[ 41.167831] audit: type=1800 audit(1572720279.974:32): pid=7511 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 46.073862] kauditd_printk_skb: 2 callbacks suppressed [ 46.073876] audit: type=1400 audit(1572720284.954:35): avc: denied { map } for pid=7684 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.1.2' (ECDSA) to the list of known hosts. 2019/11/02 18:44:51 fuzzer started [ 52.779927] audit: type=1400 audit(1572720291.664:36): avc: denied { map } for pid=7693 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/11/02 18:44:53 dialing manager at 10.128.0.105:35209 2019/11/02 18:44:53 syscalls: 2532 2019/11/02 18:44:53 code coverage: enabled 2019/11/02 18:44:53 comparison tracing: enabled 2019/11/02 18:44:53 extra coverage: extra coverage is not supported by the kernel 2019/11/02 18:44:53 setuid sandbox: enabled 2019/11/02 18:44:53 namespace sandbox: enabled 2019/11/02 18:44:53 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/02 18:44:53 fault injection: enabled 2019/11/02 18:44:53 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/02 18:44:53 net packet injection: enabled 2019/11/02 18:44:53 net device setup: enabled 2019/11/02 18:44:53 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 18:47:46 executing program 0: r0 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e21, @local}}, 0x0, 0x8000, 0x0, "9fab0bb768a86274c067d878eaa37de6c3d987066764ccf0f06e02ebbfdbf1d8bfad1607659f4e874cc12b4746c3ba8a44fca7ee580b305a782054cc6bae0a4399e9601f7a51ae8ab54b4c7952a9c859"}, 0xd8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0x7, 0x7}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e22, 0x2b, @mcast1, 0x1ff}}, [0xfffffffffffff000, 0x0, 0x100000000, 0x20, 0x3, 0xf2, 0x800, 0x2, 0x1, 0x2, 0x3, 0x4, 0x4, 0x400, 0x800]}, &(0x7f0000000280)=0x100) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f00000002c0)) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x80000001) r3 = syz_open_dev$adsp(&(0x7f0000000340)='/dev/adsp#\x00', 0xa9f, 0x100) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x90, r4, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x1eb, 0x0, 0x0, 0x2ef8]}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x10001, 0x10000, 0x5, 0x3f]}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x400, 0x4000, 0x3, 0x2]}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x5, 0x896, 0x9, 0xffffffc1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xffff}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_ALGID={0x8}]}, 0x90}, 0x1, 0x0, 0x0, 0x20000000}, 0x400b0c1) faccessat(r3, &(0x7f0000000540)='./file0\x00', 0x0, 0x0) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self\x00', 0x101000, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f00000005c0)) ioctl$TIOCGICOUNT(r3, 0x545d, 0x0) r6 = syz_open_dev$vcsn(&(0x7f0000000600)='/dev/vcs#\x00', 0x20, 0x4000) getsockopt$netrom_NETROM_T1(r6, 0x103, 0x1, &(0x7f0000000640), &(0x7f0000000680)=0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f00000006c0)={0x7, 0x40, 0x0, 0x4, 0x4}, 0x14) r7 = openat(0xffffffffffffffff, &(0x7f0000000700)='./file0\x00', 0x8c00, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f00000007c0)={r7, 0xffffffffffffffff, 0x3, 0x5f, &(0x7f0000000740)="f45dcceaa1bc14f703b11cf31aa027c0ad62b33c7904c7fa1f272f894ab6eec3a0539522c21ae172db67ce4009c9c1303638e8f5623e57192aacfd997a0ebb6263e498950dd735e29c59e4a85b9f7b65c7b230c8cc3465d8c7b14574c3d239", 0x5, 0x2, 0x81, 0x5, 0x7f, 0x2, 0x1, 'syz1\x00'}) r8 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000880)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r8, 0x29, 0x30, &(0x7f00000008c0)={0x0, {{0xa, 0x4e20, 0x35, @dev={0xfe, 0x80, [], 0x20}, 0x5}}, 0x0, 0x2, [{{0xa, 0x4e22, 0x1, @mcast1}}, {{0xa, 0x4e20, 0x7, @remote, 0x71b}}]}, 0x190) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000a80)) r9 = syz_open_dev$amidi(&(0x7f0000000ac0)='/dev/amidi#\x00', 0x1, 0x420040) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r9, 0x40405515, &(0x7f0000000b00)={0x0, 0x6, 0x40, 0x80, 'syz1\x00', 0x6}) r10 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000b40)='/selinux/status\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r10, 0x4c09, 0x5) r11 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/capi/capi20ncci\x00', 0x103800, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000bc0)={0x0, 0x2}, &(0x7f0000000c00)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r11, 0x84, 0x7b, &(0x7f0000000c40)={r12, 0x6}, 0x8) [ 227.373814] audit: type=1400 audit(1572720466.254:37): avc: denied { map } for pid=7711 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1055 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 227.467982] IPVS: ftp: loaded support on port[0] = 21 18:47:46 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x840, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x30, &(0x7f0000000040)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e23, @multicast1}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={r1, 0x2c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x2, @ipv4={[], [], @broadcast}, 0x101}, @in={0x2, 0x4e22, @multicast2}]}, &(0x7f0000000180)=0x10) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f00000001c0)={0x6, {{0x2, 0x4e24, @empty}}}, 0x88) pipe(&(0x7f0000000280)) socketpair(0xa, 0x2, 0x6, &(0x7f00000002c0)={0xffffffffffffffff}) recvfrom$x25(r2, &(0x7f0000000300)=""/114, 0x72, 0x40000000, &(0x7f0000000380)={0x9, @null=' \x00'}, 0x12) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x40, 0x0) recvfrom$rxrpc(r3, &(0x7f0000000400)=""/13, 0xd, 0x2000, &(0x7f0000000440)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x95, @empty, 0x9}}, 0x24) keyctl$join(0x1, &(0x7f0000000480)={'syz', 0x3}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.stat\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) sendto$isdn(r2, &(0x7f0000000500)={0x8, 0xd47d}, 0x8, 0x20000000, &(0x7f0000000540)={0x22, 0xb2, 0x0, 0x9, 0x1}, 0x6) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x10040, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r5, 0xc040564b, &(0x7f00000005c0)={0x6, 0x0, 0x1004, 0x81, 0x2, {0x7f, 0x1f}}) r6 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/mls\x00', 0x0, 0x0) ioctl$TCSBRKP(r6, 0x5425, 0x3) bind$inet(r0, &(0x7f0000000640)={0x2, 0x4e21, @broadcast}, 0x10) ioctl$TIOCGISO7816(r3, 0x80285442, &(0x7f0000000680)) ioctl$SIOCGSTAMP(r3, 0x8906, &(0x7f00000006c0)) r7 = syz_open_dev$vcsa(&(0x7f0000000700)='/dev/vcsa#\x00', 0x4, 0x480080) write$UHID_INPUT2(r7, &(0x7f0000000740)={0xc, 0xef, "fc7198e33f088845cdcf5a758c1f7b8d8e2b05e0159a2eb3bf07d8075da37767a4ce0d30dcd49f418ac6427c191f6f431e058c29d86d8f8d609c95e46d5697b15f51b835afd40d7fedecda4035a8c7b526ee8532b65fe7201081a4e8de35f58293d5d92142e092ac99fa1398599a9ae6154cb0156a4a77b926ecd40ad4962f771b377cb7cecadd7f662722d649ddedc413331e3ef6af87258c76082ef79b6764cf7ba85b3fc02a6eb33cfdffa2ab48aaac27b0561b33a654fec5b624376049348ffbb1d2dc1f7debeb0609fa0d61466b2f18cd0e644bc034f664661999f107c723f79f63be7491aa0324e19ca25aa1"}, 0xf5) r8 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/mls\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000880)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r8, &(0x7f0000000900)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x10000, @loopback, 0x1000}, {0xa, 0x4e21, 0x800, @local, 0x81}, r9, 0xffff}}, 0x48) r10 = syz_open_dev$cec(&(0x7f0000000a40)='/dev/cec#\x00', 0x2, 0x2) ioctl$sock_inet6_udp_SIOCINQ(r10, 0x541b, &(0x7f0000000a80)) r11 = socket$l2tp(0x18, 0x1, 0x1) r12 = socket$bt_cmtp(0x1f, 0x3, 0x5) connect$l2tp(r11, &(0x7f0000000ac0)=@pppol2tp={0x18, 0x1, {0x0, r12, {0x2, 0x4e22, @broadcast}, 0x0, 0x2, 0x2, 0x4}}, 0x26) [ 227.572952] chnl_net:caif_netlink_parms(): no params data found [ 227.657528] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.680443] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.689589] device bridge_slave_0 entered promiscuous mode [ 227.710367] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.716840] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.741421] device bridge_slave_1 entered promiscuous mode [ 227.763245] IPVS: ftp: loaded support on port[0] = 21 [ 227.781817] bond0: Enslaving bond_slave_0 as an active interface with an up link 18:47:46 executing program 2: r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000003, r0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000040)={0x400, 0x6, 0x8, 0x7}) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x11, 0x110, r2, 0x5bc7c000) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1, 0xc, &(0x7f00000000c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @alu={0x4, 0x0, 0x1, 0x3, 0xe, 0xa6b62de8a4b98cb1, 0xfffffffffffffffc}, @alu={0x7, 0x1, 0xc, 0x5, 0xa, 0xc, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @alu={0x3, 0x1, 0xc, 0xa, 0x7, 0x8, 0xffffffffffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x20}, @map={0x18, 0x5, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x28}, @generic={0x3, 0x0, 0x6, 0x8000}], &(0x7f0000000140)='GPL\x00', 0xb59, 0x91, &(0x7f0000000180)=""/145, 0x20880, 0xeb7218b7c76b6880, [], 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xc, 0x1000, 0x9}, 0x10}, 0x70) write(r3, &(0x7f0000000340)="3f66b66a3913bc9d571ab28c094b69da6c2af77231c63daa06237cfcaa705c7fae9da1da3c025d5a46442909e87ec2137346065e999932cac3879c37cb5d058dc7c52d625cda048172e0043b99b7c5048b79071ec1def611849ba8d0f79335a71da290d1e1838e44aff1938c54569d59a7ba86699385c8feade5e6f579bf15f283e0c4e56f454de77ba1595e3e", 0x8d) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xd, &(0x7f0000000440)={0x2, &(0x7f0000000400)=[{0x1, 0x8, 0x0, 0x101}, {0x37, 0x20, 0x6, 0x1}]}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x1, 0x3, 0x72b, 0x80000001, 0x94}, &(0x7f00000004c0)=0x14) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000500)={r4, @in={{0x2, 0x4e22, @loopback}}, [0xfffffffffffffff8, 0x1, 0x0, 0x8, 0x1ff, 0x200, 0x4, 0x800, 0x7f, 0x0, 0x2, 0x4, 0x0, 0x6]}, &(0x7f0000000600)=0x100) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r5, 0x2287, &(0x7f0000000680)=0xb9a1) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/hwrng\x00', 0x40, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r6, 0x40086200, &(0x7f0000000700)=0x7) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/checkreqprot\x00', 0x400, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000007c0)={0x7, &(0x7f0000000780)=[{}, {}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r7, 0xc010641d, &(0x7f0000000840)={r8, &(0x7f0000000800)=""/2}) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000880)={'ifb0\x00', 0x6}) ioctl$RNDADDTOENTCNT(r5, 0x40045201, &(0x7f00000008c0)=0x3ff) fstat(r1, &(0x7f0000000900)) r9 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000980)='/dev/dlm-monitor\x00', 0x2233c3166f9c6e54, 0x0) write$nbd(r9, &(0x7f00000009c0)={0x67446698, 0x1, 0x2, 0x4, 0x1, "ddd04807fc2ae26fd93c8a48f09f30044b0b55d379cdc000e3400e3a5976c1e49ff379e17c8da0e464b1eb9e3f719bfdd02bfd19ab27ecb4d1737e660b762e79cf3f4adc51499a730a34d901275c42d7d66fdf7dd1fca8055d4736e6dd7434e8cd1c7eb9d0600b81d8ec4705b92a434741f2a21f7f37aa0b70cdae821a9d179f11992b4da2a81e7c73048aa5b5ff82fac6fdd6adc52eec17c0685991229b5efeb94dbea4682da3a52f19979fe7668d7f8c55f6df61aa68979fa93f301f70121d52f1cd718b303a4cd8afce"}, 0xdb) setsockopt$inet_dccp_int(r2, 0x21, 0x4, &(0x7f0000000ac0)=0xff, 0x4) r10 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$KVM_GET_PIT2(r10, 0x8070ae9f, &(0x7f0000000b40)) r11 = syz_open_dev$dspn(&(0x7f0000000bc0)='/dev/dsp#\x00', 0x20, 0x44240) recvfrom$ax25(r11, &(0x7f0000000c00)=""/91, 0x5b, 0x0, &(0x7f0000000c80)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000d00)) r12 = openat$null(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/null\x00', 0x40000, 0x0) r13 = syz_genetlink_get_family_id$nbd(&(0x7f0000000dc0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f0000000e80)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000e40)={&(0x7f0000000e00)={0x20, r13, 0x2, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) [ 227.807109] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 227.863326] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 227.871360] team0: Port device team_slave_0 added [ 227.887081] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 227.896402] team0: Port device team_slave_1 added [ 227.914909] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 227.961666] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 18:47:46 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth0\x00', {0x2, 0x4e21, @multicast2}}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x0, {0xffffffff, 0xffffff7f, "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", 0xa3, 0x7, 0x4, 0x1, 0x4, 0x20, 0x7f}, r2}}, 0x128) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x400e80, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x3f}, &(0x7f00000002c0)=0x8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r4, 0x660c) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000300)={0x7ff}) r5 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x6, 0x40000) ioctl$VIDIOC_ENUM_FMT(r5, 0xc0405602, &(0x7f00000003c0)={0x4, 0x3, 0x0, "7e7f0131be5ace871e709bed5ce1bdac2a65c8db5b8d82cbbca4e4f44fe429a8", 0x38303553}) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/73) r6 = syz_open_dev$mouse(&(0x7f0000000480)='/dev/input/mouse#\x00', 0x703, 0x30801) ioctl$SNDRV_TIMER_IOCTL_STOP(r6, 0x54a1) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r7, 0xc0945662, &(0x7f0000000500)={0x9, 0x0, [], {0x8f57326ae07d6ddf, @reserved}}) r8 = openat(0xffffffffffffff9c, &(0x7f00000005c0)='./file0\x00', 0x110040, 0x10) ioctl$PPPIOCSFLAGS(r8, 0x40047459, &(0x7f0000000600)=0x2400002) r9 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x8}}, 0x5, 0x200, 0x0, 0x7, 0x8}, &(0x7f0000000740)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r9, 0x84, 0x11, &(0x7f0000000780)={r10, 0x534}, &(0x7f00000007c0)=0x8) r11 = dup3(r9, r6, 0x0) write$9p(r11, &(0x7f0000000800)="0f5d1079860d66925057f71bc9e7c6d803511fe001e54c2b2627789d9d81935f48bc5485a3c11fa8b453242120e2345518c4235a79f68a56be7ed8835de9573297defde998422a9a09c4afff58bc737592c0136b89", 0x55) syncfs(r7) r12 = syz_open_dev$radio(&(0x7f0000000880)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r12, 0xc0205648, &(0x7f0000000900)={0x60000, 0x0, 0x2, [], &(0x7f00000008c0)={0x9a0907, 0x5, [], @ptr=0x412d8722}}) write$binfmt_aout(r6, &(0x7f0000000940)={{0x107, 0x6, 0xe5, 0x2b6, 0x341, 0x0, 0xb9, 0x200}, "465308703a461a0ac281a27fd95df3d3c8d028c173567a20668cddd371ccf64a0ce7d7553db8553cad021a19310eca95459c98f8f8e7d03777525afc8cdc9049ed4830fd5d9131ce4662ac8e4e3a972f3b14a46003961fc65143f7a6a885799fbc289e30ae4932cfdbe2e856e1e9e8142675b51cf372285cd7e8", [[], [], [], [], [], [], [], [], []]}, 0x99a) r13 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001300)='/dev/dsp\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r13, 0xc02c5341, &(0x7f0000001340)) [ 228.043462] device hsr_slave_0 entered promiscuous mode [ 228.100713] device hsr_slave_1 entered promiscuous mode [ 228.147359] IPVS: ftp: loaded support on port[0] = 21 [ 228.156168] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 228.170844] chnl_net:caif_netlink_parms(): no params data found [ 228.187088] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 228.202809] IPVS: ftp: loaded support on port[0] = 21 18:47:47 executing program 4: getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000080)=0x80) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x7fff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000140)={r1, @in={{0x2, 0x4e23, @local}}, [0x10001, 0xfffffffffffffff7, 0x316d, 0xffffffffffffffff, 0x9, 0x0, 0x245c, 0x9, 0x9, 0x5, 0x3, 0x6, 0x0, 0x9, 0x9]}, &(0x7f0000000240)=0x100) lsetxattr$trusted_overlay_origin(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) r3 = syz_open_dev$vcsn(&(0x7f00000039c0)='/dev/vcs#\x00', 0x3, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000003a00)={0x0, 0x7c, "8a9955f67e1e7c2d4d1281342ab8bf133741c21d98b971a7c520667e648c5d0205e79bd8a5dc97a33c0ffae7884bb056e94e7119f2cf624c02090ed7dd20a5acff9b25cb14f7ca571395767e0a481db38afda495000fdcbbd0c336ea4de0560e5da0e2183c9d195f38ef0ec88ac0d930df59aecd0efe9fe59486b90a"}, &(0x7f0000003ac0)=0x84) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000003b00)={r4, 0x5}, 0x8) truncate(&(0x7f0000003b40)='./file0\x00', 0x401) socketpair(0xa, 0x800, 0x0, &(0x7f0000003b80)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000003bc0)={r2, 0x1, 0x10}, &(0x7f0000003c00)=0xc) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, &(0x7f0000003c40)=0x6) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000003c80)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000003cc0)={0x0, 0x8}, &(0x7f0000003d00)=0x8) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/dlm-control\x00', 0x100, 0x0) bind$rxrpc(r0, &(0x7f0000003d80)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e24, @local}}, 0x24) r7 = socket$caif_seqpacket(0x25, 0x5, 0x2) ioctl$sock_inet_SIOCSIFNETMASK(r7, 0x891c, &(0x7f0000003dc0)={'ipddp0\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}) utime(&(0x7f0000003e00)='./file0\x00', &(0x7f0000003e40)={0x4, 0x9}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003e80)={0xffffffffffffffff}) getsockopt$sock_linger(r8, 0x1, 0xd, &(0x7f0000003ec0), &(0x7f0000003f00)=0x8) arch_prctl$ARCH_SET_GS(0x1001, 0x2) lsetxattr$security_selinux(&(0x7f0000003f40)='./file0\x00', &(0x7f0000003f80)='security.selinux\x00', &(0x7f0000003fc0)='system_u:object_r:udev_rules_t:s0\x00', 0x22, 0x2) r9 = openat$null(0xffffffffffffff9c, &(0x7f0000004000)='/dev/null\x00', 0x702400, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r9, 0x84, 0x1e, &(0x7f0000004040), 0x4) r10 = socket$can_bcm(0x1d, 0x2, 0x2) fsetxattr$security_ima(r10, &(0x7f0000004080)='security.ima\x00', &(0x7f00000040c0)=@md5={0x1, "7d664148db7e6409c16661fa9c2697fc"}, 0x11, 0x6) r11 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000004100)='/selinux/policy\x00', 0x0, 0x0) r12 = syz_genetlink_get_family_id$fou(&(0x7f0000004180)='fou\x00') sendmsg$FOU_CMD_ADD(r11, &(0x7f0000004240)={&(0x7f0000004140)={0x10, 0x0, 0x0, 0x80000001}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x30, r12, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @mcast1}, @FOU_ATTR_AF={0x8, 0x2, 0x3}]}, 0x30}, 0x1, 0x0, 0x0, 0x801}, 0x8084) accept4(r0, 0x0, &(0x7f0000004280), 0x80000) [ 228.248937] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.255541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.262762] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.269123] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.432832] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.434620] IPVS: ftp: loaded support on port[0] = 21 [ 228.439883] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.453378] device bridge_slave_0 entered promiscuous mode 18:47:47 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100000001, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e23, 0x6, @dev={0xfe, 0x80, [], 0xd}, 0x101}}, 0x1cb, 0x2}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1, 0x2}, 0x8) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x800, 0x0) r3 = accept$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000280), r4}}, 0x18) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000380)=0x4020) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f00000003c0)="a761b55cdac44e0d96c07bf559aa51900d8ec5") r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKIOMIN(r5, 0x1278, &(0x7f0000000400)) r6 = dup(0xffffffffffffffff) ioctl$BLKIOOPT(r6, 0x1279, &(0x7f0000000440)) sysfs$3(0x3) rmdir(&(0x7f0000000480)='./file0\x00') r7 = accept4(0xffffffffffffffff, &(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000540)=0x80, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r8, 0x800443d3, &(0x7f0000000580)={{0x9, 0xc2, 0x3, 0x1, 0x3f, 0x7}, 0x6, 0x9, 0x2}) ioctl$VIDIOC_G_INPUT(r7, 0x80045626, &(0x7f00000005c0)) r9 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000640)={0x0, 0x8, 0x3, [0x1c0, 0xec, 0x9]}, &(0x7f0000000680)=0xe) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r9, 0x84, 0x7b, &(0x7f00000006c0)={r10, 0x7}, 0x8) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700), 0xc) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000740)={r11, 0x0, 0x9, 0x394, 0x1000}) r12 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') accept$packet(r9, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000840)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000008c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x1002100}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a40)={0x98, r12, 0x1, 0x70bd29, 0x25dfdbfb, {}, [{{0x8, 0x1, r13}, {0x7c, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}]}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4044040}, 0x20004024) accept$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000bc0)=0x14) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000c00)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) [ 228.532257] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.538660] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.548615] device bridge_slave_1 entered promiscuous mode [ 228.575526] chnl_net:caif_netlink_parms(): no params data found [ 228.590750] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.608683] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.682631] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 228.698343] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 228.733305] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 228.741082] team0: Port device team_slave_0 added [ 228.746172] chnl_net:caif_netlink_parms(): no params data found [ 228.774005] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 228.782119] team0: Port device team_slave_1 added [ 228.794710] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.801669] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.808641] device bridge_slave_0 entered promiscuous mode [ 228.824474] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 228.835341] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 228.847860] IPVS: ftp: loaded support on port[0] = 21 [ 228.855777] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.863290] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.871454] device bridge_slave_1 entered promiscuous mode [ 228.942452] device hsr_slave_0 entered promiscuous mode [ 228.989672] device hsr_slave_1 entered promiscuous mode [ 229.052074] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 229.063456] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 229.083417] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 229.092374] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.104472] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 229.113369] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.120232] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.127222] device bridge_slave_0 entered promiscuous mode [ 229.135624] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.142217] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.149162] device bridge_slave_1 entered promiscuous mode [ 229.174851] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 229.182752] team0: Port device team_slave_0 added [ 229.195980] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.210644] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.221752] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 229.229002] team0: Port device team_slave_1 added [ 229.243564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.251846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.267175] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 229.273924] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.283528] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 229.291572] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 229.302167] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 229.335610] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 229.361423] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 229.383496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.392494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.400411] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.406751] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.415066] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 229.427696] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 229.436058] team0: Port device team_slave_0 added [ 229.442205] chnl_net:caif_netlink_parms(): no params data found [ 229.466379] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 229.512379] device hsr_slave_0 entered promiscuous mode [ 229.549827] device hsr_slave_1 entered promiscuous mode [ 229.590086] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 229.597438] team0: Port device team_slave_1 added [ 229.625289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.633901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.641797] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.648147] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.658362] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 229.665794] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 229.674631] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 229.687906] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 229.703655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.716132] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 229.728048] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 229.741849] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.758384] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.765609] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.773187] device bridge_slave_0 entered promiscuous mode [ 229.781191] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 229.841768] device hsr_slave_0 entered promiscuous mode [ 229.879694] device hsr_slave_1 entered promiscuous mode [ 229.932622] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 229.942306] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 229.948636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.956705] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.965035] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.971548] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.978762] device bridge_slave_1 entered promiscuous mode [ 230.002611] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 230.010645] chnl_net:caif_netlink_parms(): no params data found [ 230.019769] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 230.032985] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 230.047193] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 230.057271] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 230.084136] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.101520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.109251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.120005] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 230.131302] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 230.138381] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 230.146522] team0: Port device team_slave_0 added [ 230.164425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 230.172513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.180378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.187787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.207025] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 230.213143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 230.223391] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.231713] team0: Port device team_slave_1 added [ 230.237136] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 230.256094] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.262796] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.270010] device bridge_slave_0 entered promiscuous mode [ 230.282827] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 230.341421] device hsr_slave_0 entered promiscuous mode [ 230.379809] device hsr_slave_1 entered promiscuous mode [ 230.442378] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.448762] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.458943] device bridge_slave_1 entered promiscuous mode [ 230.478645] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 230.496308] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 230.504382] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 230.513212] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 230.525050] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.533069] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 230.550354] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.558834] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 230.572318] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 230.581910] team0: Port device team_slave_0 added [ 230.587478] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.595152] team0: Port device team_slave_1 added [ 230.600716] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 230.608190] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 230.662538] device hsr_slave_0 entered promiscuous mode [ 230.699932] device hsr_slave_1 entered promiscuous mode [ 230.740464] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 230.752845] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 230.763790] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 230.775222] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 230.786426] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 230.800123] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 230.806236] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.818247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.826818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.841732] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.850080] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 230.856991] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 230.870064] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.878812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.886319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.893614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.901567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.909103] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.915497] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.925441] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 230.932444] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.941532] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 230.941982] audit: type=1400 audit(1572720469.824:38): avc: denied { associate } for pid=7712 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 230.951856] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.991750] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.999015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.008021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.016158] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.022574] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.038655] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 231.047729] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 231.058402] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 231.068376] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 231.075942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.084465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.099448] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.105826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.121878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 231.126845] audit: type=1326 audit(1572720470.004:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7734 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0x0 [ 231.130012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 231.165005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.174611] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 231.182506] audit: type=1400 audit(1572720470.064:40): avc: denied { create } for pid=7734 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 231.207031] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.214177] audit: type=1400 audit(1572720470.064:41): avc: denied { write } for pid=7734 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 231.218219] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 231.239722] audit: type=1400 audit(1572720470.064:42): avc: denied { read } for pid=7734 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 231.251996] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 231.277480] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 231.285944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.294810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.302873] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.309226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.317048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.325204] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.333136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.340225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.347764] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.357333] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 231.368001] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 231.376625] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 231.383988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 231.392023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.399963] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.407551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.414606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.431366] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 231.437639] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.444990] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 231.458026] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 231.464803] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.474437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 231.485356] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 231.493751] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 231.503280] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 231.511183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.523215] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.531107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.539026] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.547100] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.553511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.561379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.568935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.577606] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.587918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.597582] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 231.605973] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 231.626753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.635103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.643251] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.649693] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.657733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.666235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.674017] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.680413] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.689010] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 231.698368] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 231.708924] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 231.716524] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.724435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.732204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.740143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.747930] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.756030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.763971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.771975] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.778313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.787045] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 231.803818] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 231.814725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 231.823407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.831249] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.845980] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 231.854009] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 231.863731] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 231.875231] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 231.883585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 231.891590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.899577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.907247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.915336] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.918793] audit: type=1326 audit(1572720470.804:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7734 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0x0 [ 231.923779] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.956549] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 231.964823] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 231.977126] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.989041] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready 18:47:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f00000002c0)=0xa7) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x10, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x58e1c2f0d9881433}) fsetxattr$security_ima(r2, &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@v1={0x2, "712f49368b1f79f8e12c18"}, 0xc, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)=0x9) dup2(r1, r2) [ 232.002332] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 232.016662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.025264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.039145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.047628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 232.055573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.067116] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 232.073945] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.085116] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 232.097396] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 232.112381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.124320] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 232.134092] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 232.144178] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 232.151647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.159695] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.167365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.175700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.183811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.190731] protocol 88fb is buggy, dev hsr_slave_0 [ 232.190812] protocol 88fb is buggy, dev hsr_slave_1 [ 232.201774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.212589] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 232.222300] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 232.236473] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 232.243573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.252579] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 232.260272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.267973] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.279912] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 232.287331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 232.295634] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.302825] protocol 88fb is buggy, dev hsr_slave_0 [ 232.302879] protocol 88fb is buggy, dev hsr_slave_1 [ 232.326419] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 232.347835] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.356916] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 232.363791] protocol 88fb is buggy, dev hsr_slave_0 [ 232.363836] protocol 88fb is buggy, dev hsr_slave_1 18:47:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000100)=""/37) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6609) r1 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6609) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000300)={0x0, 0x0, [], @raw_data=[0x1ff, 0x7fff, 0xfffffffe, 0x8001, 0x3, 0x8, 0x0, 0x3, 0x0, 0x20, 0x8, 0x0, 0x80, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x9, 0xfffffffc, 0x3, 0x0, 0x0, 0x401, 0x0, 0x9, 0x0, 0x3f, 0xffffffff, 0x2, 0x0, 0x4]}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x4, 0xfffffff6, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) [ 232.399641] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 232.410805] protocol 88fb is buggy, dev hsr_slave_0 [ 232.415936] protocol 88fb is buggy, dev hsr_slave_1 [ 232.427196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.436407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.462121] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 232.468183] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.474726] protocol 88fb is buggy, dev hsr_slave_0 [ 232.474787] protocol 88fb is buggy, dev hsr_slave_1 [ 232.491821] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 232.500289] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 232.521070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.529006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.558229] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.564704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.565326] Unknown ioctl -2141170668 [ 232.580252] hrtimer: interrupt took 44396 ns [ 232.583159] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 232.603326] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 232.627569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.643101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.657007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.665058] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.671481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.701442] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 232.711554] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 18:47:51 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) dup(0xffffffffffffffff) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) getpid() write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x7, 0x4, 0xfe, 0x5, 0xc282240822b67f34, 0x3b, 0xa5a7, 0x125, 0x38, 0x265, 0xd32, 0xd9c4, 0x20, 0x2, 0x3, 0x8, 0xb5}, [{0x60000000, 0x100, 0x7ce, 0x80000000, 0x0, 0x0, 0x2, 0x3}, {0x70000000, 0x6, 0x7f, 0xa4, 0x582f90bf, 0x9, 0x0, 0x3}], "2f543a958184dfe1b1f44d003b40d08b3d6deca949c975043359880466e9bd01d3a13ef0c7df833f7106016b488d4dfd353335f934e79cd9de7e1d54ef032ab0bb17a5bb8847fc1361735df54a08e4ffa402cf024860660ce4056a7ea194b9256bd332b8174c21093f0fdc90794219e83bfa4518a74764c8df4ab6106031a97457e104bd4ad1a5d82f1ed70e2ab1fabb4c49438dee4577b8c8c9ca8905f91ef14f86bcd5974477e116da4756c38f12e5174f31cc76aaeb31e7ae0eb33f4eda7485cfc8eb030c849ce64f15102a9b8b4fbe30682bdc7b"}, 0x14e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) shutdown(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x80800, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x404e23, 0x0, @loopback}, 0x1c) socket$inet(0x2, 0xa, 0x7) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r4, 0x7}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, r4}, 0x20) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) sendfile(r0, r5, 0x0, 0x80001d00c0d0) [ 232.910804] Unknown ioctl -2141170668 [ 232.941089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.951778] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 232.962694] 8021q: adding VLAN 0 to HW filter on device batadv0 18:47:51 executing program 3: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x100, 0x88f21ca36d3c9305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x9}, 0x68c0ced20b76ece7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x2) fdatasync(0xffffffffffffffff) unshare(0x60000000) r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) write$vhci(r0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000080)={{0xffffffffffffffff, 0x1, 0x80, 0x3, 0x401}, 0x1, 0x9}) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r1, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000040)=0x60000000000, 0x8) 18:47:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x29019, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) getpgrp(0x0) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000040)={@empty}, &(0x7f0000000080)=0x14) [ 233.041341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.085641] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 233.094082] IPVS: ftp: loaded support on port[0] = 21 [ 233.102802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 233.114639] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 18:47:52 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f000002eff0), 0x10) getpeername(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000400)=r1) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x200441, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000340)=0x5, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r3 = inotify_init1(0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f00000001c0), 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="a9ee82fefd16f88c00fba900009f9029cd1a94732380eb5d42bc1ac8431271d31a30e4f9d617468deaf5a99b44e6771604fd0b9dea874c4d56bdf24851e1f63ce3c3a6eef597d6d15366240b7bdf438f644f274941f03f8ff0592c070da742edf5553f89cd6db0ff1a8427b0da6db154fed8e5e06bc3722c56"], 0x1, 0x1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) open(0x0, 0x1fe, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_TXQLEN={0x8}]}, 0x30}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, &(0x7f00000005c0)="0830e633cf517fa40a758fb5a5c7a604043475e3252ef1002e507457ab0a381cea7e0ed523cd62e9d1e5f54050264944a05d7a2129303c2f4cadb18f259b2e3f109c258b6196d59e6169c442ae94889d174a1cef58f3081b26ad33701a16c60357137fae04a59bbad2197ce6be133a9e09c1acd5298c7b632c609376ea4bf21bfb4200b59bbc110046522e657796080d533629f496cb4286475acf93dde804c74d2b53467473355617bf70acff4cbb3a23b88be83140c78440be6f7793fc2abd4d77", &(0x7f0000000000), &(0x7f0000000200), &(0x7f00000006c0)="98f542b6e25eeefd0f7985dd267a31") [ 233.142671] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 233.156377] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 233.188411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 233.208619] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.240981] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready 18:47:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x0, 0x8}}, 0x20) syz_emit_ethernet(0x56, &(0x7f00000003c0)={@broadcast, @link_local, [], {@canfd={0xd, {{0x3, 0x1, 0x0, 0x1}, 0x20, 0x2, 0x0, 0x0, "684f0252518b7fe54dd5983054525ecb21567731b2e2e9c863fafebd5296f708349aca080814cb2494cd074b4635480c50e7a114b2b8f122f1ecf2a5d6d15e6d"}}}}, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x0, 0x0) write$vhci(r2, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r2, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000010057594000000bc000000ffffffff0001000019a00000"]) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000100)={0x1, 0x3, 0x6, 0x2, 0x20}) r3 = socket$inet6(0xa, 0x3, 0x2) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000300)) getsockopt$inet6_buf(r3, 0x29, 0x0, &(0x7f00000001c0)=""/238, &(0x7f0000000140)=0xee) 18:47:52 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket(0x1e, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) sendto$inet(r0, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0xfffffffffffffe2b}, 0x804) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000440), 0x0, 0x500) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') preadv(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$admmidi(0x0, 0x0, 0x0) write$vhci(r5, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r5, 0x80045300, &(0x7f0000000000)) r6 = socket(0x40000000015, 0x5, 0x0) connect$inet(r6, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r6, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r9, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x28, r10, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x759a1ac0, r10, 0x101, 0x400000, 0x3}, 0x2}, 0x1, 0x0, 0x0, 0xbbfafc1641c276d4}, 0x4000008) sendmsg$IPVS_CMD_DEL_DEST(r6, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x28000800}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xc0, r8, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xd9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffe01}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x3ff}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x2}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x20}}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4010}, 0x2) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0xe, 0x0, &(0x7f000034f000)) [ 233.303138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 233.330284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.363027] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 233.376351] audit: type=1400 audit(1572720472.254:44): avc: denied { create } for pid=7790 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 233.428637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.447174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 18:47:52 executing program 2: r0 = accept$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @default}, [@default, @null, @remote, @rose, @null, @rose, @null, @bcast]}, &(0x7f00000000c0)=0x48) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usage_user\x00', 0x0, 0x0) accept$netrom(r1, &(0x7f00000001c0)={{}, [@remote, @null, @null, @default, @netrom, @netrom, @netrom, @default]}, &(0x7f0000000240)=0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1c, 0xffffff9c}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xe7}, 0x48) [ 233.465314] audit: type=1400 audit(1572720472.254:45): avc: denied { getopt } for pid=7790 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 233.503357] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 18:47:52 executing program 2: perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x7) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) syz_open_dev$ndb(0x0, 0x0, 0xe232633705fac4c5) syz_open_dev$dspn(0x0, 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000200), 0x4) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) r4 = syz_open_dev$admmidi(0x0, 0x0, 0x0) write$vhci(r4, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r4, 0x227f, &(0x7f00000000c0)) r5 = syz_open_dev$admmidi(0x0, 0x0, 0x0) write$vhci(r5, 0x0, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000140)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000000)=0x8, &(0x7f0000000080)=0x2) [ 233.541838] audit: type=1400 audit(1572720472.414:46): avc: denied { prog_load } for pid=7800 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 233.648080] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 233.794859] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 233.804644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 233.896472] IPVS: ftp: loaded support on port[0] = 21 [ 233.908248] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 233.914172] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 233.968271] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 234.411653] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2229 comm=kworker/0:1H [ 234.427941] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2229 comm=kworker/0:1H [ 234.441418] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2229 comm=kworker/0:1H [ 234.455665] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2229 comm=kworker/0:1H [ 234.482193] block nbd2: shutting down sockets 18:47:54 executing program 0: r0 = creat(&(0x7f0000000740)='./bus\x00', 0x0) io_setup(0x2e6, &(0x7f0000000080)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x1000010001}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10600}]) 18:47:54 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket(0x1e, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) sendto$inet(r0, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0xfffffffffffffe2b}, 0x804) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000440), 0x0, 0x500) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') preadv(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$admmidi(0x0, 0x0, 0x0) write$vhci(r5, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r5, 0x80045300, &(0x7f0000000000)) r6 = socket(0x40000000015, 0x5, 0x0) connect$inet(r6, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r6, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r9, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x28, r10, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x759a1ac0, r10, 0x101, 0x400000, 0x3}, 0x2}, 0x1, 0x0, 0x0, 0xbbfafc1641c276d4}, 0x4000008) sendmsg$IPVS_CMD_DEL_DEST(r6, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x28000800}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xc0, r8, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xd9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffe01}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x3ff}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x2}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x20}}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4010}, 0x2) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0xe, 0x0, &(0x7f000034f000)) 18:47:54 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r2 = socket$inet6(0xa, 0x3, 0x2) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000300)) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) r6 = socket(0x40000000015, 0x5, 0x0) connect$inet(r6, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r6, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r7 = accept4$ax25(r6, &(0x7f0000000200)={{0x3, @netrom}, [@netrom, @bcast, @default, @rose, @null, @null, @remote, @default]}, &(0x7f00000002c0)=0x48, 0x800) getsockopt$IP_VS_SO_GET_VERSION(r7, 0x0, 0x480, &(0x7f00000003c0), &(0x7f0000000400)=0x40) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x5e20, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r8, 0x7}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r8, &(0x7f0000000140)=0x4) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000001c0)={r9, 0x2d867ee}, 0x8) ftruncate(r1, 0x8200) r10 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x7fff, 0x12d}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) symlinkat(&(0x7f0000008ff8)='./bus\x00', 0xffffffffffffffff, 0x0) r11 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) getresuid(&(0x7f0000002bc0), 0x0, 0x0) sendfile(r0, r11, 0x0, 0x8000fffffffa) 18:47:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup\x00\x8es', 0x200002, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x80, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r3, 0xc038563b, &(0x7f0000000380)={0x0, 0x0, {0xd62, 0x4, 0x8, 0x8001}}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) r4 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f00000007c0)='status\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r5, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)={0xa0, r6, 0x4, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x200000000000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x65}]}, @TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x20000800}, 0x40) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r4, 0xc0405519, &(0x7f0000000080)={0x8, 0x4, 0x6, 0x8, 'syz0\x00', 0x3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:47:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xc, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) fsync(r1) [ 235.892854] audit: type=1804 audit(1572720474.774:47): pid=7832 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir358876360/syzkaller.qNoO56/3/bus" dev="sda1" ino=16524 res=1 18:47:54 executing program 4: socket(0x10, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) move_pages(0x0, 0x5, &(0x7f0000000000)=[&(0x7f0000001000/0x4000)=nil, &(0x7f000000d000/0x2000)=nil, &(0x7f000000d000/0x4000)=nil, &(0x7f0000006000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil], 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r4) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x194, 0x0, 0x0, 0xffffffffffffffa3) r6 = syz_open_dev$admmidi(0x0, 0x0, 0x0) write$vhci(r6, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r6, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x307000}) syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x2a1, 0x0, 0x0, 0x1c2) ioctl$KVM_NMI(r5, 0xae9a) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 236.023411] audit: type=1804 audit(1572720474.824:48): pid=7832 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir358876360/syzkaller.qNoO56/3/bus" dev="sda1" ino=16524 res=1 18:47:55 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f000000d000/0x2000)=nil, 0x5800) unshare(0x0) socket$rds(0x15, 0x5, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000100)=ANY=[], 0x0) pipe(0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r2, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) syz_open_dev$midi(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f00000003c0)) r3 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(r3, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/11, 0x2}], 0x10000000000000dc) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, &(0x7f00000001c0)) socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r4, 0x29, 0x2f, &(0x7f0000000480)={0x4, {{0xa, 0x4e20, 0xfffffffc, @ipv4={[], [], @loopback}, 0xac}}, {{0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, [], 0x24}, 0xa0}}}, 0x108) [ 236.106200] audit: type=1400 audit(1572720474.864:49): avc: denied { prog_run } for pid=7834 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 236.151810] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 18:47:55 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket(0x1e, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) sendto$inet(r0, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0xfffffffffffffe2b}, 0x804) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000440), 0x0, 0x500) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') preadv(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$admmidi(0x0, 0x0, 0x0) write$vhci(r5, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r5, 0x80045300, &(0x7f0000000000)) r6 = socket(0x40000000015, 0x5, 0x0) connect$inet(r6, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r6, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r9, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x28, r10, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x759a1ac0, r10, 0x101, 0x400000, 0x3}, 0x2}, 0x1, 0x0, 0x0, 0xbbfafc1641c276d4}, 0x4000008) sendmsg$IPVS_CMD_DEL_DEST(r6, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x28000800}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xc0, r8, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xd9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffe01}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x3ff}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x2}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x20}}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4010}, 0x2) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0xe, 0x0, &(0x7f000034f000)) 18:47:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r1 = socket(0x10, 0x4008000000803, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f00000000c0)=0x81a, 0x4) sendto(r1, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/231, 0xe7}, 0xfffffffe}], 0x1, 0x2, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r2, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x28, r4, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x208001}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="b8000000", @ANYRES16=r4, @ANYBLOB="000025bd7000fbdbdf25080000006c000200080008000600000014000100e0000002000000000000000000000000080008000800000008000b000800000008000900fffbffff0800090080000000080002004e2400001400010000000000000000000000ffff00000000080003000000000008000b0009000000380002001400010000000353000000000000000000000000080003000300000008000900080000000800030003000000080006005310ffff"], 0xb8}, 0x1, 0x0, 0x0, 0x50}, 0x8400) 18:47:55 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x0, 0x2) r2 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x0) r3 = shmget(0x1, 0x3000, 0x1, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r4 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x3, 0x1182e089e2283f72) ioctl$VIDIOC_QUERY_DV_TIMINGS(r4, 0x80845663, &(0x7f00000000c0)={0x0, @reserved}) r5 = socket(0x40000000015, 0x5, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r5, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1}], 0x1, 0x0, 0x0, 0x4}, 0x0) accept4$x25(r5, &(0x7f0000000180), &(0x7f00000001c0)=0x12, 0x800) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000200)=0x2) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000000)=0x4, 0x4) r6 = dup2(r1, r2) pread64(r6, &(0x7f0000000280)=""/187, 0xbb, 0x0) syz_mount_image$vfat(0x0, 0x0, 0xe000, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) 18:47:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="54010000100013070000000000000000e0000001000000000000000000000000ac1414bb000000000000000000000000000000000000000000000000e8e553000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000001c0004000000000000000000ac141400000000000000000000000000480001006d643500"/268], 0x154}}, 0x0) [ 236.386367] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 236.447796] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 236.580600] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.0'. [ 236.635556] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 264.640170] block nbd2: Connection timed out [ 264.644921] print_req_error: I/O error, dev nbd2, sector 0 [ 264.650810] Buffer I/O error on dev nbd2, logical block 0, async page read [ 264.657871] block nbd2: Connection timed out [ 264.662625] print_req_error: I/O error, dev nbd2, sector 2 [ 264.668301] Buffer I/O error on dev nbd2, logical block 1, async page read [ 264.675468] block nbd2: Connection timed out [ 264.679948] print_req_error: I/O error, dev nbd2, sector 4 [ 264.685564] Buffer I/O error on dev nbd2, logical block 2, async page read [ 264.692710] block nbd2: Connection timed out [ 264.697122] print_req_error: I/O error, dev nbd2, sector 6 [ 264.702799] Buffer I/O error on dev nbd2, logical block 3, async page read [ 264.710933] print_req_error: I/O error, dev nbd2, sector 0 [ 264.716676] Buffer I/O error on dev nbd2, logical block 0, async page read [ 264.723794] Buffer I/O error on dev nbd2, logical block 1, async page read [ 264.730873] Buffer I/O error on dev nbd2, logical block 2, async page read [ 264.737892] Buffer I/O error on dev nbd2, logical block 3, async page read [ 264.745690] print_req_error: I/O error, dev nbd2, sector 0 [ 264.751482] Buffer I/O error on dev nbd2, logical block 0, async page read [ 264.758536] print_req_error: I/O error, dev nbd2, sector 2 [ 264.764936] Buffer I/O error on dev nbd2, logical block 1, async page read [ 264.772187] print_req_error: I/O error, dev nbd2, sector 0 [ 264.778538] print_req_error: I/O error, dev nbd2, sector 2 [ 264.784352] print_req_error: I/O error, dev nbd2, sector 4 [ 264.791799] ldm_validate_partition_table(): Disk read failed. [ 264.798945] Dev nbd2: unable to read RDB block 0 [ 264.805198] nbd2: unable to read partition table [ 264.810246] nbd2: partition table beyond EOD, truncated [ 385.599647] INFO: task syz-executor.2:7805 blocked for more than 140 seconds. [ 385.607172] Not tainted 4.19.81 #0 [ 385.612146] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 385.620152] syz-executor.2 D27760 7805 7718 0x00000004 [ 385.625773] Call Trace: [ 385.628462] __schedule+0x866/0x1dc0 [ 385.632252] ? pci_mmcfg_check_reserved+0x170/0x170 [ 385.637369] ? mark_held_locks+0x100/0x100 [ 385.641665] schedule+0x92/0x1c0 [ 385.645034] schedule_timeout+0x8c8/0xfc0 [ 385.649188] ? wait_for_completion+0x294/0x440 [ 385.653887] ? find_held_lock+0x35/0x130 [ 385.658132] ? usleep_range+0x170/0x170 [ 385.662144] ? _raw_spin_unlock_irq+0x28/0x90 [ 385.666642] ? wait_for_completion+0x294/0x440 [ 385.671281] ? _raw_spin_unlock_irq+0x28/0x90 [ 385.675797] ? lockdep_hardirqs_on+0x415/0x5d0 [ 385.680498] ? trace_hardirqs_on+0x67/0x220 [ 385.684885] ? kasan_check_read+0x11/0x20 [ 385.689027] wait_for_completion+0x29c/0x440 [ 385.693487] ? wait_for_completion_interruptible+0x4b0/0x4b0 [ 385.699453] ? wake_up_q+0x100/0x100 [ 385.703208] ? flush_workqueue_prep_pwqs+0x352/0x590 [ 385.708336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.714576] flush_workqueue+0x40f/0x14b0 [ 385.718811] ? __dev_printk+0x116/0x280 [ 385.722836] ? _dev_warn+0xd8/0x110 [ 385.726473] ? pwq_unbound_release_workfn+0x2e0/0x2e0 [ 385.731819] ? sock_shutdown+0x1e2/0x250 [ 385.735975] nbd_ioctl+0xb52/0xcb0 [ 385.739555] ? nbd_ioctl+0xb52/0xcb0 [ 385.743287] ? nbd_add_socket+0x680/0x680 [ 385.747688] ? finish_wait+0x260/0x260 [ 385.751637] ? nbd_add_socket+0x680/0x680 [ 385.755923] blkdev_ioctl+0xc38/0x1ab6 [ 385.759948] ? blkpg_ioctl+0xa90/0xa90 [ 385.763912] ? __fget+0x340/0x540 [ 385.767401] block_ioctl+0xee/0x130 [ 385.771094] ? blkdev_fallocate+0x410/0x410 [ 385.775546] do_vfs_ioctl+0xd5f/0x1380 [ 385.779549] ? selinux_file_ioctl+0x46f/0x5e0 [ 385.784072] ? selinux_file_ioctl+0x125/0x5e0 [ 385.788566] ? ioctl_preallocate+0x210/0x210 [ 385.793062] ? selinux_file_mprotect+0x620/0x620 [ 385.797823] ? iterate_fd+0x360/0x360 [ 385.801763] ? nsecs_to_jiffies+0x30/0x30 [ 385.805937] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.811601] ? security_file_ioctl+0x8d/0xc0 [ 385.816027] ksys_ioctl+0xab/0xd0 [ 385.819540] __x64_sys_ioctl+0x73/0xb0 [ 385.823470] do_syscall_64+0xfd/0x620 [ 385.827274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.832512] RIP: 0033:0x459f49 [ 385.835720] Code: 0f 11 07 48 83 c7 10 0f 10 06 48 83 c6 10 0f 11 07 48 83 c7 10 0f 10 06 48 83 c6 10 0f 11 07 48 83 c7 10 0f 10 06 48 83 c6 10 <0f> 11 07 48 83 c7 10 0f 10 06 48 83 c6 10 0f 11 07 48 83 c7 10 0f [ 385.855320] RSP: 002b:00007ff30dda1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 385.863097] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000459f49 [ 385.870417] RDX: 0000000000000000 RSI: 000000000000ab03 RDI: 0000000000000005 [ 385.877673] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 385.884985] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff30dda26d4 [ 385.892388] R13: 00000000004c3a06 R14: 00000000004d7a98 R15: 00000000ffffffff [ 385.899729] [ 385.899729] Showing all locks held in the system: [ 385.906060] 1 lock held by khungtaskd/1037: [ 385.910713] #0: 000000000e8947af (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 385.919381] 2 locks held by kworker/u5:0/1167: [ 385.924127] #0: 00000000a3de8ef1 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}, at: process_one_work+0x87e/0x1750 [ 385.934792] #1: 000000004d233bb8 ((work_completion)(&args->work)){+.+.}, at: process_one_work+0x8b4/0x1750 [ 385.945208] 1 lock held by rsyslogd/7549: [ 385.949453] 2 locks held by getty/7672: [ 385.953430] #0: 000000008049d9f4 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 385.961841] #1: 00000000c5b4ed97 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 385.970995] 2 locks held by getty/7673: [ 385.974984] #0: 0000000066a7899f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 385.984402] #1: 0000000022f9d7b3 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 385.993390] 2 locks held by getty/7674: [ 385.997372] #0: 00000000be34f44f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 386.006017] #1: 00000000566024d6 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 386.014938] 2 locks held by getty/7675: [ 386.018893] #0: 00000000fcdeac96 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 386.027190] #1: 0000000079ae52c6 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 386.036417] 2 locks held by getty/7676: [ 386.040427] #0: 00000000246bc0ff (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 386.048687] #1: 00000000db483203 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 386.057600] 2 locks held by getty/7677: [ 386.061610] #0: 000000008eeaf6ad (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 386.069937] #1: 000000007986009f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 386.078825] 2 locks held by getty/7678: [ 386.082872] #0: 0000000096bffd99 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 386.091262] #1: 00000000fbee7c8c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 386.100178] [ 386.101807] ============================================= [ 386.101807] [ 386.108825] NMI backtrace for cpu 1 [ 386.112552] CPU: 1 PID: 1037 Comm: khungtaskd Not tainted 4.19.81 #0 [ 386.119043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.128378] Call Trace: [ 386.130992] dump_stack+0x172/0x1f0 [ 386.134805] nmi_cpu_backtrace.cold+0x63/0xa4 [ 386.139347] ? lapic_can_unplug_cpu.cold+0x47/0x47 [ 386.144277] nmi_trigger_cpumask_backtrace+0x1b0/0x1f8 [ 386.149574] arch_trigger_cpumask_backtrace+0x14/0x20 [ 386.154760] watchdog+0x9df/0xee0 [ 386.158217] kthread+0x354/0x420 [ 386.161568] ? reset_hung_task_detector+0x30/0x30 [ 386.166392] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 386.172011] ret_from_fork+0x24/0x30 [ 386.175837] Sending NMI from CPU 1 to CPUs 0: [ 386.180831] NMI backtrace for cpu 0 [ 386.180836] CPU: 0 PID: 2280 Comm: kworker/u4:4 Not tainted 4.19.81 #0 [ 386.180842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.180846] Workqueue: bat_events batadv_nc_worker [ 386.180852] RIP: 0010:__lock_acquire+0x49/0x49c0 [ 386.180863] Code: fc ff df 48 83 e4 f0 48 81 ec a0 01 00 00 48 8b 45 10 48 c7 84 24 a0 00 00 00 b3 8a b5 41 48 c7 84 24 a8 00 00 00 20 3f 3a 88 <48> c7 84 24 b0 00 00 00 00 9a 51 81 48 89 84 24 98 00 00 00 48 8d [ 386.180866] RSP: 0018:ffff8880a1fafa80 EFLAGS: 00000082 [ 386.180873] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000002 [ 386.180878] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: ffffffff8879d7e0 [ 386.180883] RBP: ffff8880a1fafc50 R08: 0000000000000000 R09: 0000000000000000 [ 386.180887] R10: ffffed1015d04732 R11: 0000000000000000 R12: 0000000000000002 [ 386.180892] R13: 0000000000000000 R14: 0000000000000000 R15: ffffffff8879d7e0 [ 386.180897] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 386.180901] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 386.180906] CR2: ffffffffff600400 CR3: 0000000075e3b000 CR4: 00000000001406f0 [ 386.180911] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 386.180915] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 386.180918] Call Trace: [ 386.180921] ? add_timer+0x463/0xbe0 [ 386.180925] ? mark_held_locks+0x100/0x100 [ 386.180928] ? mark_held_locks+0x100/0x100 [ 386.180931] ? lock_downgrade+0x880/0x880 [ 386.180935] ? batadv_nc_worker+0x1fa/0x760 [ 386.180938] ? find_held_lock+0x35/0x130 [ 386.180941] ? batadv_nc_worker+0x1fa/0x760 [ 386.180944] lock_acquire+0x16f/0x3f0 [ 386.180948] ? batadv_nc_worker+0xe3/0x760 [ 386.180951] batadv_nc_worker+0x117/0x760 [ 386.180954] ? batadv_nc_worker+0xe3/0x760 [ 386.180958] process_one_work+0x989/0x1750 [ 386.180961] ? pwq_dec_nr_in_flight+0x320/0x320 [ 386.180964] ? lock_acquire+0x16f/0x3f0 [ 386.180968] ? kasan_check_write+0x14/0x20 [ 386.180971] ? do_raw_spin_lock+0xc8/0x240 [ 386.180974] worker_thread+0x98/0xe40 [ 386.180978] ? trace_hardirqs_on+0x67/0x220 [ 386.180981] kthread+0x354/0x420 [ 386.180984] ? process_one_work+0x1750/0x1750 [ 386.180988] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 386.180991] ret_from_fork+0x24/0x30 [ 386.182094] Kernel panic - not syncing: hung_task: blocked tasks [ 386.421931] CPU: 1 PID: 1037 Comm: khungtaskd Not tainted 4.19.81 #0 [ 386.428461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.442094] Call Trace: [ 386.444711] dump_stack+0x172/0x1f0 [ 386.448419] panic+0x26a/0x50e [ 386.452050] ? __warn_printk+0xf3/0xf3 [ 386.455922] ? lapic_can_unplug_cpu.cold+0x47/0x47 [ 386.460839] ? ___preempt_schedule+0x16/0x18 [ 386.465248] ? nmi_trigger_cpumask_backtrace+0x165/0x1f8 [ 386.470705] ? nmi_trigger_cpumask_backtrace+0x1c1/0x1f8 [ 386.476150] ? nmi_trigger_cpumask_backtrace+0x1cb/0x1f8 [ 386.481583] ? nmi_trigger_cpumask_backtrace+0x165/0x1f8 [ 386.487478] watchdog+0x9f0/0xee0 [ 386.490921] kthread+0x354/0x420 [ 386.494270] ? reset_hung_task_detector+0x30/0x30 [ 386.499107] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 386.504632] ret_from_fork+0x24/0x30 [ 386.515683] Kernel Offset: disabled [ 386.519329] Rebooting in 86400 seconds..