Warning: Permanently added '10.128.0.93' (ECDSA) to the list of known hosts. 2019/12/01 15:36:42 fuzzer started 2019/12/01 15:36:44 dialing manager at 10.128.0.105:36521 2019/12/01 15:36:44 syscalls: 2592 2019/12/01 15:36:44 code coverage: enabled 2019/12/01 15:36:44 comparison tracing: enabled 2019/12/01 15:36:44 extra coverage: extra coverage is not supported by the kernel 2019/12/01 15:36:44 setuid sandbox: enabled 2019/12/01 15:36:44 namespace sandbox: enabled 2019/12/01 15:36:44 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/01 15:36:44 fault injection: enabled 2019/12/01 15:36:44 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/01 15:36:44 net packet injection: enabled 2019/12/01 15:36:44 net device setup: enabled 2019/12/01 15:36:44 concurrency sanitizer: enabled 2019/12/01 15:36:44 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 76.966542][ T7532] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/01 15:37:02 adding functions to KCSAN blacklist: 'futex_wait_queue_me' 'p9_poll_workfn' 'sit_tunnel_xmit' 'handle_mm_fault' 'padata_find_next' 'has_bh_in_lru' 'tick_sched_do_timer' 'echo_char' 'xas_find_marked' 'generic_permission' 'iput' 'inode_permission' 'kauditd_thread' 'snd_ctl_notify' 'rcu_gp_fqs_loop' 'generic_write_end' 'tomoyo_check_path_acl' 'blk_mq_sched_dispatch_requests' 'do_signal_stop' 'tcp_add_backlog' 'ext4_writepages' 'ext4_mark_iloc_dirty' 'list_lru_count_one' 'blk_mq_get_request' 'mm_update_next_owner' '__add_to_page_cache_locked' 'sync_inodes_sb' 'mod_timer' 'd_delete' 'ep_poll' 'ext4_mb_good_group' 'do_exit' 'snd_seq_prioq_cell_out' 'do_syslog' 'queue_access_lock' '__mark_inode_dirty' 'inet_shutdown' 'shmem_file_read_iter' 'pfkey_is_alive' 'n_tty_receive_buf_common' 'kcm_release' 'do_wait' 'check_lifetime' '__perf_event_overflow' 'virtqueue_enable_cb_delayed' '__rcu_read_unlock' 'shmem_add_to_page_cache' 'virtqueue_disable_cb' 'vm_area_dup' 'timer_clear_idle' 'ktime_get_real_seconds' 'find_get_pages_range_tag' 'complete_signal' 'taskstats_exit' 'poll_schedule_timeout' 'generic_fillattr' 'pcpu_alloc' 'balance_dirty_pages' 'rcu_gp_fqs_check_wake' 'kcm_rfree' 'dd_has_work' 'process_srcu' '__rb_erase_color' 'blk_mq_dispatch_rq_list' '__skb_try_recv_from_queue' 'tomoyo_supervisor' 'blk_mq_run_hw_queue' 'blk_mq_get_driver_tag' 'ext4_has_free_clusters' 'copy_process' 'ext4_nonda_switch' 'tick_nohz_idle_stop_tick' 'common_perm_cond' 'inactive_list_is_low' 'lru_add_drain_all' 'run_timer_softirq' 'add_timer' 'pipe_wait' 'mem_cgroup_select_victim_node' 'sbitmap_queue_clear' '__ext4_new_inode' 'blk_stat_add' 'alloc_empty_file' 'do_readlinkat' 'ext4_free_inode' '__hrtimer_run_queues' 'exit_signals' 'bio_chain' 'wbt_done' 'get_signal' 'pid_update_inode' 'ext4_free_inodes_count' '__delete_from_page_cache' 'dput' '__dev_queue_xmit' 'wbt_issue' 'find_next_bit' 'xas_clear_mark' '__snd_rawmidi_transmit_ack' 'pipe_poll' 'tick_do_update_jiffies64' 'lruvec_lru_size' 'atime_needs_update' 'page_counter_try_charge' 'do_nanosleep' 'snd_seq_check_queue' 'l2tp_tunnel_del_work' 'free_pid' 'audit_log_start' '__acct_update_integrals' 'wbc_attach_and_unlock_inode' 15:40:58 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x482400) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x1f, 0x4, 0x9, 0xfffffff9}, {0x6, 0x7f, 0x40}]}) r1 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000480)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0}, &(0x7f0000000640)=0xc) r7 = getgid() fstat(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000840), &(0x7f0000000880)=0x0, &(0x7f00000008c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000900)={0x0, 0x0, 0x0}, &(0x7f0000000940)=0xc) fsetxattr$system_posix_acl(r1, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000980)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x5, r3}, {0x2, 0x8, r4}, {0x2, 0x0, r5}, {0x2, 0x0, r6}], {0x4, 0x3}, [{0x8, 0x4, r7}, {0x8, 0x2, r8}, {0x8, 0x1, r9}, {0x8, 0x2, r10}, {0x8, 0x5, r11}, {0x8, 0x3, r12}], {0x10, 0x1}, {0x20, 0xdd59552efa7a59dd}}, 0x7c, 0x2) r13 = socket$key(0xf, 0x3, 0x2) connect(r13, &(0x7f0000000a00)=@vsock={0x28, 0x0, 0x2711, @hyper}, 0x80) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000d80)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x40008}, 0xc, &(0x7f0000000d40)={&(0x7f0000000ac0)={0x270, 0x0, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x110, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x86}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffff10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1b}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}]}, @TIPC_NLA_LINK={0x94, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x33b}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1a0}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x270}}, 0xe197014a96b5044) prctl$PR_SET_KEEPCAPS(0x8, 0x0) pipe2(&(0x7f0000000dc0)={0xffffffffffffffff}, 0x84000) ioctl$SIOCGETNODEID(r14, 0x89e1, &(0x7f0000000e00)={0x3}) r15 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000e40)='cgroup.procs\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000e80)=0x0) fcntl$setownex(r15, 0xf, &(0x7f0000000ec0)={0x2, r16}) r17 = openat$zero(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/zero\x00', 0x232001, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r17, 0x5411, &(0x7f0000000f40)) r18 = syz_open_dev$binderN(&(0x7f0000000f80)='/dev/binder#\x00', 0x0, 0x802) epoll_ctl$EPOLL_CTL_DEL(r17, 0x2, r18) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000fc0)={0xfffffffffffeffff, 0x2}) r19 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vga_arbiter\x00', 0x140, 0x0) r20 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r19, &(0x7f0000001240)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x180008}, 0xc, &(0x7f0000001200)={&(0x7f00000010c0)={0x140, r20, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0x78, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8038}]}, @TIPC_NLA_LINK={0x40, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x40000}, 0x8010) [ 321.579527][ T7535] IPVS: ftp: loaded support on port[0] = 21 15:40:58 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={'rose', 0x0}, 0x3, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000080)=0x6dc) write$P9_RRENAMEAT(r0, &(0x7f00000000c0)={0x7, 0x4b, 0x2}, 0x7) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$inet_dccp_buf(r1, 0x21, 0xd, &(0x7f0000000140)="1540e14243f49d72816ae881acb38704a53f0d222a6f6ac979f7eb30cc12ee1eac46e10ba5c7048c892850fc99c5deb01e5a2a106314", 0x36) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self\x00', 0x400000, 0x0) syncfs(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x1}, 0x28, 0x5) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x10000, 0x0) getsockopt$CAN_RAW_LOOPBACK(r4, 0x65, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) statx(r1, &(0x7f0000000340)='./file0\x00', 0x6800, 0x40, &(0x7f0000000380)) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000480)={0x1, 0x2}, 0x2) r5 = accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14, 0x180800) ioctl$FS_IOC_SETVERSION(r5, 0x40087602, &(0x7f0000000540)=0x899) r6 = socket$inet(0x2, 0x1, 0x6) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f00000005c0)=@get={0x1, &(0x7f0000000580)=""/59, 0x7}) r7 = syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x1, 0x40802) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r7, 0x8983, &(0x7f0000000640)) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) connect$inet6(r8, &(0x7f0000000700)={0xa, 0x4e23, 0xd7d1, @mcast2, 0xff}, 0x1c) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000740)='/proc/self/net/pfkey\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000780)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r9, &(0x7f0000000800)={0x9, 0x108, 0xfa00, {r10, 0x6, "ce6466", "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"}}, 0x110) fsetxattr$security_capability(r5, &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v3={0x3000000, [{0x3, 0x4}, {0x6, 0x1939}], 0xee00}, 0x18, 0x2) r11 = dup(0xffffffffffffffff) r12 = syz_genetlink_get_family_id$fou(&(0x7f0000000a00)='fou\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000a40)={@mcast2, 0x0}, &(0x7f0000000a80)=0x14) sendmsg$FOU_CMD_ADD(r11, &(0x7f0000000b80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000ac0)={0x58, r12, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @dev={0xac, 0x14, 0x14, 0x1d}}, @FOU_ATTR_IFINDEX={0x8, 0xb, r13}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}]}, 0x58}, 0x1, 0x0, 0x0, 0x8}, 0x20000000) [ 321.661251][ T7535] chnl_net:caif_netlink_parms(): no params data found [ 321.716608][ T7535] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.723843][ T7535] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.744590][ T7535] device bridge_slave_0 entered promiscuous mode [ 321.755019][ T7535] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.763054][ T7535] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.784981][ T7535] device bridge_slave_1 entered promiscuous mode [ 321.811286][ T7535] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 321.835306][ T7535] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 321.854475][ T7535] team0: Port device team_slave_0 added 15:40:58 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x94c8e849594d0fe3) bind$vsock_dgram(r0, &(0x7f0000000000)={0x28, 0x0, 0x2710, @my=0x0}, 0x10) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3f) ioctl$TCFLSH(r1, 0x540b, 0x5) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) move_mount(r0, &(0x7f0000000040)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00', 0x4) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f00000002c0)={r3, r4, 0x0, 0x90, &(0x7f0000000200)="ecb2a385d78d35cf26394f42e1b948813a2ca0edcf2af80e52808d9f0fbb18e69b1cbc95aa317f0ce2b145e1a288178534d99a397fb179b25d13938a89e621808cbfe4b9f478569266cf997dcd1371eb7d9dca56768b3d24f7805e0d6c288c2a70cd47b6ae47f8ad805e0ac8cd3c9107d377ca4b6d8c3aa7a9421412767e1435246b769d28c7938b32de76fca6dc0a01", 0x8, 0xfc, 0x4, 0xfff, 0x0, 0x1, 0x24, 'syz1\x00'}) r5 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000380)=@id, &(0x7f00000003c0)=0x10, 0x0) getsockname(r5, &(0x7f0000000400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000480)=0x80) r7 = syz_open_dev$sndpcmp(&(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00', 0x7, 0x1b1922) ioctl$TCSETAW(r7, 0x5407, &(0x7f0000000500)={0x1f, 0x0, 0x81, 0x9, 0x9, 0x42, 0x7, 0x5, 0x4, 0x9}) r8 = syz_open_dev$sndpcmc(&(0x7f0000000540)='/dev/snd/pcmC#D#c\x00', 0x1, 0x42000) ioctl$TIOCLINUX4(r8, 0x541c, &(0x7f0000000580)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={0xffffffffffffffff, 0x0, 0x0, 0xf2, &(0x7f00000005c0), &(0x7f0000000600)=""/242, 0x7fffffff, 0x0, 0x2b, 0xab, &(0x7f0000000700)="365f5dff9a6a5b25afa4125b23e3bf562ff163befd529667da294d460329a74a0809160cee520bbafacca3", &(0x7f0000000740)="1a28c8a3dc34e30523439115352d3fed077226bc5fa813d0eefa2f4ac5812e2a2dc8563c773d59734475bf1c06c63f6dc85e10643e3c081975dd2033d643254831884a8a353a29650a59ff57088d201ff7cdc091eeeaee3fad5e076d404757e3dd0d0de52d6c5fbdaba7ab80b967ac5a8666410e0624bc83b8e23213429cd4c810399ab80c967757bff8ba3d241019acecffefbe2f8129f67f11a260e64ec7379fc352b6f7c862af9602f4"}, 0x40) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'team0\x00', 0x0}) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000001080)={&(0x7f0000000f80)={0x2c, 0x0, r9, 0x2d}, 0x10, &(0x7f0000001040)=[{&(0x7f0000000fc0)="f0247e147c3fcd80cbac1b81f47587bdcc6c13bbeadfdcc2735e060686de2392d8430c59ebe43f1027b1d6c76ad3240ae71cff291839fa9dd6951bac9774c0e68bf8446dbd563fe3cd955845d6ffe282b8437c0c879bd76e5a", 0x59}], 0x1, 0x0, 0x0, 0x40008001}, 0xa3baa710d4d0fe1d) r10 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/ubi_ctrl\x00', 0xc8742, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r10, 0x400442c9, &(0x7f0000001100)={0x81, @dev={[], 0x28}}) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000001140)={0x6, [0x4, 0xffff, 0x0, 0x0, 0x47e, 0x7fff, 0xfffd, 0x401, 0x4, 0x7ff, 0x0, 0x3, 0x113e, 0x3f, 0x6, 0x101, 0x1000, 0xff48, 0xf62b, 0xffff, 0x3, 0x1f, 0x1000, 0x7, 0x5, 0x7, 0xba, 0x8001, 0x6, 0x0, 0x4, 0x0, 0x3, 0x6b, 0x8, 0x8b, 0x0, 0x7, 0xff, 0x1, 0x3f, 0x5, 0x1, 0x0, 0x6, 0x2f, 0x2, 0xffff], 0x3}) io_setup(0x7fff, &(0x7f00000011c0)=0x0) io_pgetevents(r11, 0x7a, 0x7, &(0x7f0000001200)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000001300)={0x0, 0x989680}, &(0x7f0000001380)={&(0x7f0000001340)={0x8dce}, 0x8}) r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000013c0)='cmdline\x00') ioctl$sock_SIOCSIFBR(r12, 0x8941, &(0x7f0000001400)=@generic={0x0, 0x74b3, 0x100000000}) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000001440)) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x29, 0x1, &(0x7f0000001480), 0x4) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r13, 0x8982, &(0x7f00000018c0)) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000001940), &(0x7f00000019c0)=0x68) [ 321.861505][ T7535] team0: Port device team_slave_1 added [ 321.872014][ T7539] IPVS: ftp: loaded support on port[0] = 21 [ 321.946992][ T7535] device hsr_slave_0 entered promiscuous mode [ 321.994323][ T7535] device hsr_slave_1 entered promiscuous mode 15:40:59 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x15241) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x13f, 0x6}}, 0x20) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000000c0)={{0x81, 0x1f}, {0x9, 0x1}, 0xfb, 0x1, 0x7f}) r1 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$poke(0xe1d4d6633ec7f5a6, r1, &(0x7f0000000140), 0x100000001) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$llc_int(r2, 0x10c, 0x6b448c5c97d62b64, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x41, 0x0) ioctl$VIDIOC_LOG_STATUS(r3, 0x5646, 0x0) r4 = semget(0x3, 0x0, 0x18) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000280)=[0x0, 0x9, 0x1, 0x1, 0x8000, 0xdd]) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x222200, 0x0) fchmod(r5, 0x284) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000400)={{0x7}, 0x3f, 0x6, 0xf8, 0x40, &(0x7f0000000300)="df80ecb61c61e641cb065bc814ac9fb0f9e492caa98c3239e9add1d348e97a079baf1f9e52f5b24980caa4a62a01373b4e55b9b35757a9bdfe24447779125ecb8aa13a95134a129826395edef6f891b5f55b0261364e3c323e36a927ef2c98c327c3e519f2e91dbfc474819c61acbfaa532b9ae158f96f5a0af296a7bdbf2a46fd79334cc4473460876ade0219931b3a56555b527d991743f99b2338a53b17d8228ebe400d6092978acdaaca77b289b91928f491e52ffc7b41f09382579f2c9e4220d5ad386f8bb8faa9f52a42e74ff25ce21aac4d1609309306b26a6716bf2a94f5faecaf36e781648169f631d84ba0c56be66b5d20e2aa"}) r6 = syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x8, 0x100) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r6, 0x28, 0x1, &(0x7f0000000480)=0x6, 0x8) r7 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r7, 0x8982, &(0x7f00000004c0)={0x6, 'yam0\x00', {0x3}, 0x600}) r8 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540), &(0x7f00000005c0)=0x60, 0x80000) ioctl(r8, 0x3f, &(0x7f0000000600)="ca1332b83eaa026e1550752f70c487258ae52769394c985aa9c7ac5f0d728877dd2946cf83d916560f03ca2077f72b98abd1390f08cd527feb18e25da216fd74e49f494861b6000790f6d3adc21cc05a38b2b716f1e043eab9e0bc015e6d2ee3de054a06dbe221ce16910e032253da8ab55820abcf7c70a775a709d45e930d94b21d0014af52a7e48ca943e902abf8f0ca") r9 = syz_open_dev$mouse(&(0x7f00000006c0)='/dev/input/mouse#\x00', 0x2, 0x101a00) ioctl$SIOCRSGL2CALL(r9, 0x89e5, &(0x7f0000000700)=@bcast) creat(&(0x7f0000000740)='./file0\x00', 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f0000002080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000020c0)=0x14) sendto$packet(r5, &(0x7f0000000780)="b7f782e83c41e9c3c8d621eea0a6c39313daacb835d6950c4c2170d2347775d274c7345c5703d814e5a7706a98a5c7e26ebf3d87b6ac91cc3145acdc94da503588bc50ab60cf69a7362fb808c7e378e23d136c223689825bcb6dd615b28f8e8053f9d409ea467d", 0x67, 0x401, &(0x7f0000002100)={0x11, 0x19, r10, 0x1, 0x80, 0x6, @broadcast}, 0x14) pipe(&(0x7f0000002140)={0xffffffffffffffff}) ioctl$EVIOCSCLOCKID(r11, 0x400445a0, &(0x7f0000002180)=0x6) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000010, 0x40010, r3, 0x8000) r12 = syz_open_dev$dmmidi(&(0x7f00000021c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x400) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000002280)={0x9, &(0x7f0000002200)=[{0x0}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r12, 0xc010641d, &(0x7f0000002300)={r13, &(0x7f00000022c0)=""/54}) [ 322.165695][ T7541] IPVS: ftp: loaded support on port[0] = 21 [ 322.165907][ T7535] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.178762][ T7535] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.186087][ T7535] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.193208][ T7535] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.422887][ T7535] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.459165][ T7539] chnl_net:caif_netlink_parms(): no params data found [ 322.535036][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.545005][ T7538] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.585884][ T7538] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.605628][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 322.637949][ T7535] 8021q: adding VLAN 0 to HW filter on device team0 [ 322.672437][ T7569] IPVS: ftp: loaded support on port[0] = 21 [ 322.699554][ T7541] chnl_net:caif_netlink_parms(): no params data found [ 322.744057][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 322.752957][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 322.784528][ T7538] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.791590][ T7538] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.824552][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 15:40:59 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000140)=0x1) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000180)) r3 = accept4$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000280)={0x40, 0xa5c}) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x121000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f0000000300)={0xfffffff7, 0x2, {0x3, 0x1, 0x3fd, 0x0, 0x2}}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x8040ae9f, &(0x7f0000000380)) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x100, 0x1}) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dsp\x00', 0x800000, 0x0) ioctl$CAPI_SET_FLAGS(r5, 0x80044324, &(0x7f0000000440)=0x1) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffffe) r6 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000480)='/dev/urandom\x00', 0xc0002, 0x0) ioctl$RNDZAPENTCNT(r6, 0x5204, &(0x7f00000004c0)=0x17) r7 = semget$private(0x0, 0x0, 0x8) semctl$GETALL(r7, 0x0, 0xd, &(0x7f0000000500)=""/68) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)=0x0) syz_open_procfs$namespace(r8, &(0x7f00000005c0)='ns/mnt\x00') ioctl$KVM_TRANSLATE(r5, 0xc018ae85, &(0x7f0000000600)={0x4, 0x200000, 0x9, 0x6, 0x74}) ioctl$LOOP_CLR_FD(r2, 0x4c01) ioctl$IOC_PR_PREEMPT(r5, 0x401870cb, &(0x7f0000000640)={0xc572, 0xffff, 0x8, 0x7}) signalfd4(r3, &(0x7f0000000680)={0xa3}, 0x8, 0x81000) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$GIO_UNISCRNMAP(r9, 0x4b69, &(0x7f0000000700)=""/255) r11 = syz_open_dev$mice(&(0x7f0000000800)='/dev/input/mice\x00', 0x0, 0x400004) bind$tipc(r11, &(0x7f0000000840)=@name={0x1e, 0x2, 0x0, {{0x21, 0x4}, 0x4}}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r10, 0xc0bc5310, &(0x7f0000000880)) [ 322.855259][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.884394][ T7538] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.891471][ T7538] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.935899][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 322.976064][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 323.016254][ T7539] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.023402][ T7539] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.064911][ T7539] device bridge_slave_0 entered promiscuous mode [ 323.089742][ T7539] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.124038][ T7539] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.131812][ T7539] device bridge_slave_1 entered promiscuous mode [ 323.189932][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 323.216193][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 323.256147][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 323.345341][ T7539] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 323.368316][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 323.384698][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 323.393346][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 323.444743][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 323.475783][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 323.497423][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 323.508467][ T7535] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 323.526122][ T7541] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.533172][ T7541] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.548087][ T7541] device bridge_slave_0 entered promiscuous mode [ 323.577360][ T7541] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.604625][ T7541] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.612337][ T7541] device bridge_slave_1 entered promiscuous mode [ 323.641115][ T7574] IPVS: ftp: loaded support on port[0] = 21 15:41:00 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x8ca03b387ec415ca, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x4, @rand_addr="ad947c5693789bb7004682bb121ad62d", 0x8a42}, 0x1c) r1 = socket$tipc(0x1e, 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x100010, r1, 0xd5ef0000) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x8, 0x220100) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f00000000c0)=[0x7, 0x1]) r3 = socket$inet6(0xa, 0xe06aae4913242257, 0x20) getsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000100)={@mcast2}, &(0x7f0000000140)=0x14) r4 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x40, 0x11) getsockopt$TIPC_NODE_RECVQ_DEPTH(r4, 0x10f, 0x83, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r5 = syz_open_pts(0xffffffffffffffff, 0x40001) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000240)=0x200) socketpair(0x10, 0x1, 0x1, &(0x7f0000000280)={0xffffffffffffffff}) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$inet6_dccp(0xa, 0x6, 0x0) recvfrom$inet6(r7, &(0x7f0000000300)=""/165, 0xa5, 0x5001, &(0x7f00000003c0)={0xa, 0x4e23, 0x2, @mcast1, 0x4}, 0x1c) r8 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$UI_SET_ABSBIT(r8, 0x40045567, 0x2) ioctl$VT_DISALLOCATE(r4, 0x5608) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0x800, 0x0) ioctl$KVM_SET_TSC_KHZ(r9, 0xaea2, 0x2) r10 = dup3(0xffffffffffffffff, r5, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @multicast1}}}, &(0x7f0000000500)=0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r10, 0x84, 0x76, &(0x7f0000000540)={r11, 0x9}, 0x8) r12 = fanotify_init(0x1, 0x2) ioctl$int_in(r12, 0x73, &(0x7f0000000580)=0x5) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r4, 0x40485404, &(0x7f00000005c0)={{0x1, 0x0, 0x8ca, 0x2, 0x9}, 0x9, 0x7}) r13 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ubi_ctrl\x00', 0x200000, 0x0) ioctl$TIOCGSID(r13, 0x5429, &(0x7f0000000680)) ioctl$KVM_REINJECT_CONTROL(r13, 0xae71, &(0x7f00000006c0)) [ 323.648236][ T7539] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 323.673324][ T7535] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 323.709475][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 323.718443][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 323.761009][ T7541] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 323.790163][ T7539] team0: Port device team_slave_0 added [ 323.807635][ T7541] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 323.825412][ T7539] team0: Port device team_slave_1 added [ 323.848846][ T7569] chnl_net:caif_netlink_parms(): no params data found [ 323.868831][ T7541] team0: Port device team_slave_0 added [ 323.877151][ T7591] IPVS: ftp: loaded support on port[0] = 21 [ 323.928294][ T7539] device hsr_slave_0 entered promiscuous mode [ 323.974281][ T7539] device hsr_slave_1 entered promiscuous mode [ 324.034085][ T7539] debugfs: Directory 'hsr0' with parent '/' already present! [ 324.045440][ T7541] team0: Port device team_slave_1 added [ 324.126118][ T7541] device hsr_slave_0 entered promiscuous mode [ 324.174341][ T7541] device hsr_slave_1 entered promiscuous mode [ 324.214149][ T7541] debugfs: Directory 'hsr0' with parent '/' already present! [ 324.298155][ T7569] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.344103][ T7569] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.378300][ T7569] device bridge_slave_0 entered promiscuous mode [ 324.493893][ T7569] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.513288][ T7569] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.584744][ T7569] device bridge_slave_1 entered promiscuous mode [ 324.624554][ T7574] chnl_net:caif_netlink_parms(): no params data found [ 324.839117][ T7569] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 324.878091][ T7539] 8021q: adding VLAN 0 to HW filter on device bond0 [ 324.915052][ T7574] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.922195][ T7574] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.950763][ T7574] device bridge_slave_0 entered promiscuous mode [ 325.001019][ T7569] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 325.035004][ T7541] 8021q: adding VLAN 0 to HW filter on device bond0 [ 325.076190][ T7574] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.086337][ T7574] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.135144][ T7574] device bridge_slave_1 entered promiscuous mode [ 325.193288][ T7539] 8021q: adding VLAN 0 to HW filter on device team0 [ 325.210657][ T7591] chnl_net:caif_netlink_parms(): no params data found [ 325.254177][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 325.274453][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 325.337355][ T7541] 8021q: adding VLAN 0 to HW filter on device team0 [ 325.374944][ T7569] team0: Port device team_slave_0 added [ 325.381316][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 325.427330][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 325.467396][ T3018] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.474533][ T3018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.553160][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 325.597058][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 325.644911][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 325.694504][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 325.757489][ T3018] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.764641][ T3018] bridge0: port 2(bridge_slave_1) entered forwarding state 15:41:02 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz'}, &(0x7f00000004c0)="004dde0301b3d8a52150dbf7f3649aa4a133b1b47392870e2defc66e389f1912e8d05566b4faa7040cc60d103d385210cae9cc0804628a83533410d5996991644a3fe726a1063c39e41d570890b0d9256e0b19698ef7213a67bcfc7af200080000f071991224ad9524b280b9fa224a833ea0cc3c5a51d5d20acd5aa3a5926c8079170000000000000000000000000054db45165107b9c877a83a6bfaf6f33a59150445c45cc59c3a967d69bd8ecb5724a39784673c37c977e61cc6b3e20cd4f9", 0x1e3, r0) r2 = socket(0x4, 0x3, 0x2d) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = gettid() r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r5, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r6, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r7, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r8 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r8, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r9 = accept4$vsock_stream(r8, &(0x7f0000000a80)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) r10 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r10, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r11 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r11) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r11, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x3bb674ee, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000000140)={0x3, 0x1, 0xffffffff, 0x5}, &(0x7f0000000200)=0x362, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7fffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r12, 0x4) r13 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000ac0)=r12, 0x4) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000b00)=0x0) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r16, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40)={0x0, 0x0, 0x0}, &(0x7f0000000b80)=0xc) r18 = gettid() ptrace$setopts(0x4206, r18, 0x0, 0x0) tkill(r18, 0x19) r19 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r20, 0x0) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r22 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r22, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r23 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r23, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r24 = syz_open_dev$mice(&(0x7f0000000c80)='/dev/input/mice\x00', 0x0, 0x0) r25 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r25, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r26 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r26, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r27 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r27, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r28 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r28, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r29 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r29, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r30 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r30, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000cc0)=0x0) fstat(r2, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0}) r33 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r33, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000ec0)='systex_acl_ac@ess\x00\x00\x00\x00\x00\x00\x00)x\x0f\x16\xdc\xac\x83\x0f\xbf\xf24I=1\x96\x93\xa9aL\x0f\xd6A\'/\x95\x04\"Tn\xdf7\xcd\x05\xd3\xab\xf8o\xcb\xc7\xce\xdd\xa0\xbd\xc7\x81\xadPb\xd3\xc6\xfcS\x14\xa7\xa8\'W!s\xe09\xcd\x1ci\xb8\x01\xfa\x8b\xa9`\xa8\x84L\x14j\xc9|#\xd6\x1f\x9f\xa6O\x06v\xfa\xcf\xd18\xbbZ\xe7\xb95{\\\vy\x935),5\xee\xd0\xc6\xe6jF\xf5\xd7,\xb1\x06Zl8\xb3)\xe6\\3i]\x84\'\x8a1+\xf5%\xf4\xf0WfI/<3\xb0\xd8.\xa0\xb6\xf2\xfd\x85\x04\xe4\xf2\xe5\x19*:\x84\x13\x83n\x15\xda\xab\xbd\x11\x9a\xa3\x14\x98m\x91T', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100010000000000040000000000000008000000", @ANYRES32=r34, @ANYBLOB="48001fd4", @ANYRES32=0x0, @ANYBLOB="10000600000000002000000000000000"], 0xffffffffffffffe1, 0x0) sendmsg$unix(r5, &(0x7f0000000e80)={&(0x7f00000007c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000a40)=[{&(0x7f0000000840)="c61deb68393a9760f227c8242a2babaee0528efbfa64012b3893f8e34cedaf126bc5c2406f5dc88207b59a5095aad89f4e1a47adf79821468ea71878bdbd70b5", 0x40}, {&(0x7f0000000880)="352039a87065526bc34d1febe12718db589b874fcbe4954fce284f48e2f66b3b76a3fce9f1f67f65c9e8225314524192ffb4a9d83b9197ebf6fcef09565d46359c1da18670de2e12a0e94ac8cc6086e423a46a8e8482f116db6218ab88b530040502ae7f7099d04bc4accaad57ed54ec7492f04b1cccb1e4176a87c8a65c60c24d417c2f559838eb4b0bb0bb1cbcd64e700b677571fea3f86f574853830ecc419f131959c81dd1baa511b077e30f00791d696f687b29e5e5998d128336a9852e943ca0b6bb7f8e3e6e2637424761cf476ac27eb8b6dabcd5fad24bc4", 0xdc}, {&(0x7f0000000980)}, {&(0x7f00000009c0)="a81b244bab16a170f1fc60da344917e9639b798583ad25a42d171ed92730255f266f11b0c1896c57071783ed653811d893fc148072a6453ee1f5fafedfb9df57ab26d4a0125c4fc9c6f7d312b90498", 0x4f}], 0x4, &(0x7f0000000d80)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r6, r2, r7, r9, r10, r13, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r14, r16, r17}}}, @cred={{0x1c, 0x1, 0x2, {r18, r20, r21}}}, @rights={{0x24, 0x1, 0x1, [r22, r23, r24, r3, r25]}}, @rights={{0x34, 0x1, 0x1, [r26, r27, r3, r28, r29, r2, r3, r2, r30]}}, @cred={{0x1c, 0x1, 0x2, {r31, r32, r34}}}], 0xf0, 0x900}, 0x80) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x19) r35 = syz_open_procfs(r4, &(0x7f0000000740)='net/hci\x00') ioctl$FS_IOC_SETVERSION(r35, 0x40087602, &(0x7f0000000780)=0x752) getsockopt$inet6_IPV6_IPSEC_POLICY(r35, 0x29, 0x22, &(0x7f0000000580)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xffffff33) sendto$packet(r2, &(0x7f0000000300)="1b91fbd5c369a7515e9cc41c785343e57764a5edf63d511e7172701b43604c1607da8da51b1a57d3d9972f16e6ee4569a9a053c18f2e8b121a3cc983c31963585bfa4a619e112c35dbf51afa40422bee8785015a00d5d127bdb959ab7d9efa910f800715abfc5d17b709ce42a41792702d9cf1ff2f36bb81add98ce12d463fe8fa9b390a5129db7027c834b85d620e7f73ff340a9d39c832e1037b0ffba3c11f5aa4bb1ebc4f7d191503b352259039a0cbcc2cca671de4cb7610", 0xba, 0x4000000, &(0x7f0000000680)={0x11, 0x0, r36, 0x1, 0x8, 0x6, @random="c17b68a2c71c"}, 0x14) r37 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000040)='9', 0x1, 0xffffffffffffffff) r38 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r38, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r39 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r38, &(0x7f0000000700)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000480)={0x14, r39, 0x200, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x8) keyctl$dh_compute(0x17, &(0x7f0000000400)={r37, r1, r37}, &(0x7f0000000080)=""/92, 0x5c, &(0x7f0000000200)={&(0x7f0000000000)={'sha1\x00'}}) [ 325.838185][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 325.898446][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 325.951976][ T26] audit: type=1804 audit(1575214862.896:31): pid=7646 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir384058890/syzkaller.A8aOHL/1/file0" dev="sda1" ino=16521 res=1 [ 325.988121][ T7574] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 326.031488][ T7539] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 15:41:03 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz'}, &(0x7f00000004c0)="004dde0301b3d8a52150dbf7f3649aa4a133b1b47392870e2defc66e389f1912e8d05566b4faa7040cc60d103d385210cae9cc0804628a83533410d5996991644a3fe726a1063c39e41d570890b0d9256e0b19698ef7213a67bcfc7af200080000f071991224ad9524b280b9fa224a833ea0cc3c5a51d5d20acd5aa3a5926c8079170000000000000000000000000054db45165107b9c877a83a6bfaf6f33a59150445c45cc59c3a967d69bd8ecb5724a39784673c37c977e61cc6b3e20cd4f9", 0x1e3, r0) r2 = socket(0x4, 0x3, 0x2d) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = gettid() r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r5, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r6, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r7, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r8 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r8, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r9 = accept4$vsock_stream(r8, &(0x7f0000000a80)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) r10 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r10, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r11 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r11) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r11, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x3bb674ee, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000000140)={0x3, 0x1, 0xffffffff, 0x5}, &(0x7f0000000200)=0x362, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7fffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r12, 0x4) r13 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000ac0)=r12, 0x4) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000b00)=0x0) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r16, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40)={0x0, 0x0, 0x0}, &(0x7f0000000b80)=0xc) r18 = gettid() ptrace$setopts(0x4206, r18, 0x0, 0x0) tkill(r18, 0x19) r19 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r20, 0x0) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r22 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r22, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r23 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r23, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r24 = syz_open_dev$mice(&(0x7f0000000c80)='/dev/input/mice\x00', 0x0, 0x0) r25 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r25, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r26 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r26, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r27 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r27, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r28 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r28, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r29 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r29, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r30 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r30, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000cc0)=0x0) fstat(r2, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0}) r33 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r33, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000ec0)='systex_acl_ac@ess\x00\x00\x00\x00\x00\x00\x00)x\x0f\x16\xdc\xac\x83\x0f\xbf\xf24I=1\x96\x93\xa9aL\x0f\xd6A\'/\x95\x04\"Tn\xdf7\xcd\x05\xd3\xab\xf8o\xcb\xc7\xce\xdd\xa0\xbd\xc7\x81\xadPb\xd3\xc6\xfcS\x14\xa7\xa8\'W!s\xe09\xcd\x1ci\xb8\x01\xfa\x8b\xa9`\xa8\x84L\x14j\xc9|#\xd6\x1f\x9f\xa6O\x06v\xfa\xcf\xd18\xbbZ\xe7\xb95{\\\vy\x935),5\xee\xd0\xc6\xe6jF\xf5\xd7,\xb1\x06Zl8\xb3)\xe6\\3i]\x84\'\x8a1+\xf5%\xf4\xf0WfI/<3\xb0\xd8.\xa0\xb6\xf2\xfd\x85\x04\xe4\xf2\xe5\x19*:\x84\x13\x83n\x15\xda\xab\xbd\x11\x9a\xa3\x14\x98m\x91T', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100010000000000040000000000000008000000", @ANYRES32=r34, @ANYBLOB="48001fd4", @ANYRES32=0x0, @ANYBLOB="10000600000000002000000000000000"], 0xffffffffffffffe1, 0x0) sendmsg$unix(r5, &(0x7f0000000e80)={&(0x7f00000007c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000a40)=[{&(0x7f0000000840)="c61deb68393a9760f227c8242a2babaee0528efbfa64012b3893f8e34cedaf126bc5c2406f5dc88207b59a5095aad89f4e1a47adf79821468ea71878bdbd70b5", 0x40}, {&(0x7f0000000880)="352039a87065526bc34d1febe12718db589b874fcbe4954fce284f48e2f66b3b76a3fce9f1f67f65c9e8225314524192ffb4a9d83b9197ebf6fcef09565d46359c1da18670de2e12a0e94ac8cc6086e423a46a8e8482f116db6218ab88b530040502ae7f7099d04bc4accaad57ed54ec7492f04b1cccb1e4176a87c8a65c60c24d417c2f559838eb4b0bb0bb1cbcd64e700b677571fea3f86f574853830ecc419f131959c81dd1baa511b077e30f00791d696f687b29e5e5998d128336a9852e943ca0b6bb7f8e3e6e2637424761cf476ac27eb8b6dabcd5fad24bc4", 0xdc}, {&(0x7f0000000980)}, {&(0x7f00000009c0)="a81b244bab16a170f1fc60da344917e9639b798583ad25a42d171ed92730255f266f11b0c1896c57071783ed653811d893fc148072a6453ee1f5fafedfb9df57ab26d4a0125c4fc9c6f7d312b90498", 0x4f}], 0x4, &(0x7f0000000d80)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r6, r2, r7, r9, r10, r13, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r14, r16, r17}}}, @cred={{0x1c, 0x1, 0x2, {r18, r20, r21}}}, @rights={{0x24, 0x1, 0x1, [r22, r23, r24, r3, r25]}}, @rights={{0x34, 0x1, 0x1, [r26, r27, r3, r28, r29, r2, r3, r2, r30]}}, @cred={{0x1c, 0x1, 0x2, {r31, r32, r34}}}], 0xf0, 0x900}, 0x80) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x19) r35 = syz_open_procfs(r4, &(0x7f0000000740)='net/hci\x00') ioctl$FS_IOC_SETVERSION(r35, 0x40087602, &(0x7f0000000780)=0x752) getsockopt$inet6_IPV6_IPSEC_POLICY(r35, 0x29, 0x22, &(0x7f0000000580)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xffffff33) sendto$packet(r2, &(0x7f0000000300)="1b91fbd5c369a7515e9cc41c785343e57764a5edf63d511e7172701b43604c1607da8da51b1a57d3d9972f16e6ee4569a9a053c18f2e8b121a3cc983c31963585bfa4a619e112c35dbf51afa40422bee8785015a00d5d127bdb959ab7d9efa910f800715abfc5d17b709ce42a41792702d9cf1ff2f36bb81add98ce12d463fe8fa9b390a5129db7027c834b85d620e7f73ff340a9d39c832e1037b0ffba3c11f5aa4bb1ebc4f7d191503b352259039a0cbcc2cca671de4cb7610", 0xba, 0x4000000, &(0x7f0000000680)={0x11, 0x0, r36, 0x1, 0x8, 0x6, @random="c17b68a2c71c"}, 0x14) r37 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000040)='9', 0x1, 0xffffffffffffffff) r38 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r38, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r39 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r38, &(0x7f0000000700)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000480)={0x14, r39, 0x200, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x8) keyctl$dh_compute(0x17, &(0x7f0000000400)={r37, r1, r37}, &(0x7f0000000080)=""/92, 0x5c, &(0x7f0000000200)={&(0x7f0000000000)={'sha1\x00'}}) [ 326.086264][ T7539] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 326.204798][ T7569] team0: Port device team_slave_1 added [ 326.221701][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 326.247741][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 326.318162][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 326.340450][ T26] audit: type=1804 audit(1575214863.286:32): pid=7650 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir384058890/syzkaller.A8aOHL/2/file0" dev="sda1" ino=16521 res=1 [ 326.375119][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 15:41:03 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz'}, &(0x7f00000004c0)="004dde0301b3d8a52150dbf7f3649aa4a133b1b47392870e2defc66e389f1912e8d05566b4faa7040cc60d103d385210cae9cc0804628a83533410d5996991644a3fe726a1063c39e41d570890b0d9256e0b19698ef7213a67bcfc7af200080000f071991224ad9524b280b9fa224a833ea0cc3c5a51d5d20acd5aa3a5926c8079170000000000000000000000000054db45165107b9c877a83a6bfaf6f33a59150445c45cc59c3a967d69bd8ecb5724a39784673c37c977e61cc6b3e20cd4f9", 0x1e3, r0) r2 = socket(0x4, 0x3, 0x2d) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = gettid() r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r5, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r6, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r7, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r8 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r8, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r9 = accept4$vsock_stream(r8, &(0x7f0000000a80)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) r10 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r10, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r11 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r11) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r11, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x3bb674ee, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000000140)={0x3, 0x1, 0xffffffff, 0x5}, &(0x7f0000000200)=0x362, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7fffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r12, 0x4) r13 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000ac0)=r12, 0x4) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000b00)=0x0) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r16, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40)={0x0, 0x0, 0x0}, &(0x7f0000000b80)=0xc) r18 = gettid() ptrace$setopts(0x4206, r18, 0x0, 0x0) tkill(r18, 0x19) r19 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r20, 0x0) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r22 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r22, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r23 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r23, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r24 = syz_open_dev$mice(&(0x7f0000000c80)='/dev/input/mice\x00', 0x0, 0x0) r25 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r25, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r26 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r26, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r27 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r27, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r28 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r28, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r29 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r29, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r30 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r30, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000cc0)=0x0) fstat(r2, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0}) r33 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r33, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000ec0)='systex_acl_ac@ess\x00\x00\x00\x00\x00\x00\x00)x\x0f\x16\xdc\xac\x83\x0f\xbf\xf24I=1\x96\x93\xa9aL\x0f\xd6A\'/\x95\x04\"Tn\xdf7\xcd\x05\xd3\xab\xf8o\xcb\xc7\xce\xdd\xa0\xbd\xc7\x81\xadPb\xd3\xc6\xfcS\x14\xa7\xa8\'W!s\xe09\xcd\x1ci\xb8\x01\xfa\x8b\xa9`\xa8\x84L\x14j\xc9|#\xd6\x1f\x9f\xa6O\x06v\xfa\xcf\xd18\xbbZ\xe7\xb95{\\\vy\x935),5\xee\xd0\xc6\xe6jF\xf5\xd7,\xb1\x06Zl8\xb3)\xe6\\3i]\x84\'\x8a1+\xf5%\xf4\xf0WfI/<3\xb0\xd8.\xa0\xb6\xf2\xfd\x85\x04\xe4\xf2\xe5\x19*:\x84\x13\x83n\x15\xda\xab\xbd\x11\x9a\xa3\x14\x98m\x91T', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100010000000000040000000000000008000000", @ANYRES32=r34, @ANYBLOB="48001fd4", @ANYRES32=0x0, @ANYBLOB="10000600000000002000000000000000"], 0xffffffffffffffe1, 0x0) sendmsg$unix(r5, &(0x7f0000000e80)={&(0x7f00000007c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000a40)=[{&(0x7f0000000840)="c61deb68393a9760f227c8242a2babaee0528efbfa64012b3893f8e34cedaf126bc5c2406f5dc88207b59a5095aad89f4e1a47adf79821468ea71878bdbd70b5", 0x40}, {&(0x7f0000000880)="352039a87065526bc34d1febe12718db589b874fcbe4954fce284f48e2f66b3b76a3fce9f1f67f65c9e8225314524192ffb4a9d83b9197ebf6fcef09565d46359c1da18670de2e12a0e94ac8cc6086e423a46a8e8482f116db6218ab88b530040502ae7f7099d04bc4accaad57ed54ec7492f04b1cccb1e4176a87c8a65c60c24d417c2f559838eb4b0bb0bb1cbcd64e700b677571fea3f86f574853830ecc419f131959c81dd1baa511b077e30f00791d696f687b29e5e5998d128336a9852e943ca0b6bb7f8e3e6e2637424761cf476ac27eb8b6dabcd5fad24bc4", 0xdc}, {&(0x7f0000000980)}, {&(0x7f00000009c0)="a81b244bab16a170f1fc60da344917e9639b798583ad25a42d171ed92730255f266f11b0c1896c57071783ed653811d893fc148072a6453ee1f5fafedfb9df57ab26d4a0125c4fc9c6f7d312b90498", 0x4f}], 0x4, &(0x7f0000000d80)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r6, r2, r7, r9, r10, r13, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r14, r16, r17}}}, @cred={{0x1c, 0x1, 0x2, {r18, r20, r21}}}, @rights={{0x24, 0x1, 0x1, [r22, r23, r24, r3, r25]}}, @rights={{0x34, 0x1, 0x1, [r26, r27, r3, r28, r29, r2, r3, r2, r30]}}, @cred={{0x1c, 0x1, 0x2, {r31, r32, r34}}}], 0xf0, 0x900}, 0x80) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x19) r35 = syz_open_procfs(r4, &(0x7f0000000740)='net/hci\x00') ioctl$FS_IOC_SETVERSION(r35, 0x40087602, &(0x7f0000000780)=0x752) getsockopt$inet6_IPV6_IPSEC_POLICY(r35, 0x29, 0x22, &(0x7f0000000580)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xffffff33) sendto$packet(r2, &(0x7f0000000300)="1b91fbd5c369a7515e9cc41c785343e57764a5edf63d511e7172701b43604c1607da8da51b1a57d3d9972f16e6ee4569a9a053c18f2e8b121a3cc983c31963585bfa4a619e112c35dbf51afa40422bee8785015a00d5d127bdb959ab7d9efa910f800715abfc5d17b709ce42a41792702d9cf1ff2f36bb81add98ce12d463fe8fa9b390a5129db7027c834b85d620e7f73ff340a9d39c832e1037b0ffba3c11f5aa4bb1ebc4f7d191503b352259039a0cbcc2cca671de4cb7610", 0xba, 0x4000000, &(0x7f0000000680)={0x11, 0x0, r36, 0x1, 0x8, 0x6, @random="c17b68a2c71c"}, 0x14) r37 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000040)='9', 0x1, 0xffffffffffffffff) r38 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r38, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r39 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r38, &(0x7f0000000700)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000480)={0x14, r39, 0x200, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x8) keyctl$dh_compute(0x17, &(0x7f0000000400)={r37, r1, r37}, &(0x7f0000000080)=""/92, 0x5c, &(0x7f0000000200)={&(0x7f0000000000)={'sha1\x00'}}) [ 326.444592][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 326.484676][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 326.537133][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 326.577610][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 326.620911][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 326.689437][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 326.747890][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 326.768422][ T26] audit: type=1804 audit(1575214863.716:33): pid=7654 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir384058890/syzkaller.A8aOHL/3/file0" dev="sda1" ino=16521 res=1 [ 326.805562][ T7595] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.812699][ T7595] bridge0: port 1(bridge_slave_0) entered forwarding state 15:41:03 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz'}, &(0x7f00000004c0)="004dde0301b3d8a52150dbf7f3649aa4a133b1b47392870e2defc66e389f1912e8d05566b4faa7040cc60d103d385210cae9cc0804628a83533410d5996991644a3fe726a1063c39e41d570890b0d9256e0b19698ef7213a67bcfc7af200080000f071991224ad9524b280b9fa224a833ea0cc3c5a51d5d20acd5aa3a5926c8079170000000000000000000000000054db45165107b9c877a83a6bfaf6f33a59150445c45cc59c3a967d69bd8ecb5724a39784673c37c977e61cc6b3e20cd4f9", 0x1e3, r0) r2 = socket(0x4, 0x3, 0x2d) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = gettid() r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r5, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r6, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r7, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r8 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r8, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r9 = accept4$vsock_stream(r8, &(0x7f0000000a80)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) r10 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r10, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r11 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r11) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r11, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x3bb674ee, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000000140)={0x3, 0x1, 0xffffffff, 0x5}, &(0x7f0000000200)=0x362, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7fffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r12, 0x4) r13 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000ac0)=r12, 0x4) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000b00)=0x0) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r16, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40)={0x0, 0x0, 0x0}, &(0x7f0000000b80)=0xc) r18 = gettid() ptrace$setopts(0x4206, r18, 0x0, 0x0) tkill(r18, 0x19) r19 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r20, 0x0) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r22 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r22, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r23 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r23, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r24 = syz_open_dev$mice(&(0x7f0000000c80)='/dev/input/mice\x00', 0x0, 0x0) r25 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r25, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r26 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r26, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r27 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r27, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r28 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r28, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r29 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r29, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r30 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r30, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000cc0)=0x0) fstat(r2, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0}) r33 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r33, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000ec0)='systex_acl_ac@ess\x00\x00\x00\x00\x00\x00\x00)x\x0f\x16\xdc\xac\x83\x0f\xbf\xf24I=1\x96\x93\xa9aL\x0f\xd6A\'/\x95\x04\"Tn\xdf7\xcd\x05\xd3\xab\xf8o\xcb\xc7\xce\xdd\xa0\xbd\xc7\x81\xadPb\xd3\xc6\xfcS\x14\xa7\xa8\'W!s\xe09\xcd\x1ci\xb8\x01\xfa\x8b\xa9`\xa8\x84L\x14j\xc9|#\xd6\x1f\x9f\xa6O\x06v\xfa\xcf\xd18\xbbZ\xe7\xb95{\\\vy\x935),5\xee\xd0\xc6\xe6jF\xf5\xd7,\xb1\x06Zl8\xb3)\xe6\\3i]\x84\'\x8a1+\xf5%\xf4\xf0WfI/<3\xb0\xd8.\xa0\xb6\xf2\xfd\x85\x04\xe4\xf2\xe5\x19*:\x84\x13\x83n\x15\xda\xab\xbd\x11\x9a\xa3\x14\x98m\x91T', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100010000000000040000000000000008000000", @ANYRES32=r34, @ANYBLOB="48001fd4", @ANYRES32=0x0, @ANYBLOB="10000600000000002000000000000000"], 0xffffffffffffffe1, 0x0) sendmsg$unix(r5, &(0x7f0000000e80)={&(0x7f00000007c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000a40)=[{&(0x7f0000000840)="c61deb68393a9760f227c8242a2babaee0528efbfa64012b3893f8e34cedaf126bc5c2406f5dc88207b59a5095aad89f4e1a47adf79821468ea71878bdbd70b5", 0x40}, {&(0x7f0000000880)="352039a87065526bc34d1febe12718db589b874fcbe4954fce284f48e2f66b3b76a3fce9f1f67f65c9e8225314524192ffb4a9d83b9197ebf6fcef09565d46359c1da18670de2e12a0e94ac8cc6086e423a46a8e8482f116db6218ab88b530040502ae7f7099d04bc4accaad57ed54ec7492f04b1cccb1e4176a87c8a65c60c24d417c2f559838eb4b0bb0bb1cbcd64e700b677571fea3f86f574853830ecc419f131959c81dd1baa511b077e30f00791d696f687b29e5e5998d128336a9852e943ca0b6bb7f8e3e6e2637424761cf476ac27eb8b6dabcd5fad24bc4", 0xdc}, {&(0x7f0000000980)}, {&(0x7f00000009c0)="a81b244bab16a170f1fc60da344917e9639b798583ad25a42d171ed92730255f266f11b0c1896c57071783ed653811d893fc148072a6453ee1f5fafedfb9df57ab26d4a0125c4fc9c6f7d312b90498", 0x4f}], 0x4, &(0x7f0000000d80)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r6, r2, r7, r9, r10, r13, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r14, r16, r17}}}, @cred={{0x1c, 0x1, 0x2, {r18, r20, r21}}}, @rights={{0x24, 0x1, 0x1, [r22, r23, r24, r3, r25]}}, @rights={{0x34, 0x1, 0x1, [r26, r27, r3, r28, r29, r2, r3, r2, r30]}}, @cred={{0x1c, 0x1, 0x2, {r31, r32, r34}}}], 0xf0, 0x900}, 0x80) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x19) r35 = syz_open_procfs(r4, &(0x7f0000000740)='net/hci\x00') ioctl$FS_IOC_SETVERSION(r35, 0x40087602, &(0x7f0000000780)=0x752) getsockopt$inet6_IPV6_IPSEC_POLICY(r35, 0x29, 0x22, &(0x7f0000000580)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xffffff33) sendto$packet(r2, &(0x7f0000000300)="1b91fbd5c369a7515e9cc41c785343e57764a5edf63d511e7172701b43604c1607da8da51b1a57d3d9972f16e6ee4569a9a053c18f2e8b121a3cc983c31963585bfa4a619e112c35dbf51afa40422bee8785015a00d5d127bdb959ab7d9efa910f800715abfc5d17b709ce42a41792702d9cf1ff2f36bb81add98ce12d463fe8fa9b390a5129db7027c834b85d620e7f73ff340a9d39c832e1037b0ffba3c11f5aa4bb1ebc4f7d191503b352259039a0cbcc2cca671de4cb7610", 0xba, 0x4000000, &(0x7f0000000680)={0x11, 0x0, r36, 0x1, 0x8, 0x6, @random="c17b68a2c71c"}, 0x14) r37 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000040)='9', 0x1, 0xffffffffffffffff) r38 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r38, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r39 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r38, &(0x7f0000000700)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000480)={0x14, r39, 0x200, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x8) keyctl$dh_compute(0x17, &(0x7f0000000400)={r37, r1, r37}, &(0x7f0000000080)=""/92, 0x5c, &(0x7f0000000200)={&(0x7f0000000000)={'sha1\x00'}}) [ 326.907841][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 326.947679][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 326.994424][ T7595] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.002162][ T7595] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.094692][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 327.151118][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 327.189969][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 327.208029][ T26] audit: type=1804 audit(1575214864.156:34): pid=7658 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir384058890/syzkaller.A8aOHL/4/file0" dev="sda1" ino=16522 res=1 [ 327.252805][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 327.286800][ T7574] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 327.317326][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 327.328998][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 327.343886][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 15:41:04 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz'}, &(0x7f00000004c0)="004dde0301b3d8a52150dbf7f3649aa4a133b1b47392870e2defc66e389f1912e8d05566b4faa7040cc60d103d385210cae9cc0804628a83533410d5996991644a3fe726a1063c39e41d570890b0d9256e0b19698ef7213a67bcfc7af200080000f071991224ad9524b280b9fa224a833ea0cc3c5a51d5d20acd5aa3a5926c8079170000000000000000000000000054db45165107b9c877a83a6bfaf6f33a59150445c45cc59c3a967d69bd8ecb5724a39784673c37c977e61cc6b3e20cd4f9", 0x1e3, r0) r2 = socket(0x4, 0x3, 0x2d) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = gettid() r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r5, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r6, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r7, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r8 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r8, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r9 = accept4$vsock_stream(r8, &(0x7f0000000a80)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) r10 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r10, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r11 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r11) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r11, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x3bb674ee, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000000140)={0x3, 0x1, 0xffffffff, 0x5}, &(0x7f0000000200)=0x362, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7fffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r12, 0x4) r13 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000ac0)=r12, 0x4) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000b00)=0x0) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r16, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40)={0x0, 0x0, 0x0}, &(0x7f0000000b80)=0xc) r18 = gettid() ptrace$setopts(0x4206, r18, 0x0, 0x0) tkill(r18, 0x19) r19 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r20, 0x0) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r22 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r22, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r23 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r23, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r24 = syz_open_dev$mice(&(0x7f0000000c80)='/dev/input/mice\x00', 0x0, 0x0) r25 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r25, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r26 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r26, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r27 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r27, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r28 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r28, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r29 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r29, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r30 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r30, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000cc0)=0x0) fstat(r2, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0}) r33 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r33, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000ec0)='systex_acl_ac@ess\x00\x00\x00\x00\x00\x00\x00)x\x0f\x16\xdc\xac\x83\x0f\xbf\xf24I=1\x96\x93\xa9aL\x0f\xd6A\'/\x95\x04\"Tn\xdf7\xcd\x05\xd3\xab\xf8o\xcb\xc7\xce\xdd\xa0\xbd\xc7\x81\xadPb\xd3\xc6\xfcS\x14\xa7\xa8\'W!s\xe09\xcd\x1ci\xb8\x01\xfa\x8b\xa9`\xa8\x84L\x14j\xc9|#\xd6\x1f\x9f\xa6O\x06v\xfa\xcf\xd18\xbbZ\xe7\xb95{\\\vy\x935),5\xee\xd0\xc6\xe6jF\xf5\xd7,\xb1\x06Zl8\xb3)\xe6\\3i]\x84\'\x8a1+\xf5%\xf4\xf0WfI/<3\xb0\xd8.\xa0\xb6\xf2\xfd\x85\x04\xe4\xf2\xe5\x19*:\x84\x13\x83n\x15\xda\xab\xbd\x11\x9a\xa3\x14\x98m\x91T', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100010000000000040000000000000008000000", @ANYRES32=r34, @ANYBLOB="48001fd4", @ANYRES32=0x0, @ANYBLOB="10000600000000002000000000000000"], 0xffffffffffffffe1, 0x0) sendmsg$unix(r5, &(0x7f0000000e80)={&(0x7f00000007c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000a40)=[{&(0x7f0000000840)="c61deb68393a9760f227c8242a2babaee0528efbfa64012b3893f8e34cedaf126bc5c2406f5dc88207b59a5095aad89f4e1a47adf79821468ea71878bdbd70b5", 0x40}, {&(0x7f0000000880)="352039a87065526bc34d1febe12718db589b874fcbe4954fce284f48e2f66b3b76a3fce9f1f67f65c9e8225314524192ffb4a9d83b9197ebf6fcef09565d46359c1da18670de2e12a0e94ac8cc6086e423a46a8e8482f116db6218ab88b530040502ae7f7099d04bc4accaad57ed54ec7492f04b1cccb1e4176a87c8a65c60c24d417c2f559838eb4b0bb0bb1cbcd64e700b677571fea3f86f574853830ecc419f131959c81dd1baa511b077e30f00791d696f687b29e5e5998d128336a9852e943ca0b6bb7f8e3e6e2637424761cf476ac27eb8b6dabcd5fad24bc4", 0xdc}, {&(0x7f0000000980)}, {&(0x7f00000009c0)="a81b244bab16a170f1fc60da344917e9639b798583ad25a42d171ed92730255f266f11b0c1896c57071783ed653811d893fc148072a6453ee1f5fafedfb9df57ab26d4a0125c4fc9c6f7d312b90498", 0x4f}], 0x4, &(0x7f0000000d80)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r6, r2, r7, r9, r10, r13, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r14, r16, r17}}}, @cred={{0x1c, 0x1, 0x2, {r18, r20, r21}}}, @rights={{0x24, 0x1, 0x1, [r22, r23, r24, r3, r25]}}, @rights={{0x34, 0x1, 0x1, [r26, r27, r3, r28, r29, r2, r3, r2, r30]}}, @cred={{0x1c, 0x1, 0x2, {r31, r32, r34}}}], 0xf0, 0x900}, 0x80) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x19) r35 = syz_open_procfs(r4, &(0x7f0000000740)='net/hci\x00') ioctl$FS_IOC_SETVERSION(r35, 0x40087602, &(0x7f0000000780)=0x752) getsockopt$inet6_IPV6_IPSEC_POLICY(r35, 0x29, 0x22, &(0x7f0000000580)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xffffff33) sendto$packet(r2, &(0x7f0000000300)="1b91fbd5c369a7515e9cc41c785343e57764a5edf63d511e7172701b43604c1607da8da51b1a57d3d9972f16e6ee4569a9a053c18f2e8b121a3cc983c31963585bfa4a619e112c35dbf51afa40422bee8785015a00d5d127bdb959ab7d9efa910f800715abfc5d17b709ce42a41792702d9cf1ff2f36bb81add98ce12d463fe8fa9b390a5129db7027c834b85d620e7f73ff340a9d39c832e1037b0ffba3c11f5aa4bb1ebc4f7d191503b352259039a0cbcc2cca671de4cb7610", 0xba, 0x4000000, &(0x7f0000000680)={0x11, 0x0, r36, 0x1, 0x8, 0x6, @random="c17b68a2c71c"}, 0x14) r37 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000040)='9', 0x1, 0xffffffffffffffff) r38 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r38, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r39 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r38, &(0x7f0000000700)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000480)={0x14, r39, 0x200, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x8) keyctl$dh_compute(0x17, &(0x7f0000000400)={r37, r1, r37}, &(0x7f0000000080)=""/92, 0x5c, &(0x7f0000000200)={&(0x7f0000000000)={'sha1\x00'}}) [ 327.361600][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 327.378759][ T7541] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 327.398381][ T7541] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 327.423662][ T7591] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.448713][ T7591] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.464663][ T7591] device bridge_slave_0 entered promiscuous mode [ 327.477345][ T26] audit: type=1804 audit(1575214864.426:35): pid=7678 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir384058890/syzkaller.A8aOHL/5/file0" dev="sda1" ino=16522 res=1 [ 327.479496][ T7539] 8021q: adding VLAN 0 to HW filter on device batadv0 15:41:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x206100, 0x0) accept$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, &(0x7f00000000c0)=0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="003f003f0000007e5bc5795ecaffff810000000000000000ffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) [ 327.524099][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 327.532663][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 327.557520][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 327.566009][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 327.582351][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 327.591215][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 327.609297][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 327.617286][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 327.627759][ T7591] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.635037][ T7591] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.642888][ T7591] device bridge_slave_1 entered promiscuous mode [ 327.676411][ T7569] device hsr_slave_0 entered promiscuous mode [ 327.680330][ C1] hrtimer: interrupt took 24500 ns 15:41:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x206100, 0x0) accept$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, &(0x7f00000000c0)=0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="003f003f0000007e5bc5795ecaffff810000000000000000ffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) [ 327.727464][ T7569] device hsr_slave_1 entered promiscuous mode [ 327.764606][ T7569] debugfs: Directory 'hsr0' with parent '/' already present! [ 327.787351][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 327.799973][ T7541] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 327.822729][ T7574] team0: Port device team_slave_0 added [ 327.851536][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 327.861330][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 327.929651][ T7591] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 327.980009][ T7574] team0: Port device team_slave_1 added [ 328.011397][ T7591] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 328.166048][ T7574] device hsr_slave_0 entered promiscuous mode [ 328.204504][ T7574] device hsr_slave_1 entered promiscuous mode [ 328.237533][ T7574] debugfs: Directory 'hsr0' with parent '/' already present! [ 328.269533][ T7591] team0: Port device team_slave_0 added [ 328.290630][ T7569] 8021q: adding VLAN 0 to HW filter on device bond0 [ 328.367178][ T7591] team0: Port device team_slave_1 added [ 328.388865][ T7569] 8021q: adding VLAN 0 to HW filter on device team0 [ 328.486915][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 328.507241][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 328.612175][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 328.658109][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 328.722815][ T7570] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.730030][ T7570] bridge0: port 1(bridge_slave_0) entered forwarding state 15:41:05 executing program 1: socket(0x200000000000011, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = syz_open_dev$rtc(&(0x7f0000000400)='/dev/rtc#\x00', 0x0, 0x92d000) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000540)) r1 = getpid() sched_setattr(r1, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) exit_group(0x10000) write(r4, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x2000, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') mount$fuseblk(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x0) fsetxattr$security_capability(r5, &(0x7f0000000240)='security.capability\x00', &(0x7f00000002c0)=@v2={0x2000000, [{0x0, 0xffff0001}, {0x3f}]}, 0x14, 0x5) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) [ 328.810463][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 328.884649][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 328.945688][ T7570] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.952788][ T7570] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.031365][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 329.093328][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 329.157423][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 329.220796][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 329.287887][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 329.338529][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 329.423216][ T7569] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 329.484021][ T7569] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 329.586309][ T7591] device hsr_slave_0 entered promiscuous mode [ 329.617094][ T7591] device hsr_slave_1 entered promiscuous mode [ 329.684036][ T7591] debugfs: Directory 'hsr0' with parent '/' already present! [ 329.709951][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 329.731762][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 329.781452][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 329.827177][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 329.869049][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 329.917020][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 329.984466][ T7569] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 330.068044][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 330.088874][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 330.136752][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 330.179023][ T7574] 8021q: adding VLAN 0 to HW filter on device bond0 15:41:07 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x71, 0x40100) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000040)={0x3, 0x20}) [ 330.368447][ T7574] 8021q: adding VLAN 0 to HW filter on device team0 [ 330.441973][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 330.482756][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 330.607501][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 330.647281][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 330.694384][ T7538] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.701469][ T7538] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.754787][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 330.763313][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 330.844697][ T7538] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.851808][ T7538] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.894647][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 330.967015][ T7591] 8021q: adding VLAN 0 to HW filter on device bond0 [ 331.012399][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 331.044507][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 331.104870][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 331.145838][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 331.188167][ T7591] 8021q: adding VLAN 0 to HW filter on device team0 [ 331.228602][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 331.248921][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 331.296012][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.338452][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 331.380833][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 331.436532][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 331.471118][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 15:41:08 executing program 0: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x8) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000040)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}, 0x5c}]}) mknod$loop(&(0x7f0000000140)='./bus/file0\x00', 0x1200, 0x0) [ 331.510205][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.517309][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.597111][ T7813] overlayfs: filesystem on './bus' not supported as upperdir [ 331.606320][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 331.628623][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 331.676126][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.683206][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.726240][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 331.775069][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 331.783352][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 331.820229][ T7574] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 331.854913][ T7574] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 331.885995][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 331.894639][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 331.903697][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 331.965469][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 331.998409][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 332.037360][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 332.057672][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 332.097751][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 332.121443][ T7591] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 332.164029][ T7591] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 332.204507][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 332.218960][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 332.240826][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.264870][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 332.273289][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 332.291002][ T7780] ================================================================== [ 332.295130][ T7538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 332.299127][ T7780] BUG: KCSAN: data-race in flush_signal_handlers / proc_pid_status [ 332.314079][ T7780] [ 332.316412][ T7780] read to 0xffff8880a24b48e0 of 8 bytes by task 7794 on cpu 0: [ 332.323960][ T7780] proc_pid_status+0xa0b/0x1000 [ 332.328813][ T7780] proc_single_show+0x89/0xe0 [ 332.333492][ T7780] seq_read+0x350/0x960 [ 332.337646][ T7780] __vfs_read+0x67/0xc0 [ 332.341884][ T7780] vfs_read+0x143/0x2c0 [ 332.346035][ T7780] ksys_read+0xd5/0x1b0 [ 332.350191][ T7780] __x64_sys_read+0x4c/0x60 [ 332.354703][ T7780] do_syscall_64+0xcc/0x370 [ 332.359204][ T7780] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 332.365066][ T7780] [ 332.367375][ T7780] write to 0xffff8880a24b48e0 of 8 bytes by task 7780 on cpu 1: [ 332.375040][ T7780] flush_signal_handlers+0x6e/0xe0 [ 332.380128][ T7780] setup_new_exec+0x325/0x3d0 [ 332.384812][ T7780] load_elf_binary+0x78a/0x2ec0 [ 332.389640][ T7780] search_binary_handler+0x127/0x420 [ 332.394910][ T7780] __do_execve_file.isra.0+0xb76/0x11d0 [ 332.400433][ T7780] __x64_sys_execve+0x62/0x80 [ 332.405092][ T7780] do_syscall_64+0xcc/0x370 [ 332.409573][ T7780] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 332.415436][ T7780] [ 332.417740][ T7780] Reported by Kernel Concurrency Sanitizer on: [ 332.423869][ T7780] CPU: 1 PID: 7780 Comm: ifup Not tainted 5.4.0-syzkaller #0 [ 332.431226][ T7780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.441258][ T7780] ================================================================== [ 332.449311][ T7780] Kernel panic - not syncing: panic_on_warn set ... [ 332.455889][ T7780] CPU: 1 PID: 7780 Comm: ifup Not tainted 5.4.0-syzkaller #0 [ 332.463230][ T7780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.473361][ T7780] Call Trace: [ 332.476650][ T7780] dump_stack+0x11d/0x181 [ 332.480961][ T7780] panic+0x210/0x640 [ 332.484850][ T7780] ? vprintk_func+0x8d/0x140 [ 332.489448][ T7780] kcsan_report.cold+0xc/0xd [ 332.494031][ T7780] kcsan_setup_watchpoint+0x3fe/0x460 [ 332.499383][ T7780] __tsan_unaligned_write8+0xc4/0x100 [ 332.504735][ T7780] flush_signal_handlers+0x6e/0xe0 [ 332.509834][ T7780] setup_new_exec+0x325/0x3d0 [ 332.514501][ T7780] load_elf_binary+0x78a/0x2ec0 [ 332.519333][ T7780] ? __read_once_size.constprop.0+0x12/0x20 [ 332.525206][ T7780] ? __sanitizer_cov_trace_cmp8+0x11/0x20 [ 332.531002][ T7780] ? refcount_sub_and_test_checked+0xc8/0x190 [ 332.537050][ T7780] ? refcount_dec_and_test_checked+0x2c/0x40 [ 332.543009][ T7780] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 332.549249][ T7780] ? _raw_read_unlock+0x34/0x50 [ 332.554107][ T7780] search_binary_handler+0x127/0x420 [ 332.559393][ T7780] __do_execve_file.isra.0+0xb76/0x11d0 [ 332.564925][ T7780] __x64_sys_execve+0x62/0x80 [ 332.569582][ T7780] do_syscall_64+0xcc/0x370 [ 332.574076][ T7780] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 332.579952][ T7780] RIP: 0033:0x7f56e2fa4207 [ 332.584352][ T7780] Code: Bad RIP value. [ 332.588395][ T7780] RSP: 002b:00007ffebf114ba8 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 332.596782][ T7780] RAX: ffffffffffffffda RBX: 00000000007935f8 RCX: 00007f56e2fa4207 [ 332.604737][ T7780] RDX: 0000000000793618 RSI: 00000000007935f8 RDI: 0000000000793678 [ 332.612689][ T7780] RBP: 0000000000793678 R08: 0000000000793598 R09: 00007f56e301ba00 [ 332.620637][ T7780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000793618 [ 332.628586][ T7780] R13: 0000000000793618 R14: 0000000000000001 R15: 0000000000000000 [ 332.638033][ T7780] Kernel Offset: disabled [ 332.642355][ T7780] Rebooting in 86400 seconds..