Warning: Permanently added '10.128.0.159' (ECDSA) to the list of known hosts. 2020/01/09 14:55:05 fuzzer started 2020/01/09 14:55:07 dialing manager at 10.128.0.105:46059 2020/01/09 14:55:08 syscalls: 2812 2020/01/09 14:55:08 code coverage: enabled 2020/01/09 14:55:08 comparison tracing: enabled 2020/01/09 14:55:08 extra coverage: enabled 2020/01/09 14:55:08 setuid sandbox: enabled 2020/01/09 14:55:08 namespace sandbox: enabled 2020/01/09 14:55:08 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/09 14:55:08 fault injection: enabled 2020/01/09 14:55:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/09 14:55:08 net packet injection: enabled 2020/01/09 14:55:08 net device setup: enabled 2020/01/09 14:55:08 concurrency sanitizer: enabled 2020/01/09 14:55:08 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/01/09 14:55:10 adding functions to KCSAN blacklist: 'taskstats_exit' 'timer_clear_idle' 'ext4_nonda_switch' 'wbt_done' 'ext4_free_inodes_count' '__ext4_new_inode' '__send_signal' 'mod_timer' 'generic_write_end' 'ep_poll' 'tomoyo_supervisor' 'run_timer_softirq' 'copy_process' 'pcpu_alloc' 'tick_do_update_jiffies64' 'tick_sched_do_timer' '__hrtimer_run_queues' 'blk_stat_add' 'find_next_bit' 'do_signal_stop' 'alloc_empty_file' 'do_nanosleep' 14:55:25 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x1) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0xf8, 0xf8, 0xf8, 0x0, 0xf8, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@dev, @local, [], [], 'team_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) syzkaller login: [ 79.161322][ T8007] IPVS: ftp: loaded support on port[0] = 21 14:55:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r1 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r1, 0x40001) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x100000000002) [ 79.260566][ T8007] chnl_net:caif_netlink_parms(): no params data found [ 79.329333][ T8007] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.345690][ T8007] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.364807][ T8007] device bridge_slave_0 entered promiscuous mode [ 79.372716][ T8007] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.384803][ T8007] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.392584][ T8007] device bridge_slave_1 entered promiscuous mode 14:55:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) [ 79.426080][ T8010] IPVS: ftp: loaded support on port[0] = 21 [ 79.441427][ T8007] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.462020][ T8007] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.503258][ T8007] team0: Port device team_slave_0 added [ 79.526691][ T8007] team0: Port device team_slave_1 added [ 79.646485][ T8007] device hsr_slave_0 entered promiscuous mode 14:55:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@check_strict='check=strict'}]}) [ 79.705088][ T8007] device hsr_slave_1 entered promiscuous mode [ 79.788525][ T8013] IPVS: ftp: loaded support on port[0] = 21 [ 79.825887][ T8010] chnl_net:caif_netlink_parms(): no params data found [ 79.863402][ T8015] IPVS: ftp: loaded support on port[0] = 21 [ 79.928736][ T8010] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.935865][ T8010] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.943495][ T8010] device bridge_slave_0 entered promiscuous mode [ 79.953203][ T8010] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.961434][ T8010] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.970013][ T8010] device bridge_slave_1 entered promiscuous mode 14:55:26 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000100)={{0xffffff94}, {0xff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 80.046089][ T8007] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.109080][ T8007] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 80.198364][ T8010] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.260797][ T8013] chnl_net:caif_netlink_parms(): no params data found [ 80.269822][ T8007] netdevsim netdevsim0 netdevsim2: renamed from eth2 14:55:26 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) [ 80.326925][ T8007] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 80.368635][ T8010] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.391991][ T8017] IPVS: ftp: loaded support on port[0] = 21 [ 80.467921][ T8023] IPVS: ftp: loaded support on port[0] = 21 [ 80.476306][ T8010] team0: Port device team_slave_0 added [ 80.507401][ T8010] team0: Port device team_slave_1 added [ 80.513420][ T8015] chnl_net:caif_netlink_parms(): no params data found [ 80.536466][ T8013] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.548401][ T8013] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.556117][ T8013] device bridge_slave_0 entered promiscuous mode [ 80.564947][ T8013] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.572010][ T8013] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.579914][ T8013] device bridge_slave_1 entered promiscuous mode [ 80.667192][ T8010] device hsr_slave_0 entered promiscuous mode [ 80.725008][ T8010] device hsr_slave_1 entered promiscuous mode [ 80.764788][ T8010] debugfs: Directory 'hsr0' with parent '/' already present! [ 80.791072][ T8013] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.811360][ T8013] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.820505][ T8015] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.829333][ T8015] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.837155][ T8015] device bridge_slave_0 entered promiscuous mode [ 80.879443][ T8015] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.888490][ T8015] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.896195][ T8015] device bridge_slave_1 entered promiscuous mode [ 80.903000][ T8017] chnl_net:caif_netlink_parms(): no params data found [ 80.958412][ T8017] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.965620][ T8017] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.973505][ T8017] device bridge_slave_0 entered promiscuous mode [ 80.985834][ T8013] team0: Port device team_slave_0 added [ 80.997840][ T8015] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.010250][ T8015] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.027031][ T8017] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.034091][ T8017] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.042034][ T8017] device bridge_slave_1 entered promiscuous mode [ 81.051790][ T8013] team0: Port device team_slave_1 added [ 81.058254][ T8010] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.120849][ T8010] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.167370][ T8010] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.206940][ T8023] chnl_net:caif_netlink_parms(): no params data found [ 81.229175][ T8015] team0: Port device team_slave_0 added [ 81.236188][ T8015] team0: Port device team_slave_1 added [ 81.241914][ T8010] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 81.297231][ T8017] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.310323][ T8007] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.329723][ T8017] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.407099][ T8015] device hsr_slave_0 entered promiscuous mode [ 81.455120][ T8015] device hsr_slave_1 entered promiscuous mode [ 81.514822][ T8015] debugfs: Directory 'hsr0' with parent '/' already present! [ 81.567107][ T8013] device hsr_slave_0 entered promiscuous mode [ 81.605145][ T8013] device hsr_slave_1 entered promiscuous mode [ 81.645033][ T8013] debugfs: Directory 'hsr0' with parent '/' already present! [ 81.671215][ T8007] 8021q: adding VLAN 0 to HW filter on device team0 [ 81.685786][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 81.693639][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 81.721025][ T8017] team0: Port device team_slave_0 added [ 81.738094][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 81.746672][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 81.757404][ T3092] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.764486][ T3092] bridge0: port 1(bridge_slave_0) entered forwarding state [ 81.779323][ T8023] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.786469][ T8023] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.794383][ T8023] device bridge_slave_0 entered promiscuous mode [ 81.802563][ T8017] team0: Port device team_slave_1 added [ 81.813829][ T8025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 81.822227][ T8025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 81.830861][ T8025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 81.839765][ T8025] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.846925][ T8025] bridge0: port 2(bridge_slave_1) entered forwarding state [ 81.857872][ T8023] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.865772][ T8023] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.873440][ T8023] device bridge_slave_1 entered promiscuous mode [ 81.976720][ T8017] device hsr_slave_0 entered promiscuous mode [ 82.015357][ T8017] device hsr_slave_1 entered promiscuous mode [ 82.054950][ T8017] debugfs: Directory 'hsr0' with parent '/' already present! [ 82.062581][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 82.082751][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 82.091398][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 82.100096][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 82.108849][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 82.121217][ T8020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 82.130591][ T8020] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 82.140648][ T8023] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.172428][ T8007] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 82.184051][ T8007] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 82.197528][ T8023] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.212732][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 82.221358][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 82.230234][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 82.238824][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 82.247778][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 82.255580][ T8015] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 82.317967][ T8015] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 82.397369][ T8015] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 82.437719][ T8015] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 82.506344][ T8023] team0: Port device team_slave_0 added [ 82.513256][ T8023] team0: Port device team_slave_1 added [ 82.536131][ T8013] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 82.587631][ T8013] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 82.629444][ T8013] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 82.681994][ T8013] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 82.769229][ T8020] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 82.777644][ T8020] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 82.788219][ T8010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.802577][ T8007] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 82.836810][ T8023] device hsr_slave_0 entered promiscuous mode [ 82.885314][ T8023] device hsr_slave_1 entered promiscuous mode [ 82.934781][ T8023] debugfs: Directory 'hsr0' with parent '/' already present! [ 82.949649][ T8010] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.965925][ T8017] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 83.014783][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 83.022627][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.034509][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 83.043556][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.052324][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.059410][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.067834][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.081834][ T8017] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 83.131462][ T8025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 83.140308][ T8025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.149126][ T8025] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.156202][ T8025] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.163816][ T8025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 83.173024][ T8025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 83.182418][ T8017] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 83.242731][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 83.251768][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 83.263140][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 83.271869][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.280882][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 83.289374][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.297929][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 83.311593][ T8015] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.319240][ T8017] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 83.382962][ T8010] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 83.394092][ T8010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 83.408961][ T8023] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 83.480702][ T8023] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 83.517290][ T8020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 83.526443][ T8020] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.535063][ T8020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 83.542910][ T8020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.551847][ T8020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 83.560781][ T8020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 83.586118][ T8023] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 83.617012][ T8023] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 83.675613][ T8015] 8021q: adding VLAN 0 to HW filter on device team0 [ 83.691834][ T8010] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 83.703884][ T8025] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 83.711903][ T8025] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 83.719741][ T8025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 83.728071][ T8025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.737742][ T8025] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.745581][ T8025] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 83.755490][ T8007] device veth0_vlan entered promiscuous mode [ 83.770325][ T8007] device veth1_vlan entered promiscuous mode [ 83.777759][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 83.785963][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 83.794614][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.803211][ T3092] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.810261][ T3092] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.818211][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 83.826867][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.835335][ T3092] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.843303][ T3092] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.865150][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.893653][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 83.916292][ T8013] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.941174][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 83.950070][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 83.958858][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 83.967647][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 83.976463][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.990171][ T8015] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 84.001506][ T8015] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 84.021439][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 84.029623][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 84.037991][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 84.046810][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 84.055286][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 84.063653][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 84.072314][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 84.080940][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 84.088496][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 84.107322][ T8023] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.114590][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 84.122354][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 84.130031][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 84.143927][ T8017] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.154021][ T8013] 8021q: adding VLAN 0 to HW filter on device team0 [ 84.163454][ T8015] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 84.181212][ T8010] device veth0_vlan entered promiscuous mode [ 84.209184][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 84.218828][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.227806][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 84.236527][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 84.248740][ T26] bridge0: port 1(bridge_slave_0) entered blocking state 14:55:30 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x1) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0xf8, 0xf8, 0xf8, 0x0, 0xf8, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@dev, @local, [], [], 'team_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) [ 84.255819][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 84.264370][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 84.276728][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 84.288337][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.295560][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.303452][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 84.316390][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 84.331723][ T8010] device veth1_vlan entered promiscuous mode [ 84.344490][ T8017] 8021q: adding VLAN 0 to HW filter on device team0 14:55:30 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x1) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0xf8, 0xf8, 0xf8, 0x0, 0xf8, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@dev, @local, [], [], 'team_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) [ 84.366001][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.373790][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.384064][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 84.393863][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 84.402400][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 84.410615][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 84.421975][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 84.430279][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 84.438610][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 84.447907][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 84.457303][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 14:55:30 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x1) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0xf8, 0xf8, 0xf8, 0x0, 0xf8, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@dev, @local, [], [], 'team_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) [ 84.469883][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 84.479028][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 84.487882][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 84.505572][ T8023] 8021q: adding VLAN 0 to HW filter on device team0 [ 84.515967][ T8013] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 84.538252][ T8013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 14:55:31 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x1) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0xf8, 0xf8, 0xf8, 0x0, 0xf8, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@dev, @local, [], [], 'team_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) [ 84.574849][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 84.589442][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 84.609925][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 14:55:31 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x1) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0xf8, 0xf8, 0xf8, 0x0, 0xf8, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@dev, @local, [], [], 'team_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) [ 84.628828][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 84.645478][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.652716][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 84.660758][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 84.669308][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 84.685393][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 84.694255][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 84.710430][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 84.719187][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 14:55:31 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x1) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0xf8, 0xf8, 0xf8, 0x0, 0xf8, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@dev, @local, [], [], 'team_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) [ 84.728609][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 84.737650][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 84.746394][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.753453][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.761645][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 84.770904][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 84.779995][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 84.788757][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 84.797358][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.804413][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 84.812627][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 84.821370][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 14:55:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000c8d000)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000000101010074b3000000000000000000000c00120008000100df21f402"], 0x20}}, 0x0) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) [ 84.832231][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.839379][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.849837][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 84.858885][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 84.867854][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 84.876973][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 84.889883][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 84.898652][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 84.910241][ T8015] device veth0_vlan entered promiscuous mode [ 84.931323][ T8023] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 84.970519][ T8023] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 84.986617][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 84.997740][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.005786][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 85.014534][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 85.026236][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 85.034314][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 85.042953][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 85.049156][ T8056] netlink: 'syz-executor.0': attribute type 18 has an invalid length. [ 85.052212][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 85.068040][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 85.076847][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 85.088660][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 85.097288][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 85.105813][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 85.114082][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 85.122511][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 85.156169][ T8017] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 85.169244][ T8017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 85.177127][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 85.185464][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 85.193438][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 85.201044][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 85.208707][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 85.217349][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 85.229169][ T8013] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 85.244446][ T8015] device veth1_vlan entered promiscuous mode 14:55:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r1 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r1, 0x40001) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x100000000002) [ 85.274095][ T8025] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 85.288353][ T8025] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 85.297622][ T8025] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 85.306689][ T8025] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 85.315976][ T8023] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 85.356228][ T8017] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 85.364422][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 85.379474][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 85.398253][ T8013] device veth0_vlan entered promiscuous mode [ 85.414000][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 85.428301][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 85.448805][ T8013] device veth1_vlan entered promiscuous mode [ 85.485215][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.493091][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 85.520788][ T3092] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 85.579086][ T8020] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 85.588940][ T8020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 85.600267][ T8077] ISOFS: Unable to identify CD-ROM format. [ 85.610793][ T8020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 85.627362][ T8023] device veth0_vlan entered promiscuous mode [ 85.650767][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 85.661889][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 85.670881][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 85.680083][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 85.723548][ T8023] device veth1_vlan entered promiscuous mode [ 85.744779][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.764490][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 85.766618][ C1] hrtimer: interrupt took 40701 ns [ 85.776713][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 85.794339][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 85.812193][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 85.828898][ T8017] device veth0_vlan entered promiscuous mode [ 85.848442][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 85.861122][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.872704][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 85.883802][ T8017] device veth1_vlan entered promiscuous mode [ 85.998365][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 86.009961][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 14:55:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r1 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r1, 0x40001) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x100000000002) 14:55:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000c8d000)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000000101010074b3000000000000000000000c00120008000100df21f402"], 0x20}}, 0x0) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) 14:55:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@check_strict='check=strict'}]}) 14:55:32 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000100)={{0xffffff94}, {0xff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 14:55:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 14:55:32 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) [ 86.261223][ T8096] ISOFS: Unable to identify CD-ROM format. [ 86.341460][ T8105] netlink: 'syz-executor.0': attribute type 18 has an invalid length. 14:55:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@check_strict='check=strict'}]}) 14:55:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r1 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r1, 0x40001) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x100000000002) 14:55:32 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 14:55:32 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000100)={{0xffffff94}, {0xff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 86.606465][ T8115] ISOFS: Unable to identify CD-ROM format. 14:55:33 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000100)={{0xffffff94}, {0xff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 14:55:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000c8d000)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000000101010074b3000000000000000000000c00120008000100df21f402"], 0x20}}, 0x0) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) 14:55:33 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 14:55:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 14:55:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@check_strict='check=strict'}]}) 14:55:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) [ 87.003257][ T8139] netlink: 'syz-executor.0': attribute type 18 has an invalid length. [ 87.228446][ T8142] ISOFS: Unable to identify CD-ROM format. [ 87.238682][ T27] audit: type=1326 audit(1578581733.700:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8145 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45dd8a code=0x50000 14:55:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 14:55:33 executing program 5: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="0a48000035000505d25a80648c63940d0124fc600c0010400a000000053582c137153e370907018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:55:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000c8d000)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000000101010074b3000000000000000000000c00120008000100df21f402"], 0x20}}, 0x0) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) [ 87.401767][ T27] audit: type=1326 audit(1578581733.700:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8145 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45af49 code=0x50000 [ 87.464146][ T8154] netlink: 16602 bytes leftover after parsing attributes in process `syz-executor.5'. [ 87.519901][ T8154] netlink: zone id is out of range [ 87.536047][ T8160] netlink: 'syz-executor.0': attribute type 18 has an invalid length. [ 87.562217][ T8154] netlink: zone id is out of range [ 87.587877][ T27] audit: type=1326 audit(1578581733.700:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8145 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45af49 code=0x50000 [ 87.650586][ T8162] netlink: 16602 bytes leftover after parsing attributes in process `syz-executor.5'. [ 87.665310][ T8162] netlink: zone id is out of range [ 87.670659][ T8162] netlink: zone id is out of range 14:55:34 executing program 3: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x840000000002, 0x3, 0xff) r1 = socket(0x0, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0x78, "48d023ecf5bca701d20a8f86c850713cae1181edf3394538af64b955e913b67729291e43c09e316eb97176cf8b15c7745c5af13ea75fa6e0303f9c43067242a2db208e8dccc6a2548f525de9dae984cb7e7a34fef2145f1ea2fa8ef8965a7cf501c9d2a69a11a4e30db16618431f1be35ff69201e1a4c376"}, &(0x7f00000002c0)=0x80) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000300)={r2, 0x1}, &(0x7f0000000340)=0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x1, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x484c0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f00000003c0)=@gcm_256={{0x7}, "e1a6555de5740775", "cd17bb3624520076c8b655aa7ea09212bb5211c82a4a0a880218d319586c6a4e", "9c26edd8", "0f9165c4fbcfa252"}, 0x38) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) bind$packet(r6, &(0x7f0000000200)={0x11, 0x0, r7}, 0x14) setsockopt$packet_int(r6, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x1, &(0x7f0000000100)=0x0) io_submit(r8, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r6, &(0x7f0000000080), 0x101b2}]) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r6, 0x6, 0x21, &(0x7f0000000280)="b2684f4be3ff9de00552c9a5c09a5b6b", 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000001c0)}}, 0x0, 0xffffffffffffffff, r3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010300"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000400)=0x1f, 0x4) syz_open_dev$sndpcmc(&(0x7f0000003540)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40802) socket(0x10, 0x0, 0x8) 14:55:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) [ 87.752229][ T27] audit: type=1326 audit(1578581733.700:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8145 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=16 compat=0 ip=0x45adb7 code=0x50000 14:55:34 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0xda7, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000080)={0x1}) [ 87.876239][ T8165] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 14:55:34 executing program 5: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="0a48000035000505d25a80648c63940d0124fc600c0010400a000000053582c137153e370907018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 87.930501][ T27] audit: type=1326 audit(1578581733.700:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8145 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=16 compat=0 ip=0x45adb7 code=0x50000 14:55:34 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0xda7, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000080)={0x1}) [ 88.100704][ T8178] netlink: 16602 bytes leftover after parsing attributes in process `syz-executor.5'. [ 88.121886][ T27] audit: type=1326 audit(1578581733.700:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8145 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=4 compat=0 ip=0x45a265 code=0x50000 [ 88.126260][ T8178] netlink: zone id is out of range 14:55:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) [ 88.189510][ T8178] netlink: zone id is out of range [ 88.197593][ T27] audit: type=1326 audit(1578581733.700:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8145 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=88 compat=0 ip=0x45ac77 code=0x50000 14:55:34 executing program 3: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x840000000002, 0x3, 0xff) r1 = socket(0x0, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0x78, "48d023ecf5bca701d20a8f86c850713cae1181edf3394538af64b955e913b67729291e43c09e316eb97176cf8b15c7745c5af13ea75fa6e0303f9c43067242a2db208e8dccc6a2548f525de9dae984cb7e7a34fef2145f1ea2fa8ef8965a7cf501c9d2a69a11a4e30db16618431f1be35ff69201e1a4c376"}, &(0x7f00000002c0)=0x80) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000300)={r2, 0x1}, &(0x7f0000000340)=0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x1, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x484c0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f00000003c0)=@gcm_256={{0x7}, "e1a6555de5740775", "cd17bb3624520076c8b655aa7ea09212bb5211c82a4a0a880218d319586c6a4e", "9c26edd8", "0f9165c4fbcfa252"}, 0x38) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) bind$packet(r6, &(0x7f0000000200)={0x11, 0x0, r7}, 0x14) setsockopt$packet_int(r6, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x1, &(0x7f0000000100)=0x0) io_submit(r8, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r6, &(0x7f0000000080), 0x101b2}]) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r6, 0x6, 0x21, &(0x7f0000000280)="b2684f4be3ff9de00552c9a5c09a5b6b", 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000001c0)}}, 0x0, 0xffffffffffffffff, r3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010300"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000400)=0x1f, 0x4) syz_open_dev$sndpcmc(&(0x7f0000003540)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40802) socket(0x10, 0x0, 0x8) 14:55:34 executing program 5: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="0a48000035000505d25a80648c63940d0124fc600c0010400a000000053582c137153e370907018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 88.308996][ T27] audit: type=1326 audit(1578581733.700:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8145 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=4 compat=0 ip=0x45a265 code=0x50000 [ 88.374883][ T8187] netlink: 16602 bytes leftover after parsing attributes in process `syz-executor.5'. [ 88.391270][ T27] audit: type=1326 audit(1578581733.700:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8145 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45dd8a code=0x50000 [ 88.422173][ T8187] netlink: zone id is out of range [ 88.427788][ T8187] netlink: zone id is out of range [ 88.433611][ T27] audit: type=1326 audit(1578581733.700:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8145 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45dd8a code=0x50000 [ 88.707905][ T8146] ================================================================== [ 88.716059][ T8146] BUG: KCSAN: data-race in audit_log_start / skb_dequeue [ 88.723167][ T8146] [ 88.725504][ T8146] write to 0xffffffff8624d660 of 4 bytes by task 27 on cpu 1: [ 88.732969][ T8146] skb_dequeue+0x84/0x150 [ 88.737307][ T8146] kauditd_send_queue+0x3e/0x220 [ 88.742244][ T8146] kauditd_thread+0x483/0x560 [ 88.746921][ T8146] kthread+0x1d4/0x200 [ 88.750991][ T8146] ret_from_fork+0x1f/0x30 [ 88.755417][ T8146] [ 88.757754][ T8146] read to 0xffffffff8624d660 of 4 bytes by task 8146 on cpu 0: [ 88.765298][ T8146] audit_log_start+0xf9/0x610 [ 88.769988][ T8146] audit_seccomp+0x54/0x1a0 [ 88.774534][ T8146] __seccomp_filter+0x6ac/0xf30 [ 88.779382][ T8146] __secure_computing+0xb4/0x210 [ 88.784321][ T8146] syscall_trace_enter+0x215/0x740 [ 88.789694][ T8146] do_syscall_64+0x2bf/0x3a0 [ 88.794307][ T8146] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 88.800193][ T8146] [ 88.802562][ T8146] Reported by Kernel Concurrency Sanitizer on: [ 88.808719][ T8146] CPU: 0 PID: 8146 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 88.817301][ T8146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.827348][ T8146] ================================================================== [ 88.835405][ T8146] Kernel panic - not syncing: panic_on_warn set ... [ 88.842015][ T8146] CPU: 0 PID: 8146 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 88.850600][ T8146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.860643][ T8146] Call Trace: [ 88.863944][ T8146] dump_stack+0x11d/0x181 [ 88.868288][ T8146] panic+0x210/0x640 [ 88.872187][ T8146] ? vprintk_func+0x8d/0x140 [ 88.876792][ T8146] kcsan_report.cold+0xc/0xd [ 88.881414][ T8146] kcsan_setup_watchpoint+0x3fe/0x460 [ 88.886817][ T8146] __tsan_read4+0xc6/0x100 [ 88.891238][ T8146] audit_log_start+0xf9/0x610 [ 88.895928][ T8146] ? audit_log_end+0xfe/0x240 [ 88.900622][ T8146] audit_seccomp+0x54/0x1a0 [ 88.905136][ T8146] __seccomp_filter+0x6ac/0xf30 [ 88.910021][ T8146] ? debug_smp_processor_id+0x3e/0x137 [ 88.915499][ T8146] ? kcsan_setup_watchpoint+0x1d4/0x460 [ 88.921056][ T8146] __secure_computing+0xb4/0x210 [ 88.926032][ T8146] syscall_trace_enter+0x215/0x740 [ 88.931285][ T8146] do_syscall_64+0x2bf/0x3a0 [ 88.935914][ T8146] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 88.941817][ T8146] RIP: 0033:0x45af49 [ 88.945726][ T8146] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 88.965373][ T8146] RSP: 002b:00007f578fec8cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 88.973929][ T8146] RAX: 0000000000000000 RBX: 000000000075bf28 RCX: 000000000045af49 [ 88.981906][ T8146] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bf28 [ 88.989889][ T8146] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 88.997871][ T8146] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf2c [ 89.005849][ T8146] R13: 00007ffc132eba3f R14: 00007f578fec99c0 R15: 000000000075bf2c [ 89.015252][ T8146] Kernel Offset: disabled [ 89.019613][ T8146] Rebooting in 86400 seconds..