[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 58.353087][ T27] audit: type=1800 audit(1576098344.431:25): pid=8761 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 58.374125][ T27] audit: type=1800 audit(1576098344.431:26): pid=8761 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 58.395279][ T27] audit: type=1800 audit(1576098344.431:27): pid=8761 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.6' (ECDSA) to the list of known hosts. 2019/12/11 21:05:54 fuzzer started 2019/12/11 21:05:56 dialing manager at 10.128.0.26:33577 2019/12/11 21:05:56 syscalls: 2701 2019/12/11 21:05:56 code coverage: enabled 2019/12/11 21:05:56 comparison tracing: enabled 2019/12/11 21:05:56 extra coverage: enabled 2019/12/11 21:05:56 setuid sandbox: enabled 2019/12/11 21:05:56 namespace sandbox: enabled 2019/12/11 21:05:56 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/11 21:05:56 fault injection: enabled 2019/12/11 21:05:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/11 21:05:56 net packet injection: enabled 2019/12/11 21:05:56 net device setup: enabled 2019/12/11 21:05:56 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/11 21:05:56 devlink PCI setup: PCI device 0000:00:10.0 is not available 21:07:45 executing program 0: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1142, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, 0x0) ptrace(0x11, r0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) 21:07:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write(r0, &(0x7f00000000c0), 0x0) syzkaller login: [ 179.448935][ T8928] IPVS: ftp: loaded support on port[0] = 21 [ 179.565220][ T8930] IPVS: ftp: loaded support on port[0] = 21 21:07:45 executing program 2: sendmmsg$alg(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0xff00, 0x0, 0x0, &(0x7f0000002780)=[@op={0x18, 0x29}], 0x18}], 0x146, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 179.679444][ T8928] chnl_net:caif_netlink_parms(): no params data found [ 179.839093][ T8930] chnl_net:caif_netlink_parms(): no params data found [ 179.850323][ T8928] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.859543][ T8928] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.868025][ T8928] device bridge_slave_0 entered promiscuous mode [ 179.903151][ T8935] IPVS: ftp: loaded support on port[0] = 21 [ 179.915418][ T8928] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.922467][ T8928] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.930954][ T8928] device bridge_slave_1 entered promiscuous mode [ 179.951002][ T8930] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.961152][ T8930] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.969470][ T8930] device bridge_slave_0 entered promiscuous mode [ 179.992450][ T8930] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.003755][ T8930] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.011740][ T8930] device bridge_slave_1 entered promiscuous mode [ 180.048978][ T8930] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 180.062567][ T8928] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 180.078948][ T8928] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 180.090428][ T8930] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 21:07:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000006005b000000ff01080000ffffffffffffffe2000001e0006bf000000000800000000000000000000000000000000a00002e00000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000fbbccf810000000000000000fd85d16e79bad40ac3794899000000000000000000000000000000d94bfeadbfce0d4ed6f71b242b42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000e6010000000100000000002000"], 0xb8}}, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) [ 180.157680][ T8930] team0: Port device team_slave_0 added [ 180.179266][ T8928] team0: Port device team_slave_0 added [ 180.197106][ T8930] team0: Port device team_slave_1 added [ 180.221778][ T8928] team0: Port device team_slave_1 added [ 180.299262][ T8930] device hsr_slave_0 entered promiscuous mode 21:07:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0xbd, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 180.455670][ T8930] device hsr_slave_1 entered promiscuous mode 21:07:46 executing program 5: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x2c1) [ 180.551736][ T8937] IPVS: ftp: loaded support on port[0] = 21 [ 180.586314][ T8928] device hsr_slave_0 entered promiscuous mode [ 180.643691][ T8928] device hsr_slave_1 entered promiscuous mode [ 180.693370][ T8928] debugfs: Directory 'hsr0' with parent '/' already present! [ 180.731986][ T8941] IPVS: ftp: loaded support on port[0] = 21 [ 180.732083][ T8939] IPVS: ftp: loaded support on port[0] = 21 [ 180.786918][ T8935] chnl_net:caif_netlink_parms(): no params data found [ 180.815092][ T8930] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 180.897638][ T8930] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 180.968282][ T8930] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 181.028710][ T8930] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 181.131768][ T8935] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.139430][ T8935] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.147847][ T8935] device bridge_slave_0 entered promiscuous mode [ 181.157195][ T8935] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.164366][ T8935] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.171952][ T8935] device bridge_slave_1 entered promiscuous mode [ 181.192008][ T8928] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 181.289555][ T8928] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 181.347998][ T8928] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 181.408828][ T8928] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 181.489735][ T8935] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 181.507557][ T8935] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 181.533070][ T8935] team0: Port device team_slave_0 added [ 181.542663][ T8935] team0: Port device team_slave_1 added [ 181.616039][ T8935] device hsr_slave_0 entered promiscuous mode [ 181.664553][ T8935] device hsr_slave_1 entered promiscuous mode [ 181.693320][ T8935] debugfs: Directory 'hsr0' with parent '/' already present! [ 181.756737][ T8937] chnl_net:caif_netlink_parms(): no params data found [ 181.836169][ T8939] chnl_net:caif_netlink_parms(): no params data found [ 181.942143][ T8941] chnl_net:caif_netlink_parms(): no params data found [ 181.963725][ T8935] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 182.019606][ T8935] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 182.071297][ T8935] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 182.126012][ T8935] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 182.217400][ T8937] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.224900][ T8937] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.232641][ T8937] device bridge_slave_0 entered promiscuous mode [ 182.242925][ T8937] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.250977][ T8937] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.258826][ T8937] device bridge_slave_1 entered promiscuous mode [ 182.266162][ T8939] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.274837][ T8939] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.282466][ T8939] device bridge_slave_0 entered promiscuous mode [ 182.290879][ T8939] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.298049][ T8939] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.305839][ T8939] device bridge_slave_1 entered promiscuous mode [ 182.349692][ T8941] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.358441][ T8941] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.366563][ T8941] device bridge_slave_0 entered promiscuous mode [ 182.406273][ T8928] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.414602][ T8941] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.421732][ T8941] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.430033][ T8941] device bridge_slave_1 entered promiscuous mode [ 182.438895][ T8937] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 182.452844][ T8930] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.464046][ T8939] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 182.482269][ T8939] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 182.493757][ T8937] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 182.536534][ T8941] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 182.548430][ T8941] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 182.577086][ T8937] team0: Port device team_slave_0 added [ 182.585587][ T8939] team0: Port device team_slave_0 added [ 182.592922][ T8937] team0: Port device team_slave_1 added [ 182.611851][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.619933][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.627981][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.636140][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.645637][ T8939] team0: Port device team_slave_1 added [ 182.660952][ T8928] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.680448][ T8941] team0: Port device team_slave_0 added [ 182.689792][ T8941] team0: Port device team_slave_1 added [ 182.697721][ T8930] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.776118][ T8939] device hsr_slave_0 entered promiscuous mode [ 182.833631][ T8939] device hsr_slave_1 entered promiscuous mode [ 182.893336][ T8939] debugfs: Directory 'hsr0' with parent '/' already present! [ 182.955260][ T8937] device hsr_slave_0 entered promiscuous mode [ 183.003718][ T8937] device hsr_slave_1 entered promiscuous mode [ 183.063373][ T8937] debugfs: Directory 'hsr0' with parent '/' already present! [ 183.146897][ T8941] device hsr_slave_0 entered promiscuous mode [ 183.183811][ T8941] device hsr_slave_1 entered promiscuous mode [ 183.223448][ T8941] debugfs: Directory 'hsr0' with parent '/' already present! [ 183.236378][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.245665][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.254229][ T1043] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.261356][ T1043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.269575][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.279347][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.287778][ T1043] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.294868][ T1043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.302621][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.311068][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.369367][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.379340][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.388400][ T8932] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.395498][ T8932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.403283][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.411823][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.420964][ T8932] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.428044][ T8932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.436249][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.472328][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.486268][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.495048][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.503959][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.512197][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.531941][ T8937] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 183.590175][ T8937] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 183.651349][ T8937] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 183.704719][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.712571][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.722217][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.736723][ T8935] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.743897][ T8939] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 183.803839][ T8941] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 183.846051][ T8937] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 183.889708][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.899588][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.908105][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.917000][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.925615][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.934400][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.942679][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.951178][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.959674][ T8939] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 184.015928][ T8939] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 184.056306][ T8941] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 184.116376][ T8941] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 184.185266][ T8941] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 184.230498][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.243293][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.251698][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.260727][ T8939] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 184.328873][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.338949][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.355250][ T8928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 184.380958][ T8935] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.390378][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 184.398230][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 184.406376][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.414558][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.449510][ T8930] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 184.482789][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.491537][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.500164][ T1043] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.507278][ T1043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.516660][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.524693][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.533317][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.541622][ T1043] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.548698][ T1043] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.584027][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 184.591504][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 184.622635][ T8937] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.638941][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.655706][ T8928] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 184.667759][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.728721][ T8937] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.759461][ T8939] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.782447][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.795481][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.811139][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.820709][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.830851][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.841315][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.889483][ T8935] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 184.902356][ T8935] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 184.915596][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.925281][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 21:07:51 executing program 1: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x0, 0x0) close(r0) [ 184.934702][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.945338][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.954464][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.971113][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.978240][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.990616][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.999674][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.008550][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.015757][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.023882][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.032746][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.041518][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.049821][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.058758][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.066745][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.097531][ T8941] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.105679][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.114282][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.122593][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.131777][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.140392][ T1043] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.164952][ T8939] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.179645][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.188909][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.197529][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.206307][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 21:07:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getpid() setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x79, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040), 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0), 0x0, 0x0, 0x0, 0x7115}, 0x100) [ 185.225192][ T8941] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.248159][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.268456][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.293020][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.309106][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.320660][ T8932] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.327809][ T8932] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.335624][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.344340][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.352617][ T8932] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.359748][ T8932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.367403][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 185.374932][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 185.384467][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.392720][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.401721][ T8932] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.428393][ T8937] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.443304][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.451986][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.460570][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.467666][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.477598][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.486753][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.495423][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.502469][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.512318][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.522625][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.530737][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.546185][ T8935] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.579140][ T8949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 21:07:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'veth1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x50000000000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="7c0000002400070e9d2f003242ed540856351bbf", @ANYRES32=r1, @ANYBLOB="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"], 0x7c}}, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec16, 0x0) [ 185.591364][ T8949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 21:07:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xff2e) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000003900)=""/150, 0x96}, {&(0x7f00000039c0)=""/188, 0xbc}], 0x2}}], 0x1, 0x0, 0x0) [ 185.629365][ T8949] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 185.637367][ T8949] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 185.649865][ T8949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.659270][ T8949] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.684693][ T8971] netlink: 63 bytes leftover after parsing attributes in process `syz-executor.1'. [ 185.743495][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.752027][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.760977][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.775671][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 21:07:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xff2e) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000003900)=""/150, 0x96}, {&(0x7f00000039c0)=""/188, 0xbc}], 0x2}}], 0x1, 0x0, 0x0) [ 185.789088][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.799795][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.812132][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.822528][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.838314][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.848640][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.861379][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.872266][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 21:07:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xff2e) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000003900)=""/150, 0x96}, {&(0x7f00000039c0)=""/188, 0xbc}], 0x2}}], 0x1, 0x0, 0x0) [ 185.889355][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.898106][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.912749][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.925421][ T8939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 21:07:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'veth1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x50000000000, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="7c0000002400070e9d2f003242ed540856351bbf", @ANYRES32=r1, @ANYBLOB="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"], 0x7c}}, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec16, 0x0) [ 185.942553][ T8937] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.959023][ T8941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.972852][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 21:07:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xff2e) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000003900)=""/150, 0x96}, {&(0x7f00000039c0)=""/188, 0xbc}], 0x2}}], 0x1, 0x0, 0x0) [ 186.099471][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 186.108473][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 186.130209][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 21:07:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xff2e) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000003900)=""/150, 0x96}, {&(0x7f00000039c0)=""/188, 0xbc}], 0x2}}], 0x1, 0x0, 0x0) [ 186.145809][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 186.168249][ T8941] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 186.196518][ T8939] 8021q: adding VLAN 0 to HW filter on device batadv0 21:07:52 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) fsopen(&(0x7f0000000600)='cgroup\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000800}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/nvme-fabrics\x00', 0x4000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000740)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000880)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f0000000780)={0x6c, r1, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_LINK={0x2c, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x4000) rt_sigaction(0x9, 0x0, 0x0, 0x8, &(0x7f0000000440)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) r2 = add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) socket$inet6_udplite(0xa, 0x2, 0x88) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r2, r3}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000040)={'blake2s-256-generic\x00'}}) r4 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_RM_MAP(r4, 0x4018641b, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) memfd_create(0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x18, r6, 0x1, 0x0, 0x0, {0xb}, [@TIPC_NLA_MEDIA={0x4}]}, 0x18}}, 0x0) [ 186.616822][ C1] hrtimer: interrupt took 26245 ns 21:07:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'veth1_to_team\x00', &(0x7f0000000100)=@ethtool_cmd={0x13}}) 21:07:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000000)=0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=ANY=[]}) 21:07:52 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x12) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r4, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r4, &(0x7f0000000240)="e1e2ba918014ed1efc", 0xfffffffffffffca6, 0x10, 0x0, 0x107) splice(r4, 0x0, r3, 0x0, 0xa7, 0x0) 21:07:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000003900)=""/150, 0x96}, {&(0x7f00000039c0)=""/188, 0xbc}], 0x2}}], 0x1, 0x0, 0x0) 21:07:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xff2e) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000003900)=""/150, 0x96}, {&(0x7f00000039c0)=""/188, 0xbc}], 0x2}}], 0x1, 0x0, 0x0) 21:07:52 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 21:07:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xff2e) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000003900)=""/150, 0x96}, {&(0x7f00000039c0)=""/188, 0xbc}], 0x2}}], 0x1, 0x0, 0x0) 21:07:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000003900)=""/150, 0x96}, {&(0x7f00000039c0)=""/188, 0xbc}], 0x2}}], 0x1, 0x0, 0x0) 21:07:53 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x0, 0x0) 21:07:53 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f00000000c0), 0x4) [ 186.955747][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 186.955760][ T27] audit: type=1326 audit(1576098473.041:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9051 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d68a code=0x0 21:07:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xff2e) 21:07:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000003900)=""/150, 0x96}, {&(0x7f00000039c0)=""/188, 0xbc}], 0x2}}], 0x1, 0x0, 0x0) 21:07:53 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @rand_addr="7d1b216265d8a27b5ccae4e324faa88a"}, 0x1c) 21:07:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) accept$alg(r0, 0x0, 0x0) 21:07:53 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x0, 0x1000ae00) close(r0) 21:07:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xff2e) recvmmsg(0xffffffffffffffff, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000003900)=""/150, 0x96}, {&(0x7f00000039c0)=""/188, 0xbc}], 0x2}}], 0x1, 0x0, 0x0) 21:07:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/147}, 0x9b, 0x0, 0x0) [ 187.723117][ T27] audit: type=1326 audit(1576098473.801:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9051 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d68a code=0x0 21:07:53 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 21:07:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) 21:07:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') 21:07:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xff2e) recvmmsg(0xffffffffffffffff, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000003900)=""/150, 0x96}, {&(0x7f00000039c0)=""/188, 0xbc}], 0x2}}], 0x1, 0x0, 0x0) 21:07:53 executing program 4: fdatasync(0xffffffffffffffff) accept$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0xff64, 0x0}, 0xffffffffffffff36) readahead(r0, 0x4, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) fdatasync(r1) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r2}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000180)={r3, &(0x7f00000001c0), 0x0}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x0, 0x0, 0x0, 0xd}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x0, 0x0, 0x0, r4}, 0x3c) 21:07:53 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x0, 0x1000ae00) close(r0) 21:07:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) [ 187.878911][ T27] audit: type=1326 audit(1576098473.961:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9107 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d68a code=0x0 21:07:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xff2e) recvmmsg(0xffffffffffffffff, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000003900)=""/150, 0x96}, {&(0x7f00000039c0)=""/188, 0xbc}], 0x2}}], 0x1, 0x0, 0x0) 21:07:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = open(0x0, 0x40c5, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0) syz_read_part_table(0x3, 0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x1a0}]) 21:07:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000000)="0f22270fc76ca7baa00066ed66b91e0100000f320f20d86635200000000f20d86635080000000f22d8f30fbcf80f3581d90c0066f2ba5f57160fc77c01", 0x3d}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) 21:07:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xff2e) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000003900)=""/150, 0x96}, {&(0x7f00000039c0)=""/188, 0xbc}], 0x2}}], 0x1, 0x0, 0x0) [ 188.086157][ T9127] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 21:07:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) [ 188.243222][ T9122] list_del corruption. prev->next should be ffff888095e00eb0, but was ffff8880a568c970 [ 188.253729][ T9122] ------------[ cut here ]------------ [ 188.259206][ T9122] kernel BUG at lib/list_debug.c:51! [ 188.264571][ T9122] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 188.270642][ T9122] CPU: 1 PID: 9122 Comm: syz-executor.5 Not tainted 5.5.0-rc1-next-20191211-syzkaller #0 [ 188.280437][ T9122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.290505][ T9122] RIP: 0010:__list_del_entry_valid.cold+0xf/0x4f [ 188.296835][ T9122] Code: e8 c9 00 cb fd 0f 0b 48 89 f1 48 c7 c7 c0 10 70 88 4c 89 e6 e8 b5 00 cb fd 0f 0b 4c 89 f6 48 c7 c7 60 12 70 88 e8 a4 00 cb fd <0f> 0b 4c 89 ea 4c 89 f6 48 c7 c7 a0 11 70 88 e8 90 00 cb fd 0f 0b [ 188.316439][ T9122] RSP: 0018:ffffc90001687c00 EFLAGS: 00010282 [ 188.322496][ T9122] RAX: 0000000000000054 RBX: ffff8880a5686080 RCX: 0000000000000000 [ 188.330447][ T9122] RDX: 0000000000000000 RSI: ffffffff815e8576 RDI: fffff520002d0f72 [ 188.338402][ T9122] RBP: ffffc90001687c18 R08: 0000000000000054 R09: ffffed1015d26621 [ 188.346364][ T9122] R10: ffffed1015d26620 R11: ffff8880ae933107 R12: ffff8880a5686180 [ 188.354325][ T9122] R13: ffff8880a568c970 R14: ffff888095e00eb0 R15: ffff888095e00eb0 [ 188.362297][ T9122] FS: 0000000001ac6940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 188.371219][ T9122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 188.377805][ T9122] CR2: 0000001b31b21000 CR3: 00000000946a3000 CR4: 00000000001426e0 [ 188.385775][ T9122] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 188.393910][ T9122] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 188.401871][ T9122] Call Trace: [ 188.405158][ T9122] __dentry_kill+0x1fd/0x600 [ 188.409735][ T9122] ? dput+0x38/0xe10 [ 188.413616][ T9122] ? dput+0x38/0xe10 [ 188.417503][ T9122] dput+0x62f/0xe10 [ 188.421292][ T9122] simple_recursive_removal+0x5bc/0x6d0 [ 188.426821][ T9122] ? debugfs_rename+0x7f0/0x7f0 [ 188.431657][ T9122] debugfs_remove+0x5e/0x80 [ 188.436140][ T9122] kvm_put_kvm+0x136/0xcc0 [ 188.440535][ T9122] ? kvm_irqfd_release+0xe2/0x120 [ 188.445539][ T9122] ? kvm_irqfd_release+0xe2/0x120 [ 188.450540][ T9122] kvm_vm_release+0x44/0x60 [ 188.455025][ T9122] __fput+0x2ff/0x890 [ 188.458984][ T9122] ? kvm_dev_ioctl+0x17d0/0x17d0 [ 188.463908][ T9122] ____fput+0x16/0x20 [ 188.467921][ T9122] task_work_run+0x145/0x1c0 [ 188.472494][ T9122] exit_to_usermode_loop+0x316/0x380 [ 188.477761][ T9122] do_syscall_64+0x676/0x790 [ 188.482332][ T9122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.488201][ T9122] RIP: 0033:0x4143e1 [ 188.492087][ T9122] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 188.511699][ T9122] RSP: 002b:00007ffed7ffedb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 188.520092][ T9122] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00000000004143e1 [ 188.528044][ T9122] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 188.535995][ T9122] RBP: 0000000000000001 R08: 00000000fc2b66a5 R09: 00000000fc2b66a9 [ 188.543950][ T9122] R10: 00007ffed7ffee90 R11: 0000000000000293 R12: 000000000075bf20 [ 188.551919][ T9122] R13: 000000000002df1a R14: 0000000000760898 R15: 000000000075bf2c [ 188.559877][ T9122] Modules linked in: [ 188.565276][ T9122] ---[ end trace 39355ffd00c71ac8 ]--- [ 188.570750][ T9122] RIP: 0010:__list_del_entry_valid.cold+0xf/0x4f [ 188.577092][ T9122] Code: e8 c9 00 cb fd 0f 0b 48 89 f1 48 c7 c7 c0 10 70 88 4c 89 e6 e8 b5 00 cb fd 0f 0b 4c 89 f6 48 c7 c7 60 12 70 88 e8 a4 00 cb fd <0f> 0b 4c 89 ea 4c 89 f6 48 c7 c7 a0 11 70 88 e8 90 00 cb fd 0f 0b [ 188.596735][ T9122] RSP: 0018:ffffc90001687c00 EFLAGS: 00010282 [ 188.602797][ T9122] RAX: 0000000000000054 RBX: ffff8880a5686080 RCX: 0000000000000000 [ 188.610812][ T9122] RDX: 0000000000000000 RSI: ffffffff815e8576 RDI: fffff520002d0f72 [ 188.618812][ T9122] RBP: ffffc90001687c18 R08: 0000000000000054 R09: ffffed1015d26621 [ 188.626799][ T9122] R10: ffffed1015d26620 R11: ffff8880ae933107 R12: ffff8880a5686180 [ 188.634794][ T9122] R13: ffff8880a568c970 R14: ffff888095e00eb0 R15: ffff888095e00eb0 21:07:54 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 21:07:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) 21:07:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$inet_int(r0, 0x0, 0xe, &(0x7f0000000180), &(0x7f00000001c0)=0x1) 21:07:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xff2e) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000003900)=""/150, 0x96}, {&(0x7f00000039c0)=""/188, 0xbc}], 0x2}}], 0x1, 0x0, 0x0) [ 188.642759][ T9122] FS: 0000000001ac6940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 188.651712][ T9122] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 188.658320][ T9122] CR2: 0000001b31b21000 CR3: 00000000946a3000 CR4: 00000000001426e0 [ 188.666329][ T9122] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 188.674344][ T9122] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 188.682300][ T9122] Kernel panic - not syncing: Fatal exception [ 188.689710][ T9122] Kernel Offset: disabled [ 188.694034][ T9122] Rebooting in 86400 seconds..