[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 29.041622] kauditd_printk_skb: 8 callbacks suppressed [ 29.041633] audit: type=1800 audit(1544644604.379:29): pid=5885 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 29.075093] audit: type=1800 audit(1544644604.379:30): pid=5885 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.117' (ECDSA) to the list of known hosts. 2018/12/12 19:56:54 fuzzer started 2018/12/12 19:56:57 dialing manager at 10.128.0.26:45517 2018/12/12 19:56:57 syscalls: 1 2018/12/12 19:56:57 code coverage: enabled 2018/12/12 19:56:57 comparison tracing: enabled 2018/12/12 19:56:57 setuid sandbox: enabled 2018/12/12 19:56:57 namespace sandbox: enabled 2018/12/12 19:56:57 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/12 19:56:57 fault injection: enabled 2018/12/12 19:56:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/12 19:56:57 net packet injection: enabled 2018/12/12 19:56:57 net device setup: enabled 19:59:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_route(r1, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000140)) syz_open_dev$mouse(0x0, 0x0, 0x400100) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000007c0)={0x6, 0x118, 0xfa00, {{0x101, 0x0, "3a1ac57fb59b6f11c613d3eb0fdc1463e19c14c08bbc3ea15e272dced8abc2dca3aeb4744aaa43c66bd7da67c3ea98668f81c2092887eaa5e05cd91dec5e99d91f9fda9779230765c9a2602c89cb9cd5e94563e2dec80c57963e49891f6b92cb98448c0346c6ba6f28ebc6d96ccd8053b85d1a82de12775cd0b75403fc6a8e12084f7a9082df5f89d0b5ba9749a8df978495dbbe980884625edcd99db927ba71c2456536418d4a3028873528ce8a884503dfc0767e0a9b846dd44e9bfa1581aca967a9235974ea952506ffc84e890c25ad5ee0a90a4eb260c26ec1f3c89cdfe5521123c91e99ca665c6658f76c34daac9bfb0f5bcb5f239877ef73b53ab39e72", 0x6, 0x0, 0x8000000, 0x0, 0x5, 0x0, 0x2}}}, 0x120) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f00001da000/0x18000)=nil, &(0x7f0000000640)=[@textreal={0x8, 0x0}], 0x1, 0x4e, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vcs\x00', 0x400200, 0x0) syzkaller login: [ 220.424557] IPVS: ftp: loaded support on port[0] = 21 19:59:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="020a040007000000ebff0fdf333f220005001a00050000000005000654c6c6598d2ba7c61400eb55d28df8fe2c8cbd877b5f98d5900721f183c66db0a896b306e7ca0000001a99d8c9ab9828961bec0fb16a27061616cae976d65862765b979f1cec5dee5daf5d30"], 0x68}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x20, 0x0) [ 220.730821] IPVS: ftp: loaded support on port[0] = 21 19:59:56 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x4) clone(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) [ 221.042050] IPVS: ftp: loaded support on port[0] = 21 19:59:56 executing program 3: syz_execute_func(&(0x7f0000000180)="470f1b2764ff0941c366410f38282a66420fe2e33e0f1110c442019dcc66460f3a0b82fbfffffff86f") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r1 = dup2(r0, r0) connect$netlink(r1, &(0x7f0000000000)=@unspec, 0xc) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000240), 0x4) recvfrom$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 221.468296] IPVS: ftp: loaded support on port[0] = 21 19:59:57 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 221.950204] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.971501] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.979115] device bridge_slave_0 entered promiscuous mode [ 222.036162] IPVS: ftp: loaded support on port[0] = 21 [ 222.090262] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.101497] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.120959] device bridge_slave_1 entered promiscuous mode [ 222.248780] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.401138] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 19:59:57 executing program 5: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mkdir(&(0x7f0000000880)='./file0/file1\x00', 0x0) mount(&(0x7f0000000240), &(0x7f0000000200)='.', 0x0, 0x1004, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0/file1\x00', &(0x7f00000002c0)='fusectl\x00', 0x0, 0x0) mount(&(0x7f0000000240), &(0x7f0000000280)='.', 0x0, 0x3002480, 0x0) [ 222.683621] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.708529] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.721301] device bridge_slave_0 entered promiscuous mode [ 222.775062] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 222.812959] IPVS: ftp: loaded support on port[0] = 21 [ 222.829801] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.854924] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.862181] device bridge_slave_1 entered promiscuous mode [ 222.915539] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 222.999149] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.015484] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.028129] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.036129] device bridge_slave_0 entered promiscuous mode [ 223.115637] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.171344] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.177742] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.192011] device bridge_slave_1 entered promiscuous mode [ 223.425325] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.521519] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 223.584040] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.613429] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 223.641493] team0: Port device team_slave_0 added [ 223.716919] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 223.728817] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 223.741992] team0: Port device team_slave_1 added [ 223.843419] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 223.852076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.898987] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 223.923731] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.930144] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.962233] device bridge_slave_0 entered promiscuous mode [ 223.970038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.985945] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.014391] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.033689] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.061673] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.071526] device bridge_slave_1 entered promiscuous mode [ 224.107397] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.205798] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 224.216465] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 224.233320] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 224.242124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.261852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.318935] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.334197] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.352167] device bridge_slave_0 entered promiscuous mode [ 224.373695] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 224.388042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.396768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.456085] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 224.475822] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 224.497352] team0: Port device team_slave_0 added [ 224.515053] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 224.563018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.574621] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.583828] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.601781] device bridge_slave_1 entered promiscuous mode [ 224.654206] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 224.681903] team0: Port device team_slave_1 added [ 224.734430] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 224.812793] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 224.819757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.831843] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.877093] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.896117] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 224.914212] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 224.943630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 224.962068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.993428] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.011351] team0: Port device team_slave_0 added [ 225.041586] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 225.082698] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.107262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.118976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.146848] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.159372] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.167633] device bridge_slave_0 entered promiscuous mode [ 225.207609] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.223187] team0: Port device team_slave_1 added [ 225.231199] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.240992] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.281489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.324261] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.332414] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.339776] device bridge_slave_1 entered promiscuous mode [ 225.354511] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 225.431495] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 225.438364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.460525] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.482014] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 225.493881] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 225.543509] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 225.550363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 225.568568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.615205] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 225.633476] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 225.652244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 225.689671] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.701435] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.715118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.734577] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 225.768908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.814456] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.830254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.841833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.898116] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.912197] team0: Port device team_slave_0 added [ 225.973661] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.980171] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.987584] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.993993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.015050] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 226.051510] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 226.062545] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 226.069941] team0: Port device team_slave_1 added [ 226.158557] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 226.175044] team0: Port device team_slave_0 added [ 226.193131] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 226.201254] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.298794] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 226.306473] team0: Port device team_slave_1 added [ 226.330433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.402396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 226.443075] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 226.449948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 226.462381] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.487471] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 226.501221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.510830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.564639] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 226.595581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.605803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.642165] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.652644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.674447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.799591] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 226.811417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.819379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.867232] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.873663] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.880323] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.886739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.903704] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 226.940464] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.962549] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 226.969932] team0: Port device team_slave_0 added [ 226.996071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.013132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.101022] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 227.110468] team0: Port device team_slave_1 added [ 227.200230] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.206665] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.213379] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.219757] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.228163] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 227.260742] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.351432] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.411155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.423315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.476796] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 227.484267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.497644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.622728] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 227.630063] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.640175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.025428] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.031890] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.038578] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.045034] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.053494] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 228.421028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.494558] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.500991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.507657] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.514083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.522282] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 229.069684] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.076132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.082887] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.089261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.106508] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 229.465916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.481915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.078177] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.534800] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 232.102124] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 232.123553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.131591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.225803] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.455547] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.624640] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.674777] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 232.942278] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 233.140009] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.188358] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 233.204611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.227653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.460338] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 233.474476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.489967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.508620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.639365] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 233.658407] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.917740] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 233.932533] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.058420] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.092234] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 234.098476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.111814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.363955] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 234.375544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.391660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.630402] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.660291] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 234.832662] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.092878] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 235.099090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.111649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.544016] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.882969] hrtimer: interrupt took 34705 ns [ 236.008610] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 20:00:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_route(r1, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000140)) syz_open_dev$mouse(0x0, 0x0, 0x400100) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000007c0)={0x6, 0x118, 0xfa00, {{0x101, 0x0, "3a1ac57fb59b6f11c613d3eb0fdc1463e19c14c08bbc3ea15e272dced8abc2dca3aeb4744aaa43c66bd7da67c3ea98668f81c2092887eaa5e05cd91dec5e99d91f9fda9779230765c9a2602c89cb9cd5e94563e2dec80c57963e49891f6b92cb98448c0346c6ba6f28ebc6d96ccd8053b85d1a82de12775cd0b75403fc6a8e12084f7a9082df5f89d0b5ba9749a8df978495dbbe980884625edcd99db927ba71c2456536418d4a3028873528ce8a884503dfc0767e0a9b846dd44e9bfa1581aca967a9235974ea952506ffc84e890c25ad5ee0a90a4eb260c26ec1f3c89cdfe5521123c91e99ca665c6658f76c34daac9bfb0f5bcb5f239877ef73b53ab39e72", 0x6, 0x0, 0x8000000, 0x0, 0x5, 0x0, 0x2}}}, 0x120) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f00001da000/0x18000)=nil, &(0x7f0000000640)=[@textreal={0x8, 0x0}], 0x1, 0x4e, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vcs\x00', 0x400200, 0x0) 20:00:12 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) unshare(0x600) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040), 0x0, &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) getpeername$unix(r0, &(0x7f0000000440)=@abs, &(0x7f0000000040)=0x6e) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000007c0)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x100000000000009) lremovexattr(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x3ff, 0x5e, 0x0, 0x0, 0xe, 0x0, "5408251e178a18de00009904a6e79c583c824c75d4246a48134ba9ffaf1efcb2f7ef3a29ce8d9a34769775e54a4be19b4ed4de2c087e4f9e0fb5205ee6cd7b1b", "cb1f26f331c330f6faf1262087ffe5a5c12b96dba0544310273b8a07e976a396dedf6350666a44b333d069904eb78497e9d24a40e5a7ca2049e62e4434eeb49a", "36bb85282cb4ad8db8f1cc5a34beb3737071a3d183ff5f1792fae9a24cd1fe50", [0x6ddc, 0x4]}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(r3, 0x8200) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000240)={0x7f, 0x8}) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f00000004c0)={0x2, 0x0, [], {0x0, @reserved}}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000740)={'HL\x00'}, &(0x7f0000000780)=0x1e) link(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') write$sndseq(0xffffffffffffffff, &(0x7f0000000580)=[{0x0, 0xffffffffffffffff, 0xffff, 0x0, @tick, {0x3, 0x100000001}, {0x6, 0xe}, @queue={0xffffffff, {0x0, 0x7}}}], 0x1c) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) 20:00:12 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) unshare(0x600) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040), 0x0, &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) getpeername$unix(r0, &(0x7f0000000440)=@abs, &(0x7f0000000040)=0x6e) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000007c0)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x100000000000009) lremovexattr(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x3ff, 0x5e, 0x0, 0x0, 0xe, 0x0, "5408251e178a18de00009904a6e79c583c824c75d4246a48134ba9ffaf1efcb2f7ef3a29ce8d9a34769775e54a4be19b4ed4de2c087e4f9e0fb5205ee6cd7b1b", "cb1f26f331c330f6faf1262087ffe5a5c12b96dba0544310273b8a07e976a396dedf6350666a44b333d069904eb78497e9d24a40e5a7ca2049e62e4434eeb49a", "36bb85282cb4ad8db8f1cc5a34beb3737071a3d183ff5f1792fae9a24cd1fe50", [0x6ddc, 0x4]}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(r3, 0x8200) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000240)={0x7f, 0x8}) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f00000004c0)={0x2, 0x0, [], {0x0, @reserved}}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000740)={'HL\x00'}, &(0x7f0000000780)=0x1e) link(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') write$sndseq(0xffffffffffffffff, &(0x7f0000000580)=[{0x0, 0xffffffffffffffff, 0xffff, 0x0, @tick, {0x3, 0x100000001}, {0x6, 0xe}, @queue={0xffffffff, {0x0, 0x7}}}], 0x1c) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) 20:00:12 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) unshare(0x600) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040), 0x0, &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) getpeername$unix(r0, &(0x7f0000000440)=@abs, &(0x7f0000000040)=0x6e) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000007c0)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x100000000000009) lremovexattr(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x3ff, 0x5e, 0x0, 0x0, 0xe, 0x0, "5408251e178a18de00009904a6e79c583c824c75d4246a48134ba9ffaf1efcb2f7ef3a29ce8d9a34769775e54a4be19b4ed4de2c087e4f9e0fb5205ee6cd7b1b", "cb1f26f331c330f6faf1262087ffe5a5c12b96dba0544310273b8a07e976a396dedf6350666a44b333d069904eb78497e9d24a40e5a7ca2049e62e4434eeb49a", "36bb85282cb4ad8db8f1cc5a34beb3737071a3d183ff5f1792fae9a24cd1fe50", [0x6ddc, 0x4]}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(r3, 0x8200) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000240)={0x7f, 0x8}) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f00000004c0)={0x2, 0x0, [], {0x0, @reserved}}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000740)={'HL\x00'}, &(0x7f0000000780)=0x1e) link(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') write$sndseq(0xffffffffffffffff, &(0x7f0000000580)=[{0x0, 0xffffffffffffffff, 0xffff, 0x0, @tick, {0x3, 0x100000001}, {0x6, 0xe}, @queue={0xffffffff, {0x0, 0x7}}}], 0x1c) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) 20:00:12 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) unshare(0x600) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040), 0x0, &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) getpeername$unix(r0, &(0x7f0000000440)=@abs, &(0x7f0000000040)=0x6e) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000007c0)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x100000000000009) lremovexattr(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x3ff, 0x5e, 0x0, 0x0, 0xe, 0x0, "5408251e178a18de00009904a6e79c583c824c75d4246a48134ba9ffaf1efcb2f7ef3a29ce8d9a34769775e54a4be19b4ed4de2c087e4f9e0fb5205ee6cd7b1b", "cb1f26f331c330f6faf1262087ffe5a5c12b96dba0544310273b8a07e976a396dedf6350666a44b333d069904eb78497e9d24a40e5a7ca2049e62e4434eeb49a", "36bb85282cb4ad8db8f1cc5a34beb3737071a3d183ff5f1792fae9a24cd1fe50", [0x6ddc, 0x4]}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(r3, 0x8200) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000240)={0x7f, 0x8}) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f00000004c0)={0x2, 0x0, [], {0x0, @reserved}}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000740)={'HL\x00'}, &(0x7f0000000780)=0x1e) link(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') write$sndseq(0xffffffffffffffff, &(0x7f0000000580)=[{0x0, 0xffffffffffffffff, 0xffff, 0x0, @tick, {0x3, 0x100000001}, {0x6, 0xe}, @queue={0xffffffff, {0x0, 0x7}}}], 0x1c) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) 20:00:12 executing program 0: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x100, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f000088c000)={@remote, 0x0, 0x0, 0x2000ff, 0x41}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x100, 0x1}, 0x20) 20:00:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x1002) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001340)={"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"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:00:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x1002) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001340)={"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"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:00:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udplite6\x00') sendfile(r0, r1, &(0x7f0000000000)=0x100000, 0x10000) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) 20:00:13 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 20:00:13 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040), 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x400448e7, &(0x7f0000000000)) [ 238.618419] list_del corruption. prev->next should be ffff8881c2dd4730, but was ffff8881c0335930 [ 238.627907] ------------[ cut here ]------------ [ 238.632671] kernel BUG at lib/list_debug.c:53! [ 238.637354] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 238.642727] CPU: 0 PID: 7667 Comm: ip Not tainted 4.20.0-rc6-next-20181210+ #164 [ 238.650289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.659777] RIP: 0010:__list_del_entry_valid.cold.1+0x48/0x4a [ 238.665680] Code: e4 80 88 e8 22 1f d2 fd 0f 0b 48 89 de 48 c7 c7 c0 e5 80 88 e8 11 1f d2 fd 0f 0b 48 89 de 48 c7 c7 60 e5 80 88 e8 00 1f d2 fd <0f> 0b 48 89 d9 48 c7 c7 20 e6 80 88 e8 ef 1e d2 fd 0f 0b 48 89 f1 [ 238.684594] RSP: 0018:ffff888188386740 EFLAGS: 00010282 [ 238.689981] RAX: 0000000000000054 RBX: ffff8881c2dd4730 RCX: 0000000000000000 [ 238.697260] RDX: 0000000000000000 RSI: ffffffff816621c5 RDI: 0000000000000005 [ 238.704537] RBP: ffff888188386758 R08: ffff888183c00580 R09: ffffed103b585020 [ 238.711826] R10: ffffed103b585020 R11: ffff8881dac28107 R12: ffff8881cd978ff0 [ 238.719116] R13: ffff8881b53d3930 R14: ffff888188386860 R15: 1ffff11031070cf4 [ 238.726411] FS: 00007f5f5246e700(0000) GS:ffff8881dac00000(0000) knlGS:0000000000000000 [ 238.734641] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 238.740529] CR2: 000000000063f210 CR3: 00000001d7334000 CR4: 00000000001406f0 [ 238.747822] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 238.755098] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 238.762378] Call Trace: [ 238.765058] neigh_mark_dead+0x13b/0x410 [ 238.769178] ? graph_lock+0x270/0x270 [ 238.772996] ? neigh_change_state+0x680/0x680 [ 238.777577] ? kasan_check_write+0x14/0x20 [ 238.781881] ? do_raw_write_lock+0x14f/0x310 [ 238.786304] ? do_raw_read_unlock+0x70/0x70 [ 238.790634] ? __lock_is_held+0xb5/0x140 [ 238.794711] neigh_flush_dev+0x3a1/0x960 [ 238.798794] ? neigh_changeaddr+0x24/0x40 [ 238.803115] ? __neigh_for_each_release+0x4f0/0x4f0 [ 238.808139] ? do_raw_read_unlock+0x70/0x70 [ 238.812536] ? net_to_rxe+0xe1/0x110 [ 238.816265] neigh_changeaddr+0x31/0x40 [ 238.820296] ndisc_netdev_event+0xe6/0x5b0 [ 238.824542] ? ndisc_send_unsol_na+0x500/0x500 [ 238.829199] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 238.834796] ? netconsole_netdev_event+0x7d/0x280 [ 238.839701] notifier_call_chain+0x17e/0x380 [ 238.844126] ? unregister_die_notifier+0x20/0x20 [ 238.848899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.854452] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 238.860006] ? rtnl_is_locked+0xb5/0xf0 [ 238.863992] ? rtnl_trylock+0x20/0x20 [ 238.867803] raw_notifier_call_chain+0x2d/0x40 [ 238.872421] call_netdevice_notifiers_info+0x3f/0x90 [ 238.877546] dev_set_mac_address+0x293/0x3b0 [ 238.881973] ? netdev_state_change+0x1a0/0x1a0 [ 238.886605] ? lru_cache_add+0xa50/0xa50 [ 238.890752] ? cpumask_any_but+0xb1/0xe0 [ 238.894869] do_setlink+0x7c7/0x3f30 [ 238.898598] ? print_usage_bug+0xc0/0xc0 [ 238.902660] ? find_held_lock+0x36/0x1c0 [ 238.906725] ? validate_linkmsg+0xa50/0xa50 [ 238.911122] ? wp_page_copy+0x1a0e/0x2720 [ 238.915283] ? lock_downgrade+0x900/0x900 [ 238.919442] ? mark_held_locks+0x130/0x130 [ 238.923694] ? mark_held_locks+0x130/0x130 [ 238.927963] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 238.933246] ? validate_nla+0x29a/0x1650 [ 238.937335] ? nla_memcmp+0x90/0x90 [ 238.940974] ? mark_held_locks+0x130/0x130 [ 238.945218] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 238.950772] ? rtnl_is_locked+0xb5/0xf0 [ 238.954765] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 238.959790] ? validate_linkmsg+0x271/0xa50 [ 238.964122] ? rtnl_stats_dump+0xd70/0xd70 [ 238.968365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.973912] ? netdev_master_upper_dev_get+0x173/0x250 [ 238.979199] ? __nla_parse+0x12c/0x3e0 [ 238.983100] ? netdev_has_any_upper_dev+0x170/0x170 [ 238.988473] __rtnl_newlink+0xcde/0x19e0 [ 238.992552] ? rtnl_link_unregister+0x390/0x390 [ 238.997286] ? rcu_read_unlock_special+0x370/0x370 [ 239.002225] ? rcu_softirq_qs+0x20/0x20 [ 239.006259] ? unwind_dump+0x190/0x190 [ 239.010227] ? is_bpf_text_address+0xd3/0x170 [ 239.014776] ? kernel_text_address+0x79/0xf0 [ 239.019204] ? __kernel_text_address+0xd/0x40 [ 239.023699] ? unwind_get_return_address+0x61/0xa0 [ 239.028655] ? __save_stack_trace+0x8d/0xf0 [ 239.032990] ? save_stack+0xa9/0xd0 [ 239.036614] ? save_stack+0x43/0xd0 [ 239.040241] ? kasan_kmalloc+0xcb/0xd0 [ 239.044133] ? kmem_cache_alloc_trace+0x154/0x740 [ 239.048975] ? rtnl_newlink+0x4d/0xa0 [ 239.052785] ? rtnetlink_rcv_msg+0x46a/0xc20 [ 239.057248] ? netlink_rcv_skb+0x172/0x440 [ 239.061489] ? rtnetlink_rcv+0x1c/0x20 [ 239.065396] ? netlink_unicast+0x5a5/0x760 [ 239.069635] ? netlink_sendmsg+0xa18/0xfc0 [ 239.073905] ? rtnl_newlink+0x4d/0xa0 [ 239.077769] ? rcu_read_lock_sched_held+0x14f/0x180 [ 239.082796] ? kmem_cache_alloc_trace+0x356/0x740 [ 239.087643] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 239.092977] ? ns_capable_common+0x13f/0x170 [ 239.097391] ? rcu_read_unlock_special+0x370/0x370 [ 239.102322] rtnl_newlink+0x6b/0xa0 [ 239.105945] ? __rtnl_newlink+0x19e0/0x19e0 [ 239.110268] rtnetlink_rcv_msg+0x46a/0xc20 [ 239.114509] ? rtnl_fdb_dump+0xd00/0xd00 [ 239.118981] netlink_rcv_skb+0x172/0x440 [ 239.123045] ? rtnl_fdb_dump+0xd00/0xd00 [ 239.127110] ? netlink_ack+0xb80/0xb80 [ 239.130999] ? rcu_read_unlock_special+0x370/0x370 [ 239.135944] rtnetlink_rcv+0x1c/0x20 [ 239.139660] netlink_unicast+0x5a5/0x760 [ 239.143727] ? netlink_attachskb+0x9a0/0x9a0 [ 239.148198] ? aa_sk_perm+0x22b/0x8e0 [ 239.152003] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 239.157021] netlink_sendmsg+0xa18/0xfc0 [ 239.161093] ? netlink_unicast+0x760/0x760 [ 239.165407] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 239.170343] ? apparmor_socket_sendmsg+0x29/0x30 [ 239.175100] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.180703] ? security_socket_sendmsg+0x94/0xc0 [ 239.185464] ? netlink_unicast+0x760/0x760 [ 239.189764] sock_sendmsg+0xd5/0x120 [ 239.193482] ___sys_sendmsg+0x7fd/0x930 [ 239.197471] ? copy_msghdr_from_user+0x580/0x580 [ 239.202228] ? graph_lock+0x270/0x270 [ 239.206031] ? graph_lock+0x270/0x270 [ 239.209833] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.215426] ? __fget_light+0x2e9/0x430 [ 239.219404] ? fget_raw+0x20/0x20 [ 239.222871] ? find_held_lock+0x36/0x1c0 [ 239.226952] ? __do_page_fault+0x62e/0xd70 [ 239.231201] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 239.236738] ? sockfd_lookup_light+0xc5/0x160 [ 239.241243] __sys_sendmsg+0x11d/0x280 [ 239.245139] ? __ia32_sys_shutdown+0x80/0x80 [ 239.249558] ? kasan_check_write+0x14/0x20 [ 239.253805] ? up_read+0x225/0x2c0 [ 239.257353] ? up_read_non_owner+0x100/0x100 [ 239.261802] ? do_syscall_64+0x9a/0x820 [ 239.265787] ? do_syscall_64+0x9a/0x820 [ 239.269801] ? trace_hardirqs_off_caller+0x310/0x310 [ 239.274920] __x64_sys_sendmsg+0x78/0xb0 [ 239.278992] do_syscall_64+0x1b9/0x820 [ 239.282947] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 239.288344] ? syscall_return_slowpath+0x5e0/0x5e0 [ 239.293280] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 239.298151] ? trace_hardirqs_on_caller+0x310/0x310 [ 239.303187] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 239.308211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.313763] ? prepare_exit_to_usermode+0x291/0x3b0 [ 239.318797] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 239.323653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.328843] RIP: 0033:0x7f5f51b8f320 [ 239.332592] Code: 02 48 83 c8 ff eb 8d 48 8b 05 14 7b 2a 00 f7 da 64 89 10 48 83 c8 ff eb c9 90 83 3d d5 d2 2a 00 00 75 10 b8 2e 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e ba 00 00 48 89 04 24 [ 239.351662] RSP: 002b:00007ffc406e2ea8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 239.359378] RAX: ffffffffffffffda RBX: 00007ffc406e6fa0 RCX: 00007f5f51b8f320 [ 239.366656] RDX: 0000000000000000 RSI: 00007ffc406e2ee0 RDI: 0000000000000003 [ 239.373923] RBP: 00007ffc406e2ee0 R08: 0000000000000000 R09: 0000000000000000 [ 239.381211] R10: 0000000000000000 R11: 0000000000000246 R12: 000000005c1168cf [ 239.388504] R13: 0000000000000000 R14: 00000000006395c0 R15: 00007ffc406e7780 [ 239.395784] Modules linked in: [ 239.399030] ---[ end trace 665fe67b5e4b9ea2 ]--- [ 239.403828] RIP: 0010:__list_del_entry_valid.cold.1+0x48/0x4a [ 239.409730] Code: e4 80 88 e8 22 1f d2 fd 0f 0b 48 89 de 48 c7 c7 c0 e5 80 88 e8 11 1f d2 fd 0f 0b 48 89 de 48 c7 c7 60 e5 80 88 e8 00 1f d2 fd <0f> 0b 48 89 d9 48 c7 c7 20 e6 80 88 e8 ef 1e d2 fd 0f 0b 48 89 f1 [ 239.428702] RSP: 0018:ffff888188386740 EFLAGS: 00010282 [ 239.434088] RAX: 0000000000000054 RBX: ffff8881c2dd4730 RCX: 0000000000000000 [ 239.441389] RDX: 0000000000000000 RSI: ffffffff816621c5 RDI: 0000000000000005 [ 239.448667] RBP: ffff888188386758 R08: ffff888183c00580 R09: ffffed103b585020 [ 239.456012] R10: ffffed103b585020 R11: ffff8881dac28107 R12: ffff8881cd978ff0 [ 239.463311] R13: ffff8881b53d3930 R14: ffff888188386860 R15: 1ffff11031070cf4 [ 239.470600] FS: 00007f5f5246e700(0000) GS:ffff8881dac00000(0000) knlGS:0000000000000000 [ 239.478871] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 239.484783] CR2: 000000000063f210 CR3: 00000001d7334000 CR4: 00000000001406f0 [ 239.492103] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 239.499376] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 239.506690] Kernel panic - not syncing: Fatal exception in interrupt [ 239.514218] Kernel Offset: disabled [ 239.517845] Rebooting in 86400 seconds..