Warning: Permanently added '10.128.0.77' (ECDSA) to the list of known hosts. 2019/12/24 17:24:55 fuzzer started 2019/12/24 17:24:56 dialing manager at 10.128.0.26:41703 2019/12/24 17:24:58 syscalls: 2707 2019/12/24 17:24:58 code coverage: enabled 2019/12/24 17:24:58 comparison tracing: enabled 2019/12/24 17:24:58 extra coverage: enabled 2019/12/24 17:24:58 setuid sandbox: enabled 2019/12/24 17:24:58 namespace sandbox: enabled 2019/12/24 17:24:58 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/24 17:24:58 fault injection: enabled 2019/12/24 17:24:58 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/24 17:24:58 net packet injection: enabled 2019/12/24 17:24:58 net device setup: enabled 2019/12/24 17:24:58 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/24 17:24:58 devlink PCI setup: PCI device 0000:00:10.0 is not available 17:28:02 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(r0, &(0x7f0000000000)="b8483cc829b1d6443f2593a5ea9b6f4612f283d53ebe84df978a32380d9091e2010d06aa6f377f0192a06f19a5d28cb8e22ee852e18dd98c4635cdd0bde972355f5c75bcc36a812346cd2fdde690f6d5a206f8562a214bbe99dfe7dfd80855dcaea2a26a01052dc06427410ded64cb0f7676a70f6614ece983c4a537c01964f80c16a098e722c0ee13e22d42dd8ade321f1bf14a73f89d0ef1316f82f44da8e2b6d2f7f1810ee323ca49cead06c5af", 0xaf, 0x4000, &(0x7f00000000c0)={0xa, 0x4e21, 0x2, @rand_addr="868caadb6591be0a545e09b5840fde26", 0x40}, 0x1c) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000140)={0xa50000, 0x8, 0x9, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0xedd8ed5fb250f968, 0x400, [], @value=0x8}}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e21, @loopback}}, 0xff, 0x80}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r2, 0x4}, 0x8) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e24, @empty}], 0x10) r4 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7ff, 0x84080) ioctl$KVM_INTERRUPT(r4, 0x4004ae86, &(0x7f0000000380)=0x9) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000400)={0x4c, 0x9, 0x4, 0x100, 0x6, {}, {0x7, 0xc, 0x6, 0x4, 0x5, 0x0, "f449c8f5"}, 0xfffffff9, 0x3, @planes=&(0x7f00000003c0)={0x0, 0x2, @userptr=0xd1ed}, 0x8, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_S_FREQUENCY(r5, 0x402c5639, &(0x7f0000000480)={0x0, 0x0, 0x8001}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000005c0)=0x0) syz_mount_image$msdos(&(0x7f00000004c0)='msdos\x00', &(0x7f0000000500)='./file0\x00', 0x6fe, 0x1, &(0x7f0000000580)=[{&(0x7f0000000540)="389d12e4dab07202bae4783c17eeb560a6bc1252155521484f", 0x19, 0x316027af}], 0x0, &(0x7f0000000600)={[{@nodots='nodots'}, {@fat=@errors_remount='errors=remount-ro'}, {@fat=@discard='discard'}, {@dots='dots'}], [{@subj_type={'subj_type', 0x3d, '/dev/vcs#\x00'}}, {@seclabel='seclabel'}, {@audit='audit'}, {@permit_directio='permit_directio'}, {@euid_eq={'euid', 0x3d, r6}}, {@obj_user={'obj_user', 0x3d, '-'}}]}) r7 = accept4$inet(r4, &(0x7f0000000680), &(0x7f00000006c0)=0x10, 0x180800) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)={r7}) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000740)={0x1, 0x7ff, 0x8dc1}) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000780)={0x1, 0x0, {0x2, 0x6, 0x500, 0x7}}) r8 = syz_open_dev$vcsa(&(0x7f00000007c0)='/dev/vcsa#\x00', 0x9, 0x84400) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000840)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r8, &(0x7f0000000900)={&(0x7f0000000800), 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x38, r9, 0x300, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r4, 0x660c) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000940)=0x1a100, 0x4) ioctl$VIDIOC_STREAMON(r3, 0x40045612, &(0x7f0000000980)=0x3) r10 = socket$inet_dccp(0x2, 0x6, 0x0) open_by_handle_at(r10, &(0x7f00000009c0)={0xf8, 0x2, "9ac75dabb31b985f2b770ba66fed69728b477097546f4803586404f4df3140f76c33ca26c0d95c503e3e08aa5feaa24072cf6f87cb8b1e3e18904ac8202b59de70d5c2abeb44d6eff864cc556cfda6c716c47caf5d1b2fb55a295d39069f66e72d02fc7728056e12c0234c0bac093cd29a2d9d8073bde494658169cd4d5faea68f6134a29c8cad76d93401813f0984bdc4e35631b5b1814b75fc3e82eda94b6cca46768fff53694a29ee6c3d7c558882d38eaf74dcfda8222697356ed42a40d2b63af4339eb3a86a2b1badc2231ec68de32d51ec952a455fc415618b14b6d58289968b312e0940b83dec09d449c3fd21"}, 0x311800) r11 = socket$caif_seqpacket(0x25, 0x5, 0x5) ioctl$EXT4_IOC_GROUP_ADD(r11, 0x40286608, &(0x7f0000000ac0)={0x2, 0x7fffffff, 0x6, 0x2, 0x8000}) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x3) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000b00)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_RM_MAP(r12, 0x4028641b, &(0x7f0000000b40)={&(0x7f0000ffc000/0x4000)=nil, 0x40, 0xe7d301c572dd3d83, 0x1, &(0x7f0000ffe000/0x2000)=nil, 0x8000}) 17:28:02 executing program 1: chmod(&(0x7f0000000000)='./file0\x00', 0x2) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan0procmd5sum{,wlan1-\x00') r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xea, 0x2) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000100)={0x18, 0x1, 0x0, {0x1}}, 0x18) r2 = syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x8, 0x800) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @multicast1}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000280)=@sack_info={r3, 0x8001, 0x976c}, &(0x7f00000002c0)=0xc) r4 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ttynull\x00', 0x282041, 0x0) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000340)="22180a7966418d1fc562b8a7be8a9d29fe2fd9a7f5d305596615cbba104c1471a094e0bc36", 0x25}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="e4821c5f4c06b5d432e1358a1efdd7d3ad385d3c0e4cbe8d8e9ca6d6f1b2a9", 0x1f}, {&(0x7f0000000400)="b397fd57f50ac495ee2e27d4c6d36f6b9b0936c074bb7f9b175ac94faf", 0x1d}], 0x4) write$P9_RWALK(r0, &(0x7f0000000480)={0x57, 0x6f, 0x1, {0x6, [{0x0, 0x3, 0x2}, {0x32, 0x2, 0x6}, {0x40, 0x3, 0x4}, {0x8, 0x0, 0x8}, {0xd0, 0x1, 0x7}, {0x10, 0x2, 0x4}]}}, 0x57) pipe2$9p(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x6c00) write$P9_RLOCK(r5, &(0x7f0000000540)={0x8, 0x35, 0x2, 0x2}, 0x8) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nvme-fabrics\x00', 0x2000, 0x0) ioctl$SIOCX25GFACILITIES(r6, 0x89e2, &(0x7f00000005c0)) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000600)={&(0x7f0000ff5000/0x9000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x9000, 0x1}) r7 = syz_open_dev$swradio(&(0x7f0000000640)='/dev/swradio#\x00', 0x1, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r7, 0xc0096616, &(0x7f0000000680)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vga_arbiter\x00', 0x22000, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001780)={r8, &(0x7f0000000700)="829823ab355e8103b838e85a0853f9776bfe523ad69e86001d7feff8987c6eea9c7624ae4c2884afce813f750309851195d8e16442d5729177d3c3b72ec98e6de1", &(0x7f0000000780)=""/4096, 0x6}, 0x20) r9 = syz_genetlink_get_family_id$tipc(&(0x7f00000017c0)='TIPC\x00') ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000001800)={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x306, @broadcast}, 0x2, {0x2, 0x4e21, @local}, 'dummy0\x00'}) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f00000018c0)={0x48, 0xa, 0x4, 0x100000, 0x4, {}, {0x1, 0x2, 0x7, 0x9, 0x8, 0x76, "6c24c373"}, 0xa443, 0x4, @planes=&(0x7f0000001880)={0xffffffff, 0x3, @userptr=0x8000, 0xb0d3}, 0xfffffffb, 0x0, 0xffffffffffffffff}) ioctl$KVM_GET_DEBUGREGS(r10, 0x8080aea1, &(0x7f0000001940)) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000019c0)) socketpair(0x0, 0x180008, 0x1f, &(0x7f0000001a00)={0xffffffffffffffff}) getsockopt$TIPC_IMPORTANCE(r11, 0x10f, 0x7f, &(0x7f0000001a40), &(0x7f0000001a80)=0x4) r12 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001ac0)='/proc/capi/capi20\x00', 0x111541, 0x0) ioctl$SIOCGETLINKNAME(r12, 0x89e0, &(0x7f0000001b00)={0x3, 0x1}) r13 = dup(0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(r13, &(0x7f0000001c40)={&(0x7f0000001b80)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001c00)={&(0x7f0000001bc0)={0x30, r9, 0x4, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x14, 0x18, {0x7, @bearer=@udp='udp:syz0\x00'}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) syzkaller login: [ 263.628637][ T9311] IPVS: ftp: loaded support on port[0] = 21 17:28:03 executing program 2: r0 = semget(0x0, 0x0, 0x100) semctl$SEM_INFO(r0, 0x1, 0x13, &(0x7f0000000000)=""/169) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x13, 0x7, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x1, 0x3, 0x4, 0x2, 0x0, 0xfffffffffffffff0}, @ldst={0x1, 0x1, 0x3, 0x8, 0x0, 0xfffffffffffffff0, 0x10}, @alu={0x7, 0x0, 0x1f, 0x5, 0x6, 0x4, 0xfffffffffffffff0}, @ldst={0x1, 0x0, 0x6, 0xa, 0x0, 0x6982e9e718af65a0, 0x19}]}, &(0x7f0000000100)='syzkaller\x00', 0x80f, 0xc, &(0x7f0000000140)=""/12, 0x1de35088d1eb8c22, 0x1, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x4, 0x4, 0x47f3}, 0x10, 0xffffffffffffffff}, 0x78) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000280)=0x10000) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000002c0)={0x1, 0x7, 0x4, 0x4, 0x80, {}, {0x2, 0x1, 0xff, 0x7f, 0x3, 0x2, "eab56b47"}, 0x200, 0x1, @fd, 0x81, 0x0, r1}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000340)={0x7b, 0x0, [0x9, 0x7f, 0x1, 0x1]}) r3 = socket$xdp(0x2c, 0x3, 0x0) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f00000003c0)="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") fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f00000004c0)) write$cgroup_int(r2, &(0x7f0000000500)=0x280, 0x12) r4 = dup(0xffffffffffffffff) openat$cgroup_int(r2, &(0x7f0000000540)='io.max\x00', 0x2, 0x0) r5 = syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f0000000680)={&(0x7f00000005c0)=""/131, 0x0, 0x1000, 0x0, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000006c0)={0x0, 0xb42e, 0x6, [0x9, 0x7ff, 0xf2, 0x4, 0x6, 0x7]}, &(0x7f0000000700)=0x14) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000740)={r6, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x11}}}}, &(0x7f0000000800)=0x84) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000840)={0x0, 0x16, 0x4, 0x40, 0x6, {0x0, 0x2710}, {0x4, 0x8, 0x1, 0x5, 0x5, 0x5, "d2ec4e42"}, 0x1, 0x2, @offset=0xc52f, 0xfffffff9, 0x0, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r7, 0x84, 0x5, &(0x7f00000008c0)={r6, @in6={{0xa, 0x4e22, 0x7f, @rand_addr="3d887e34315adb4a4fced81412632b6f", 0xb71e}}}, 0x84) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000003900)='/dev/autofs\x00', 0x200000, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r8, 0x12, 0x3, &(0x7f0000003940), &(0x7f0000003980)=0x4) r9 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000039c0)='/dev/btrfs-control\x00', 0x20000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000003a40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000003a00)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r9, &(0x7f0000003a80)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, r10}}, 0x30) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000003ac0)={0x8, 0x39, 0x9, 0xd, 0xb, 0xfff, 0x3, 0x7c, 0xffffffffffffffff}) syz_open_dev$vcsu(&(0x7f0000003b00)='/dev/vcsu#\x00', 0x9, 0x12026) openat$dsp(0xffffffffffffff9c, &(0x7f0000003b40)='/dev/dsp\x00', 0x400, 0x0) r11 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000003b80)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$UFFDIO_REGISTER(r11, 0xc020aa00, &(0x7f0000003bc0)={{&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0x2}) r12 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x404bf559f53670b1) ioctl$SCSI_IOCTL_DOORUNLOCK(r12, 0x5381) [ 263.848121][ T9311] chnl_net:caif_netlink_parms(): no params data found [ 263.904992][ T9314] IPVS: ftp: loaded support on port[0] = 21 [ 263.974737][ T9311] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.983180][ T9311] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.002201][ T9311] device bridge_slave_0 entered promiscuous mode [ 264.037093][ T9311] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.052748][ T9311] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.071798][ T9311] device bridge_slave_1 entered promiscuous mode 17:28:03 executing program 3: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x80800, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)=0x1) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000080)=""/91, &(0x7f0000000100)=0x5b) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f0000000140)=0x9) r2 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x7ff, 0x6631e403e61e9e15) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f00000001c0)={0x80000000, [0x7f, 0x7ff], 0xba8a}, 0x10) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="af90dca57e2522dc6782437aa5150c2129cc4ed1f1c65dd18952fd61aaf4421ff06301d4c494fb02a6fb7ad41203baf07e02a0e03720dbbef65d7ac6add04b35742e1e20a7c7b5a87fdc678e182fce32804cde99e61bab4cf9e334941da63e62c9bbd2c3941513d40aa7a4dc08101103ac264b725007c846ebe65270adfe842ffc64e7abaceb360fb2b322d9aa81ef294690fd3db34b364f345528e674e7ada0df08330cea", 0xa5, 0xfffffffffffffffb) keyctl$setperm(0x5, r3, 0x10) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000340), &(0x7f0000000380)=0x4) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x84525d20e5a08ced, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r4, 0xc004500a, &(0x7f0000000400)=0x7fff) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000440)) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$VT_GETMODE(r5, 0x5601, &(0x7f0000000480)) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) dup2(r6, 0xffffffffffffffff) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d0a, &(0x7f00000004c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000500)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000540)=0x28) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000005c0)={0x100, 0x3, 0x4, 0x2000, 0x6ab, {r7, r8/1000+30000}, {0x5, 0x0, 0x5, 0x5, 0xff, 0x80, "c958b35a"}, 0x25, 0x4, @offset=0x7, 0x4, 0x0, 0xffffffffffffffff}) ioctl$TIOCGLCKTRMIOS(r9, 0x5456, &(0x7f0000000640)={0x6, 0x6, 0x83, 0x0, 0xb, "187c3fbee6606f0b3300082e1eb606af9f7c2a"}) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000680)=0x8, 0x4) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000700)={0x9, &(0x7f00000006c0)=[{0x800, 0x9}, {0x4, 0xe72}, {0x9, 0x4}, {0xfffc, 0x95}, {0x93, 0xfff}, {0x100, 0xffff}, {0x6, 0xff9}, {0xff, 0x7f}, {0x9, 0x1}]}) r10 = socket$inet(0x2, 0x4, 0x7f) setsockopt$inet_tcp_int(r10, 0x6, 0x18, &(0x7f0000000740)=0x996b, 0x4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/bsg\x00', 0x1, 0x0) connect$nfc_llcp(r11, &(0x7f0000000b80)={0x27, 0x1, 0x1, 0x0, 0x6, 0x5, "abf74623f550f53739fc19b8c53014863d0d32a675f7066bb6aba480621e28d5e56caf2e7ce4b97eda319fe364b315511d551785e2ddc905273ed2afb7b42b", 0x1}, 0x60) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000c40)={0x1, &(0x7f0000000c00)=[{0x3, 0x1, 0x6, 0x6}]}, 0x10) r12 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000c80)={{0x3, @netrom}, [@netrom, @rose, @null, @remote, @default, @netrom, @netrom, @default]}, &(0x7f0000000d00)=0x48, 0x80000) fcntl$setlease(r12, 0x400, 0x1) [ 264.121047][ T9311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 264.157154][ T9311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 264.208535][ T9311] team0: Port device team_slave_0 added [ 264.225449][ T9316] IPVS: ftp: loaded support on port[0] = 21 [ 264.234211][ T9311] team0: Port device team_slave_1 added [ 264.337573][ T9311] device hsr_slave_0 entered promiscuous mode [ 264.402478][ T9311] device hsr_slave_1 entered promiscuous mode 17:28:03 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x100480) ioctl$SNDCTL_DSP_GETODELAY(r0, 0x80045017, &(0x7f0000000040)) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1, 0x3c1e00) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000000c0)={0x800100a, 0x10000, 0x2}) r2 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x8001, 0xac00) ioctl$VIDIOC_ENUMAUDOUT(r2, 0xc0345642, &(0x7f0000000140)={0xfff, "d4e27f97d36d255c853fbacd71ee85a80dc87a567fd4ec47ccd9d700e6b62363", 0x2}) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f0000000180)={0x1000, 0x6, 0x9}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x103100, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000240)={0x4, &(0x7f0000000200), 0x1e1180052396e7d7, r1}) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x8100, 0x0) r5 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)=0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsa\x00', 0x2000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000000480)=0xe8) getresuid(&(0x7f00000004c0)=0x0, &(0x7f0000000500), &(0x7f0000000540)) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{0xdc28, 0x5, 0x4, 0x8}]}) sendmsg$nl_generic(r4, &(0x7f00000009c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000001}, 0xc, &(0x7f0000000980)={&(0x7f0000000600)={0x348, 0x27, 0x200, 0x70bd2d, 0x25dfdbfe, {0xe}, [@generic="b5cb207acf6e882de8c75176637ca81a44ebd66ce973176232ce18d5e0bc28bc1c6d218dd27e86e6ed7f7957a01c047017e1ad928a5393ce918c46331115d7b509f06c320a164c24d211cfa293b974daa43819e184bd5a03d066c2150cec36d863bc50dab9698e9ba98e366ef8c1525c2629d22ad46ef3109569c457ef846d719445d4af395cd6e677e7227918dd28da7921ff620a8e27329b0903f62f33f026fad1df0f78f424630bedf7cc", @nested={0xc, 0x16, [@typed={0x8, 0x41, @fd=r5}]}, @nested={0x1c, 0x3a, [@typed={0xc, 0x7a, @str='selinux\x00'}, @typed={0xc, 0x81, @u64=0x7c}]}, @generic="3fd4af7b10010b38b72006ff4eac36a67b85df975695368ef267564ec67d499ec8add59d6125c4f8a2095864c7f42e95c958b5f860165c68b0e2e54ad653a1d05c458b3d87a2d25139ac318e22344f32ee2af9ec7035eebeee150f2385050680d9512faf03a4e8859b46faebaf11fa1dec9c42cb903cd33585abd9aa65d493b37e61f5007cebc09839aab632065db72ea22eb99c81db11ae1443d68f2d3c327d4b09", @nested={0xe8, 0x5d, [@typed={0x8, 0x91, @pid=r6}, @generic="6a370b9dc44f244fbdd096a3895e13dc0c8fff10103ba78f80eb9cfdd5935ee15da8a3d0d3bd31130be2b64f96c1fff164ba0c7ac052253f854976f3498c95e99a0c3aa3735ff162f98418368d9a07c91d02c25b03b8c59613f994a664548d443acfc225af9ce22f83b71bd5c52973f4054ab8f75e84ba98f1e2565aa72f7a7928665debe1668d258811da149cf1ba285e668805", @typed={0x8, 0x2, @fd=r7}, @typed={0x4, 0x94}, @typed={0x8, 0x2a, @uid=r8}, @generic="209736ab5dfdd43312469b4a14666541e2d462d5604e485501139d9794c1", @generic="3cb03070fab0", @typed={0x8, 0x3b, @uid=r9}, @typed={0x8, 0x40, @fd=r10}]}, @generic="8c94869bbfb42fcdad7c11fc4d82c51c8b333575536e6a571de72423846712c4b4077e6b95c8c2d8b12cac5bb5367cd2b995af8a834d9e56b3cebc9a7a13673b2e4338e17a46de156a0c309052e088cbe9fb65bcb66dd9bf9ffbe09e4e485c6833160415999a7ce7c1a0dff5f01a4790fbd41df8c952d7e0661db88501470a9e93ce23692095761661662ef5b66cbb3ecf7aff4144fd65d5293233b5fa640b119468780505f45af7eb50aeba6afb8fecfe2dffb7d138d3557a50065967dce0279a84b0164280195d207cf1ebc12a", @typed={0x8, 0x31, @fd=r2}]}, 0x348}, 0x1, 0x0, 0x0, 0x20000040}, 0x40) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) r11 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/nvram\x00', 0x41, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@broadcast, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000c00)=0xe8) statx(r7, &(0x7f0000000c40)='./file0\x00', 0x100, 0x100, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d80)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000e80)=0xe8) mount$fuseblk(&(0x7f0000000a00)='/dev/loop0\x00', &(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)='fuseblk\x00', 0x2000, &(0x7f0000000ec0)={{'fd', 0x3d, r11}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r12}, 0x2c, {'group_id', 0x3d, r13}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x577}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}], [{@permit_directio='permit_directio'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selinux\x00'}}, {@uid_lt={'uid<', r15}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@measure='measure'}]}}) r16 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000001000)='/dev/dlm-control\x00', 0x200, 0x0) sendto$netrom(r16, &(0x7f0000001040)="b986586cbb0d5d703095229cba5b66ce698676b03ecf256f23c3719a990007493694f4", 0x23, 0x10, 0x0, 0x0) lseek(r1, 0x0, 0x3) r17 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001080)='/dev/dlm-monitor\x00', 0x70f0ace7230e508b, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r17, 0xc0305302, &(0x7f00000010c0)={0x800, 0x1, 0x73b, 0xa750, 0x100, 0x1}) ioctl$sock_inet6_SIOCSIFDSTADDR(r11, 0x8918, &(0x7f0000001100)={@local, 0x1, r14}) r18 = accept4$packet(r1, &(0x7f0000001140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001180)=0x14, 0x800) readv(r18, &(0x7f0000002280)=[{&(0x7f00000011c0)=""/155, 0x9b}, {&(0x7f0000001280)=""/4096, 0x1000}], 0x2) [ 264.509867][ T9318] IPVS: ftp: loaded support on port[0] = 21 [ 264.607661][ T9314] chnl_net:caif_netlink_parms(): no params data found [ 264.656717][ T9311] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 264.826879][ T9311] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 264.877174][ T9311] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 264.974590][ T9311] netdevsim netdevsim0 netdevsim3: renamed from eth3 17:28:04 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000040)=r0, 0x1) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_UNLINK(r2, 0x4161, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x202584, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r3, 0xc2604110, &(0x7f0000000100)={0x59, [[0x0, 0x7, 0xffffffff, 0x1e, 0x80, 0x1000, 0x0, 0x2], [0x8000, 0xffffffff, 0x80000001, 0x4, 0x9c, 0x80000000, 0x96, 0x8], [0x0, 0x5, 0xed4f, 0x6, 0x7, 0x9, 0x3, 0x3ff]], [], [{0xb3b2, 0x42d}, {0x0, 0x80, 0x1, 0x1, 0x1}, {0x3ff, 0xc8b, 0x1, 0x0, 0x1, 0x1}, {0x8000, 0xf67, 0x0, 0x1, 0x1}, {0x9, 0x7, 0x0, 0x1}, {0x1, 0x81, 0x0, 0x0, 0x1}, {0x915f, 0x7ff, 0x0, 0x0, 0x1, 0x1}, {0x101, 0x3, 0x0, 0x0, 0x1, 0x1}, {0x7e27, 0x0, 0x1, 0x0, 0x1, 0x1}, {0x9, 0x6, 0x1, 0x0, 0x0, 0x1}, {0x8000, 0x8, 0x1, 0x0, 0x0, 0x1}, {0x8, 0x8, 0x1, 0x1}], [], 0x1}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000380)={@loopback}, &(0x7f00000003c0)=0x14) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0xd0000, 0x0) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000440)={0x1, 0x7, 0x5}) write$cgroup_type(r0, &(0x7f0000000480)='threaded\x00', 0x9) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/qat_adf_ctl\x00', 0x62001, 0x0) sendto$netrom(r5, &(0x7f0000000500)="211f060849134e80dd99dc4df0c0f2747f5bd226afc6abed43f5d09138a6bbc7b9b4445beef5782320e529f09d84207712e617343b22732edb85caebeab4e34f778ad31261a6cb6955ce4e4e8b8b4ba25300e0707740e6af50044646b0fb5717ee2add96a8daf24fa6901ffe3bd9ab5dff530fa437c88f54407c51ec8608000e3029ba7c6457b48fe26ce8783d040882223713398315e47f5e773ef979d7ffd86e6fa7da7ae60439cdd31a36bbe3c922353ea9d06c9e5174c677bbf61f3a94ac59", 0xc1, 0x80, &(0x7f0000000600)={{0x3, @bcast, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @bcast]}, 0x48) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f00000006c0)={0x1, 0x974c4dc9646146c1, 0x4, 0x4, 0xffffffff, {}, {0x1, 0x2, 0x40, 0x1f, 0x9a, 0x7c, "ad2ce554"}, 0xa03, 0x1, @planes=&(0x7f0000000680)={0x3f, 0x4, @mem_offset=0x7, 0x9}, 0x1, 0x0, 0xffffffffffffffff}) r7 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000740)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000780)=0x1c, 0x1000) r8 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/dlm-monitor\x00', 0x169000, 0x0) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r10 = socket$rds(0x15, 0x5, 0x0) r11 = syz_open_pts(0xffffffffffffffff, 0x20000) io_uring_register$IORING_REGISTER_FILES_UPDATE(r6, 0x6, &(0x7f0000000840)={0x5, &(0x7f0000000800)=[r7, r8, r9, 0xffffffffffffffff, r10, r11, r3]}, 0x7) prctl$PR_SET_KEEPCAPS(0x8, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000880)='net/icmp\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r12, 0x84, 0x6c, &(0x7f00000008c0)={0x0, 0x3a, "fe8216ecc406c59345981bf1af9b005ed01d435ae48b8740be8c0c12f098aa656d064ecfb684e6d757411176c881c75238a4f0a307da65f90e09"}, &(0x7f0000000940)=0x42) connect$l2tp(r0, &(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x2, 0x0, 0x4, {0xa, 0x4e20, 0x8, @local, 0x9}}}, 0x32) ioctl$SOUND_MIXER_READ_STEREODEVS(0xffffffffffffffff, 0x80044dfb, &(0x7f00000009c0)) r14 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/bsg\x00', 0x800080, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a40)={r13, 0xb0, "798641079fe4c8af6729f151157d97abd7f1f639d5970072e76342771747808d9afa60efa6e002d6bd95af0de5db94d8d7a7475e827ab3f6050398276736e1878fb4eab515aa1c6cd63422768dd8f0675dcf7fea8d502336282ab3ee0b8e810e8094ebe008d2c0e3ca1d8052c67063c5e7553d52ba3ff041db210aca62e59ab76a78087169a5288cd2557f8cd4bf06080f6b7b948bac0125c9769e6a7a06b2d369b5e45cf05a8b396d38de8e4667078f"}, &(0x7f0000000b00)=0xb8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r14, 0x84, 0x7c, &(0x7f0000000b40)={r15, 0x80, 0x3}, &(0x7f0000000b80)=0x8) r16 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/sequencer\x00', 0x802021, 0x0) ioctl$USBDEVFS_BULK(r16, 0xc0185502, &(0x7f0000000d00)={{{0xe}}, 0xc3, 0x9, &(0x7f0000000c00)="cc868b0455f9ee7d2c10615b729cbbf861604eb7a193c457183f80130e4158a43a18830942c37f9336296c6ecf0c0876ae4b73079f44d7bc46d71c47e5ef382baf19b016340a166b19f8f54766adaff27d7bc01af29d550233df7cc76d321b10ba9f0ef69161c04d3f80fde67869103789ae99b9540f37e8dd6bfebc42b5e6679b3fa7df753813814653bfbdaa2ca33a7e3b6e8c60f3d709b544d6d5bf29ed18d45d5b72eb7b8fbee8e72480ad0e61bc570cdae81cf51883b8e40971d0e4920786d5d5"}) [ 265.027633][ T9314] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.042672][ T9314] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.063751][ T9314] device bridge_slave_0 entered promiscuous mode [ 265.094227][ T9314] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.113650][ T9322] IPVS: ftp: loaded support on port[0] = 21 [ 265.113857][ T9314] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.141718][ T9314] device bridge_slave_1 entered promiscuous mode [ 265.245532][ T9314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 265.280563][ T9314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 265.407983][ T9325] IPVS: ftp: loaded support on port[0] = 21 [ 265.481941][ T9314] team0: Port device team_slave_0 added [ 265.489984][ T9314] team0: Port device team_slave_1 added [ 265.508628][ T9316] chnl_net:caif_netlink_parms(): no params data found [ 265.663918][ T9314] device hsr_slave_0 entered promiscuous mode [ 265.713071][ T9314] device hsr_slave_1 entered promiscuous mode [ 265.771817][ T9314] debugfs: Directory 'hsr0' with parent '/' already present! [ 265.782685][ T9311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 265.789985][ T9318] chnl_net:caif_netlink_parms(): no params data found [ 265.834552][ T9316] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.842516][ T9316] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.850210][ T9316] device bridge_slave_0 entered promiscuous mode [ 265.860937][ T9316] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.868554][ T9316] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.877384][ T9316] device bridge_slave_1 entered promiscuous mode [ 265.940356][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.949255][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.967051][ T9311] 8021q: adding VLAN 0 to HW filter on device team0 [ 265.981739][ T9318] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.988825][ T9318] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.997279][ T9318] device bridge_slave_0 entered promiscuous mode [ 266.006388][ T9316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 266.022697][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.031370][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.047814][ T27] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.055061][ T27] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.093313][ T9318] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.100396][ T9318] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.108350][ T9318] device bridge_slave_1 entered promiscuous mode [ 266.123856][ T9314] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 266.175254][ T9316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 266.184501][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 266.227066][ T9314] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 266.284198][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.293762][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.303074][ T2739] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.310177][ T2739] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.318085][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 266.335353][ T9318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 266.346846][ T9316] team0: Port device team_slave_0 added [ 266.354811][ T9318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 266.368871][ T9314] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 266.461460][ T9322] chnl_net:caif_netlink_parms(): no params data found [ 266.476963][ T9316] team0: Port device team_slave_1 added [ 266.493589][ T9314] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 266.567703][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.587910][ T9318] team0: Port device team_slave_0 added [ 266.618831][ T9318] team0: Port device team_slave_1 added [ 266.642463][ T9325] chnl_net:caif_netlink_parms(): no params data found [ 266.725177][ T9316] device hsr_slave_0 entered promiscuous mode [ 266.762136][ T9316] device hsr_slave_1 entered promiscuous mode [ 266.821697][ T9316] debugfs: Directory 'hsr0' with parent '/' already present! [ 266.833693][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 266.842650][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 266.850977][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 266.862897][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 266.879049][ T9322] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.887984][ T9322] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.897129][ T9322] device bridge_slave_0 entered promiscuous mode [ 266.907093][ T9322] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.914233][ T9322] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.923225][ T9322] device bridge_slave_1 entered promiscuous mode [ 266.955705][ T9322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 266.970075][ T9322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 266.980637][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 266.990415][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 266.998793][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 267.021485][ T9311] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 267.037752][ T9311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 267.083891][ T9318] device hsr_slave_0 entered promiscuous mode [ 267.132815][ T9318] device hsr_slave_1 entered promiscuous mode [ 267.171851][ T9318] debugfs: Directory 'hsr0' with parent '/' already present! [ 267.184644][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 267.193408][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 267.254620][ T9322] team0: Port device team_slave_0 added [ 267.276720][ T9322] team0: Port device team_slave_1 added [ 267.303548][ T9325] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.310670][ T9325] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.322676][ T9325] device bridge_slave_0 entered promiscuous mode [ 267.330956][ T9325] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.338756][ T9325] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.347222][ T9325] device bridge_slave_1 entered promiscuous mode [ 267.370102][ T9316] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 267.419639][ T9316] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 267.487227][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 267.494746][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 267.539062][ T9316] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 267.584497][ T9316] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 267.635965][ T9325] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 267.645481][ T9318] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 267.775460][ T9322] device hsr_slave_0 entered promiscuous mode [ 267.842020][ T9322] device hsr_slave_1 entered promiscuous mode [ 267.891669][ T9322] debugfs: Directory 'hsr0' with parent '/' already present! [ 267.908146][ T9314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 267.923319][ T9311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 267.933719][ T9325] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 267.943325][ T9318] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 267.973769][ T9318] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 268.041097][ T9314] 8021q: adding VLAN 0 to HW filter on device team0 [ 268.078557][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.088047][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.096686][ T9318] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 268.172827][ T9325] team0: Port device team_slave_0 added [ 268.182428][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.191116][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.199923][ T27] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.207039][ T27] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.215130][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.223923][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.232293][ T27] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.239320][ T27] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.273662][ T9325] team0: Port device team_slave_1 added [ 268.286758][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.295935][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 268.338528][ T9322] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 268.373456][ T9333] FAT-fs (loop0): Unrecognized mount option "subj_type=/dev/vcs#" or missing value [ 268.415317][ T9322] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 268.474360][ T9322] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 268.487031][ T9337] FAT-fs (loop0): Unrecognized mount option "subj_type=/dev/vcs#" or missing value [ 268.513866][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 268.523198][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 268.532511][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 17:28:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x6f, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0xffffffffffffffff) [ 268.595010][ T9325] device hsr_slave_0 entered promiscuous mode [ 268.636076][ T9325] device hsr_slave_1 entered promiscuous mode [ 268.693278][ T9325] debugfs: Directory 'hsr0' with parent '/' already present! [ 268.719247][ T9322] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 268.773783][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 268.782069][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 268.790625][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 268.799641][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 268.808610][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 268.819555][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 268.828262][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 268.863501][ T9314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 17:28:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) [ 268.967352][ T9316] 8021q: adding VLAN 0 to HW filter on device bond0 17:28:08 executing program 0: creat(&(0x7f0000000000)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xa) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) sendfile(r0, r1, 0x0, 0x8000fffffffe) [ 269.036250][ T9325] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 269.094550][ T9325] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 269.121864][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 269.121880][ T28] audit: type=1804 audit(1577208488.267:31): pid=9351 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir768404313/syzkaller.sJpn1G/3/bus" dev="sda1" ino=16520 res=1 [ 269.155729][ T9325] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 269.167383][ T28] audit: type=1804 audit(1577208488.277:32): pid=9351 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir768404313/syzkaller.sJpn1G/3/bus" dev="sda1" ino=16520 res=1 [ 269.245418][ T9318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 269.254721][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 269.272101][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 269.304408][ T9325] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 269.368721][ T9314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 269.391380][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 269.401654][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.413288][ T9318] 8021q: adding VLAN 0 to HW filter on device team0 [ 269.436783][ T9316] 8021q: adding VLAN 0 to HW filter on device team0 [ 269.487396][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 269.497210][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.505481][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.515637][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.524607][ T2739] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.531780][ T2739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.540043][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 269.549843][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.558738][ T2739] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.565929][ T2739] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.642185][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 269.650365][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.681464][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.703631][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.710779][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.727593][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 269.736633][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.746626][ T5] bridge0: port 2(bridge_slave_1) entered blocking state 17:28:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 269.753782][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.763386][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 269.773100][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 269.783381][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 269.861279][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 269.870854][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 269.880757][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 269.905442][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 269.920614][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 269.930764][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 269.940697][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 269.949713][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 269.959505][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 269.970884][ T28] audit: type=1804 audit(1577208489.117:33): pid=9361 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir768404313/syzkaller.sJpn1G/3/bus" dev="sda1" ino=16520 res=1 [ 269.973645][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 270.007179][ C0] hrtimer: interrupt took 26634 ns [ 270.031045][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 270.046362][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 270.084814][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 270.093682][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 270.106823][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 270.116717][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 270.125968][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 17:28:09 executing program 1: poll(&(0x7f0000000100)=[{}, {}, {}, {}], 0xb6, 0x800000000004b) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x58d, 0x0, 0x0, 0x800e004e5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getown(r0, 0x5) recvfrom$inet(r1, 0x0, 0x91, 0x0, 0x0, 0x800e004ed) shutdown(r0, 0x0) shutdown(r1, 0x0) [ 270.135289][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 270.168297][ T9318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 270.239000][ T9325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 270.254386][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 270.264937][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 270.266576][ T28] audit: type=1804 audit(1577208489.417:34): pid=9351 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir768404313/syzkaller.sJpn1G/3/bus" dev="sda1" ino=16520 res=1 [ 270.281216][ T9316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 17:28:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreq(r0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x162, 0x0, 0x0, 0x800e00410) shutdown(r0, 0x0) [ 270.321649][ T28] audit: type=1804 audit(1577208489.457:35): pid=9352 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir768404313/syzkaller.sJpn1G/3/bus" dev="sda1" ino=16520 res=1 [ 270.383391][ T9325] 8021q: adding VLAN 0 to HW filter on device team0 [ 270.399376][ T9322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 270.410200][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 270.419911][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 17:28:09 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r2, &(0x7f0000000040), 0x8) [ 270.453810][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 270.461739][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 270.470950][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 270.486619][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 17:28:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129cde3}], 0x1, &(0x7f00000001c0)=""/17, 0x10036, 0x7304}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) [ 270.512079][ T9328] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.519165][ T9328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.553837][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.562078][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.570802][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.579714][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.586843][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.648052][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 270.660113][ T9318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 270.718558][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 270.750977][ T9316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 270.794926][ T9322] 8021q: adding VLAN 0 to HW filter on device team0 [ 270.814096][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 270.824324][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 270.836155][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 270.848261][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 270.856862][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 270.868099][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 270.876254][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 270.897352][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 270.910680][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 270.926102][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 270.945470][ T9325] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 270.966959][ T9325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 270.995080][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 271.008562][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 271.031213][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 271.040235][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 271.056958][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.066574][ T9321] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.073729][ T9321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.087671][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 271.121486][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.158393][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.178098][ T9321] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.185284][ T9321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.220744][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 271.279004][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 271.288845][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 271.302251][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 271.310299][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 271.326762][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 271.338362][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 271.356599][ T9325] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 271.376935][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 271.394679][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 271.429609][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 271.462600][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 271.471151][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 271.492945][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 271.522194][ T9322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 17:28:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000022000535d25a80648c63940d0124fc60100002400a000000053582c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) 17:28:10 executing program 3: poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xff0b, 0x0, 0x0, 0x800e003e1) poll(&(0x7f00000000c0)=[{}], 0x1, 0x82) shutdown(r0, 0x0) [ 271.612970][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 271.623832][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 271.647096][ T9322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 271.728992][ T9420] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 17:28:11 executing program 4: creat(&(0x7f0000000000)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) r1 = socket$netlink(0x10, 0x3, 0xa) connect$netlink(r1, &(0x7f0000000000), 0xc) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0xfffffff4) sendfile(r0, r2, 0x0, 0x8000fffffffe) 17:28:11 executing program 2: r0 = socket(0x10, 0x80002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500e967f108100e9503e4b4090008000c0006e1ffff2e0015000410000000000000000000000000004000"/57, 0x39}], 0x1}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090417feb1ae7aa77cf40000ff3f0200000000000000000010", 0x1f}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x6b7, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x7f) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 17:28:11 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 17:28:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000022000535d25a80648c63940d0124fc60100002400a000000053582c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) 17:28:11 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mlockall(0x3) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 17:28:11 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f00000002c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000059, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) sysinfo(0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000000), 0x0) dup2(r4, r5) mmap(&(0x7f0000200000/0x400000)=nil, 0x400002, 0x1, 0x2011, r5, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 272.152556][ T9444] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.2'. [ 272.169416][ T9446] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 272.201817][ T9448] devpts: called with bogus options 17:28:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) io_setup(0x1, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, 0x0}]) 17:28:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x401}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 272.333583][ T28] audit: type=1804 audit(1577208491.477:36): pid=9454 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir457158373/syzkaller.49LqoP/1/bus" dev="sda1" ino=16547 res=1 [ 272.426086][ T28] audit: type=1804 audit(1577208491.517:37): pid=9460 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir457158373/syzkaller.49LqoP/1/bus" dev="sda1" ino=16547 res=1 [ 272.431489][ T9467] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 17:28:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket(0x2, 0x80002, 0x0) setsockopt$inet_int(r1, 0x0, 0xb, &(0x7f00000000c0), 0x1) [ 272.457115][ T28] audit: type=1804 audit(1577208491.537:38): pid=9464 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir457158373/syzkaller.49LqoP/1/bus" dev="sda1" ino=16547 res=1 [ 272.544122][ T28] audit: type=1804 audit(1577208491.537:39): pid=9460 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir457158373/syzkaller.49LqoP/1/bus" dev="sda1" ino=16547 res=1 17:28:11 executing program 2: ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f0000000000)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)=""/72, 0x48}], 0x174, 0x0) 17:28:11 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000002c0)='user\x00') 17:28:12 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x2, 0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r1 = socket(0x10, 0x3, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1]) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) [ 272.846376][ T9481] proc: Unknown parameter 'user' [ 272.866394][ T9479] ptrace attach of "/root/syz-executor.2"[9316] was attempted by "/root/syz-executor.2"[9479] [ 272.935405][ T9484] proc: Unknown parameter 'user' [ 272.946115][ T9485] ptrace attach of "/root/syz-executor.2"[9316] was attempted by "/root/syz-executor.2"[9485] 17:28:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth1_to_team\x00', 0x0}) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) io_setup(0x402, &(0x7f00000001c0)=0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x41, 0x4, 0x0, 0x52, 0xfffffffffffffffe}) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0x101b2}]) 17:28:12 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000ba0800000100000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="0000000001000000000000003500000078792ee9806be44f180e2086a35454eee77e80ac81355556ecbf7a518d5f7dc758ac03b31d4f3a759f0fc4f7eefdcebf8d4ff96437329f61385b5932c8bf950bf11db00525ae9e55b1adbc6f2930e77ea89583c9ee087ec78e8048979ef700fb00dec6fffc9c8fa5a3bcbd9fba29e454310638a33650c0a61cd35a23b44161269a991500ff17674a3819f2fc372487d8e166e2eabde3acf62cef9b62f76d73a5704b1bf0df796e2a22d748a339a2b30000000000"], 0x80}, 0x1, 0x0, 0x0, 0x30005048}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=ANY=[@ANYBLOB="01000000ba0800"/16, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010000000084e4da8a00020078792e2a0000000000000086a35454eee77e80ac81355556ecbf7a518d5f7dc758ac03b31d4f3a1be87df8f7eefdcebf8d4ff96437329f61385b5932c8bf950b"], 0x38}}, 0x0) 17:28:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) write(r0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x162, 0x0, 0x0, 0x800e00410) shutdown(r0, 0x0) [ 273.133443][ T9493] skbuff: bad partial csum: csum=65534/0 headroom=2 headlen=14 17:28:12 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 17:28:12 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mlockall(0x3) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 17:28:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x100000000000019, &(0x7f0000000080)=0x5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e23}, 0x1c) getsockopt$sock_int(r0, 0x1, 0x4, 0x0, &(0x7f0000000440)) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x199}, 0x80000000002100) 17:28:12 executing program 2: 17:28:12 executing program 0: r0 = io_uring_setup(0xd, &(0x7f0000000000)) r1 = socket$kcm(0x10, 0x2, 0x10) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180)=[r1], 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=[0xffffffffffffffff]}, 0x1) 17:28:12 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x8040) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_STP_STATE={0x8, 0x5, 0x1}]}}}]}, 0x3c}}, 0x0) 17:28:12 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000000)='wlan1\x00') 17:28:13 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x2, 0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r1 = socket(0x10, 0x3, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1]) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) [ 273.887410][ T2739] ================================================================== [ 273.895759][ T2739] BUG: KASAN: use-after-free in io_wq_flush+0x1f7/0x210 [ 273.895783][ T2739] Read of size 8 at addr ffff8880a949fc00 by task kworker/0:2/2739 [ 273.910591][ T2739] [ 273.912937][ T2739] CPU: 0 PID: 2739 Comm: kworker/0:2 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0 [ 273.922476][ T2739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.922507][ T2739] Workqueue: events io_ring_file_ref_switch [ 273.922591][ T2739] Call Trace: [ 273.922643][ T2739] dump_stack+0x197/0x210 [ 273.946144][ T2739] ? io_wq_flush+0x1f7/0x210 [ 273.950825][ T2739] print_address_description.constprop.0.cold+0xd4/0x30b [ 273.957845][ T2739] ? io_wq_flush+0x1f7/0x210 [ 273.957861][ T2739] ? io_wq_flush+0x1f7/0x210 [ 273.957878][ T2739] __kasan_report.cold+0x1b/0x41 [ 273.957897][ T2739] ? io_wq_flush+0x1f7/0x210 [ 273.957917][ T2739] kasan_report+0x12/0x20 [ 273.957935][ T2739] __asan_report_load8_noabort+0x14/0x20 [ 273.957954][ T2739] io_wq_flush+0x1f7/0x210 [ 273.976617][ T2739] ? io_wq_cancel_work+0x600/0x600 [ 273.996124][ T2739] ? unix_notinflight+0x131/0x2e0 [ 274.001143][ T2739] ? io_work_cancel+0x1a0/0x1a0 [ 274.006064][ T2739] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 274.012234][ T2739] ? io_ring_file_ref_switch+0x68a/0xac0 [ 274.017849][ T2739] io_destruct_skb+0x8e/0xc0 [ 274.022426][ T2739] ? io_openat_prep+0x3c0/0x3c0 [ 274.027312][ T2739] skb_release_head_state+0xeb/0x260 [ 274.032599][ T2739] skb_release_all+0x16/0x60 [ 274.037176][ T2739] kfree_skb+0x101/0x420 [ 274.041411][ T2739] io_ring_file_ref_switch+0x68a/0xac0 [ 274.046869][ T2739] ? io_get_work+0xb0/0xb0 [ 274.051283][ T2739] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 274.056815][ T2739] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 274.062860][ T2739] ? trace_hardirqs_on+0x67/0x240 [ 274.067907][ T2739] process_one_work+0x9af/0x1740 [ 274.072847][ T2739] ? pwq_dec_nr_in_flight+0x320/0x320 [ 274.078226][ T2739] ? lock_acquire+0x190/0x410 [ 274.082904][ T2739] worker_thread+0x98/0xe40 [ 274.087396][ T2739] ? trace_hardirqs_on+0x67/0x240 [ 274.092448][ T2739] kthread+0x361/0x430 [ 274.096507][ T2739] ? process_one_work+0x1740/0x1740 [ 274.101688][ T2739] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 274.107431][ T2739] ret_from_fork+0x24/0x30 [ 274.111847][ T2739] [ 274.114202][ T2739] Allocated by task 9522: [ 274.118520][ T2739] save_stack+0x23/0x90 [ 274.122662][ T2739] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 274.128277][ T2739] kasan_kmalloc+0x9/0x10 [ 274.132602][ T2739] kmem_cache_alloc_trace+0x158/0x790 [ 274.137961][ T2739] io_wq_create+0x52/0xa40 [ 274.142487][ T2739] io_uring_setup+0xf4a/0x2080 [ 274.147257][ T2739] __x64_sys_io_uring_setup+0x54/0x80 [ 274.152688][ T2739] do_syscall_64+0xfa/0x790 [ 274.157195][ T2739] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.163069][ T2739] [ 274.165384][ T2739] Freed by task 9520: [ 274.169357][ T2739] save_stack+0x23/0x90 [ 274.173497][ T2739] __kasan_slab_free+0x102/0x150 [ 274.178419][ T2739] kasan_slab_free+0xe/0x10 [ 274.182904][ T2739] kfree+0x10a/0x2c0 [ 274.186787][ T2739] io_wq_destroy+0x2ce/0x3c0 [ 274.191369][ T2739] io_finish_async+0x128/0x1b0 [ 274.196118][ T2739] io_ring_ctx_wait_and_kill+0x330/0x9a0 [ 274.201735][ T2739] io_uring_release+0x42/0x50 [ 274.206456][ T2739] __fput+0x2ff/0x890 [ 274.210424][ T2739] ____fput+0x16/0x20 [ 274.214391][ T2739] task_work_run+0x145/0x1c0 [ 274.218966][ T2739] exit_to_usermode_loop+0x316/0x380 [ 274.224360][ T2739] do_syscall_64+0x676/0x790 [ 274.228967][ T2739] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.234847][ T2739] [ 274.237170][ T2739] The buggy address belongs to the object at ffff8880a949fc00 [ 274.237170][ T2739] which belongs to the cache kmalloc-192 of size 192 [ 274.251221][ T2739] The buggy address is located 0 bytes inside of [ 274.251221][ T2739] 192-byte region [ffff8880a949fc00, ffff8880a949fcc0) [ 274.264301][ T2739] The buggy address belongs to the page: [ 274.269922][ T2739] page:ffffea0002a527c0 refcount:1 mapcount:0 mapping:ffff8880aa400000 index:0x0 [ 274.279040][ T2739] raw: 00fffe0000000200 ffffea0002a535c8 ffffea0002a36788 ffff8880aa400000 [ 274.287638][ T2739] raw: 0000000000000000 ffff8880a949f000 0000000100000010 0000000000000000 [ 274.296206][ T2739] page dumped because: kasan: bad access detected [ 274.302609][ T2739] [ 274.304923][ T2739] Memory state around the buggy address: [ 274.310542][ T2739] ffff8880a949fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 274.318595][ T2739] ffff8880a949fb80: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 274.326649][ T2739] >ffff8880a949fc00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 274.334703][ T2739] ^ [ 274.338761][ T2739] ffff8880a949fc80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 274.346808][ T2739] ffff8880a949fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 274.354849][ T2739] ================================================================== [ 274.362892][ T2739] Disabling lock debugging due to kernel taint [ 274.386228][ T2739] Kernel panic - not syncing: panic_on_warn set ... [ 274.392860][ T2739] CPU: 0 PID: 2739 Comm: kworker/0:2 Tainted: G B 5.5.0-rc2-next-20191220-syzkaller #0 [ 274.403788][ T2739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.413858][ T2739] Workqueue: events io_ring_file_ref_switch [ 274.419748][ T2739] Call Trace: [ 274.423050][ T2739] dump_stack+0x197/0x210 [ 274.427479][ T2739] panic+0x2e3/0x75c [ 274.431383][ T2739] ? add_taint.cold+0x16/0x16 [ 274.436075][ T2739] ? io_wq_flush+0x1f7/0x210 [ 274.440673][ T2739] ? preempt_schedule+0x4b/0x60 [ 274.445529][ T2739] ? ___preempt_schedule+0x16/0x18 [ 274.450652][ T2739] ? trace_hardirqs_on+0x5e/0x240 [ 274.455688][ T2739] ? io_wq_flush+0x1f7/0x210 [ 274.460290][ T2739] end_report+0x47/0x4f [ 274.464454][ T2739] ? io_wq_flush+0x1f7/0x210 [ 274.469050][ T2739] __kasan_report.cold+0xe/0x41 [ 274.473910][ T2739] ? io_wq_flush+0x1f7/0x210 [ 274.478520][ T2739] kasan_report+0x12/0x20 [ 274.482863][ T2739] __asan_report_load8_noabort+0x14/0x20 [ 274.488502][ T2739] io_wq_flush+0x1f7/0x210 [ 274.492950][ T2739] ? io_wq_cancel_work+0x600/0x600 [ 274.498076][ T2739] ? unix_notinflight+0x131/0x2e0 [ 274.503109][ T2739] ? io_work_cancel+0x1a0/0x1a0 [ 274.507979][ T2739] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 274.514150][ T2739] ? io_ring_file_ref_switch+0x68a/0xac0 [ 274.519789][ T2739] io_destruct_skb+0x8e/0xc0 [ 274.524383][ T2739] ? io_openat_prep+0x3c0/0x3c0 [ 274.529236][ T2739] skb_release_head_state+0xeb/0x260 [ 274.534550][ T2739] skb_release_all+0x16/0x60 [ 274.539147][ T2739] kfree_skb+0x101/0x420 [ 274.543402][ T2739] io_ring_file_ref_switch+0x68a/0xac0 [ 274.548875][ T2739] ? io_get_work+0xb0/0xb0 [ 274.553303][ T2739] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 274.558854][ T2739] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 274.564840][ T2739] ? trace_hardirqs_on+0x67/0x240 [ 274.569878][ T2739] process_one_work+0x9af/0x1740 [ 274.574829][ T2739] ? pwq_dec_nr_in_flight+0x320/0x320 [ 274.580202][ T2739] ? lock_acquire+0x190/0x410 [ 274.584895][ T2739] worker_thread+0x98/0xe40 [ 274.589398][ T2739] ? trace_hardirqs_on+0x67/0x240 [ 274.594435][ T2739] kthread+0x361/0x430 [ 274.598501][ T2739] ? process_one_work+0x1740/0x1740 [ 274.603698][ T2739] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 274.609416][ T2739] ret_from_fork+0x24/0x30 [ 274.615253][ T2739] Kernel Offset: disabled [ 274.619580][ T2739] Rebooting in 86400 seconds..