Warning: Permanently added '10.128.0.68' (ECDSA) to the list of known hosts. [ 46.778220] random: sshd: uninitialized urandom read (32 bytes read) 2019/06/20 07:42:43 fuzzer started [ 46.965175] audit: type=1400 audit(1561016563.268:36): avc: denied { map } for pid=6859 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 48.620745] random: cc1: uninitialized urandom read (8 bytes read) 2019/06/20 07:42:45 dialing manager at 10.128.0.105:36079 2019/06/20 07:42:46 syscalls: 2444 2019/06/20 07:42:46 code coverage: enabled 2019/06/20 07:42:46 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/06/20 07:42:46 extra coverage: extra coverage is not supported by the kernel 2019/06/20 07:42:46 setuid sandbox: enabled 2019/06/20 07:42:46 namespace sandbox: enabled 2019/06/20 07:42:46 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/20 07:42:46 fault injection: enabled 2019/06/20 07:42:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/20 07:42:46 net packet injection: enabled 2019/06/20 07:42:46 net device setup: enabled [ 50.474403] random: crng init done 07:44:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000300)) mount$9p_virtio(0x0, 0x0, &(0x7f0000000180)='9p\x00', 0x202028, 0x0) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x8000, 0x200000) syz_open_dev$usb(0x0, 0x100000001, 0x0) umount2(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x100000000014, 0x4, 0x8, 0x100}, 0x2c) 07:44:27 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x561f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f00000003c0)={0x3, 0x70, 0x9, 0x62899bca, 0x1000, 0x10000, 0x0, 0x8000, 0x400, 0x2, 0x6, 0x2, 0x3, 0x3f, 0x71fb, 0x5, 0x20, 0xa636, 0x1, 0xea3, 0x2, 0x4, 0x0, 0x5, 0x1000, 0x5, 0x1, 0x80, 0x1, 0x3fb, 0x10001, 0x0, 0x6, 0x80, 0xc2d, 0xffff, 0x100, 0x5, 0x0, 0xae, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x814, 0x81, 0x1, 0x3, 0x6a, 0x31f8, 0xbe7}, r2, 0x5, 0xffffffffffffffff, 0x9) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup(r3, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x9, 0xffffffff, 0x0, 0x80, 0x0, 0x4, 0x92, 0x4, 0x7f, 0x100000001, 0x0, 0x5, 0x1, 0x0, 0x8, 0xfffffffffffffff7, 0x4, 0x8, 0x3, 0x101, 0x8, 0x3, 0x7, 0x80000000, 0x0, 0x8, 0x35, 0x7, 0x10000, 0x200, 0x1, 0x9, 0x1, 0x5, 0xfff, 0x800000000000, 0x0, 0x3, 0x4, @perf_bp={0x0, 0x2}, 0x4000, 0x94f1, 0x3, 0x3, 0x3, 0x7ff, 0x5988}, r2, 0xd, r0, 0x8) openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x0, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000340)=ANY=[@ANYBLOB="2d696f202d696f202f72646d611e33cc020000a6b3656d6fc1cf1f"], 0x1b) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000580)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000180)="02cb61903010bc93adfc21d3d84ac1bfb819a00f6707", 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a00)={&(0x7f00000009c0)='./file0\x00'}, 0x10) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2000000, 'c\x86\xdd', 0x7}]}, 0xfdef) ioctl$TUNGETDEVNETNS(r6, 0x54e3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 150.891432] audit: type=1400 audit(1561016667.198:37): avc: denied { map } for pid=6859 comm="syz-fuzzer" path="/root/syzkaller-shm529314813" dev="sda1" ino=16490 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 07:44:27 executing program 5: 07:44:27 executing program 2: 07:44:27 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x146}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:44:27 executing program 4: io_setup(0x401, &(0x7f0000000000)) [ 150.918539] audit: type=1400 audit(1561016667.198:38): avc: denied { map } for pid=6877 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13812 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 151.053583] IPVS: ftp: loaded support on port[0] = 21 [ 151.229988] chnl_net:caif_netlink_parms(): no params data found [ 151.254261] IPVS: ftp: loaded support on port[0] = 21 [ 151.273983] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.280670] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.287787] device bridge_slave_0 entered promiscuous mode [ 151.296120] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.302536] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.309299] device bridge_slave_1 entered promiscuous mode [ 151.330153] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 151.340627] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 151.363452] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 151.371744] team0: Port device team_slave_0 added [ 151.378671] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 151.386004] team0: Port device team_slave_1 added [ 151.391440] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 151.398779] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 151.408430] IPVS: ftp: loaded support on port[0] = 21 [ 151.461867] device hsr_slave_0 entered promiscuous mode [ 151.500252] device hsr_slave_1 entered promiscuous mode [ 151.582653] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 151.589847] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 151.662368] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.668778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.675613] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.681956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.711165] IPVS: ftp: loaded support on port[0] = 21 [ 151.719487] chnl_net:caif_netlink_parms(): no params data found [ 151.769481] chnl_net:caif_netlink_parms(): no params data found [ 151.831257] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.837659] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.844598] device bridge_slave_0 entered promiscuous mode [ 151.853525] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.859858] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.866941] device bridge_slave_1 entered promiscuous mode [ 151.902872] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.910256] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.917189] device bridge_slave_0 entered promiscuous mode [ 151.925305] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.932293] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.939085] device bridge_slave_1 entered promiscuous mode [ 151.947149] IPVS: ftp: loaded support on port[0] = 21 [ 151.952688] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 151.963118] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 151.989061] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 151.995249] 8021q: adding VLAN 0 to HW filter on device bond0 [ 152.026401] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 152.033510] team0: Port device team_slave_0 added [ 152.039349] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 152.061987] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 152.069846] team0: Port device team_slave_1 added [ 152.076786] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 152.084865] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 152.106553] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 152.113834] team0: Port device team_slave_0 added [ 152.118971] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 152.132399] chnl_net:caif_netlink_parms(): no params data found [ 152.142548] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 152.149563] team0: Port device team_slave_1 added [ 152.154800] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 152.182613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 152.191488] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.198392] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.208563] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 152.263227] device hsr_slave_0 entered promiscuous mode [ 152.320310] device hsr_slave_1 entered promiscuous mode [ 152.365994] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 152.373322] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 152.380157] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 152.387326] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 152.403822] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 152.409934] 8021q: adding VLAN 0 to HW filter on device team0 [ 152.435768] IPVS: ftp: loaded support on port[0] = 21 [ 152.503434] device hsr_slave_0 entered promiscuous mode [ 152.540301] device hsr_slave_1 entered promiscuous mode [ 152.582533] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 152.592340] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 152.609187] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 152.619171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 152.627020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 152.634643] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.640988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 152.650815] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 152.661195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 152.668871] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 152.676718] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.683083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.690008] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.697977] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.705087] device bridge_slave_0 entered promiscuous mode [ 152.712432] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.718764] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.725743] device bridge_slave_1 entered promiscuous mode [ 152.735106] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 152.757665] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 152.765054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 152.782386] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 152.790325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 152.802669] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 152.811484] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 152.834205] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 152.841752] team0: Port device team_slave_0 added [ 152.858909] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 152.866342] team0: Port device team_slave_1 added [ 152.884706] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 152.894647] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 152.903148] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 152.933076] chnl_net:caif_netlink_parms(): no params data found [ 152.944038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 152.951879] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 152.959652] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 152.968486] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 152.984081] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 153.043461] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 153.051241] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 153.059935] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 153.112310] device hsr_slave_0 entered promiscuous mode [ 153.170443] device hsr_slave_1 entered promiscuous mode [ 153.225056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 153.233387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 153.245766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 153.253194] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 153.268895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 153.276349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 153.283855] chnl_net:caif_netlink_parms(): no params data found [ 153.295697] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 153.314042] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 153.320465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 153.348013] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.355639] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.362646] device bridge_slave_0 entered promiscuous mode [ 153.370351] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.376689] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.384075] device bridge_slave_1 entered promiscuous mode [ 153.414726] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 153.432482] 8021q: adding VLAN 0 to HW filter on device bond0 [ 153.439795] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 153.450976] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 153.458277] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 153.472119] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 153.479672] 8021q: adding VLAN 0 to HW filter on device bond0 [ 153.488270] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 153.502805] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 153.508943] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.515566] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.524531] device bridge_slave_0 entered promiscuous mode [ 153.532215] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.538553] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.545723] device bridge_slave_1 entered promiscuous mode [ 153.553470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 153.560625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.597872] 8021q: adding VLAN 0 to HW filter on device bond0 [ 153.607793] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 153.614299] 8021q: adding VLAN 0 to HW filter on device team0 [ 153.620639] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 153.627670] team0: Port device team_slave_0 added [ 153.634235] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 153.641752] team0: Port device team_slave_1 added [ 153.646975] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 153.654637] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 153.664528] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 153.670737] 8021q: adding VLAN 0 to HW filter on device team0 [ 153.677685] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 153.687382] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 153.696544] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 153.703942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 153.714994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.722248] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 153.741138] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 153.784316] device hsr_slave_0 entered promiscuous mode [ 153.820640] device hsr_slave_1 entered promiscuous mode [ 153.862337] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 153.869535] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 153.878847] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 153.896861] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 153.903915] 8021q: adding VLAN 0 to HW filter on device team0 [ 153.912744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 153.924337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.931238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 153.938843] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 153.946490] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.952856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.961184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 153.968852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 153.976571] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.982937] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.989976] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 153.999081] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 154.016139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 154.024320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 154.032090] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 154.039736] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 154.047602] team0: Port device team_slave_0 added [ 154.053970] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 154.065514] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 154.072447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 154.081441] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.088942] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.095304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.102409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.111134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.118679] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.125060] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.133064] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 154.142038] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 154.150557] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 154.157748] team0: Port device team_slave_1 added [ 154.166066] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 154.180622] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 154.187764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 154.196520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.204632] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.211026] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.218258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 154.226215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 154.234052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.241981] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.248321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.250503] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 154.267057] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 154.275723] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 154.283859] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 154.293817] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 154.307463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 07:44:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") io_setup(0x1, &(0x7f0000000340)=0x0) io_getevents(r1, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r2 = memfd_create(&(0x7f0000000000)='securitynodev:ppp1bdev\x00', 0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r3, 0x1000000000014) [ 154.315689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 154.326047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 154.336755] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 154.345875] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 154.402303] device hsr_slave_0 entered promiscuous mode [ 154.440289] device hsr_slave_1 entered promiscuous mode [ 154.480905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 154.488517] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 154.496126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 154.504130] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 154.514516] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 154.525948] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 154.534172] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 154.542361] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 154.550240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 154.557737] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 154.565475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 154.573375] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 07:44:30 executing program 0: [ 154.583432] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 154.595401] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 154.603504] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 154.611005] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 154.624854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 07:44:30 executing program 0: [ 154.639184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 154.647024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 154.655245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 154.663628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 154.676249] 8021q: adding VLAN 0 to HW filter on device bond0 07:44:31 executing program 0: [ 154.687748] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 154.697171] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 154.723465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 07:44:31 executing program 0: 07:44:31 executing program 0: r0 = socket$inet(0x10, 0x8000000002, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 154.735088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 154.757961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 154.783025] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 154.791456] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 154.798957] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 154.806957] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 154.815852] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready 07:44:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x42, &(0x7f0000000340), &(0x7f0000000380)=0x4) [ 154.836247] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 154.848288] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 154.864392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 154.875899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 154.883458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 154.891213] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 154.898608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 154.906123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 154.915011] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 154.929513] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 154.938315] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 154.945124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 154.953884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 154.961735] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 154.969030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 154.976586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 154.985133] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 154.991545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 154.999070] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 155.008610] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 155.014993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 155.031865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.038813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.053741] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 155.059807] 8021q: adding VLAN 0 to HW filter on device team0 [ 155.068974] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 155.087318] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 155.094461] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 155.101126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.109008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.117191] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.123574] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.133650] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 155.145033] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 155.152294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.159905] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.167547] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.173917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.182744] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 155.193790] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 155.202318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 155.212114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 155.221681] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 155.231359] 8021q: adding VLAN 0 to HW filter on device bond0 [ 155.239766] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 155.249338] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 155.259832] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 155.267462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 155.277729] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 155.292833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.300328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.310534] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 155.317551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 155.326414] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 155.335328] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 155.345983] 8021q: adding VLAN 0 to HW filter on device team0 [ 155.357320] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 155.368601] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 155.375939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.383999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.392782] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.399110] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.406170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 155.414108] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 155.424259] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 155.433236] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 155.446949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 155.455371] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 155.463046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 155.470868] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.478315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.486599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.494531] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.500920] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.510136] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 155.517636] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 155.529617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 155.537224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.545202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 155.555157] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 155.561375] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 155.568999] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 155.577275] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 155.589806] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 155.599394] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 155.629609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 155.641182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 155.655780] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 155.667355] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 155.675561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 155.690041] hrtimer: interrupt took 45399 ns [ 155.702047] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 155.724741] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 155.740821] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 155.793767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 155.801769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.811890] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 155.820966] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 155.832212] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 155.838247] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 155.846542] device nr0 entered promiscuous mode [ 155.858390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 155.866226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.892672] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 155.904084] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 155.974419] device nr0 entered promiscuous mode 07:44:32 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x561f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f00000003c0)={0x3, 0x70, 0x9, 0x62899bca, 0x1000, 0x10000, 0x0, 0x8000, 0x400, 0x2, 0x6, 0x2, 0x3, 0x3f, 0x71fb, 0x5, 0x20, 0xa636, 0x1, 0xea3, 0x2, 0x4, 0x0, 0x5, 0x1000, 0x5, 0x1, 0x80, 0x1, 0x3fb, 0x10001, 0x0, 0x6, 0x80, 0xc2d, 0xffff, 0x100, 0x5, 0x0, 0xae, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x814, 0x81, 0x1, 0x3, 0x6a, 0x31f8, 0xbe7}, r2, 0x5, 0xffffffffffffffff, 0x9) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup(r3, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x9, 0xffffffff, 0x0, 0x80, 0x0, 0x4, 0x92, 0x4, 0x7f, 0x100000001, 0x0, 0x5, 0x1, 0x0, 0x8, 0xfffffffffffffff7, 0x4, 0x8, 0x3, 0x101, 0x8, 0x3, 0x7, 0x80000000, 0x0, 0x8, 0x35, 0x7, 0x10000, 0x200, 0x1, 0x9, 0x1, 0x5, 0xfff, 0x800000000000, 0x0, 0x3, 0x4, @perf_bp={0x0, 0x2}, 0x4000, 0x94f1, 0x3, 0x3, 0x3, 0x7ff, 0x5988}, r2, 0xd, r0, 0x8) openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x0, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000340)=ANY=[@ANYBLOB="2d696f202d696f202f72646d611e33cc020000a6b3656d6fc1cf1f"], 0x1b) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000580)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000180)="02cb61903010bc93adfc21d3d84ac1bfb819a00f6707", 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a00)={&(0x7f00000009c0)='./file0\x00'}, 0x10) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2000000, 'c\x86\xdd', 0x7}]}, 0xfdef) ioctl$TUNGETDEVNETNS(r6, 0x54e3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:44:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x22, 0x2, 0x2, &(0x7f0000000040)) 07:44:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) [ 156.154586] device nr0 entered promiscuous mode 07:44:35 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x146}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:44:35 executing program 2: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x22, 0x2, 0x2, &(0x7f0000000040)) 07:44:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4000000000004e22}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0x6, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x3ff, 0x4) bind$inet6(r1, &(0x7f0000000440)={0xa, 0x4e22, 0x0, @empty}, 0x1c) 07:44:35 executing program 0: r0 = memfd_create(&(0x7f0000000480)='security.SMACK64TRANSMUTE\x00', 0x0) setitimer(0x1, 0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e5e2) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r0, r3, 0x0, 0x7ffffffd) 07:44:35 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uhid\x00', 0x400100002, 0x0) r1 = dup(r0) write$UHID_DESTROY(r1, &(0x7f0000000200)={0x223}, 0x4) 07:44:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x13, 0x0, &(0x7f0000000080)) 07:44:35 executing program 4: r0 = socket$packet(0x11, 0x8000000000002, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) close(r0) 07:44:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc1205531, &(0x7f0000000040)) 07:44:35 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000240)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) [ 159.147796] syz-executor.0 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 07:44:35 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm-monitor\x00', 0x4000, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x6, 0x2080) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000001c0)=""/246) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x4004743b, &(0x7f0000000000)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x482880, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x89b5, 0xe00) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000100)=0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000340)={0x9, 0x9, 0x0, 0x10000, 0x8, 0x7f}) setxattr$trusted_overlay_nlink(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xa5}, 0x28, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='map_files\x00') getdents64(r3, &(0x7f0000000040)=""/150, 0x308) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000400)={0x0, 0x0, {0x100, 0x401, 0x8, 0x40}}) getsockopt$sock_int(r3, 0x1, 0x0, 0x0, &(0x7f0000000300)) openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x8001, 0x0) 07:44:35 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080), 0x1e) 07:44:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x29d}, {0x0}, {0x0, 0x361}, {0x0}, {0x0, 0x198}, {&(0x7f00000024c0)=""/8, 0x8}], 0xa}, 0x40002) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e00650) shutdown(r1, 0x0) shutdown(r2, 0x0) 07:44:38 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x146}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:44:38 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm-monitor\x00', 0x4000, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x6, 0x2080) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000001c0)=""/246) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x4004743b, &(0x7f0000000000)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x482880, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x89b5, 0xe00) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000100)=0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000340)={0x9, 0x9, 0x0, 0x10000, 0x8, 0x7f}) setxattr$trusted_overlay_nlink(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xa5}, 0x28, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='map_files\x00') getdents64(r3, &(0x7f0000000040)=""/150, 0x308) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000400)={0x0, 0x0, {0x100, 0x401, 0x8, 0x40}}) getsockopt$sock_int(r3, 0x1, 0x0, 0x0, &(0x7f0000000300)) openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x8001, 0x0) 07:44:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e0091e) 07:44:38 executing program 0: poll(&(0x7f0000000080), 0x2000000000000372, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x7e, 0x0, 0x0, 0x800e004a1) ppoll(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080), 0xfee5) shutdown(r0, 0x0) 07:44:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000200)=""/177, 0xb1}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e00841) shutdown(r2, 0x0) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/25, 0x19}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r3, 0x0) 07:44:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000004fc0)=[{&(0x7f0000003b40)=""/206, 0xce}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x5ea3da1, 0x0, 0x0, 0x800e0087a) shutdown(r1, 0x0) shutdown(r2, 0x0) 07:44:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4000000000004e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0x6, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000000)=0x3ff, 0x4) bind$inet6(r2, &(0x7f0000000440)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) 07:44:38 executing program 2: 07:44:38 executing program 2: 07:44:38 executing program 0: 07:44:38 executing program 2: 07:44:38 executing program 0: 07:44:41 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x146}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:44:41 executing program 2: 07:44:41 executing program 1: 07:44:41 executing program 4: 07:44:41 executing program 0: 07:44:41 executing program 5: 07:44:41 executing program 0: 07:44:41 executing program 1: 07:44:41 executing program 2: 07:44:41 executing program 5: 07:44:41 executing program 4: 07:44:41 executing program 0: 07:44:44 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x146}) ptrace$cont(0x9, r0, 0x0, 0x0) 07:44:44 executing program 2: 07:44:44 executing program 1: 07:44:44 executing program 4: 07:44:44 executing program 5: 07:44:44 executing program 0: 07:44:44 executing program 4: 07:44:44 executing program 0: 07:44:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x304, 0x1b}, 0x10) sendmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f00000019c0)="bd8aa1cbdb74e692efe5ac8ba5be50bee9050661447fa5e19e4fb4b0adcf1871e237a14d70e1f45416db5c941874950910931727cae388c6fb03ab00bfb353fe3b3cfd889ce57fe06d869d47e97150d89679bcbe3bf9d3c28c6d50dca49bfeec486259b18dc5f63d0e1a840ef893900b0293ef54758255129e7fc64828147cc63115ec7faa888d258a5c2ddb84b0a752c0e252446c0893ce54c58bf4c6568db674661e115d5d34667e3023707888c23873702e560dcfa219f570f90f9213366849f095de84cc2320e2e640af8510d97fb41d3b65d5", 0xd5}], 0x1}}], 0x1, 0x0) 07:44:44 executing program 1: 07:44:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae8a, &(0x7f0000000280)={0x7a, 0x0, [], [0xc1]}) 07:44:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) read$eventfd(r1, &(0x7f0000000540), 0x8) [ 168.337993] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 07:44:47 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x146}) ptrace$cont(0x9, r0, 0x0, 0x0) 07:44:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x14) 07:44:47 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000002380)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 07:44:47 executing program 1: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090468fe07002b00000001000a0014000000450001070300001419001a00120002000e00010020000300"/57, 0x39}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) 07:44:47 executing program 5: 07:44:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="1c000000000000010000000007000000890b04ac1414000000000000"], 0x1c}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000240)={[{}, {0x0, 0x0, 0x933}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:44:47 executing program 5: timer_create(0x2, 0x0, &(0x7f0000000040)) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000002e000)={{0x0, r2+10000000}, {0x0, r1+30000000}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000d43000)) 07:44:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) 07:44:47 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(r1, &(0x7f0000000040)={0x78}, 0x78) 07:44:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000ee2000/0x4000)=nil, 0x4000, 0x1, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) 07:44:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sync_file_range(r0, 0x0, 0xffffffffffff0001, 0x0) 07:44:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000440)=0xf) ioctl$TCGETS(r0, 0x800455cc, 0x0) 07:44:50 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x146}) ptrace$cont(0x9, r0, 0x0, 0x0) 07:44:50 executing program 4: 07:44:50 executing program 5: 07:44:50 executing program 0: 07:44:50 executing program 1: 07:44:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000080)={0x0, 0x0, 0x0}) 07:44:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) close(r1) 07:44:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000061171c00000000009500000000000000fbbb3c983c58369f059b133e9a7816bf815a7b69966b92fcca6874cc"], 0x0, 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 07:44:50 executing program 1: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x14) 07:44:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) msync(&(0x7f0000406000/0x7000)=nil, 0x7000, 0x2) 07:44:50 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000180)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0x2]}) 07:44:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000)={0x5}, 0x10) bind(r0, &(0x7f0000000040)=@un=@abs, 0x8) recvfrom$inet(r0, 0x0, 0x100000211, 0x2, 0x0, 0x800e005b6) shutdown(r0, 0x0) 07:44:53 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:44:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0xd0, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x40002, 0x0, 0x800e00509) 07:44:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfffffec8, 0x0, 0x0, 0x800e00539) shutdown(r1, 0x0) recvmsg(r2, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000040)=""/156, 0x9c}, {0x0}, {0x0}, {0x0}, {0x0, 0xfffffffffffffc95}, {0x0}, {0x0}, {0x0}, {0x0}], 0x4}, 0x42) shutdown(r2, 0x0) 07:44:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000340)=0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfec7be070") ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) 07:44:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400000, 0x2, 0x8012, r1, 0x0) 07:44:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x20, 0x0) r2 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r2, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x0, 0x0, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000200)=""/225) [ 177.385544] audit: type=1400 audit(1561016693.688:39): avc: denied { map } for pid=7280 comm="syz-executor.2" path="/dev/usbmon0" dev="devtmpfs" ino=15235 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usbmon_device_t:s0 tclass=chr_file permissive=1 07:44:53 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x10000000003, 0xc) r1 = dup2(r0, r0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f00000000c0)="24000000fa0307041dfffdd46fa2830020200a0009ed0300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 07:44:53 executing program 1: socket(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000200), 0x2000000000000004, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xff8c, 0x0, 0x0, 0x800e004c5) ppoll(&(0x7f00000000c0)=[{}, {}], 0x2, 0x0, &(0x7f0000000140)={0x3}, 0x8) shutdown(r0, 0x0) [ 177.415898] audit: type=1400 audit(1561016693.688:40): avc: denied { map } for pid=7282 comm="syz-executor.5" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=27125 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 177.483230] audit: type=1400 audit(1561016693.788:41): avc: denied { create } for pid=7292 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 07:44:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x5d, &(0x7f0000000000)="cd2db85e", 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x29, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}}}}}}}, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e007ba) 07:44:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000001c0)=""/25, 0x19}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) recvfrom$inet(r2, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e00559) shutdown(r1, 0x0) recvmsg(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/250, 0xfa}, {0x0}], 0x2}, 0x0) shutdown(r2, 0x0) [ 177.514705] audit: type=1400 audit(1561016693.788:42): avc: denied { write } for pid=7292 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 07:44:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000001c0)=""/25, 0x19}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) recvfrom$inet(r2, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e00559) shutdown(r1, 0x0) recvmsg(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/250, 0xfa}], 0x1}, 0x0) shutdown(r2, 0x0) 07:44:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001500)=[{&(0x7f0000000000)=""/151, 0x97}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfef7, 0x0, 0x0, 0x800e0051d) shutdown(r1, 0x0) recvmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f00000001c0)=""/139, 0x8b}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) shutdown(r2, 0x0) 07:44:56 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:44:56 executing program 2: clone(0x2102407ff3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) exit(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) 07:44:56 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='statm\x00') exit(0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/69, 0x45}], 0x1, 0x0) 07:44:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00@\x00\xbdh\x00', 0x1021}) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) 07:44:56 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000080)={0x31, 0x6, 0x0, {0x1, 0x0, 0x8, 0x0, 'rootmode'}}, 0x31) 07:44:56 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000280)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000000c0)=0x1, 0xfaf270a96f225b11) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x380000, @empty}, 0x1c) 07:44:56 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0x40087602, 0x0) close(r0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="c2dca5055e0bcfec7be070") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0xffffffffffffffc0, 0x0, 0x3}) r2 = socket(0x11, 0x20100000002, 0x0) setsockopt(r2, 0x107, 0x1, &(0x7f0000000080)="010000000300060000071a80000001cc", 0x10) close(r2) 07:44:56 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000180)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 07:44:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x110007e) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000000)) 07:44:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0affefff7f0000c25517f646b22e1620ec", 0x11) 07:44:56 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) setxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000080)={0x31, 0x6, 0x0, {0x1, 0x0, 0x8, 0x0, 'rootmode'}}, 0x31) [ 180.452519] device lo entered promiscuous mode [ 180.457953] device lo left promiscuous mode 07:44:56 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 180.533237] device lo entered promiscuous mode [ 180.547675] device lo left promiscuous mode 07:44:59 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:44:59 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) setxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000080)={0x31, 0x6, 0x0, {0x1, 0x0, 0x8, 0x0, 'rootmode'}}, 0x31) 07:44:59 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/51, 0x33) 07:44:59 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000062000, 0x500001c) 07:44:59 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d00)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000200), 0xc) 07:44:59 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:44:59 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) setxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000080)={0x31, 0x6, 0x0, {0x1, 0x0, 0x8, 0x0, 'rootmode'}}, 0x31) 07:44:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) write$cgroup_subtree(r0, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)={[{0x0, 'cpu'}, {0x2f, 'cpu'}, {0x2f, 'io'}, {0x2d, 'rdma'}, {0x2d, 'pids'}, {0x2f, 'pids'}]}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0x0, 0x1, 0x9, 0x0}, 0x20) [ 183.453637] audit: type=1804 audit(1561016699.758:43): pid=7397 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir139546715/syzkaller.0uevQN/21/memory.events" dev="sda1" ino=16668 res=1 07:44:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) write$cgroup_subtree(r0, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)={[{0x0, 'cpu'}, {0x2f, 'cpu'}, {0x2f, 'io'}, {0x2d, 'rdma'}, {0x2d, 'pids'}, {0x2f, 'pids'}]}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xc, 0x1, 0x9, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) [ 183.516803] audit: type=1804 audit(1561016699.818:44): pid=7408 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir648205330/syzkaller.Jk8o5M/23/memory.events" dev="sda1" ino=16657 res=1 07:44:59 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) setxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000080)={0x31, 0x6, 0x0, {0x1, 0x0, 0x8, 0x0, 'rootmode'}}, 0x31) 07:44:59 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x0, 0x0, 0x0) [ 183.642811] audit: type=1804 audit(1561016699.938:45): pid=7416 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir995427683/syzkaller.RXjTWS/17/memory.events" dev="sda1" ino=16642 res=1 07:45:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_tcp_buf(r2, 0x6, 0x1c, 0x0, &(0x7f00000000c0)) [ 183.829347] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 184.104309] audit: type=1804 audit(1561016700.408:46): pid=7416 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir995427683/syzkaller.RXjTWS/17/memory.events" dev="sda1" ino=16642 res=1 [ 184.206776] audit: type=1804 audit(1561016700.508:47): pid=7433 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir648205330/syzkaller.Jk8o5M/23/memory.events" dev="sda1" ino=16657 res=1 07:45:02 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x146}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:45:02 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000080)={0x31, 0x6, 0x0, {0x1, 0x0, 0x8, 0x0, 'rootmode'}}, 0x31) 07:45:02 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) read$FUSE(r1, &(0x7f0000000180), 0x1000) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000140)=0x2d) write$FUSE_ATTR(r1, &(0x7f0000000040)={0x78}, 0x78) 07:45:02 executing program 4: nanosleep(0x0, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x2000400000000009, 0x0) read(r0, &(0x7f00000000c0)=""/110, 0x6e) close(r0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) 07:45:02 executing program 0: ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x2000400000000009, 0x0) read(r0, &(0x7f00000000c0)=""/110, 0x6e) close(r0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) 07:45:02 executing program 5: openat$rfkill(0xffffffffffffff9c, 0x0, 0x10100d, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x2000400000000009, 0x0) read(r0, &(0x7f00000000c0)=""/110, 0x6e) close(r0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) 07:45:02 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000080)={0x31, 0x6, 0x0, {0x1, 0x0, 0x8, 0x0, 'rootmode'}}, 0x31) 07:45:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) fcntl$setpipe(r3, 0x408, 0x0) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='\a', 0x1}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) 07:45:02 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000080)={0x31, 0x6, 0x0, {0x1, 0x0, 0x8, 0x0, 'rootmode'}}, 0x31) 07:45:02 executing program 5: openat$rfkill(0xffffffffffffff9c, 0x0, 0x10100d, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x2000400000000009, 0x0) read(r0, &(0x7f00000000c0)=""/110, 0x6e) close(r0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) 07:45:02 executing program 1: openat$rfkill(0xffffffffffffff9c, 0x0, 0x10100d, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x2000400000000009, 0x0) read(r0, &(0x7f00000000c0)=""/110, 0x6e) close(r0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) 07:45:02 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000080)={0x31, 0x6, 0x0, {0x1, 0x0, 0x8, 0x0, 'rootmode'}}, 0x31) [ 186.638467] BUG: unable to handle kernel NULL pointer dereference at 0000000000000020 [ 186.646599] IP: kthread_stop+0x4c/0x650 [ 186.647409] kobject: 'loop1' (ffff8880a49d37e0): kobject_uevent_env [ 186.650567] PGD a093a067 P4D a093a067 PUD 88712067 PMD 0 [ 186.650587] Oops: 0002 [#1] PREEMPT SMP KASAN [ 186.650594] Modules linked in: [ 186.657844] kobject: 'loop1' (ffff8880a49d37e0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 186.662613] CPU: 0 PID: 7474 Comm: syz-executor.5 Not tainted 4.14.128 #22 [ 186.662618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.662625] task: ffff8880590666c0 task.stack: ffff888059f68000 [ 186.662638] RIP: 0010:kthread_stop+0x4c/0x650 [ 186.662644] RSP: 0018:ffff888059f6fb50 EFLAGS: 00010216 [ 186.662652] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90008a33000 [ 186.662657] RDX: 0000000000000afa RSI: ffffffff813e150c RDI: 0000000000000286 [ 186.662665] RBP: ffff888059f6fb70 R08: ffff8880590666c0 R09: 0000000000000000 [ 186.734676] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 186.742108] R13: ffff888218285e38 R14: 1ffffffff137717c R15: ffffffff89bb8be0 [ 186.749361] FS: 00007fa57b6da700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 186.757581] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 186.763827] CR2: 0000000000000020 CR3: 00000000a1345000 CR4: 00000000001406f0 [ 186.771190] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 186.778479] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 186.785913] Call Trace: [ 186.788561] vivid_stop_generating_vid_cap+0x1b9/0x664 [ 186.793821] vid_cap_stop_streaming+0x7c/0xd0 [ 186.798308] ? vid_cap_buf_queue+0x230/0x230 [ 186.802708] __vb2_queue_cancel+0xa3/0x890 [ 186.806924] ? lock_downgrade+0x6e0/0x6e0 [ 186.811053] vb2_core_streamoff+0x52/0x110 [ 186.815271] __vb2_cleanup_fileio+0x78/0x150 [ 186.819672] vb2_core_queue_release+0x1d/0x80 [ 186.824157] _vb2_fop_release+0x1cf/0x2a0 [ 186.828298] vb2_fop_release+0x75/0xc0 [ 186.832176] vivid_fop_release+0x180/0x3f0 [ 186.836388] ? vivid_remove+0x3d0/0x3d0 [ 186.840347] ? dev_debug_store+0xe0/0xe0 [ 186.844400] v4l2_release+0xf9/0x190 [ 186.848103] __fput+0x275/0x7a0 [ 186.851388] ____fput+0x16/0x20 [ 186.854659] task_work_run+0x114/0x190 [ 186.858616] exit_to_usermode_loop+0x1da/0x220 [ 186.863181] do_syscall_64+0x4bc/0x640 [ 186.867048] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 186.871873] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 186.877047] RIP: 0033:0x4592c9 [ 186.880217] RSP: 002b:00007fa57b6d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 186.888014] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 00000000004592c9 [ 186.895580] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 186.903069] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 186.910341] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa57b6da6d4 [ 186.917602] R13: 00000000004f8052 R14: 00000000004d0e30 R15: 00000000ffffffff [ 186.925041] Code: 00 65 8b 1d 47 6c c3 7e 83 fb 3f 0f 87 5e 04 00 00 e8 89 92 1e 00 89 db 48 0f a3 1d df f7 e6 06 0f 82 47 03 00 00 e8 74 92 1e 00 41 ff 44 24 20 49 8d 7c 24 24 48 b8 00 00 00 00 00 fc ff df [ 186.944218] RIP: kthread_stop+0x4c/0x650 RSP: ffff888059f6fb50 [ 186.950167] CR2: 0000000000000020 [ 186.958405] kobject: 'loop2' (ffff8880a4a280a0): kobject_uevent_env [ 186.960209] ---[ end trace 5527188807c14373 ]--- [ 186.967449] kobject: 'loop2' (ffff8880a4a280a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 186.969659] Kernel panic - not syncing: Fatal exception [ 186.985660] Kernel Offset: disabled [ 186.989304] Rebooting in 86400 seconds..