Warning: Permanently added '[localhost]:39455' (ECDSA) to the list of known hosts. 2019/12/26 17:55:17 fuzzer started 2019/12/26 17:55:19 dialing manager at 10.0.2.10:41933 2019/12/26 17:55:19 syscalls: 2682 2019/12/26 17:55:19 code coverage: enabled 2019/12/26 17:55:19 comparison tracing: enabled 2019/12/26 17:55:19 extra coverage: enabled 2019/12/26 17:55:19 setuid sandbox: enabled 2019/12/26 17:55:19 namespace sandbox: enabled 2019/12/26 17:55:19 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/26 17:55:19 fault injection: enabled 2019/12/26 17:55:19 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/26 17:55:19 net packet injection: enabled 2019/12/26 17:55:19 net device setup: enabled 2019/12/26 17:55:19 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/26 17:55:19 devlink PCI setup: PCI device 0000:00:10.0 is not available 17:56:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003f40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000021c0)=ANY=[@ANYBLOB="1100000000000000000000000100000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f000001000000000000003000000000000000000000000700000086"], 0x48}}], 0x1, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmmsg$inet6(r1, &(0x7f0000003b80)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="e6", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000440)='&', 0x1}], 0x1}}], 0x4000070, 0x8000) 17:56:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0xfffffffffffffe75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video36\x00', 0x2, 0x0) close(r0) open(0x0, 0x0, 0x0) 17:56:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) read(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x100000211, 0x2, 0x0, 0x800e008e8) shutdown(r0, 0x0) syzkaller login: [ 183.851506][ T8258] IPVS: ftp: loaded support on port[0] = 21 [ 183.851521][ T8260] IPVS: ftp: loaded support on port[0] = 21 [ 184.055643][ T8262] IPVS: ftp: loaded support on port[0] = 21 17:56:07 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x3800) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x3b, 0x4, 0x400, 0x0, 0x1}, 0x3c) [ 184.275608][ T8258] chnl_net:caif_netlink_parms(): no params data found [ 184.300637][ T8264] IPVS: ftp: loaded support on port[0] = 21 [ 184.314402][ T8260] chnl_net:caif_netlink_parms(): no params data found [ 184.376035][ T8258] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.386376][ T8258] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.398522][ T8258] device bridge_slave_0 entered promiscuous mode [ 184.414188][ T8258] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.423499][ T8258] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.434170][ T8258] device bridge_slave_1 entered promiscuous mode [ 184.463057][ T8258] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.478598][ T8258] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.534227][ T8260] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.543339][ T8260] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.554593][ T8260] device bridge_slave_0 entered promiscuous mode [ 184.573968][ T8258] team0: Port device team_slave_0 added [ 184.584434][ T8258] team0: Port device team_slave_1 added [ 184.606509][ T8260] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.617426][ T8260] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.629600][ T8260] device bridge_slave_1 entered promiscuous mode [ 184.648857][ T8262] chnl_net:caif_netlink_parms(): no params data found [ 184.755456][ T8258] device hsr_slave_0 entered promiscuous mode [ 184.853468][ T8258] device hsr_slave_1 entered promiscuous mode [ 184.993961][ T8260] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.019884][ T8260] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 185.070421][ T8264] chnl_net:caif_netlink_parms(): no params data found [ 185.081798][ T8262] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.094247][ T8262] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.104716][ T8262] device bridge_slave_0 entered promiscuous mode [ 185.127997][ T8260] team0: Port device team_slave_0 added [ 185.141445][ T8260] team0: Port device team_slave_1 added [ 185.149500][ T8262] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.158307][ T8262] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.168503][ T8262] device bridge_slave_1 entered promiscuous mode [ 185.178041][ T8258] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 185.249462][ T8258] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 185.294714][ T8258] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 185.368651][ T8258] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 185.464122][ T8262] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.568145][ T8260] device hsr_slave_0 entered promiscuous mode [ 185.622579][ T8260] device hsr_slave_1 entered promiscuous mode [ 185.662416][ T8260] debugfs: Directory 'hsr0' with parent '/' already present! [ 185.673515][ T8262] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 185.710173][ T8264] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.722665][ T8264] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.736471][ T8264] device bridge_slave_0 entered promiscuous mode [ 185.750222][ T8264] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.762517][ T8264] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.776167][ T8264] device bridge_slave_1 entered promiscuous mode [ 185.793859][ T8262] team0: Port device team_slave_0 added [ 185.811085][ T8262] team0: Port device team_slave_1 added [ 185.825569][ T8264] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.841988][ T8264] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 185.874479][ T8264] team0: Port device team_slave_0 added [ 185.888960][ T8264] team0: Port device team_slave_1 added [ 185.954876][ T8262] device hsr_slave_0 entered promiscuous mode [ 186.033194][ T8262] device hsr_slave_1 entered promiscuous mode [ 186.082260][ T8262] debugfs: Directory 'hsr0' with parent '/' already present! [ 186.103096][ T8260] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 186.189790][ T8260] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 186.266855][ T8260] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 186.365338][ T8260] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 186.554616][ T8264] device hsr_slave_0 entered promiscuous mode [ 186.612958][ T8264] device hsr_slave_1 entered promiscuous mode [ 186.692366][ T8264] debugfs: Directory 'hsr0' with parent '/' already present! [ 186.755212][ T8262] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 186.838586][ T8262] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 186.952630][ T8262] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 187.037368][ T8262] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 187.134142][ T8264] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 187.186099][ T8264] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 187.279174][ T8264] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 187.344230][ T8264] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 187.495491][ T8258] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.537696][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.551330][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.566479][ T8258] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.594655][ T8260] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.608130][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.624845][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.637991][ T76] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.650746][ T76] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.671829][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.981223][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.998683][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.015419][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.027995][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.059896][ T8260] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.095263][ T8262] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.109624][ T3934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.123309][ T3934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.138139][ T3934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.150742][ T3934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.162633][ T3934] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.172964][ T3934] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.186876][ T3934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.200796][ T3934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.219624][ T3934] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.233440][ T3934] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.246542][ T3934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.260021][ T3934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.288043][ T2585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.304987][ T2585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.317856][ T2585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.331579][ T2585] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.344635][ T2585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.356671][ T2585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.371274][ T2585] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.383241][ T2585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.412930][ T8262] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.429388][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.440917][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.451873][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.467092][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.478507][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.498265][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.512292][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.523629][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.537392][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.546888][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.565886][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.576333][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.588527][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.606341][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.619008][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.633725][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.645537][ T35] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.656423][ T35] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.673617][ T8260] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 188.690506][ T8260] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 188.713683][ T8258] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 188.731743][ T8258] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.745247][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.761888][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.780140][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.792998][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.804884][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.817070][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.829277][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.846787][ T8264] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.875660][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.892616][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.921515][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.935427][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.951301][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 188.965852][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 188.979376][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.995031][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.013552][ T8264] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.033170][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.053509][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 189.079203][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 189.108786][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.137698][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.182555][ T8258] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.226578][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.270435][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.328584][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.361971][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.387336][ T3020] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.409068][ T3020] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.431433][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.455528][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.477514][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.501402][ T8260] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.516937][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.531924][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.548708][ T3371] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.561472][ T3371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.608216][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.802636][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.869488][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 189.903422][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 189.938702][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.985448][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.066675][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.110832][ T8262] 8021q: adding VLAN 0 to HW filter on device batadv0 17:56:13 executing program 1: r0 = socket(0x1e, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000009c0)="d3", 0x1}], 0x1}}], 0x1, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) sendmmsg$unix(r0, &(0x7f0000003f40), 0x4924924924925ce, 0x0) [ 190.153157][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 17:56:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003f40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000021c0)=ANY=[@ANYBLOB="1100000000000000000000000100000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f000001000000000000003000000000000000000000000700000086"], 0x48}}], 0x1, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmmsg$inet6(r1, &(0x7f0000003b80)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="e6", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000440)='&', 0x1}], 0x1}}], 0x4000070, 0x8000) [ 190.181868][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.241859][ T8264] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 17:56:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x20c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 190.297784][ T8264] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.353644][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.382000][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.402831][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.418985][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.434287][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.462346][ C3] hrtimer: interrupt took 25017 ns 17:56:17 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') writev(r0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, &(0x7f0000000a00)) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x0) r1 = getpgrp(0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000140)=0x1000000) setpriority(0x0, r1, 0xffff) pidfd_send_signal(0xffffffffffffffff, 0x3a, &(0x7f0000000480)={0x2}, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(0x0, 0x0, &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000180)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x8000000, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="100000001001000001000000ed58696d81c295beba33004e85d76000000000000000068a9a5e587ecb7859211e2f50680664c11478ef7edf0f5f5c0ccf407a74db88d55ca7251f02706d4d115ddb9189cf91b56270f48f6c0c786328ded2ca80484ae6d64cd31205a814c8c23e00c86f080c777b3408c35c9b53c087be40f552f142c26c885c819ea68da3dd2b447210474e17e4802a98513da13ccd8d0dca9b2a82e14259de5cc7af5e1e51f8000000000000000000"], 0x10}}], 0x2, 0x0) sendmmsg(r2, &(0x7f0000005c00), 0x17c1ea0c475f298, 0x4009890) close(r2) fallocate(0xffffffffffffffff, 0x0, 0x2000000, 0x4) 17:56:17 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') writev(r0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, &(0x7f0000000a00)) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x0) r1 = getpgrp(0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000140)=0x1000000) setpriority(0x0, r1, 0xffff) pidfd_send_signal(0xffffffffffffffff, 0x3a, &(0x7f0000000480)={0x2}, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(0x0, 0x0, &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000180)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x8000000, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="100000001001000001000000ed58696d81c295beba33004e85d76000000000000000068a9a5e587ecb7859211e2f50680664c11478ef7edf0f5f5c0ccf407a74db88d55ca7251f02706d4d115ddb9189cf91b56270f48f6c0c786328ded2ca80484ae6d64cd31205a814c8c23e00c86f080c777b3408c35c9b53c087be40f552f142c26c885c819ea68da3dd2b447210474e17e4802a98513da13ccd8d0dca9b2a82e14259de5cc7af5e1e51f8000000000000000000"], 0x10}}], 0x2, 0x0) sendmmsg(r2, &(0x7f0000005c00), 0x17c1ea0c475f298, 0x4009890) close(r2) fallocate(0xffffffffffffffff, 0x0, 0x2000000, 0x4) [ 194.677539][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 194.689614][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 194.704715][ T8264] 8021q: adding VLAN 0 to HW filter on device batadv0 17:56:18 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000000)={0x3, @null, 0xffffffffffffffff}) 17:56:18 executing program 2: openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') writev(r0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, &(0x7f0000000a00)) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x0) r1 = getpgrp(0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000140)=0x1000000) setpriority(0x0, r1, 0xffff) pidfd_send_signal(0xffffffffffffffff, 0x3a, &(0x7f0000000480)={0x2}, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(0x0, 0x0, &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000180)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x8000000, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="100000001001000001000000ed58696d81c295beba33004e85d76000000000000000068a9a5e587ecb7859211e2f50680664c11478ef7edf0f5f5c0ccf407a74db88d55ca7251f02706d4d115ddb9189cf91b56270f48f6c0c786328ded2ca80484ae6d64cd31205a814c8c23e00c86f080c777b3408c35c9b53c087be40f552f142c26c885c819ea68da3dd2b447210474e17e4802a98513da13ccd8d0dca9b2a82e14259de5cc7af5e1e51f8000000000000000000"], 0x10}}], 0x2, 0x0) sendmmsg(r2, &(0x7f0000005c00), 0x17c1ea0c475f298, 0x4009890) close(r2) fallocate(0xffffffffffffffff, 0x0, 0x2000000, 0x4) 17:56:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000040)=@buf) [ 214.713900][ T8273] ------------[ cut here ]------------ [ 214.727550][ T8273] AppArmor WARN aa_sock_msg_perm: ((!sock)): [ 214.733140][ T8273] WARNING: CPU: 1 PID: 8273 at security/apparmor/lsm.c:933 aa_sock_msg_perm.isra.0+0xdd/0x170 [ 214.737434][ T8273] Kernel panic - not syncing: panic_on_warn set ... [ 214.737434][ T8273] CPU: 1 PID: 8273 Comm: kworker/1:3 Not tainted 5.5.0-rc3-syzkaller #0 [ 214.737434][ T8273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 214.737434][ T8273] Workqueue: krxrpcd rxrpc_peer_keepalive_worker [ 214.737434][ T8273] Call Trace: [ 214.737434][ T8273] dump_stack+0x197/0x210 [ 214.737434][ T8273] ? aa_sock_msg_perm.isra.0+0xa0/0x170 [ 214.737434][ T8273] panic+0x2e3/0x75c [ 214.737434][ T8273] ? add_taint.cold+0x16/0x16 [ 214.737434][ T8273] ? __kasan_check_write+0x14/0x20 [ 214.737434][ T8273] ? __warn.cold+0x14/0x3e [ 214.737434][ T8273] ? __warn+0xd9/0x1cf [ 214.737434][ T8273] ? aa_sock_msg_perm.isra.0+0xdd/0x170 [ 214.737434][ T8273] __warn.cold+0x2f/0x3e [ 214.737434][ T8273] ? aa_sock_msg_perm.isra.0+0xdd/0x170 [ 214.737434][ T8273] report_bug+0x289/0x300 [ 214.737434][ T8273] do_error_trap+0x11b/0x200 [ 214.737434][ T8273] do_invalid_op+0x37/0x50 [ 214.737434][ T8273] ? aa_sock_msg_perm.isra.0+0xdd/0x170 [ 214.737434][ T8273] invalid_op+0x23/0x30 [ 214.737434][ T8273] RIP: 0010:aa_sock_msg_perm.isra.0+0xdd/0x170 [ 214.737434][ T8273] Code: 89 ef e8 66 70 03 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 c6 c3 17 fe 48 c7 c6 e0 56 6a 88 48 c7 c7 20 41 6a 88 e8 22 6b e8 fd <0f> 0b e9 43 ff ff ff e8 a7 c3 17 fe 48 c7 c6 e0 56 6a 88 48 c7 c7 [ 214.737434][ T8273] RSP: 0018:ffffc9000157f9b0 EFLAGS: 00010286 [ 214.737434][ T8273] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 214.737434][ T8273] RDX: 0000000000000000 RSI: ffffffff815e8b56 RDI: fffff520002aff28 [ 214.737434][ T8273] RBP: ffffc9000157f9d8 R08: ffff8880666e8340 R09: fffffbfff1659bcc [ 214.737434][ T8273] R10: fffffbfff1659bcb R11: ffffffff8b2cde5f R12: ffffc9000157fb20 [ 214.737434][ T8273] R13: ffffffff886a45c0 R14: 0000000000000002 R15: 000000000000001d [ 214.737434][ T8273] ? vprintk_func+0x86/0x189 [ 214.737434][ T8273] apparmor_socket_sendmsg+0x2a/0x30 [ 214.737434][ T8273] security_socket_sendmsg+0x77/0xc0 [ 214.737434][ T8273] sock_sendmsg+0x45/0x130 [ 214.737434][ T8273] kernel_sendmsg+0x44/0x50 [ 214.737434][ T8273] rxrpc_send_keepalive+0x1ff/0x940 [ 214.737434][ T8273] ? rxrpc_reject_packets+0xab0/0xab0 [ 214.737434][ T8273] ? _raw_spin_unlock_bh+0x2c/0x30 [ 214.737434][ T8273] ? __local_bh_enable_ip+0x15a/0x270 [ 214.737434][ T8273] ? lockdep_hardirqs_on+0x421/0x5e0 [ 214.737434][ T8273] ? rxrpc_peer_keepalive_worker+0x62e/0xd02 [ 214.737434][ T8273] ? __local_bh_enable_ip+0x15a/0x270 [ 214.737434][ T8273] rxrpc_peer_keepalive_worker+0x7be/0xd02 [ 214.737434][ T8273] ? rxrpc_peer_add_rtt+0x650/0x650 [ 214.737434][ T8273] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 214.737434][ T8273] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 214.737434][ T8273] ? trace_hardirqs_on+0x67/0x240 [ 214.737434][ T8273] process_one_work+0x9af/0x1740 [ 214.737434][ T8273] ? pwq_dec_nr_in_flight+0x320/0x320 [ 214.737434][ T8273] ? lock_acquire+0x190/0x410 [ 214.737434][ T8273] worker_thread+0x98/0xe40 [ 214.737434][ T8273] ? trace_hardirqs_on+0x67/0x240 [ 214.737434][ T8273] kthread+0x361/0x430 [ 214.737434][ T8273] ? process_one_work+0x1740/0x1740 [ 214.737434][ T8273] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 214.737434][ T8273] ret_from_fork+0x24/0x30 [ 214.737434][ T8273] Kernel Offset: disabled [ 214.737434][ T8273] Rebooting in 86400 seconds..