[ 56.636844][ T26] audit: type=1800 audit(1572502036.942:25): pid=8775 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 56.657804][ T26] audit: type=1800 audit(1572502036.942:26): pid=8775 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 56.680210][ T26] audit: type=1800 audit(1572502036.942:27): pid=8775 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 57.385956][ T8843] sshd (8843) used greatest stack depth: 22888 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.59' (ECDSA) to the list of known hosts. 2019/10/31 06:07:26 fuzzer started 2019/10/31 06:07:28 dialing manager at 10.128.0.26:32889 2019/10/31 06:07:28 syscalls: 2541 2019/10/31 06:07:28 code coverage: enabled 2019/10/31 06:07:28 comparison tracing: enabled 2019/10/31 06:07:28 extra coverage: extra coverage is not supported by the kernel 2019/10/31 06:07:28 setuid sandbox: enabled 2019/10/31 06:07:28 namespace sandbox: enabled 2019/10/31 06:07:28 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/31 06:07:28 fault injection: enabled 2019/10/31 06:07:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/31 06:07:28 net packet injection: enabled 2019/10/31 06:07:28 net device setup: enabled 2019/10/31 06:07:28 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 06:09:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x4000000032, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x24a, 0x0) 06:09:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) dup2(0xffffffffffffffff, r2) syzkaller login: [ 191.021273][ T8944] IPVS: ftp: loaded support on port[0] = 21 [ 191.152559][ T8946] IPVS: ftp: loaded support on port[0] = 21 06:09:31 executing program 2: r0 = socket(0x10, 0x0, 0x0) gettid() tgkill(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000800), 0x0) recvfrom(r0, &(0x7f0000000000)=""/100, 0x64, 0x80, &(0x7f0000000200)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x80) socket$netlink(0x10, 0x3, 0x3) r1 = open(&(0x7f0000001780)='./file0\x00', 0x0, 0x111) fchdir(r1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000840)={0x194, 0x0, 0x20, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x8, 0x1, '\xe0'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_BEARER={0x11c, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa48}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bpq0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x8}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x101, @rand_addr="416e9b70479e0576f0c664b64cace619"}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x0, @mcast1}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @dev, 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @remote}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffff9fe6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}]}, 0x194}}, 0x4000) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) truncate(&(0x7f0000001740)='./file0\x00', 0x5) sendfile(r2, r3, 0x0, 0x7fffffa7) [ 191.228962][ T8944] chnl_net:caif_netlink_parms(): no params data found [ 191.364347][ T8946] chnl_net:caif_netlink_parms(): no params data found [ 191.402029][ T8944] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.426045][ T8944] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.436909][ T8944] device bridge_slave_0 entered promiscuous mode [ 191.470843][ T8944] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.479550][ T8944] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.488677][ T8944] device bridge_slave_1 entered promiscuous mode [ 191.505288][ T8951] IPVS: ftp: loaded support on port[0] = 21 [ 191.511645][ T8946] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.521211][ T8946] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.534393][ T8946] device bridge_slave_0 entered promiscuous mode [ 191.560730][ T8946] bridge0: port 2(bridge_slave_1) entered blocking state 06:09:31 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x1da, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @multicast2}, 0x0) [ 191.568043][ T8946] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.579841][ T8946] device bridge_slave_1 entered promiscuous mode [ 191.619044][ T8944] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 191.652024][ T8944] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 191.666110][ T8946] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 191.709862][ T8946] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 191.724767][ T8944] team0: Port device team_slave_0 added [ 191.772428][ T8944] team0: Port device team_slave_1 added [ 191.823911][ T8951] chnl_net:caif_netlink_parms(): no params data found [ 191.840460][ T8946] team0: Port device team_slave_0 added [ 191.855018][ T8954] IPVS: ftp: loaded support on port[0] = 21 [ 191.871800][ T8946] team0: Port device team_slave_1 added 06:09:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x4000000032, 0xffffffffffffffff, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x24a, 0xd0cd6b7a58010000) mount$9p_unix(0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='tranT=unix']) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 191.932268][ T8944] device hsr_slave_0 entered promiscuous mode [ 192.009396][ T8944] device hsr_slave_1 entered promiscuous mode 06:09:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpgid(0x0) [ 192.139023][ T8946] device hsr_slave_0 entered promiscuous mode [ 192.187265][ T8946] device hsr_slave_1 entered promiscuous mode [ 192.246384][ T8946] debugfs: Directory 'hsr0' with parent '/' already present! [ 192.297865][ T8956] IPVS: ftp: loaded support on port[0] = 21 [ 192.320769][ T8951] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.328391][ T8951] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.336309][ T8951] device bridge_slave_0 entered promiscuous mode [ 192.347298][ T8951] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.354366][ T8951] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.362159][ T8951] device bridge_slave_1 entered promiscuous mode [ 192.395152][ T8958] IPVS: ftp: loaded support on port[0] = 21 [ 192.444337][ T8951] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.485327][ T8951] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.532019][ T8951] team0: Port device team_slave_0 added [ 192.544110][ T8951] team0: Port device team_slave_1 added [ 192.699831][ T8951] device hsr_slave_0 entered promiscuous mode [ 192.766237][ T8951] device hsr_slave_1 entered promiscuous mode [ 192.816261][ T8951] debugfs: Directory 'hsr0' with parent '/' already present! [ 192.827279][ T8954] chnl_net:caif_netlink_parms(): no params data found [ 192.909534][ T8956] chnl_net:caif_netlink_parms(): no params data found [ 192.919587][ T8958] chnl_net:caif_netlink_parms(): no params data found [ 192.948163][ T8954] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.955582][ T8954] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.963761][ T8954] device bridge_slave_0 entered promiscuous mode [ 192.976962][ T8954] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.984053][ T8954] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.992298][ T8954] device bridge_slave_1 entered promiscuous mode [ 193.044160][ T8958] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.051430][ T8958] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.059661][ T8958] device bridge_slave_0 entered promiscuous mode [ 193.068795][ T8958] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.076166][ T8958] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.084132][ T8958] device bridge_slave_1 entered promiscuous mode [ 193.147145][ T8954] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.162752][ T8954] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.174081][ T8958] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.192846][ T8958] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.232608][ T8946] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.250003][ T8958] team0: Port device team_slave_0 added [ 193.258414][ T8958] team0: Port device team_slave_1 added [ 193.266194][ T8956] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.273262][ T8956] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.284289][ T8956] device bridge_slave_0 entered promiscuous mode [ 193.315987][ T8956] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.323138][ T8956] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.331101][ T8956] device bridge_slave_1 entered promiscuous mode [ 193.346932][ T8954] team0: Port device team_slave_0 added [ 193.354221][ T8954] team0: Port device team_slave_1 added [ 193.367578][ T8944] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.419290][ T8958] device hsr_slave_0 entered promiscuous mode [ 193.466429][ T8958] device hsr_slave_1 entered promiscuous mode [ 193.506155][ T8958] debugfs: Directory 'hsr0' with parent '/' already present! [ 193.561029][ T8956] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.571777][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.580979][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.589119][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.597620][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.649333][ T8954] device hsr_slave_0 entered promiscuous mode [ 193.726399][ T8954] device hsr_slave_1 entered promiscuous mode [ 193.796118][ T8954] debugfs: Directory 'hsr0' with parent '/' already present! [ 193.810447][ T8956] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.828071][ T8946] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.838722][ T8944] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.866276][ T8951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.879083][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.888930][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.897910][ T3022] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.905189][ T3022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.914225][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.923465][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.931998][ T3022] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.939189][ T3022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.947269][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.994144][ T8956] team0: Port device team_slave_0 added [ 194.001793][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.010984][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.019893][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.028137][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.045837][ T8946] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 194.057538][ T8946] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 194.082705][ T8951] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.096840][ T8956] team0: Port device team_slave_1 added [ 194.109761][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.118598][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.129732][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.138885][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.147741][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.156238][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.165517][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.174401][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.182902][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.192439][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.200969][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.208086][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.215715][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.225316][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.234003][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.241184][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.249614][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.258833][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.268575][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.275719][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.284933][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.292823][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.301058][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.309881][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.356431][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.365129][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.377745][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.386957][ T8964] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.394025][ T8964] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.402052][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.412072][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.448396][ T8956] device hsr_slave_0 entered promiscuous mode [ 194.476894][ T8956] device hsr_slave_1 entered promiscuous mode [ 194.526109][ T8956] debugfs: Directory 'hsr0' with parent '/' already present! [ 194.542706][ T8946] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.589248][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.598391][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.607217][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.616623][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.625204][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.634520][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.654575][ T8951] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 194.671242][ T8951] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 194.709052][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.721888][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.731632][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.742927][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.751553][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.763940][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.773176][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.781959][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.790711][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.799295][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.808310][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.816859][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.836557][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.844373][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.889297][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.903600][ T8951] 8021q: adding VLAN 0 to HW filter on device batadv0 06:09:35 executing program 1: [ 195.027763][ T8944] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 195.050056][ T8954] 8021q: adding VLAN 0 to HW filter on device bond0 06:09:35 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xfffffdea) splice(r0, 0x0, r3, 0x0, 0xec6, 0x0) [ 195.123786][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.134503][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.152578][ T8958] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.167977][ T8954] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.208338][ T8958] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.246815][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.264454][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.290300][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.299787][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.319018][ T3022] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.326193][ T3022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.336303][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 195.336315][ T26] audit: type=1800 audit(1572502175.632:31): pid=8990 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=22 res=0 [ 195.365668][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.374278][ T26] audit: type=1804 audit(1572502175.632:32): pid=8990 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir847474679/syzkaller.AdSVXK/0/file0/file0" dev="loop2" ino=22 res=1 [ 195.401474][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.405871][ C0] hrtimer: interrupt took 45611 ns [ 195.412862][ T3022] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.422349][ T3022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.447417][ T8956] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.520272][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.542100][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.588393][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.623129][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.649469][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.675041][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.703459][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.733049][ T8964] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.740469][ T8964] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.755310][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.778129][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 06:09:36 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") r1 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r1, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r2 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x20000100000000a, &(0x7f0000000200)=0x2, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x8000008800, &(0x7f0000000000)={0xa, 0x200000000004e23, 0x0, @ipv4={[], [], @empty}}, 0x1c) sendto$inet6(r2, &(0x7f0000000d40)="dd", 0x1, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000040)=""/77, 0x4d) [ 195.803110][ T8964] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.810320][ T8964] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.848783][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.888148][ T8964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.935161][ T8954] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 195.973194][ T8954] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 196.004178][ T8956] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.030105][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.043679][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 06:09:36 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000040)={0x2, 0x1004e20, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8084, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") sendto$inet(r0, &(0x7f00000000c0)="da", 0x1, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{r0}, {}], 0x2, 0x3) [ 196.055829][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.072110][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.089049][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.101363][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.113859][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.131377][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.144849][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.181239][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.205464][ T26] audit: type=1804 audit(1572502176.502:33): pid=8995 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir847474679/syzkaller.AdSVXK/0/file0/file0" dev="loop2" ino=22 res=1 [ 196.237385][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.238969][ T26] audit: type=1804 audit(1572502176.512:34): pid=9009 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir847474679/syzkaller.AdSVXK/0/file0/file0" dev="loop2" ino=22 res=1 [ 196.245201][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 06:09:36 executing program 2: r0 = socket(0x10, 0x0, 0x0) gettid() tgkill(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000800), 0x0) recvfrom(r0, &(0x7f0000000000)=""/100, 0x64, 0x80, &(0x7f0000000200)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x80) socket$netlink(0x10, 0x3, 0x3) r1 = open(&(0x7f0000001780)='./file0\x00', 0x0, 0x111) fchdir(r1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000840)={0x194, 0x0, 0x20, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x8, 0x1, '\xe0'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_BEARER={0x11c, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa48}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bpq0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x8}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x101, @rand_addr="416e9b70479e0576f0c664b64cace619"}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x0, @mcast1}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @dev, 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @remote}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffff9fe6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}]}, 0x194}}, 0x4000) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) truncate(&(0x7f0000001740)='./file0\x00', 0x5) sendfile(r2, r3, 0x0, 0x7fffffa7) 06:09:36 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") r1 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r1, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r2 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x20000100000000a, &(0x7f0000000200)=0x2, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x8000008800, &(0x7f0000000000)={0xa, 0x200000000004e23, 0x0, @ipv4={[], [], @empty}}, 0x1c) sendto$inet6(r2, &(0x7f0000000d40)="dd", 0x1, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000040)=""/77, 0x4d) [ 196.338888][ T8954] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.360000][ T8958] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 196.414973][ T8958] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 196.448625][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.456760][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.464670][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.474284][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.483405][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.493344][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.502634][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.517488][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.538353][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.545544][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.574745][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.580277][ T26] audit: type=1800 audit(1572502176.872:35): pid=9022 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=23 res=0 [ 196.589744][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.619470][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.626942][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.654533][ T26] audit: type=1804 audit(1572502176.912:36): pid=9022 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir847474679/syzkaller.AdSVXK/1/file0/file0" dev="loop2" ino=23 res=1 [ 196.689428][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.716525][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.742876][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.751585][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.766329][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.775256][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.791944][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.801700][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 06:09:37 executing program 1: r0 = socket(0x10, 0x0, 0x0) gettid() tgkill(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000800), 0x0) recvfrom(r0, &(0x7f0000000000)=""/100, 0x64, 0x80, &(0x7f0000000200)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x80) socket$netlink(0x10, 0x3, 0x3) r1 = open(&(0x7f0000001780)='./file0\x00', 0x0, 0x111) fchdir(r1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000840)={0x194, 0x0, 0x20, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x8, 0x1, '\xe0'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_BEARER={0x11c, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa48}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bpq0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x8}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x101, @rand_addr="416e9b70479e0576f0c664b64cace619"}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x0, @mcast1}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @dev, 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @remote}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffff9fe6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}]}, 0x194}}, 0x4000) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) truncate(&(0x7f0000001740)='./file0\x00', 0x5) sendfile(r2, r3, 0x0, 0x7fffffa7) 06:09:37 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") r1 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r1, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r2 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x20000100000000a, &(0x7f0000000200)=0x2, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x8000008800, &(0x7f0000000000)={0xa, 0x200000000004e23, 0x0, @ipv4={[], [], @empty}}, 0x1c) sendto$inet6(r2, &(0x7f0000000d40)="dd", 0x1, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000040)=""/77, 0x4d) [ 196.810876][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.851649][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.936128][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.944348][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.083336][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.091350][ T26] audit: type=1800 audit(1572502177.382:37): pid=9031 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=24 res=0 [ 197.169397][ T8958] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.229744][ T8956] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 06:09:37 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") r1 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r1, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r2 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x20000100000000a, &(0x7f0000000200)=0x2, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x8000008800, &(0x7f0000000000)={0xa, 0x200000000004e23, 0x0, @ipv4={[], [], @empty}}, 0x1c) sendto$inet6(r2, &(0x7f0000000d40)="dd", 0x1, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000040)=""/77, 0x4d) [ 197.295179][ T26] audit: type=1804 audit(1572502177.392:38): pid=9031 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir109296982/syzkaller.b6FObo/4/file0/file0" dev="loop1" ino=24 res=1 [ 197.307419][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.366448][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.374855][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.572846][ T8956] 8021q: adding VLAN 0 to HW filter on device batadv0 06:09:38 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000080)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f0000001100)={0xa, 0x4e24, 0x0, @local}, 0x1c, 0x0}}], 0x2, 0x0) [ 198.036631][ T9067] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 06:09:38 executing program 4: r0 = timerfd_create(0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/115, 0x73}], 0x1) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x387b1d0849878266, 0x8031, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 06:09:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000640)='2', 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a94625a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 06:09:38 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") r1 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r1, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r2 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x20000100000000a, &(0x7f0000000200)=0x2, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x8000008800, &(0x7f0000000000)={0xa, 0x200000000004e23, 0x0, @ipv4={[], [], @empty}}, 0x1c) read(r1, &(0x7f0000000040)=""/77, 0x4d) 06:09:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x20) close(r0) 06:09:38 executing program 2: r0 = socket(0x10, 0x0, 0x0) gettid() tgkill(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000800), 0x0) recvfrom(r0, &(0x7f0000000000)=""/100, 0x64, 0x80, &(0x7f0000000200)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x80) socket$netlink(0x10, 0x3, 0x3) r1 = open(&(0x7f0000001780)='./file0\x00', 0x0, 0x111) fchdir(r1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000840)={0x194, 0x0, 0x20, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x8, 0x1, '\xe0'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_BEARER={0x11c, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa48}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bpq0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x8}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x101, @rand_addr="416e9b70479e0576f0c664b64cace619"}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x0, @mcast1}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @dev, 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @remote}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffff9fe6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}]}, 0x194}}, 0x4000) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) truncate(&(0x7f0000001740)='./file0\x00', 0x5) sendfile(r2, r3, 0x0, 0x7fffffa7) 06:09:38 executing program 1: r0 = socket(0x10, 0x0, 0x0) gettid() tgkill(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000800), 0x0) recvfrom(r0, &(0x7f0000000000)=""/100, 0x64, 0x80, &(0x7f0000000200)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x80) socket$netlink(0x10, 0x3, 0x3) r1 = open(&(0x7f0000001780)='./file0\x00', 0x0, 0x111) fchdir(r1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000840)={0x194, 0x0, 0x20, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x8, 0x1, '\xe0'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_BEARER={0x11c, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa48}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bpq0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x8}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x101, @rand_addr="416e9b70479e0576f0c664b64cace619"}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x0, @mcast1}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @dev, 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @remote}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffff9fe6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}]}, 0x194}}, 0x4000) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) truncate(&(0x7f0000001740)='./file0\x00', 0x5) sendfile(r2, r3, 0x0, 0x7fffffa7) [ 198.349440][ T26] audit: type=1800 audit(1572502178.652:39): pid=9087 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=25 res=0 06:09:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x20) close(r0) 06:09:38 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x0, 0x0, 0x0, 0x6}, 0x20) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) wait4(0x0, 0x0, 0x0, 0x0) [ 198.524628][ T26] audit: type=1804 audit(1572502178.712:40): pid=9073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir847474679/syzkaller.AdSVXK/2/file0/file0" dev="loop2" ino=25 res=1 06:09:38 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r1, r1, 0x0) getgroups(0x0, 0x0) stat(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() r4 = getgid() timerfd_create(0x0, 0x0) setresgid(0x0, 0x0, 0x0) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r7 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r7, 0xc0184900, &(0x7f0000000040)={0xa925, 0x1, 0x0, 0xffffffffffffffff}) r9 = dup(r8) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r6, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r9}) sendto$inet(r9, &(0x7f00000003c0)="9c5fe322102787263a3773aee1fdd23f8f1ac5dae8a7a2cebbf699f6691cf8817a711b7db973763ad28fb843be8be8b669581c0363ec1ac0090badd1a237d2c3bad9cf462aab2a3a6c9a874927bbfc70a300b2e672503218de0525c3170a87cfc37543dd42b5ed4820fb3b1bbf3d44fd202a34beab89197eaae3b7c3a115ed10322ff4c566f1cfcfb8c1f08051f39564b9", 0x91, 0x0, 0x0, 0x0) getgroups(0x6, &(0x7f0000000380)=[0x0, r2, r3, r4, 0x0, r5]) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, &(0x7f0000000c40)={{}, {}, [{}], {}, [{}, {}, {}]}, 0x44, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 06:09:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5a03}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000080)=""/121, 0x79}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x2) [ 198.575981][ T9100] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 06:09:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000080)=""/121, 0x79}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x2) 06:09:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000039ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000039ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) sendmsg$unix(r4, &(0x7f0000000180)={&(0x7f0000f5aff6)=@abs={0x1, 0x0, 0x4e23}, 0x187, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0) dup2(r5, r4) ioctl$TIOCCBRK(r5, 0x5428) dup2(r2, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000039ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) sendmsg$unix(r7, &(0x7f0000000180)={&(0x7f0000f5aff6)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) r9 = dup2(r8, r7) write$P9_RLOPEN(r9, 0x0, 0x0) r10 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r11, 0x10e, 0x1, &(0x7f0000000100)=0x1007, 0x4) getresuid(&(0x7f00000000c0), 0x0, &(0x7f0000000140)) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000039ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = fcntl$dupfd(r13, 0x0, 0xffffffffffffffff) sendmsg$unix(r14, &(0x7f0000000180)={&(0x7f0000f5aff6)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) dup2(r15, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r16 = socket$key(0xf, 0x3, 0x2) ioctl$sock_FIOGETOWN(r16, 0x8903, &(0x7f00000000c0)) ptrace$peek(0x1, 0x0, &(0x7f0000000100)) ioctl$LOOP_CTL_ADD(r10, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, 0x0) [ 198.985411][ T9111] overlayfs: filesystem on './file0' not supported as upperdir [ 199.011505][ T9126] ================================================================== [ 199.019865][ T9126] BUG: KASAN: null-ptr-deref in io_wq_cancel_all+0x28/0x2a0 [ 199.027247][ T9126] Write of size 8 at addr 0000000000000004 by task syz-executor.1/9126 [ 199.027259][ T9126] [ 199.027275][ T9126] CPU: 1 PID: 9126 Comm: syz-executor.1 Not tainted 5.4.0-rc5-next-20191030 #0 [ 199.027284][ T9126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.027290][ T9126] Call Trace: [ 199.027312][ T9126] dump_stack+0x172/0x1f0 [ 199.027327][ T9126] ? io_wq_cancel_all+0x28/0x2a0 [ 199.027338][ T9126] ? io_wq_cancel_all+0x28/0x2a0 [ 199.027354][ T9126] __kasan_report.cold+0x5/0x41 [ 199.027368][ T9126] ? io_wq_cancel_all+0x28/0x2a0 [ 199.027388][ T9126] kasan_report+0x12/0x20 [ 199.027403][ T9126] check_memory_region+0x134/0x1a0 [ 199.038111][ T9126] __kasan_check_write+0x14/0x20 [ 199.038127][ T9126] io_wq_cancel_all+0x28/0x2a0 [ 199.038148][ T9126] ? perf_trace_lock+0xeb/0x4c0 [ 199.038170][ T9126] io_uring_flush+0x35a/0x4e0 [ 199.115282][ T9126] ? io_wake_function+0x260/0x260 [ 199.120314][ T9126] ? exit_files+0x7b/0xb0 [ 199.124686][ T9126] ? finish_wait+0x260/0x260 [ 199.132389][ T9126] ? exit_files+0x7b/0xb0 [ 199.136884][ T9126] ? io_wake_function+0x260/0x260 [ 199.141911][ T9126] filp_close+0xbd/0x170 [ 199.146148][ T9126] put_files_struct+0x1d7/0x2f0 [ 199.151078][ T9126] exit_files+0x83/0xb0 [ 199.155234][ T9126] do_exit+0x8d2/0x2e60 [ 199.159387][ T9126] ? mm_update_next_owner+0x640/0x640 [ 199.164864][ T9126] ? lock_downgrade+0x920/0x920 [ 199.169703][ T9126] ? _raw_spin_unlock_irq+0x23/0x80 [ 199.174885][ T9126] ? get_signal+0x392/0x24f0 [ 199.179459][ T9126] ? _raw_spin_unlock_irq+0x23/0x80 [ 199.184669][ T9126] do_group_exit+0x135/0x360 [ 199.189265][ T9126] get_signal+0x47c/0x24f0 [ 199.193771][ T9126] ? lock_downgrade+0x920/0x920 [ 199.198794][ T9126] do_signal+0x87/0x1700 [ 199.203025][ T9126] ? __kasan_check_read+0x11/0x20 [ 199.208318][ T9126] ? _copy_to_user+0x118/0x160 [ 199.213084][ T9126] ? setup_sigcontext+0x7d0/0x7d0 [ 199.218116][ T9126] ? exit_to_usermode_loop+0x43/0x380 [ 199.223850][ T9126] ? do_syscall_64+0x65f/0x760 [ 199.228653][ T9126] ? exit_to_usermode_loop+0x43/0x380 [ 199.234113][ T9126] ? lockdep_hardirqs_on+0x421/0x5e0 [ 199.239476][ T9126] ? trace_hardirqs_on+0x67/0x240 [ 199.244490][ T9126] exit_to_usermode_loop+0x286/0x380 [ 199.249850][ T9126] do_syscall_64+0x65f/0x760 [ 199.254448][ T9126] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.260326][ T9126] RIP: 0033:0x459f49 [ 199.264219][ T9126] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.284016][ T9126] RSP: 002b:00007fe828f03cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 199.293243][ T9126] RAX: 0000000000000001 RBX: 000000000075bfd0 RCX: 0000000000459f49 [ 199.301378][ T9126] RDX: 00000000004cdd98 RSI: 0000000000000081 RDI: 000000000075bfd4 [ 199.309438][ T9126] RBP: 000000000075bfc8 R08: 0000000000000009 R09: 0000000000000000 [ 199.317870][ T9126] R10: ffffffffffffffff R11: 0000000000000246 R12: 000000000075bfd4 [ 199.325828][ T9126] R13: 00007ffdd986756f R14: 00007fe828f049c0 R15: 000000000075bfd4 [ 199.333823][ T9126] ================================================================== [ 199.341864][ T9126] Disabling lock debugging due to kernel taint [ 199.357561][ T9126] Kernel panic - not syncing: panic_on_warn set ... [ 199.364983][ T9126] CPU: 1 PID: 9126 Comm: syz-executor.1 Tainted: G B 5.4.0-rc5-next-20191030 #0 [ 199.375518][ T9126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.386302][ T9126] Call Trace: [ 199.389608][ T9126] dump_stack+0x172/0x1f0 [ 199.393954][ T9126] panic+0x2e3/0x75c [ 199.398009][ T9126] ? add_taint.cold+0x16/0x16 [ 199.402698][ T9126] ? io_wq_cancel_all+0x28/0x2a0 [ 199.407632][ T9126] ? preempt_schedule+0x4b/0x60 [ 199.412774][ T9126] ? ___preempt_schedule+0x16/0x18 [ 199.417874][ T9126] ? trace_hardirqs_on+0x5e/0x240 [ 199.422886][ T9126] ? io_wq_cancel_all+0x28/0x2a0 [ 199.427809][ T9126] end_report+0x47/0x4f [ 199.432144][ T9126] ? io_wq_cancel_all+0x28/0x2a0 [ 199.437675][ T9126] __kasan_report.cold+0xe/0x41 [ 199.442595][ T9126] ? io_wq_cancel_all+0x28/0x2a0 [ 199.447567][ T9126] kasan_report+0x12/0x20 [ 199.452315][ T9126] check_memory_region+0x134/0x1a0 [ 199.457424][ T9126] __kasan_check_write+0x14/0x20 [ 199.462992][ T9126] io_wq_cancel_all+0x28/0x2a0 [ 199.467795][ T9126] ? perf_trace_lock+0xeb/0x4c0 [ 199.472630][ T9126] io_uring_flush+0x35a/0x4e0 [ 199.477309][ T9126] ? io_wake_function+0x260/0x260 [ 199.482407][ T9126] ? exit_files+0x7b/0xb0 [ 199.486986][ T9126] ? finish_wait+0x260/0x260 [ 199.491646][ T9126] ? exit_files+0x7b/0xb0 [ 199.495961][ T9126] ? io_wake_function+0x260/0x260 [ 199.501318][ T9126] filp_close+0xbd/0x170 [ 199.505545][ T9126] put_files_struct+0x1d7/0x2f0 [ 199.510482][ T9126] exit_files+0x83/0xb0 [ 199.514640][ T9126] do_exit+0x8d2/0x2e60 [ 199.518871][ T9126] ? mm_update_next_owner+0x640/0x640 [ 199.524228][ T9126] ? lock_downgrade+0x920/0x920 [ 199.529253][ T9126] ? _raw_spin_unlock_irq+0x23/0x80 [ 199.534447][ T9126] ? get_signal+0x392/0x24f0 [ 199.539016][ T9126] ? _raw_spin_unlock_irq+0x23/0x80 [ 199.544199][ T9126] do_group_exit+0x135/0x360 [ 199.548790][ T9126] get_signal+0x47c/0x24f0 [ 199.553212][ T9126] ? lock_downgrade+0x920/0x920 [ 199.558142][ T9126] do_signal+0x87/0x1700 [ 199.565147][ T9126] ? __kasan_check_read+0x11/0x20 [ 199.570157][ T9126] ? _copy_to_user+0x118/0x160 [ 199.574994][ T9126] ? setup_sigcontext+0x7d0/0x7d0 [ 199.580006][ T9126] ? exit_to_usermode_loop+0x43/0x380 [ 199.585368][ T9126] ? do_syscall_64+0x65f/0x760 [ 199.590129][ T9126] ? exit_to_usermode_loop+0x43/0x380 [ 199.595483][ T9126] ? lockdep_hardirqs_on+0x421/0x5e0 [ 199.600754][ T9126] ? trace_hardirqs_on+0x67/0x240 [ 199.606210][ T9126] exit_to_usermode_loop+0x286/0x380 [ 199.611496][ T9126] do_syscall_64+0x65f/0x760 [ 199.616108][ T9126] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.622001][ T9126] RIP: 0033:0x459f49 [ 199.625901][ T9126] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.646356][ T9126] RSP: 002b:00007fe828f03cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 199.654757][ T9126] RAX: 0000000000000001 RBX: 000000000075bfd0 RCX: 0000000000459f49 [ 199.663230][ T9126] RDX: 00000000004cdd98 RSI: 0000000000000081 RDI: 000000000075bfd4 [ 199.671203][ T9126] RBP: 000000000075bfc8 R08: 0000000000000009 R09: 0000000000000000 [ 199.679182][ T9126] R10: ffffffffffffffff R11: 0000000000000246 R12: 000000000075bfd4 [ 199.687141][ T9126] R13: 00007ffdd986756f R14: 00007fe828f049c0 R15: 000000000075bfd4 [ 199.697152][ T9126] Kernel Offset: disabled [ 199.701502][ T9126] Rebooting in 86400 seconds..