ T7879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 100.581173][ T7879] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.714735][ T7879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 100.723139][ T7879] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.730919][ T7879] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 100.737984][ T7879] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 100.745423][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 100.759447][ T7879] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 100.780313][ T7869] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 100.788815][ T2815] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 100.796385][ T2815] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 100.804525][ T7874] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 100.823770][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 100.830895][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 100.838337][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 100.845375][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 100.854724][ T7876] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 100.864847][ T7873] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 100.940414][ T7944] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12337 sclass=netlink_route_socket pig=7944 comm=syz-executor.3 10:51:56 executing program 0: 10:51:56 executing program 4: 10:51:56 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000000)={0x7}, 0x7) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000100) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, 0xffffffffffffffff, 0x0) 10:51:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x0) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f00000003c0)) syz_open_procfs(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) 10:51:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 [ 264.735134][ C2] dump_stack+0x197/0x210 [ 264.735134][ C2] nmi_cpu_backtrace.cold+0x70/0xb2 [ 264.735134][ C2] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 264.735134][ C2] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 264.735134][ C2] arch_trigger_cpumask_backtrace+0x14/0x20 [ 264.735134][ C2] rcu_dump_cpu_stacks+0x183/0x1cf [ 264.735134][ C2] ? find_next_bit+0x107/0x130 [ 264.735134][ C2] rcu_sched_clock_irq.cold+0x509/0xc02 [ 264.735134][ C2] ? raise_softirq+0x138/0x340 [ 264.735134][ C2] update_process_times+0x2d/0x70 [ 264.735134][ C2] tick_sched_handle+0xa2/0x190 [ 264.735134][ C2] tick_sched_timer+0x53/0x140 [ 264.735134][ C2] __hrtimer_run_queues+0x364/0xe40 [ 264.735134][ C2] ? tick_sched_do_timer+0x1b0/0x1b0 [ 264.735134][ C2] ? hrtimer_init+0x330/0x330 [ 264.735134][ C2] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 264.735134][ C2] ? ktime_get_update_offsets_now+0x2ce/0x430 [ 264.735134][ C2] hrtimer_interrupt+0x314/0x770 [ 264.735134][ C2] smp_apic_timer_interrupt+0x160/0x610 [ 264.735134][ C2] apic_timer_interrupt+0xf/0x20 [ 264.735134][ C2] RIP: 0010:kmem_cache_free+0xab/0x320 [ 264.735134][ C2] Code: e8 ba 26 00 00 84 c0 74 77 41 f7 c6 00 02 00 00 74 4f e8 08 a4 c8 ff 48 83 3d 58 70 61 07 00 0f 84 fa 01 00 00 4c 89 f7 57 9d <0f> 1f 44 00 00 4c 8b 6d 08 0f 1f 44 00 00 65 8b 05 38 ef 4f 7e 83 [ 264.735134][ C2] RSP: 0018:ffff88802d709da0 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 264.735134][ C2] RAX: 0000000000000007 RBX: ffff888022a4cd00 RCX: 0000000000000002 [ 264.735134][ C2] RDX: 0000000000000000 RSI: ffff888012204ee8 RDI: 0000000000000282 [ 264.735134][ C2] RBP: ffff88802d709dc0 R08: 1ffffffff15377bb R09: fffffbfff15377bc [ 264.735134][ C2] R10: fffffbfff15377bb R11: ffffffff8a9bbddf R12: ffff88807e856e00 [ 264.735134][ C2] R13: ffffffff81bcf428 R14: 0000000000000282 R15: ffffffff81bcf390 [ 264.735134][ C2] ? apic_timer_interrupt+0xa/0x20 [ 264.735134][ C2] ? get_max_files+0x20/0x20 [ 264.735134][ C2] ? file_free_rcu+0x98/0xe0 [ 264.735134][ C2] file_free_rcu+0x98/0xe0 [ 264.735134][ C2] rcu_core+0x570/0x1540 [ 264.735134][ C2] ? __rcu_read_unlock+0x6b0/0x6b0 [ 264.735134][ C2] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 264.735134][ C2] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 264.735134][ C2] rcu_core_si+0x9/0x10 [ 264.735134][ C2] __do_softirq+0x262/0x98c [ 264.735134][ C2] ? sched_clock_cpu+0x14e/0x1b0 [ 264.735134][ C2] irq_exit+0x19b/0x1e0 [ 264.735134][ C2] smp_apic_timer_interrupt+0x1a3/0x610 [ 264.735134][ C2] apic_timer_interrupt+0xf/0x20 [ 264.735134][ C2] [ 264.735134][ C2] RIP: 0010:generic_exec_single+0x33a/0x4c0 [ 264.735134][ C2] Code: 00 fc ff df 48 c1 e8 03 80 3c 10 00 0f 85 68 01 00 00 48 83 3d 2e 81 a9 07 00 0f 84 e0 00 00 00 e8 eb 2a 0b 00 48 89 df 57 9d <0f> 1f 44 00 00 45 31 ed e9 39 fe ff ff e8 d4 2a 0b 00 0f 0b e9 23 [ 264.735134][ C2] RSP: 0018:ffff888013bbfa80 EFLAGS: 00000216 ORIG_RAX: ffffffffffffff13 [ 264.735134][ C2] RAX: 0000000000040000 RBX: 0000000000000216 RCX: ffffc9000ac65000 [ 264.735134][ C2] RDX: 000000000000076d RSI: ffffffff8169b335 RDI: 0000000000000216 [ 264.735134][ C2] RBP: ffff888013bbfab0 R08: 1ffffffff15377bb R09: fffffbfff15377bc [ 264.735134][ C2] R10: fffffbfff15377bb R11: ffffffff8a9bbddf R12: 0000000000000200 [ 264.735134][ C2] R13: ffff888013bbfb00 R14: ffff888013bbfbd0 R15: ffffffff818bd170 [ 264.735134][ C2] ? perf_duration_warn+0x40/0x40 [ 264.735134][ C2] ? generic_exec_single+0x335/0x4c0 [ 264.735134][ C2] ? __perf_event_enable+0x930/0x930 [ 264.735134][ C2] smp_call_function_single+0x17c/0x480 [ 264.735134][ C2] ? perf_duration_warn+0x40/0x40 [ 264.735134][ C2] ? generic_exec_single+0x4c0/0x4c0 [ 264.735134][ C2] ? __do_sys_perf_event_open+0x174c/0x2c70 [ 264.735134][ C2] ? __perf_event_enable+0x930/0x930 [ 264.735134][ C2] task_function_call+0xe9/0x180 [ 264.735134][ C2] ? perf_event_addr_filters_exec+0x310/0x310 [ 264.735134][ C2] ? __do_sys_perf_event_open+0x174c/0x2c70 [ 264.735134][ C2] ? __perf_event_enable+0x930/0x930 [ 264.735134][ C2] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.735134][ C2] ? exclusive_event_installable+0x257/0x320 [ 264.735134][ C2] perf_install_in_context+0x308/0x5a0 [ 264.735134][ C2] ? list_add_event+0xed0/0xed0 [ 264.735134][ C2] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 264.735134][ C2] ? __perf_event_header_size.isra.0+0x166/0x1c0 [ 264.735134][ C2] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 264.735134][ C2] __do_sys_perf_event_open+0x1cbc/0x2c70 [ 264.735134][ C2] ? perf_event_set_output+0x4e0/0x4e0 [ 264.735134][ C2] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 264.735134][ C2] ? put_timespec64+0xda/0x140 [ 264.735134][ C2] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 264.735134][ C2] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 264.735134][ C2] ? do_syscall_64+0x26/0x790 [ 264.735134][ C2] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.735134][ C2] ? do_syscall_64+0x26/0x790 [ 264.735134][ C2] __x64_sys_perf_event_open+0xbe/0x150 [ 264.735134][ C2] do_syscall_64+0xfa/0x790 [ 264.735134][ C2] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.735134][ C2] RIP: 0033:0x45a759 [ 264.735134][ C2] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.735134][ C2] RSP: 002b:00007f3b39de3c88 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 264.735134][ C2] RAX: ffffffffffffffda RBX: 000000000071bf00 RCX: 000000000045a759 [ 264.735134][ C2] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000040 [ 264.735134][ C2] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 264.735134][ C2] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f3b39de46d4 [ 264.735134][ C2] R13: 00000000004aec17 R14: 00000000006f1cb0 R15: 00000000ffffffff