[ 34.735903][ T25] audit: type=1800 audit(1570808638.468:25): pid=7003 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 34.755878][ T25] audit: type=1800 audit(1570808638.468:26): pid=7003 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 34.792852][ T25] audit: type=1800 audit(1570808638.468:27): pid=7003 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 34.980252][ T7067] sshd (7067) used greatest stack depth: 10032 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.13' (ECDSA) to the list of known hosts. 2019/10/11 15:44:10 fuzzer started 2019/10/11 15:44:10 dialing manager at 10.128.0.105:43913 2019/10/11 15:44:10 syscalls: 2523 2019/10/11 15:44:10 code coverage: enabled 2019/10/11 15:44:10 comparison tracing: enabled 2019/10/11 15:44:10 extra coverage: extra coverage is not supported by the kernel 2019/10/11 15:44:10 setuid sandbox: enabled 2019/10/11 15:44:10 namespace sandbox: enabled 2019/10/11 15:44:10 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/11 15:44:10 fault injection: enabled 2019/10/11 15:44:10 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/11 15:44:10 net packet injection: enabled 2019/10/11 15:44:10 net device setup: enabled 2019/10/11 15:44:10 concurrency sanitizer: enabled 15:44:11 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0'}, 0xb) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) unshare(0x400) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) syzkaller login: [ 48.326606][ T7169] IPVS: ftp: loaded support on port[0] = 21 15:44:12 executing program 1: r0 = userfaultfd(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000}) [ 48.419880][ T7169] chnl_net:caif_netlink_parms(): no params data found [ 48.479087][ T7169] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.496345][ T7169] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.516495][ T7169] device bridge_slave_0 entered promiscuous mode [ 48.524071][ T7169] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.545694][ T7169] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.555684][ T7169] device bridge_slave_1 entered promiscuous mode [ 48.590501][ T7169] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 48.617342][ T7169] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 48.659933][ T7169] team0: Port device team_slave_0 added [ 48.667146][ T7169] team0: Port device team_slave_1 added 15:44:12 executing program 2: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000000c0)=ANY=[@ANYBLOB="381b894000c0b3ffffe108000000000000683954be0705e71e674b7ecc994b831ee36e051e2497f4792eef71760e827dd5c64cc1790e0d95a088fa8ea19ee41e8791c50fb8621cfdc4fafa2ca132316217f83e164dcae78cd78bd8cddeaa96de53701cf659a18ddacea68200"/120, @ANYRES32=0x0, @ANYBLOB="0000000000000000180012001000", @ANYRES32], 0x4}}, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x153a, 0x49, &(0x7f0000000380)="e566a2a5d5b7b3a9fe7c5af247c90b0dd5516209501f8a03d472234df30e207b7ec7a25dc4caa9e2720c9544dbec1aeb871bcd95c710452ef0e3d871e2c574ab5df6f2cfcfaf6d453f", 0x81, 0x0, 0x1, 0x1f, 0x1, 0x3, 0xea5b, 'syz0\x00'}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00005d5ff3)={0x2, 0x4e20}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000db4ff0)={0x2, 0x0, @loopback}, 0x10) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r3, 0x1261, 0xffffffffffffffff) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x114000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r6) getresgid(&(0x7f0000001300), &(0x7f0000001340), &(0x7f0000001380)=0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r7]) getresgid(0x0, &(0x7f0000001340), &(0x7f0000001380)=0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=r8]) getgroups(0x3, &(0x7f0000000240)=[0x0, 0xffffffffffffffff, 0x0]) getegid() r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=@newlink={0x38, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ppp={{0x10, 0x1, 'ppp\x00'}, {0xc, 0x2, {0x8}}}}]}, 0x38}}, 0x0) fstat(r9, &(0x7f0000000280)) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getresgid(0x0, &(0x7f0000001340), &(0x7f0000001380)=0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=r10]) getresgid(&(0x7f0000001300), 0x0, &(0x7f0000001380)=0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r11]) getgroups(0x2, &(0x7f00000004c0)=[r10, r11]) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) [ 48.738856][ T7169] device hsr_slave_0 entered promiscuous mode [ 48.796017][ T7169] device hsr_slave_1 entered promiscuous mode [ 48.862565][ T7169] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.869819][ T7169] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.877220][ T7169] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.884259][ T7169] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.901816][ T7172] IPVS: ftp: loaded support on port[0] = 21 [ 48.969363][ T7169] 8021q: adding VLAN 0 to HW filter on device bond0 [ 48.991987][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.011367][ T7174] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.036114][ T7174] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.057066][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 49.082176][ T7169] 8021q: adding VLAN 0 to HW filter on device team0 [ 49.102634][ T7177] IPVS: ftp: loaded support on port[0] = 21 [ 49.115867][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.124702][ T7174] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.131823][ T7174] bridge0: port 1(bridge_slave_0) entered forwarding state 15:44:12 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x40000, 0x0) write$FUSE_POLL(r1, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r5, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r6 = dup3(r2, r4, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r7, 0xffffffffffffffff, 0x0) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) fcntl$notify(r8, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x59, 0x3f, "01ff075dc2a482fc0a332cae0d3b2712558774937c4533707a77b245c1b4f9cfcb1785b6ad82d5399b988110362a556c9dfdbad24233ec51e5f4a0fa6e4f24ef5159532b92611e4df64f2ee6b6912e857f770637608b6200401e33867ecb6e8226d9d2e8979e09ee35b47252ef070a15f1457eb357ee9f3e9ae3e2982c754920742acab964e5ce220dc1d5559244bf38f464e9d9d2f0f9bf514c1333de9ed39f6abe1d504cdb8119b3df2580939efca75ebf4fb98d11b2b2ffda46725e0a9854fdf2ccdcf16bbca61fc632470c56aa0284e89d3efe28b632969c3813f0d77d635b52025d993f4069439d1bbb322c5e2994f77bc3a2964fa36061f90eed"}) [ 49.171152][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.180632][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.187785][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.255277][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 49.276997][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 49.294042][ T7169] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 49.325934][ T7169] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 49.359828][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 49.368930][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.386638][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.424624][ T7172] chnl_net:caif_netlink_parms(): no params data found [ 49.457424][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 49.542750][ T7169] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 49.561179][ T7180] IPVS: ftp: loaded support on port[0] = 21 [ 49.567522][ T7172] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.574651][ T7172] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.594462][ T7172] device bridge_slave_0 entered promiscuous mode 15:44:13 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000240)={0xe26e}) r1 = perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) syz_open_dev$audion(0x0, 0x100000000, 0x301000) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000002c0)) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, 0x0) socket$nl_route(0x10, 0x3, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) [ 49.640734][ T7172] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.649612][ T7172] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.660409][ T7172] device bridge_slave_1 entered promiscuous mode [ 49.724665][ T7177] chnl_net:caif_netlink_parms(): no params data found [ 49.773786][ T7172] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 49.814873][ T7172] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 49.907927][ T7172] team0: Port device team_slave_0 added [ 49.939169][ T7172] team0: Port device team_slave_1 added [ 49.961951][ T7177] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.978462][ T7177] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.994158][ T7177] device bridge_slave_0 entered promiscuous mode 15:44:13 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0'}, 0xb) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) unshare(0x400) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 50.057097][ T7177] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.064159][ T7177] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.072874][ T7177] device bridge_slave_1 entered promiscuous mode 15:44:13 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0'}, 0xb) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) unshare(0x400) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 50.188735][ T7172] device hsr_slave_0 entered promiscuous mode [ 50.205934][ T7172] device hsr_slave_1 entered promiscuous mode 15:44:14 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0'}, 0xb) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) unshare(0x400) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 50.255647][ T7172] debugfs: Directory 'hsr0' with parent '/' already present! [ 50.279832][ T7196] IPVS: ftp: loaded support on port[0] = 21 [ 50.280081][ T7177] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 15:44:14 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0'}, 0xb) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) unshare(0x400) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 50.350601][ T7177] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.451329][ T7172] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.458418][ T7172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.465731][ T7172] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.472796][ T7172] bridge0: port 1(bridge_slave_0) entered forwarding state 15:44:14 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0'}, 0xb) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) unshare(0x400) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 50.518965][ T7177] team0: Port device team_slave_0 added [ 50.541713][ T7180] chnl_net:caif_netlink_parms(): no params data found [ 50.579516][ T7177] team0: Port device team_slave_1 added [ 50.594034][ T3512] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.606033][ T3512] bridge0: port 2(bridge_slave_1) entered disabled state 15:44:14 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0'}, 0xb) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) unshare(0x400) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 50.660276][ T7209] IPVS: ftp: loaded support on port[0] = 21 [ 50.696995][ T7180] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.704073][ T7180] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.715491][ T7180] device bridge_slave_0 entered promiscuous mode [ 50.739200][ T7180] bridge0: port 2(bridge_slave_1) entered blocking state 15:44:14 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0'}, 0xb) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) unshare(0x400) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 50.759170][ T7180] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.767605][ T7180] device bridge_slave_1 entered promiscuous mode 15:44:14 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0'}, 0xb) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) unshare(0x400) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 50.822990][ T7177] device hsr_slave_0 entered promiscuous mode [ 50.876069][ T7177] device hsr_slave_1 entered promiscuous mode [ 50.915678][ T7177] debugfs: Directory 'hsr0' with parent '/' already present! [ 50.951594][ T7180] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.996058][ T7172] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.015944][ T7180] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.072221][ T7180] team0: Port device team_slave_0 added [ 51.080297][ T7172] 8021q: adding VLAN 0 to HW filter on device team0 [ 51.101893][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.109731][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.125880][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.134856][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.143630][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.150744][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.158769][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.167752][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.176270][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.183332][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.191296][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 51.200076][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 51.209253][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 51.218023][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 51.227404][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 51.236129][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 51.246936][ T7180] team0: Port device team_slave_1 added [ 51.264905][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 51.273592][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 51.282184][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.308546][ T7172] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 51.319572][ T7172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 51.331172][ T7196] chnl_net:caif_netlink_parms(): no params data found [ 51.388312][ T7180] device hsr_slave_0 entered promiscuous mode [ 51.425982][ T7180] device hsr_slave_1 entered promiscuous mode [ 51.465771][ T7180] debugfs: Directory 'hsr0' with parent '/' already present! [ 51.474966][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 51.484049][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.500117][ T7177] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.589585][ T7209] chnl_net:caif_netlink_parms(): no params data found [ 51.607893][ T7196] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.615015][ T7196] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.623427][ T7196] device bridge_slave_0 entered promiscuous mode [ 51.643161][ T7177] 8021q: adding VLAN 0 to HW filter on device team0 [ 51.652560][ T7196] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.660031][ T7196] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.667899][ T7196] device bridge_slave_1 entered promiscuous mode [ 51.675114][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.683427][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.707549][ T7209] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.714667][ T7209] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.722775][ T7209] device bridge_slave_0 entered promiscuous mode [ 51.740540][ T7209] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.748324][ T7209] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.756290][ T7209] device bridge_slave_1 entered promiscuous mode [ 51.764454][ T7172] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 51.786957][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.795855][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.804367][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.811409][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.819379][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.828502][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.837223][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.844357][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.852360][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 51.861286][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 51.870447][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 51.879069][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 51.888047][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 51.897034][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 51.905953][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 51.914456][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.923032][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 51.931525][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.940426][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.948721][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 51.971489][ T7196] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.998187][ T7177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 52.008753][ T7196] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.033517][ T7196] team0: Port device team_slave_0 added [ 52.044471][ T7209] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.065115][ T7209] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.082832][ T7196] team0: Port device team_slave_1 added [ 52.105436][ T7180] 8021q: adding VLAN 0 to HW filter on device bond0 [ 52.114782][ T7177] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 52.143354][ T7209] team0: Port device team_slave_0 added [ 52.156214][ T7180] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.174347][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.183429][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.193047][ C0] hrtimer: interrupt took 43222 ns [ 52.193309][ T7209] team0: Port device team_slave_1 added [ 52.218213][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.227969][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.237281][ T2870] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.244385][ T2870] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.253204][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.263534][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.277198][ T2870] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.284269][ T2870] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.292901][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 15:44:16 executing program 1: r0 = userfaultfd(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000}) [ 52.358713][ T7196] device hsr_slave_0 entered promiscuous mode [ 52.396034][ T7196] device hsr_slave_1 entered promiscuous mode [ 52.457548][ T7196] debugfs: Directory 'hsr0' with parent '/' already present! [ 52.483665][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.500864][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.510398][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 52.525087][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.534463][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 52.543769][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 52.553212][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.562528][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.580169][ T7180] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 52.592763][ T7180] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 52.627477][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 52.649484][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.666286][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.729355][ T7209] device hsr_slave_0 entered promiscuous mode [ 52.810385][ T7209] device hsr_slave_1 entered promiscuous mode [ 52.865675][ T7209] debugfs: Directory 'hsr0' with parent '/' already present! 15:44:16 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0'}, 0xb) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) unshare(0x400) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 52.915246][ T7180] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 52.964508][ T7196] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.010365][ T7196] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.038951][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.051642][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.110328][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.119246][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.151950][ T7174] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.159063][ T7174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.171887][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.180608][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.189431][ T7174] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.196628][ T7174] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.204489][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.213811][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 53.223465][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.240269][ T7196] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 53.250999][ T7196] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 53.265040][ T7209] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.272103][ T7208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 53.281527][ T7208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.290472][ T7208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.299280][ T7208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.308300][ T7208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.317047][ T7208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.325805][ T7208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 53.334453][ T7208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.344037][ T7208] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.352858][ T7208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 53.387778][ T7196] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.399998][ T7209] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.415979][ T7208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.424829][ T7208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.450333][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.472623][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.482122][ T3512] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.489200][ T3512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.500903][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.509996][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.521172][ T3512] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.528293][ T3512] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.536659][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.545655][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 53.554845][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 53.564087][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.574640][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.583205][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.592136][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.601324][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.620922][ T7209] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 53.637394][ T7209] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 15:44:17 executing program 1: r0 = userfaultfd(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000}) [ 53.653394][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.664777][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.690506][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 53.712827][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.736966][ T7174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 53.769789][ T7209] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.928688][ T25] kauditd_printk_skb: 3 callbacks suppressed [ 53.928722][ T25] audit: type=1804 audit(1570808657.658:31): pid=7280 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir911965137/syzkaller.sDrZDI/0/bus" dev="sda1" ino=16536 res=1 [ 54.111853][ T25] audit: type=1804 audit(1570808657.838:32): pid=7280 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir911965137/syzkaller.sDrZDI/0/bus" dev="sda1" ino=16536 res=1 15:44:17 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0'}, 0xb) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) unshare(0x400) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 15:44:17 executing program 2: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000000c0)=ANY=[@ANYBLOB="381b894000c0b3ffffe108000000000000683954be0705e71e674b7ecc994b831ee36e051e2497f4792eef71760e827dd5c64cc1790e0d95a088fa8ea19ee41e8791c50fb8621cfdc4fafa2ca132316217f83e164dcae78cd78bd8cddeaa96de53701cf659a18ddacea68200"/120, @ANYRES32=0x0, @ANYBLOB="0000000000000000180012001000", @ANYRES32], 0x4}}, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x153a, 0x49, &(0x7f0000000380)="e566a2a5d5b7b3a9fe7c5af247c90b0dd5516209501f8a03d472234df30e207b7ec7a25dc4caa9e2720c9544dbec1aeb871bcd95c710452ef0e3d871e2c574ab5df6f2cfcfaf6d453f", 0x81, 0x0, 0x1, 0x1f, 0x1, 0x3, 0xea5b, 'syz0\x00'}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00005d5ff3)={0x2, 0x4e20}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000db4ff0)={0x2, 0x0, @loopback}, 0x10) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r3, 0x1261, 0xffffffffffffffff) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x114000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r6) getresgid(&(0x7f0000001300), &(0x7f0000001340), &(0x7f0000001380)=0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r7]) getresgid(0x0, &(0x7f0000001340), &(0x7f0000001380)=0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=r8]) getgroups(0x3, &(0x7f0000000240)=[0x0, 0xffffffffffffffff, 0x0]) getegid() r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=@newlink={0x38, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ppp={{0x10, 0x1, 'ppp\x00'}, {0xc, 0x2, {0x8}}}}]}, 0x38}}, 0x0) fstat(r9, &(0x7f0000000280)) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getresgid(0x0, &(0x7f0000001340), &(0x7f0000001380)=0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=r10]) getresgid(&(0x7f0000001300), 0x0, &(0x7f0000001380)=0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r11]) getgroups(0x2, &(0x7f00000004c0)=[r10, r11]) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) 15:44:17 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x40000, 0x0) write$FUSE_POLL(r1, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r5, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r6 = dup3(r2, r4, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r7, 0xffffffffffffffff, 0x0) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) fcntl$notify(r8, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x59, 0x3f, "01ff075dc2a482fc0a332cae0d3b2712558774937c4533707a77b245c1b4f9cfcb1785b6ad82d5399b988110362a556c9dfdbad24233ec51e5f4a0fa6e4f24ef5159532b92611e4df64f2ee6b6912e857f770637608b6200401e33867ecb6e8226d9d2e8979e09ee35b47252ef070a15f1457eb357ee9f3e9ae3e2982c754920742acab964e5ce220dc1d5559244bf38f464e9d9d2f0f9bf514c1333de9ed39f6abe1d504cdb8119b3df2580939efca75ebf4fb98d11b2b2ffda46725e0a9854fdf2ccdcf16bbca61fc632470c56aa0284e89d3efe28b632969c3813f0d77d635b52025d993f4069439d1bbb322c5e2994f77bc3a2964fa36061f90eed"}) 15:44:17 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0'}, 0xb) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) unshare(0x400) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 15:44:17 executing program 1: r0 = userfaultfd(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000}) 15:44:17 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000240)={0xe26e}) r1 = perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) syz_open_dev$audion(0x0, 0x100000000, 0x301000) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000002c0)) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, 0x0) socket$nl_route(0x10, 0x3, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) 15:44:18 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0'}, 0xb) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) unshare(0x400) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 15:44:18 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000240)={0xe26e}) r1 = perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) syz_open_dev$audion(0x0, 0x100000000, 0x301000) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000002c0)) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, 0x0) socket$nl_route(0x10, 0x3, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) [ 54.485453][ T25] audit: type=1804 audit(1570808658.208:33): pid=7307 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir911965137/syzkaller.sDrZDI/1/bus" dev="sda1" ino=16553 res=1 15:44:18 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x40000, 0x0) write$FUSE_POLL(r1, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r5, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r6 = dup3(r2, r4, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r7, 0xffffffffffffffff, 0x0) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) fcntl$notify(r8, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x59, 0x3f, "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"}) 15:44:18 executing program 2: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000000c0)=ANY=[@ANYBLOB="381b894000c0b3ffffe108000000000000683954be0705e71e674b7ecc994b831ee36e051e2497f4792eef71760e827dd5c64cc1790e0d95a088fa8ea19ee41e8791c50fb8621cfdc4fafa2ca132316217f83e164dcae78cd78bd8cddeaa96de53701cf659a18ddacea68200"/120, @ANYRES32=0x0, @ANYBLOB="0000000000000000180012001000", @ANYRES32], 0x4}}, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x153a, 0x49, &(0x7f0000000380)="e566a2a5d5b7b3a9fe7c5af247c90b0dd5516209501f8a03d472234df30e207b7ec7a25dc4caa9e2720c9544dbec1aeb871bcd95c710452ef0e3d871e2c574ab5df6f2cfcfaf6d453f", 0x81, 0x0, 0x1, 0x1f, 0x1, 0x3, 0xea5b, 'syz0\x00'}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00005d5ff3)={0x2, 0x4e20}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000db4ff0)={0x2, 0x0, @loopback}, 0x10) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r3, 0x1261, 0xffffffffffffffff) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x114000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r6) getresgid(&(0x7f0000001300), &(0x7f0000001340), &(0x7f0000001380)=0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r7]) getresgid(0x0, &(0x7f0000001340), &(0x7f0000001380)=0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=r8]) getgroups(0x3, &(0x7f0000000240)=[0x0, 0xffffffffffffffff, 0x0]) getegid() r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=@newlink={0x38, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ppp={{0x10, 0x1, 'ppp\x00'}, {0xc, 0x2, {0x8}}}}]}, 0x38}}, 0x0) fstat(r9, &(0x7f0000000280)) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getresgid(0x0, &(0x7f0000001340), &(0x7f0000001380)=0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=r10]) getresgid(&(0x7f0000001300), 0x0, &(0x7f0000001380)=0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r11]) getgroups(0x2, &(0x7f00000004c0)=[r10, r11]) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) 15:44:18 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000240)={0xe26e}) r1 = perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) syz_open_dev$audion(0x0, 0x100000000, 0x301000) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000002c0)) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, 0x0) socket$nl_route(0x10, 0x3, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) 15:44:18 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000240)={0xe26e}) r1 = perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) syz_open_dev$audion(0x0, 0x100000000, 0x301000) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000002c0)) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, 0x0) socket$nl_route(0x10, 0x3, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) 15:44:18 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000240)={0xe26e}) r1 = perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) syz_open_dev$audion(0x0, 0x100000000, 0x301000) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000002c0)) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, 0x0) socket$nl_route(0x10, 0x3, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) [ 54.947963][ T25] audit: type=1804 audit(1570808658.678:34): pid=7313 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir034478085/syzkaller.z7dIke/10/bus" dev="sda1" ino=16532 res=1 [ 55.144492][ T25] audit: type=1804 audit(1570808658.868:35): pid=7333 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir911965137/syzkaller.sDrZDI/2/bus" dev="sda1" ino=16554 res=1 15:44:18 executing program 2: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000000c0)=ANY=[@ANYBLOB="381b894000c0b3ffffe108000000000000683954be0705e71e674b7ecc994b831ee36e051e2497f4792eef71760e827dd5c64cc1790e0d95a088fa8ea19ee41e8791c50fb8621cfdc4fafa2ca132316217f83e164dcae78cd78bd8cddeaa96de53701cf659a18ddacea68200"/120, @ANYRES32=0x0, @ANYBLOB="0000000000000000180012001000", @ANYRES32], 0x4}}, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x153a, 0x49, &(0x7f0000000380)="e566a2a5d5b7b3a9fe7c5af247c90b0dd5516209501f8a03d472234df30e207b7ec7a25dc4caa9e2720c9544dbec1aeb871bcd95c710452ef0e3d871e2c574ab5df6f2cfcfaf6d453f", 0x81, 0x0, 0x1, 0x1f, 0x1, 0x3, 0xea5b, 'syz0\x00'}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00005d5ff3)={0x2, 0x4e20}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000db4ff0)={0x2, 0x0, @loopback}, 0x10) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r3, 0x1261, 0xffffffffffffffff) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x114000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r6) getresgid(&(0x7f0000001300), &(0x7f0000001340), &(0x7f0000001380)=0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r7]) getresgid(0x0, &(0x7f0000001340), &(0x7f0000001380)=0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=r8]) getgroups(0x3, &(0x7f0000000240)=[0x0, 0xffffffffffffffff, 0x0]) getegid() r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=@newlink={0x38, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ppp={{0x10, 0x1, 'ppp\x00'}, {0xc, 0x2, {0x8}}}}]}, 0x38}}, 0x0) fstat(r9, &(0x7f0000000280)) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getresgid(0x0, &(0x7f0000001340), &(0x7f0000001380)=0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=r10]) getresgid(&(0x7f0000001300), 0x0, &(0x7f0000001380)=0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r11]) getgroups(0x2, &(0x7f00000004c0)=[r10, r11]) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) 15:44:18 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x40000, 0x0) write$FUSE_POLL(r1, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r5, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r6 = dup3(r2, r4, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r7, 0xffffffffffffffff, 0x0) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) fcntl$notify(r8, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x59, 0x3f, "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"}) 15:44:19 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000240)={0xe26e}) r1 = perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) syz_open_dev$audion(0x0, 0x100000000, 0x301000) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000002c0)) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, 0x0) socket$nl_route(0x10, 0x3, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) [ 55.244415][ T25] audit: type=1804 audit(1570808658.868:36): pid=7325 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir280189995/syzkaller.AHoB5n/3/bus" dev="sda1" ino=16555 res=1 15:44:19 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000240)={0xe26e}) r1 = perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) syz_open_dev$audion(0x0, 0x100000000, 0x301000) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000002c0)) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, 0x0) socket$nl_route(0x10, 0x3, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) [ 55.370896][ T25] audit: type=1804 audit(1570808658.928:37): pid=7334 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir135669375/syzkaller.ne006r/4/bus" dev="sda1" ino=16556 res=1 15:44:19 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000240)={0xe26e}) r1 = perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) syz_open_dev$audion(0x0, 0x100000000, 0x301000) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000002c0)) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, 0x0) socket$nl_route(0x10, 0x3, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) [ 55.595425][ T25] audit: type=1804 audit(1570808659.318:38): pid=7363 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir280189995/syzkaller.AHoB5n/4/bus" dev="sda1" ino=16562 res=1 15:44:19 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000240)={0xe26e}) r1 = perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) syz_open_dev$audion(0x0, 0x100000000, 0x301000) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000002c0)) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, 0x0) socket$nl_route(0x10, 0x3, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) [ 55.647478][ T25] audit: type=1804 audit(1570808659.368:39): pid=7358 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir135669375/syzkaller.ne006r/5/bus" dev="sda1" ino=16563 res=1 [ 55.694828][ T7196] ================================================================== [ 55.702939][ T7196] BUG: KCSAN: data-race in tomoyo_supervisor / tomoyo_supervisor [ 55.710634][ T7196] [ 55.712958][ T7196] write to 0xffffffff860bff20 of 8 bytes by task 7180 on cpu 0: [ 55.720577][ T7196] tomoyo_supervisor+0xced/0xd20 [ 55.725509][ T7196] tomoyo_path_number_perm+0x323/0x3c0 [ 55.730963][ T7196] tomoyo_path_mkdir+0x6e/0xa0 [ 55.735728][ T7196] security_path_mkdir+0xb8/0xf0 [ 55.740659][ T7196] do_mkdirat+0xef/0x1f0 [ 55.744893][ T7196] __x64_sys_mkdir+0x40/0x50 [ 55.749481][ T7196] do_syscall_64+0xcf/0x2f0 [ 55.753980][ T7196] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 55.759854][ T7196] [ 55.762177][ T7196] write to 0xffffffff860bff20 of 8 bytes by task 7196 on cpu 1: [ 55.769803][ T7196] tomoyo_supervisor+0xced/0xd20 [ 55.774738][ T7196] tomoyo_path_permission+0x121/0x160 [ 55.780109][ T7196] tomoyo_path_perm+0x23e/0x390 [ 55.784953][ T7196] tomoyo_path_unlink+0x63/0x90 [ 55.789802][ T7196] security_path_unlink+0xa3/0xd0 [ 55.794822][ T7196] do_unlinkat+0x2f1/0x530 [ 55.799229][ T7196] __x64_sys_unlink+0x3b/0x50 [ 55.803900][ T7196] do_syscall_64+0xcf/0x2f0 [ 55.808401][ T7196] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 55.814276][ T7196] [ 55.816594][ T7196] Reported by Kernel Concurrency Sanitizer on: [ 55.822747][ T7196] CPU: 1 PID: 7196 Comm: syz-executor.4 Not tainted 5.3.0+ #0 [ 55.830295][ T7196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 15:44:19 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000240)={0xe26e}) r1 = perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) syz_open_dev$audion(0x0, 0x100000000, 0x301000) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000002c0)) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, 0x0) socket$nl_route(0x10, 0x3, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) 15:44:19 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000240)={0xe26e}) r1 = perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) syz_open_dev$audion(0x0, 0x100000000, 0x301000) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000002c0)) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, 0x0) socket$nl_route(0x10, 0x3, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) [ 55.839364][ T25] audit: type=1804 audit(1570808659.378:40): pid=7361 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir034478085/syzkaller.z7dIke/11/bus" dev="sda1" ino=16564 res=1 [ 55.840333][ T7196] ================================================================== [ 55.840342][ T7196] Kernel panic - not syncing: panic_on_warn set ... [ 55.840358][ T7196] CPU: 1 PID: 7196 Comm: syz-executor.4 Not tainted 5.3.0+ #0 [ 55.840386][ T7196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 55.896655][ T7196] Call Trace: [ 55.899948][ T7196] dump_stack+0xf5/0x159 [ 55.904190][ T7196] panic+0x209/0x639 [ 55.908084][ T7196] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 55.914150][ T7196] ? vprintk_func+0x8d/0x140 [ 55.918744][ T7196] kcsan_report.cold+0xc/0x1b [ 55.923427][ T7196] __kcsan_setup_watchpoint+0x3ee/0x510 [ 55.928977][ T7196] __tsan_write8+0x32/0x40 [ 55.933389][ T7196] tomoyo_supervisor+0xced/0xd20 [ 55.938328][ T7196] ? __kcsan_setup_watchpoint+0x96/0x510 [ 55.943959][ T7196] ? __tsan_write1+0x32/0x40 [ 55.948553][ T7196] ? tomoyo_compare_name_union+0xa0/0xa0 [ 55.954191][ T7196] tomoyo_path_permission+0x121/0x160 [ 55.959671][ T7196] tomoyo_path_perm+0x23e/0x390 [ 55.964549][ T7196] tomoyo_path_unlink+0x63/0x90 [ 55.969407][ T7196] security_path_unlink+0xa3/0xd0 [ 55.974431][ T7196] do_unlinkat+0x2f1/0x530 [ 55.978869][ T7196] __x64_sys_unlink+0x3b/0x50 [ 55.983544][ T7196] do_syscall_64+0xcf/0x2f0 [ 55.988057][ T7196] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 55.993935][ T7196] RIP: 0033:0x4597a7 [ 55.997822][ T7196] Code: 00 66 90 b8 58 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 56.017423][ T7196] RSP: 002b:00007ffde078afa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 56.025830][ T7196] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597a7 [ 56.033798][ T7196] RDX: 00007ffde078afc0 RSI: 00007ffde078afc0 RDI: 00007ffde078b050 [ 56.041764][ T7196] RBP: 0000000000000008 R08: 0000000000000000 R09: 000000000000000e [ 56.049768][ T7196] R10: 000000000000000a R11: 0000000000000246 R12: 00007ffde078c0e0 [ 56.057729][ T7196] R13: 00005555567a6940 R14: 0000000000000000 R15: 00007ffde078c0e0 [ 56.066802][ T7196] Kernel Offset: disabled [ 56.071120][ T7196] Rebooting in 86400 seconds..