[ 36.023031] kauditd_printk_skb: 9 callbacks suppressed [ 36.023039] audit: type=1800 audit(1555982547.928:33): pid=7000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 36.060231] audit: type=1800 audit(1555982547.928:34): pid=7000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 [ 36.505225] random: sshd: uninitialized urandom read (32 bytes read) [ 36.904384] audit: type=1400 audit(1555982548.808:35): avc: denied { map } for pid=7175 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 36.957940] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 37.686504] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.232' (ECDSA) to the list of known hosts. [ 43.261133] random: sshd: uninitialized urandom read (32 bytes read) 2019/04/23 01:22:35 fuzzer started [ 43.459982] audit: type=1400 audit(1555982555.358:36): avc: denied { map } for pid=7184 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 45.149674] random: cc1: uninitialized urandom read (8 bytes read) 2019/04/23 01:22:37 dialing manager at 10.128.0.105:46537 2019/04/23 01:22:37 syscalls: 2434 2019/04/23 01:22:37 code coverage: enabled 2019/04/23 01:22:37 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/04/23 01:22:37 extra coverage: extra coverage is not supported by the kernel 2019/04/23 01:22:37 setuid sandbox: enabled 2019/04/23 01:22:37 namespace sandbox: enabled 2019/04/23 01:22:37 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/23 01:22:37 fault injection: enabled 2019/04/23 01:22:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/23 01:22:37 net packet injection: enabled 2019/04/23 01:22:37 net device setup: enabled [ 47.291082] random: crng init done 01:24:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/netlink\x00') connect$inet6(r0, 0x0, 0xfffffe23) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[], 0xfffffffffffffffc}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000300)=""/226, 0xe2, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000280)=""/94, 0x0) getpid() syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f00000002c0), 0x4cc, 0x20007ffc) getpid() recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:24:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/netlink\x00') connect$inet6(r0, 0x0, 0xfffffe23) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[], 0xfffffffffffffffc}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0x20007ffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) 01:24:39 executing program 2: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x55}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) 01:24:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x401, 0x0, 0x0, 0x0, 0x5}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 01:24:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) r4 = open(&(0x7f00000003c0)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc8, 0xe0, 0x5, {"cd9be787ba08d916d8438f7d464373129aaf2951f956a0a019747681456bdda9de652038528a92ad945964979596e06d3b0d9fd03fa4ba0e63c246c437d100f5659f305961bc07e7d6d0c1b9cb1813df635261c3a3ce90872e475a780c0505e79e75b29427f7def73fcdcc83369445a40676a0b53ac95835330812dcd6dd8b112ace0c61c54660cca47770949d054a79818468121f45aebfaeb442a7bde417144ad0cb548f7429c1899f3f464639361650d0aa332e79b403177072d66ec42561d93ae55330"}}, {0x0, "333c6437c97d9ef18ae9e29a0074c95cb03ff78da6913463959af20f344ae309a4c2294f7d8104445f9defeff641bd99a8457f6b058b7cbad38de88d1a645896ef07898c012adfd51bee1b5539e232cc428cabe5edb97361936ecd6fb14ba9d825c57a5bc33a05e80dee96ee9ea6a5b29b1d1c89767629c2df48b93b088bd563a7ffed7b72e327b87e054f0d63e5ee94605024ce982c6f4798705962395626c54a69f0c176d0c29bc38050c11e824629a77a94b486152d6a78e8006a7ef65bb16a26c15fe778af03388d22857c3c2e9e32"}}, 0x0, 0x1b3}, 0x20) write$P9_RREMOVE(r5, 0x0, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/247, 0xf7}], 0x1, 0x0) syncfs(r3) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) clone(0x808106, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = gettid() pause() ptrace$setopts(0x4206, r6, 0x0, 0x1) tkill(r6, 0x2c) socket$inet(0x2, 0x4000000000000001, 0x0) ptrace(0x18, r6) 01:24:39 executing program 1: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x82000001, 0x11011, r0, 0x0) [ 167.535880] audit: type=1400 audit(1555982679.438:37): avc: denied { map } for pid=7200 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=154 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 168.380328] IPVS: ftp: loaded support on port[0] = 21 [ 168.702583] chnl_net:caif_netlink_parms(): no params data found [ 168.711176] IPVS: ftp: loaded support on port[0] = 21 [ 168.775855] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.783000] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.790927] device bridge_slave_0 entered promiscuous mode [ 168.801335] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.807823] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.815037] device bridge_slave_1 entered promiscuous mode [ 168.839625] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 168.848967] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 168.876368] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 168.884245] team0: Port device team_slave_0 added [ 168.884335] IPVS: ftp: loaded support on port[0] = 21 [ 168.890123] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 168.901845] team0: Port device team_slave_1 added [ 168.913386] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 168.938098] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 169.032295] device hsr_slave_0 entered promiscuous mode [ 169.070413] device hsr_slave_1 entered promiscuous mode [ 169.113642] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 169.123230] chnl_net:caif_netlink_parms(): no params data found [ 169.132206] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 169.172232] IPVS: ftp: loaded support on port[0] = 21 [ 169.200263] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.206800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.213803] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.220852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.255812] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.264104] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.271252] device bridge_slave_0 entered promiscuous mode [ 169.291344] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.297788] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.306033] device bridge_slave_1 entered promiscuous mode [ 169.368143] chnl_net:caif_netlink_parms(): no params data found [ 169.377646] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 169.388520] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 169.427152] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 169.434649] team0: Port device team_slave_0 added [ 169.463404] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 169.471284] team0: Port device team_slave_1 added [ 169.482198] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.488582] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.495722] device bridge_slave_0 entered promiscuous mode [ 169.502781] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 169.509897] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.516413] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.523128] IPVS: ftp: loaded support on port[0] = 21 [ 169.529512] device bridge_slave_1 entered promiscuous mode [ 169.546999] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 169.567557] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 169.577622] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 169.662301] device hsr_slave_0 entered promiscuous mode [ 169.701572] device hsr_slave_1 entered promiscuous mode [ 169.752653] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 169.761298] team0: Port device team_slave_0 added [ 169.769749] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 169.777330] team0: Port device team_slave_1 added [ 169.798308] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.805831] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.815433] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 169.823434] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 169.843831] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 169.851373] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 169.953617] IPVS: ftp: loaded support on port[0] = 21 [ 169.959510] device hsr_slave_0 entered promiscuous mode [ 170.000544] device hsr_slave_1 entered promiscuous mode [ 170.050971] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 170.060929] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 170.090914] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 170.099618] chnl_net:caif_netlink_parms(): no params data found [ 170.137376] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.181328] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 170.188839] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 170.255765] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.262656] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.269623] device bridge_slave_0 entered promiscuous mode [ 170.282946] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 170.296088] chnl_net:caif_netlink_parms(): no params data found [ 170.309742] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.316598] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.323755] device bridge_slave_1 entered promiscuous mode [ 170.347310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.355796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.381962] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 170.397657] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 170.405342] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.418466] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 170.469755] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 170.491064] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 170.507876] team0: Port device team_slave_0 added [ 170.515981] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.523667] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.531030] device bridge_slave_0 entered promiscuous mode [ 170.538216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.546937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.554664] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.561132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.577748] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.586923] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 170.629288] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 170.636645] team0: Port device team_slave_1 added [ 170.641998] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.648380] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.656251] device bridge_slave_1 entered promiscuous mode [ 170.663573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.671609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.679222] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.685645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.694736] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 170.719062] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 170.743663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.757567] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 170.769236] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 170.785760] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 170.793878] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 170.804845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.814335] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 170.872656] device hsr_slave_0 entered promiscuous mode [ 170.910434] device hsr_slave_1 entered promiscuous mode [ 170.950753] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 170.958867] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 170.966778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.974627] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.982595] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.989811] chnl_net:caif_netlink_parms(): no params data found [ 171.003849] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 171.012697] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 171.021400] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 171.040001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.048309] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.056254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.063420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.082807] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 171.095523] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 171.101739] 8021q: adding VLAN 0 to HW filter on device team0 [ 171.114372] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 171.121853] team0: Port device team_slave_0 added [ 171.128832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.136832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.167712] 8021q: adding VLAN 0 to HW filter on device bond0 [ 171.174859] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 171.183224] team0: Port device team_slave_1 added [ 171.190743] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 171.198348] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 171.209339] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 171.235232] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 171.242122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.249755] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.258838] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 171.271125] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 171.278049] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 171.286006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.293509] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.299993] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.308060] device bridge_slave_0 entered promiscuous mode [ 171.372502] device hsr_slave_0 entered promiscuous mode [ 171.410421] device hsr_slave_1 entered promiscuous mode [ 171.460505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.468519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.476660] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.483182] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.491039] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 171.500996] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 171.510451] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 171.516812] 8021q: adding VLAN 0 to HW filter on device team0 [ 171.524234] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.532076] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.539263] device bridge_slave_1 entered promiscuous mode [ 171.562935] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 171.571957] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 171.579845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.587276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.595131] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.603070] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.609433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.617960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.624931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.633578] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 171.644805] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 171.656206] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 171.669591] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 171.687417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.696702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.704858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.712642] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.719045] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.726172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.734913] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 171.744942] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 171.765164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 171.773334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.781129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 171.788870] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.802984] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 171.815242] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 171.824261] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 171.833178] team0: Port device team_slave_0 added [ 171.838586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.847114] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.854866] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.861285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.868330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.876620] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.886517] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 171.895284] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 171.907893] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 171.916103] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 171.923706] team0: Port device team_slave_1 added [ 171.928746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.937798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.945496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.954865] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 171.971095] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 171.979635] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 171.987044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 171.999547] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 172.008481] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 172.034196] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 172.041211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 172.049184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.059231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 172.066905] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.074925] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 172.085230] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 172.142659] device hsr_slave_0 entered promiscuous mode [ 172.200448] device hsr_slave_1 entered promiscuous mode [ 172.242806] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.255042] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 172.261254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 172.276153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 172.284232] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 172.294984] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 172.303306] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 172.322334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 172.335252] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.343452] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 172.354147] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 172.371728] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 172.379667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 172.387828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.403551] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 172.409640] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 172.426526] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.440620] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.451701] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 172.468741] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 172.482060] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 172.488833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.501381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.517233] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.537112] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 172.546304] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.558117] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 172.572141] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 172.581383] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 172.590718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.599202] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.608588] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.615406] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.627046] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 172.673582] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.685539] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 172.717019] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 172.754299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.770981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.778327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.794649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.804761] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.811457] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.822794] hrtimer: interrupt took 65133 ns [ 172.886099] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 172.923984] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready 01:24:44 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xc) syz_emit_ethernet(0x32, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) [ 172.931011] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.953772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 172.988851] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 173.011900] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 173.045173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.053055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.061752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.069462] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.075884] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.085310] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready 01:24:45 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000002c0)={0x2, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) [ 173.095400] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 173.109023] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 173.117077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 173.125652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 01:24:45 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000002c0)={0x2, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) [ 173.146011] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.163354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.171749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.179833] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.186252] bridge0: port 2(bridge_slave_1) entered forwarding state 01:24:45 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000002c0)={0x2, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) [ 173.230454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.238239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.249938] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.263635] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 173.274392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 01:24:45 executing program 2: creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) lseek(r0, 0x0, 0x0) [ 173.301879] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 173.308842] audit: type=1804 audit(1555982685.208:38): pid=7273 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir712170337/syzkaller.BM44MO/0/bus" dev="sda1" ino=16523 res=1 [ 173.310497] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready 01:24:45 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000002c0)={0x2, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) [ 173.364169] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.384408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 01:24:45 executing program 0: ioctl$VIDIOC_S_PARM(0xffffffffffffffff, 0xc0cc5616, &(0x7f00000002c0)={0x2, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) [ 173.385922] audit: type=1804 audit(1555982685.248:39): pid=7275 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir712170337/syzkaller.BM44MO/0/bus" dev="sda1" ino=16523 res=1 [ 173.401038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.444291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.485793] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 173.500256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.507922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.526065] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 173.541781] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 173.548489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.559263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.567679] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.581601] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 173.589112] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 173.601751] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 173.609652] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 173.617843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 173.625596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.633058] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.640167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.656668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.664436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.672203] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.686326] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 173.697405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.705103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.716034] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 173.722953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 173.735535] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 173.741736] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.752278] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 173.763535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.772751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.780924] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.787328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.794551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 173.804060] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 173.813374] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 173.822341] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 173.831774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.839740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.848540] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.855025] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.867127] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 173.875012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.886431] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 173.898461] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 173.908909] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 173.921860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.934608] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 173.954433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.962560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.972772] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 173.982643] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.990797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.998802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.016529] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 174.024758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.034290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.044587] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 174.053988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 174.062189] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.078381] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 174.085226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 174.102032] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 174.116468] 8021q: adding VLAN 0 to HW filter on device batadv0 01:24:47 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x1000011ffd, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) fcntl$setlease(r0, 0x400, 0x0) 01:24:47 executing program 0: ioctl$VIDIOC_S_PARM(0xffffffffffffffff, 0xc0cc5616, &(0x7f00000002c0)={0x2, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) [ 175.156022] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 175.186665] *** Guest State *** [ 175.190292] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 175.207642] CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 175.222462] CR3 = 0x00000000fffbc000 [ 175.229965] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 175.241962] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 175.253050] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 175.260843] CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 [ 175.269667] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 175.278511] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 175.287591] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 175.296332] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 175.305079] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 175.313529] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 175.328830] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 175.351321] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 175.365821] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 175.375144] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 175.382660] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 175.390749] Interruptibility = 00000001 ActivityState = 00000000 [ 175.397249] *** Host State *** [ 175.400995] RIP = 0xffffffff8117477a RSP = 0xffff88806684f998 [ 175.407235] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 175.414349] FSBase=00007f6c30e4e700 GSBase=ffff8880aef00000 TRBase=fffffe0000034000 [ 175.423578] audit: type=1400 audit(1555982687.328:40): avc: denied { map } for pid=7324 comm="syz-executor.1" path="socket:[26697]" dev="sockfs" ino=26697 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=packet_socket permissive=1 [ 175.453715] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 175.459799] CR0=0000000080050033 CR3=0000000097adb000 CR4=00000000001426e0 [ 175.467889] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff86201910 [ 175.474823] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 175.481047] *** Control State *** [ 175.484736] PinBased=0000003f CPUBased=b699edfe SecondaryExec=000000c2 [ 175.491986] EntryControls=0000d1ff ExitControls=002fefff [ 175.497802] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 01:24:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) close(r1) [ 175.504836] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 175.511619] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 175.518229] reason=80000021 qualification=0000000000000000 [ 175.525048] IDTVectoring: info=00000000 errcode=00000000 [ 175.530595] TSC Offset = 0xffffff9f12bf6e0e [ 175.534942] EPT pointer = 0x000000009976001e 01:24:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4000000000c) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="1f0000000203193b000007000000068100023b050900020000004042010058", 0x1f}], 0x1) 01:24:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000380)="0adc1f123c123f319bd070") syz_emit_ethernet(0x38, &(0x7f0000000180)={@local, @random="8b01359b1dfc", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x40000, 0x11, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 01:24:48 executing program 0: ioctl$VIDIOC_S_PARM(0xffffffffffffffff, 0xc0cc5616, &(0x7f00000002c0)={0x2, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) 01:24:48 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) socket(0xf, 0x800, 0x2) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 01:24:48 executing program 3: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x2e, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, 0x0) 01:24:48 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0xa, @win={{}, 0x3, 0x0, 0x0, 0x0, 0x0}}) 01:24:48 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0xa, @win={{}, 0x3, 0x0, 0x0, 0x0, 0x0}}) 01:24:48 executing program 0: r0 = syz_open_dev$video(0x0, 0x204, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000002c0)={0x2, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) 01:24:48 executing program 3: rt_sigaction(0x3d, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x40000, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000180)={{0x7ff}, {0x5, 0x100000001}, 0x0, 0x2}) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) keyctl$get_security(0x11, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) 01:24:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="7065726d686174203078303030303030303030c73030303030305e2f70726f632f7468726561642d73656c662f617474722f63757272656e7400737461636b20"], 0x1) [ 176.331915] audit: type=1400 audit(1555982688.238:41): avc: denied { create } for pid=7348 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 01:24:48 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0xa, @win={{}, 0x3, 0x0, 0x0, 0x0, 0x0}}) 01:24:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, 0x0) 01:24:48 executing program 0: r0 = syz_open_dev$video(0x0, 0x204, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000002c0)={0x2, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) [ 176.418767] bond0: Releasing backup interface bond_slave_1 [ 176.427305] audit: type=1400 audit(1555982688.258:42): avc: denied { ioctl } for pid=7359 comm="syz-executor.3" path="socket:[26745]" dev="sockfs" ino=26745 ioctlcmd=0x8991 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 01:24:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = dup2(r0, r0) r2 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 01:24:48 executing program 3: rt_sigaction(0x3d, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x40000, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000180)={{0x7ff}, {0x5, 0x100000001}, 0x0, 0x2}) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) keyctl$get_security(0x11, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) 01:24:48 executing program 5: syz_genetlink_get_family_id$tipc(&(0x7f00000007c0)='TIPC\x00') r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000080)={'ip6gretap0\x00', 0x101}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, 0x0) getpgid(0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000002c0)) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) 01:24:48 executing program 0: r0 = syz_open_dev$video(0x0, 0x204, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000002c0)={0x2, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) [ 176.625947] audit: type=1400 audit(1555982688.268:43): avc: denied { write } for pid=7348 comm="syz-executor.4" path="socket:[26439]" dev="sockfs" ino=26439 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 01:24:48 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0xa, @win={{}, 0x3, 0x0, 0x0, 0x0, 0x0}}) 01:24:48 executing program 3: rt_sigaction(0x3d, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x40000, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000180)={{0x7ff}, {0x5, 0x100000001}, 0x0, 0x2}) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) keyctl$get_security(0x11, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) 01:24:48 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x00\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 01:24:48 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000002c0)={0x2, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) 01:24:48 executing program 1: ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000000c0)={0xa, @win={{}, 0x3, 0x0, 0x0, 0x0, 0x0}}) 01:24:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0xf}], 0x1}}], 0x1, 0x0, 0x0) 01:24:48 executing program 3: rt_sigaction(0x3d, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x40000, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000180)={{0x7ff}, {0x5, 0x100000001}, 0x0, 0x2}) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) keyctl$get_security(0x11, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) [ 176.819279] bond0: Releasing backup interface bond_slave_1 [ 176.860430] audit: type=1400 audit(1555982688.598:44): avc: denied { create } for pid=7387 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:24:48 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000002c0)={0x2, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) [ 176.900635] audit: type=1400 audit(1555982688.598:45): avc: denied { write } for pid=7387 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 176.929059] bond0: Enslaving bond_slave_1 as an active interface with an up link 01:24:48 executing program 1: ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000000c0)={0xa, @win={{}, 0x3, 0x0, 0x0, 0x0, 0x0}}) 01:24:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000380)="0adc1f123c123f319bd070") syz_emit_ethernet(0x38, &(0x7f0000000180)={@local, @random="8b01359b1dfc", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x40000, 0x2c, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 176.954504] audit: type=1400 audit(1555982688.608:46): avc: denied { read } for pid=7387 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 176.993520] bond0: Releasing backup interface bond_slave_1 [ 177.054429] bond0: Enslaving bond_slave_1 as an active interface with an up link 01:24:51 executing program 5: syz_genetlink_get_family_id$tipc(&(0x7f00000007c0)='TIPC\x00') r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000080)={'ip6gretap0\x00', 0x101}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, 0x0) getpgid(0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000002c0)) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) 01:24:51 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000002c0)={0x2, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) 01:24:51 executing program 4: syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 01:24:51 executing program 1: ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000000c0)={0xa, @win={{}, 0x3, 0x0, 0x0, 0x0, 0x0}}) 01:24:51 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x00\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 01:24:51 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x00\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 01:24:51 executing program 0: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_S_PARM(0xffffffffffffffff, 0xc0cc5616, &(0x7f00000002c0)={0x2, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) 01:24:51 executing program 1: r0 = syz_open_dev$video(0x0, 0x204, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0xa, @win={{}, 0x3, 0x0, 0x0, 0x0, 0x0}}) [ 179.776866] bond0: Enslaving bond_slave_1 as an active interface with an up link 01:24:51 executing program 0: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_S_PARM(0xffffffffffffffff, 0xc0cc5616, &(0x7f00000002c0)={0x2, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) 01:24:51 executing program 1: r0 = syz_open_dev$video(0x0, 0x204, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0xa, @win={{}, 0x3, 0x0, 0x0, 0x0, 0x0}}) [ 179.825372] bond0: Releasing backup interface bond_slave_1 01:24:51 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x00\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 01:24:51 executing program 5: syz_genetlink_get_family_id$tipc(&(0x7f00000007c0)='TIPC\x00') r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000080)={'ip6gretap0\x00', 0x101}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, 0x0) getpgid(0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000002c0)) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) 01:24:51 executing program 1: r0 = syz_open_dev$video(0x0, 0x204, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0xa, @win={{}, 0x3, 0x0, 0x0, 0x0, 0x0}}) [ 179.918379] bond0: Enslaving bond_slave_1 as an active interface with an up link 01:24:51 executing program 0: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_S_PARM(0xffffffffffffffff, 0xc0cc5616, &(0x7f00000002c0)={0x2, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) [ 180.000313] protocol 88fb is buggy, dev hsr_slave_0 [ 180.005640] protocol 88fb is buggy, dev hsr_slave_1 [ 180.020675] bond0: Releasing backup interface bond_slave_1 [ 180.120534] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 180.240599] protocol 88fb is buggy, dev hsr_slave_0 [ 180.245744] protocol 88fb is buggy, dev hsr_slave_1 [ 180.410159] protocol 88fb is buggy, dev hsr_slave_0 [ 180.415307] protocol 88fb is buggy, dev hsr_slave_1 01:24:52 executing program 4: syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 01:24:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 01:24:52 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000040)={'ip6gre0\x00', @ifru_names='/\xc0p\x00'}) 01:24:52 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0xa, @win={{}, 0x3, 0x0, 0x0, 0x0, 0x0}}) 01:24:52 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, 0x0) 01:24:52 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x00\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 01:24:52 executing program 5: syz_genetlink_get_family_id$tipc(&(0x7f00000007c0)='TIPC\x00') r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000080)={'ip6gretap0\x00', 0x101}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, 0x0) r2 = getpgid(0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) getpgid(r2) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000002c0)) ioctl$SIOCSIFHWADDR(r1, 0x8924, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) ptrace$pokeuser(0x6, r3, 0x388, 0xffffffffffffffff) add_key$keyring(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:24:52 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f00000007c0)='TIPC\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0xffffffffffffffff) [ 180.699604] bond0: Releasing backup interface bond_slave_1 01:24:52 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0xa, @win={{}, 0x3, 0x0, 0x0, 0x0, 0x0}}) 01:24:52 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, 0x0) [ 180.795950] bond0: Enslaving bond_slave_1 as an active interface with an up link 01:24:52 executing program 5: syz_genetlink_get_family_id$tipc(&(0x7f00000007c0)='TIPC\x00') r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000080)={'ip6gretap0\x00', 0x101}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, 0x0) r2 = getpgid(0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) getpgid(r2) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000002c0)) ioctl$SIOCSIFHWADDR(r1, 0x8924, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) ptrace$pokeuser(0x6, r3, 0x388, 0xffffffffffffffff) add_key$keyring(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:24:52 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0xa, @win={{}, 0x3, 0x0, 0x0, 0x0, 0x0}}) [ 180.970178] protocol 88fb is buggy, dev hsr_slave_0 [ 180.975297] protocol 88fb is buggy, dev hsr_slave_1 [ 181.120186] protocol 88fb is buggy, dev hsr_slave_0 [ 181.125315] protocol 88fb is buggy, dev hsr_slave_1 01:24:53 executing program 4: syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 01:24:53 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000007c0)='TIPC\x00') r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000080)={'ip6gretap0\x00', 0x101}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, 0x0) r2 = getpgid(0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) getpgid(r2) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000002c0)) ioctl$SIOCSIFHWADDR(r1, 0x8924, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) ptrace$pokeuser(0x6, r3, 0x388, 0xffffffffffffffff) add_key$keyring(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:24:53 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, 0x0) 01:24:53 executing program 1: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000000c0)={0xa, @win={{}, 0x3, 0x0, 0x0, 0x0, 0x0}}) 01:24:53 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f00000007c0)='TIPC\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0xffffffffffffffff) 01:24:53 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x206, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x2, @raw_data="4fa8cdce51f428e55c7f63c5de1118c1e0f9197def167f2c917d8431ff71df8acf58f407ffe57ddb41d6a705e7bfc2fecdbdc4c78ede69d50efbf4492502959cfd5817ce3171306b60f7bfa3e6c7fc8ab8bf5f578a4673f49074d2862ce8fecfa194449c4c04f226ff7d491dc325570c6ab806448e0c53752acc0471d7f4767df4ffbdd47c1a90d9adc7162c8e6f796239e55d161a879c9a70a26091d3193964bc41a420557f94b938c60f07c50515488c2d7c0b06dca972535b1e968c6ad703884d427e1edd1e93"}) 01:24:53 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, 0x0}) 01:24:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x0, 0x0, 0x700000000000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 01:24:53 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x206, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x2, @raw_data="4fa8cdce51f428e55c7f63c5de1118c1e0f9197def167f2c917d8431ff71df8acf58f407ffe57ddb41d6a705e7bfc2fecdbdc4c78ede69d50efbf4492502959cfd5817ce3171306b60f7bfa3e6c7fc8ab8bf5f578a4673f49074d2862ce8fecfa194449c4c04f226ff7d491dc325570c6ab806448e0c53752acc0471d7f4767df4ffbdd47c1a90d9adc7162c8e6f796239e55d161a879c9a70a26091d3193964bc41a420557f94b938c60f07c50515488c2d7c0b06dca972535b1e968c6ad703884d427e1edd1e93"}) 01:24:53 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000002c0)={0x0, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) 01:24:53 executing program 1: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000000c0)={0xa, @win={{}, 0x3, 0x0, 0x0, 0x0, 0x0}}) [ 181.659411] binder: 7546:7552 transaction failed 29189/-22, size 24-8 line 2802 01:24:53 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x206, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x2, @raw_data="4fa8cdce51f428e55c7f63c5de1118c1e0f9197def167f2c917d8431ff71df8acf58f407ffe57ddb41d6a705e7bfc2fecdbdc4c78ede69d50efbf4492502959cfd5817ce3171306b60f7bfa3e6c7fc8ab8bf5f578a4673f49074d2862ce8fecfa194449c4c04f226ff7d491dc325570c6ab806448e0c53752acc0471d7f4767df4ffbdd47c1a90d9adc7162c8e6f796239e55d161a879c9a70a26091d3193964bc41a420557f94b938c60f07c50515488c2d7c0b06dca972535b1e968c6ad703884d427e1edd1e93"}) [ 181.728109] binder: undelivered TRANSACTION_ERROR: 29189 01:24:54 executing program 4: syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 01:24:54 executing program 3: socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="275eec7629faa4109ed08132e7327d0d80970dd5c59efba976f405dc6ef5273e4c93351a02c4f10a7015a1126688b6e4381e52f67a40c0748d882c854d970272e37765cfe624ee9f0857d8913dd1d0b11ecb21026ffa1e1de615b58d490eab227f335e664f42d347d55a8141318fde6c58e153668c1e18e6c805ad1e77bbb4effbc9bdeed39bd653f8a2a00ed91239fae33b6d5c95c24ac91dceeb6ff2b2bdda056e4700"], 0xa4) 01:24:54 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x206, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x2, @raw_data="4fa8cdce51f428e55c7f63c5de1118c1e0f9197def167f2c917d8431ff71df8acf58f407ffe57ddb41d6a705e7bfc2fecdbdc4c78ede69d50efbf4492502959cfd5817ce3171306b60f7bfa3e6c7fc8ab8bf5f578a4673f49074d2862ce8fecfa194449c4c04f226ff7d491dc325570c6ab806448e0c53752acc0471d7f4767df4ffbdd47c1a90d9adc7162c8e6f796239e55d161a879c9a70a26091d3193964bc41a420557f94b938c60f07c50515488c2d7c0b06dca972535b1e968c6ad703884d427e1edd1e93"}) 01:24:54 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000002c0)={0x0, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) 01:24:54 executing program 1: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000000c0)={0xa, @win={{}, 0x3, 0x0, 0x0, 0x0, 0x0}}) 01:24:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95, 0x0, 0x0, 0x700000000000000}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 01:24:54 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000002c0)={0x0, @raw_data="e485a5362449d0eee8b1649c88d9e0085b3cd95ae49ff81050beac27646a61f544b92eb275d371c791951582cce0ea361d20ca6ecb74641710bb23eb2c7fec630e7dc396b59a277296edc8f9b2c42b17f52b77e366801be1ae6ddd4dc874f45250ee4ab90b7c6203d6070a16aea05b0bb96193f18bd93fd9402c4b13b016f57ef89dd1c7b4ac9ce2b670044cf9f46e3f3753437aad5665d7c66eee571f422578ec0550bdef2ea8d311e005cf8a23d73c280bc52024874f67934b52d1182438dda95c1278a7c47025"}) 01:24:54 executing program 5: ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000000c0)={0x2, @raw_data="4fa8cdce51f428e55c7f63c5de1118c1e0f9197def167f2c917d8431ff71df8acf58f407ffe57ddb41d6a705e7bfc2fecdbdc4c78ede69d50efbf4492502959cfd5817ce3171306b60f7bfa3e6c7fc8ab8bf5f578a4673f49074d2862ce8fecfa194449c4c04f226ff7d491dc325570c6ab806448e0c53752acc0471d7f4767df4ffbdd47c1a90d9adc7162c8e6f796239e55d161a879c9a70a26091d3193964bc41a420557f94b938c60f07c50515488c2d7c0b06dca972535b1e968c6ad703884d427e1edd1e93"}) 01:24:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) fsync(r1) 01:24:54 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x204, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, 0x0) 01:24:54 executing program 3: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$get_security(0x11, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x00\n\x00!!\x00\x14\x00', @ifru_names='bond_slave_1\x00'}) 01:24:54 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@jqfmt_vfsold='jqfmt%\nfsold'}]}) [ 182.740265] ================================================================== [ 182.748031] BUG: KASAN: global-out-of-bounds in strscpy+0x20e/0x2c0 [ 182.754463] Read of size 8 at addr ffffffff8677b340 by task syz-executor.0/7602 [ 182.763432] [ 182.765080] CPU: 1 PID: 7602 Comm: syz-executor.0 Not tainted 4.14.113 #3 [ 182.772191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.781585] Call Trace: [ 182.784197] dump_stack+0x138/0x19c [ 182.787844] ? strscpy+0x20e/0x2c0 [ 182.791442] print_address_description.cold+0x5/0x1dc [ 182.796660] ? strscpy+0x20e/0x2c0 [ 182.800230] kasan_report.cold+0xaf/0x2b5 [ 182.804400] __asan_report_load8_noabort+0x14/0x20 [ 182.809347] strscpy+0x20e/0x2c0 [ 182.812760] prepare_error_buf+0x94/0x1aa0 [ 182.817052] ? lock_downgrade+0x6e0/0x6e0 [ 182.821223] ? scnprintf_le_key+0x600/0x600 [ 182.825568] ? __lock_acquire+0x5f9/0x45e0 [ 182.829848] __reiserfs_warning+0x9f/0xb0 [ 182.834026] ? reiserfs_printk+0xd0/0xd0 [ 182.838126] ? trace_hardirqs_on+0x10/0x10 [ 182.842562] reiserfs_parse_options+0xafa/0x1820 [ 182.847351] ? find_held_lock+0x35/0x130 [ 182.851444] ? reiserfs_sync_fs+0xe0/0xe0 [ 182.855612] ? trace_hardirqs_on+0x10/0x10 [ 182.860028] ? workqueue_sysfs_register+0x3c0/0x3c0 [ 182.865063] ? lockdep_init_map+0x9/0x10 [ 182.869138] ? debug_mutex_init+0x2d/0x5a [ 182.873305] reiserfs_fill_super+0x461/0x2b20 [ 182.877829] ? finish_unfinished+0x1010/0x1010 [ 182.882441] ? snprintf+0xa5/0xd0 [ 182.885928] ? set_blocksize+0x270/0x300 [ 182.890016] ? ns_test_super+0x50/0x50 [ 182.893963] mount_bdev+0x2c1/0x370 [ 182.897605] ? finish_unfinished+0x1010/0x1010 [ 182.902209] get_super_block+0x35/0x40 [ 182.906220] mount_fs+0x9d/0x2a7 [ 182.909631] vfs_kern_mount.part.0+0x5e/0x3d0 [ 182.914249] do_mount+0x417/0x27d0 [ 182.917802] ? copy_mount_options+0x5c/0x2f0 [ 182.922269] ? rcu_read_lock_sched_held+0x110/0x130 [ 182.927333] ? copy_mount_string+0x40/0x40 [ 182.931682] ? copy_mount_options+0x1fe/0x2f0 [ 182.936214] SyS_mount+0xab/0x120 [ 182.939685] ? copy_mnt_ns+0x8c0/0x8c0 [ 182.943628] do_syscall_64+0x1eb/0x630 [ 182.947618] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 182.952677] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 182.957981] RIP: 0033:0x45b69a [ 182.961173] RSP: 002b:00007f3d1b95aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 182.968925] RAX: ffffffffffffffda RBX: 00007f3d1b95ab40 RCX: 000000000045b69a [ 182.976287] RDX: 00007f3d1b95aae0 RSI: 0000000020000100 RDI: 00007f3d1b95ab00 [ 182.983576] RBP: 0000000000000000 R08: 00007f3d1b95ab40 R09: 00007f3d1b95aae0 [ 182.990950] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 182.998503] R13: 00000000004c782d R14: 00000000004dd880 R15: 00000000ffffffff [ 183.005915] [ 183.007568] The buggy address belongs to the variable: [ 183.012887] __func__.31266+0xa20/0x3a60 [ 183.016955] [ 183.018585] Memory state around the buggy address: [ 183.023528] ffffffff8677b200: 00 06 fa fa fa fa fa fa 00 03 fa fa fa fa fa fa [ 183.030908] ffffffff8677b280: 00 00 00 00 06 fa fa fa fa fa fa fa 00 03 fa fa [ 183.038292] >ffffffff8677b300: fa fa fa fa 00 00 00 00 05 fa fa fa fa fa fa fa [ 183.045669] ^ [ 183.051229] ffffffff8677b380: 00 03 fa fa fa fa fa fa 00 00 00 01 fa fa fa fa [ 183.058633] ffffffff8677b400: 00 03 fa fa fa fa fa fa 00 00 00 00 fa fa fa fa [ 183.066086] ================================================================== [ 183.073543] Disabling lock debugging due to kernel taint [ 183.079628] bond0: Releasing backup interface bond_slave_1 [ 183.079744] Kernel panic - not syncing: panic_on_warn set ... [ 183.079744] [ 183.092675] CPU: 1 PID: 7602 Comm: syz-executor.0 Tainted: G B 4.14.113 #3 [ 183.101347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.110712] Call Trace: [ 183.113321] dump_stack+0x138/0x19c [ 183.116959] ? strscpy+0x20e/0x2c0 [ 183.120506] panic+0x1f2/0x438 [ 183.123725] ? add_taint.cold+0x16/0x16 [ 183.127720] kasan_end_report+0x47/0x4f [ 183.131706] kasan_report.cold+0x136/0x2b5 [ 183.135949] __asan_report_load8_noabort+0x14/0x20 [ 183.140887] strscpy+0x20e/0x2c0 [ 183.144377] prepare_error_buf+0x94/0x1aa0 [ 183.148621] ? lock_downgrade+0x6e0/0x6e0 [ 183.152780] ? scnprintf_le_key+0x600/0x600 [ 183.157108] ? __lock_acquire+0x5f9/0x45e0 [ 183.161359] __reiserfs_warning+0x9f/0xb0 [ 183.165815] ? reiserfs_printk+0xd0/0xd0 [ 183.169885] ? trace_hardirqs_on+0x10/0x10 [ 183.174396] reiserfs_parse_options+0xafa/0x1820 [ 183.179167] ? find_held_lock+0x35/0x130 [ 183.183235] ? reiserfs_sync_fs+0xe0/0xe0 [ 183.187419] ? trace_hardirqs_on+0x10/0x10 [ 183.191704] ? workqueue_sysfs_register+0x3c0/0x3c0 [ 183.196734] ? lockdep_init_map+0x9/0x10 [ 183.200834] ? debug_mutex_init+0x2d/0x5a [ 183.205248] reiserfs_fill_super+0x461/0x2b20 [ 183.209748] ? finish_unfinished+0x1010/0x1010 [ 183.214344] ? snprintf+0xa5/0xd0 [ 183.217806] ? set_blocksize+0x270/0x300 [ 183.221873] ? ns_test_super+0x50/0x50 [ 183.225768] mount_bdev+0x2c1/0x370 [ 183.229398] ? finish_unfinished+0x1010/0x1010 [ 183.233983] get_super_block+0x35/0x40 [ 183.237874] mount_fs+0x9d/0x2a7 [ 183.241245] vfs_kern_mount.part.0+0x5e/0x3d0 [ 183.245837] do_mount+0x417/0x27d0 [ 183.249379] ? copy_mount_options+0x5c/0x2f0 [ 183.253798] ? rcu_read_lock_sched_held+0x110/0x130 [ 183.258918] ? copy_mount_string+0x40/0x40 [ 183.263180] ? copy_mount_options+0x1fe/0x2f0 [ 183.267712] SyS_mount+0xab/0x120 [ 183.271183] ? copy_mnt_ns+0x8c0/0x8c0 [ 183.275077] do_syscall_64+0x1eb/0x630 [ 183.278967] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 183.283837] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 183.289029] RIP: 0033:0x45b69a [ 183.292213] RSP: 002b:00007f3d1b95aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 183.299950] RAX: ffffffffffffffda RBX: 00007f3d1b95ab40 RCX: 000000000045b69a [ 183.307227] RDX: 00007f3d1b95aae0 RSI: 0000000020000100 RDI: 00007f3d1b95ab00 [ 183.314600] RBP: 0000000000000000 R08: 00007f3d1b95ab40 R09: 00007f3d1b95aae0 [ 183.321896] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 183.329199] R13: 00000000004c782d R14: 00000000004dd880 R15: 00000000ffffffff [ 183.337382] Kernel Offset: disabled [ 183.341094] Rebooting in 86400 seconds..