[ 37.024462][ T26] audit: type=1800 audit(1548960027.649:25): pid=7733 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 37.046250][ T26] audit: type=1800 audit(1548960027.649:26): pid=7733 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 37.092414][ T26] audit: type=1800 audit(1548960027.659:27): pid=7733 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 37.113078][ T26] audit: type=1800 audit(1548960027.659:28): pid=7733 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.113' (ECDSA) to the list of known hosts. 2019/01/31 18:40:35 fuzzer started 2019/01/31 18:40:36 dialing manager at 10.128.0.26:36349 2019/01/31 18:40:37 syscalls: 1 2019/01/31 18:40:37 code coverage: enabled 2019/01/31 18:40:37 comparison tracing: enabled 2019/01/31 18:40:37 extra coverage: extra coverage is not supported by the kernel 2019/01/31 18:40:37 setuid sandbox: enabled 2019/01/31 18:40:37 namespace sandbox: enabled 2019/01/31 18:40:37 Android sandbox: /sys/fs/selinux/policy does not exist 2019/01/31 18:40:37 fault injection: enabled 2019/01/31 18:40:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/01/31 18:40:37 net packet injection: enabled 2019/01/31 18:40:37 net device setup: enabled 18:43:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x3, 0x6) setsockopt$sock_int(r1, 0x1, 0x21, &(0x7f0000000100), 0x4) syzkaller login: [ 212.743800][ T7896] IPVS: ftp: loaded support on port[0] = 21 18:43:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000340)='./file0\x00', 0x4000000080000005) inotify_add_watch(r1, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r3 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r1, r3) [ 212.865943][ T7896] chnl_net:caif_netlink_parms(): no params data found [ 212.971824][ T7896] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.979437][ T7896] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.988072][ T7896] device bridge_slave_0 entered promiscuous mode [ 212.997160][ T7896] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.004487][ T7896] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.012944][ T7896] device bridge_slave_1 entered promiscuous mode [ 213.027272][ T7899] IPVS: ftp: loaded support on port[0] = 21 [ 213.052632][ T7896] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.062819][ T7896] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 213.107598][ T7896] team0: Port device team_slave_0 added [ 213.118094][ T7896] team0: Port device team_slave_1 added 18:43:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x0, 0x0) ppoll(&(0x7f0000000240)=[{r1}, {r0}, {r0, 0x4110}, {}], 0x4, 0x0, 0x0, 0x0) [ 213.204192][ T7896] device hsr_slave_0 entered promiscuous mode [ 213.241285][ T7896] device hsr_slave_1 entered promiscuous mode 18:43:24 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, 0x0, 0x0) [ 213.336171][ T7901] IPVS: ftp: loaded support on port[0] = 21 [ 213.346537][ T7896] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.353790][ T7896] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.361651][ T7896] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.368739][ T7896] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.438788][ T7899] chnl_net:caif_netlink_parms(): no params data found [ 213.535253][ T7896] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.599730][ T7896] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.617355][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.632826][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.654786][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.663374][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 213.686685][ T7904] IPVS: ftp: loaded support on port[0] = 21 18:43:24 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x4, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 213.701921][ T7899] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.709012][ T7899] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.718109][ T7899] device bridge_slave_0 entered promiscuous mode [ 213.734583][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.751859][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.758965][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.781264][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.789716][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.796857][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.838560][ T7899] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.851377][ T7899] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.871123][ T7899] device bridge_slave_1 entered promiscuous mode 18:43:24 executing program 5: r0 = memfd_create(&(0x7f0000000280)='/dev/autofs\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') [ 213.957683][ T7908] IPVS: ftp: loaded support on port[0] = 21 [ 213.965012][ T7905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.975961][ T7905] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.989694][ T7905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.003269][ T7905] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.014568][ T7905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.024135][ T7905] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.034804][ T7905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.043633][ T7905] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.075632][ T7896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.094192][ T7899] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.107206][ T7899] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.116652][ T7905] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.134201][ T7901] chnl_net:caif_netlink_parms(): no params data found [ 214.180622][ T7911] IPVS: ftp: loaded support on port[0] = 21 [ 214.216090][ T7899] team0: Port device team_slave_0 added [ 214.244546][ T7899] team0: Port device team_slave_1 added [ 214.284086][ T7901] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.292250][ T7901] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.299909][ T7901] device bridge_slave_0 entered promiscuous mode [ 214.310775][ T7896] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.362789][ T7899] device hsr_slave_0 entered promiscuous mode [ 214.411386][ T7899] device hsr_slave_1 entered promiscuous mode [ 214.461303][ T7901] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.468402][ T7901] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.476317][ T7901] device bridge_slave_1 entered promiscuous mode [ 214.501443][ T7901] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.516260][ T7901] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.621950][ T7901] team0: Port device team_slave_0 added [ 214.659286][ T7901] team0: Port device team_slave_1 added 18:43:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10000, 0x1) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfd, 0x230000}, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x70, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000000), &(0x7f0000000140), 0x4000000000000000}, 0x20) [ 214.695981][ T7904] chnl_net:caif_netlink_parms(): no params data found 18:43:25 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x6, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20000, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)={0x1}) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000100)) 18:43:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 18:43:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x200000a, 0x32, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$pptp(0x18, 0x1, 0x2) ioctl$KDDELIO(r1, 0x4b35, 0x400000401) r2 = socket$inet(0x2, 0x803, 0x1) getsockopt(r2, 0x0, 0xd, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0xa6) [ 214.857022][ T7928] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 214.896491][ T7901] device hsr_slave_0 entered promiscuous mode [ 214.941290][ T7901] device hsr_slave_1 entered promiscuous mode [ 214.974415][ T7908] chnl_net:caif_netlink_parms(): no params data found [ 215.046591][ T7904] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.053928][ T7904] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.062090][ T7904] device bridge_slave_0 entered promiscuous mode [ 215.069933][ T7904] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.077424][ T7904] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.085653][ T7904] device bridge_slave_1 entered promiscuous mode 18:43:25 executing program 0: ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x200}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) socket$bt_hidp(0x1f, 0x3, 0x6) bind$alg(0xffffffffffffffff, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680)={0x0, r2}, 0xc) ioctl$RTC_PIE_OFF(r3, 0x7006) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000200)=""/98, 0x62}, {&(0x7f0000000280)=""/112, 0x7fffef4a}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0xbf, "bf84ce85b39883c2139b0316803c8e7bd4cdc7a6aec561d15b2508badd47335e6f7acd3d0175d1870a20badee13e5747a9f4fe3e7cb8529d86b7cf23832f364303f766a392ab593462324fcc269eb21822cf82ec2ef8c76269833c4c5fb64e1d956721d72621346ecbedf52f441d64679dd6b7f633c662c371be95046ca2eeedd4b71251001efc911cb1b67dc7d261632f772649661c99934681fcf21a16313988c99ec7f52967ee6a4e07093e3d0d91c948012649681c0aa4ebbe54713e81"}, &(0x7f00000001c0)=0xc7) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000500)={r4, @in={{0x2, 0x4e23, @local}}, 0x6, 0x5}, &(0x7f00000005c0)=0x90) connect$netlink(0xffffffffffffffff, 0x0, 0x0) [ 215.117490][ T7899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.173440][ T7911] chnl_net:caif_netlink_parms(): no params data found [ 215.191421][ T7904] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 215.200063][ T7908] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.207676][ T7908] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.215869][ T7908] device bridge_slave_0 entered promiscuous mode [ 215.235997][ T7899] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.245596][ T7904] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 215.264810][ T7908] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.272148][ T7908] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.279990][ T7908] device bridge_slave_1 entered promiscuous mode [ 215.294469][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.302602][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.340922][ C1] hrtimer: interrupt took 60205 ns [ 215.364207][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.373786][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.382742][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.389844][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.398009][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.406859][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.415962][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.423112][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.431364][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.440157][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.459416][ T7899] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 215.472434][ T7899] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 215.493625][ T7904] team0: Port device team_slave_0 added [ 215.502334][ T7904] team0: Port device team_slave_1 added [ 215.524485][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.541453][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.549918][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.576435][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.585054][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.593676][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.602151][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.610636][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.619039][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.627752][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 215.635701][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.669197][ T7908] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 215.688629][ T7908] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 215.736194][ T7904] device hsr_slave_0 entered promiscuous mode [ 215.791792][ T7904] device hsr_slave_1 entered promiscuous mode [ 215.831579][ T7911] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.838700][ T7911] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.846725][ T7911] device bridge_slave_0 entered promiscuous mode [ 215.878098][ T7911] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.885402][ T7911] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.894392][ T7911] device bridge_slave_1 entered promiscuous mode [ 215.913422][ T7908] team0: Port device team_slave_0 added [ 215.920735][ T7908] team0: Port device team_slave_1 added [ 215.953884][ T7901] 8021q: adding VLAN 0 to HW filter on device bond0 18:43:26 executing program 0: ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x200}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) socket$bt_hidp(0x1f, 0x3, 0x6) bind$alg(0xffffffffffffffff, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680)={0x0, r2}, 0xc) ioctl$RTC_PIE_OFF(r3, 0x7006) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000200)=""/98, 0x62}, {&(0x7f0000000280)=""/112, 0x7fffef4a}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0xbf, "bf84ce85b39883c2139b0316803c8e7bd4cdc7a6aec561d15b2508badd47335e6f7acd3d0175d1870a20badee13e5747a9f4fe3e7cb8529d86b7cf23832f364303f766a392ab593462324fcc269eb21822cf82ec2ef8c76269833c4c5fb64e1d956721d72621346ecbedf52f441d64679dd6b7f633c662c371be95046ca2eeedd4b71251001efc911cb1b67dc7d261632f772649661c99934681fcf21a16313988c99ec7f52967ee6a4e07093e3d0d91c948012649681c0aa4ebbe54713e81"}, &(0x7f00000001c0)=0xc7) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000500)={r4, @in={{0x2, 0x4e23, @local}}, 0x6, 0x5}, &(0x7f00000005c0)=0x90) connect$netlink(0xffffffffffffffff, 0x0, 0x0) [ 216.004446][ T7908] device hsr_slave_0 entered promiscuous mode [ 216.045726][ T7908] device hsr_slave_1 entered promiscuous mode [ 216.097580][ T7899] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.109806][ T7911] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.136116][ T7911] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.159871][ T7901] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.216817][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.246620][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.303078][ T7911] team0: Port device team_slave_0 added [ 216.314777][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.325143][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.339686][ T7939] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.346859][ T7939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.356424][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.365306][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.374802][ T7939] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.381958][ T7939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.390188][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.400320][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.419166][ T7911] team0: Port device team_slave_1 added 18:43:27 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x2, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f00000003c0)=""/200, 0xc8}, {&(0x7f0000000040)=""/40, 0x28}, {&(0x7f00000004c0)=""/143, 0x8f}], 0x3) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x0, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, r0, 0x0, 0x15, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0xffffffffffffffff}, 0x30) setpgid(r2, r3) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$sock_void(r1, 0x1, 0x3f, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000280)={@mcast2, 0x2}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200000, 0xfffffffffffffffd, 0x2012, r4, 0x0) unshare(0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x15, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="94ff30000000620b"], &(0x7f00000001c0)='GPL\x00', 0x5, 0x9a, &(0x7f00000002c0)=""/154, 0x41000, 0x1, [], r5, 0x5}, 0x48) [ 216.452061][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.462094][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.473682][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.483843][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.493791][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.511035][ C1] sched: DL replenish lagged too much [ 216.529765][ T7958] IPVS: ftp: loaded support on port[0] = 21 18:43:27 executing program 0: ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x200}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) socket$bt_hidp(0x1f, 0x3, 0x6) bind$alg(0xffffffffffffffff, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680)={0x0, r2}, 0xc) ioctl$RTC_PIE_OFF(r3, 0x7006) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000200)=""/98, 0x62}, {&(0x7f0000000280)=""/112, 0x7fffef4a}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0xbf, "bf84ce85b39883c2139b0316803c8e7bd4cdc7a6aec561d15b2508badd47335e6f7acd3d0175d1870a20badee13e5747a9f4fe3e7cb8529d86b7cf23832f364303f766a392ab593462324fcc269eb21822cf82ec2ef8c76269833c4c5fb64e1d956721d72621346ecbedf52f441d64679dd6b7f633c662c371be95046ca2eeedd4b71251001efc911cb1b67dc7d261632f772649661c99934681fcf21a16313988c99ec7f52967ee6a4e07093e3d0d91c948012649681c0aa4ebbe54713e81"}, &(0x7f00000001c0)=0xc7) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000500)={r4, @in={{0x2, 0x4e23, @local}}, 0x6, 0x5}, &(0x7f00000005c0)=0x90) connect$netlink(0xffffffffffffffff, 0x0, 0x0) [ 216.894945][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.904997][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.914031][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.937913][ T7908] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.941285][ T7959] IPVS: ftp: loaded support on port[0] = 21 [ 216.960258][ T7901] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 216.983279][ T7901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.016971][ T7911] device hsr_slave_0 entered promiscuous mode [ 217.072326][ T7911] device hsr_slave_1 entered promiscuous mode [ 217.140990][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.149333][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.235131][ T7904] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.257954][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.266945][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.278823][ T7908] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.303896][ T7901] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.319796][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.328707][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.347137][ T7904] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.386347][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.399992][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.415561][ T7939] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.422726][ T7939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.436461][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.445450][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.460644][ T7939] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.467814][ T7939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.539182][ T7911] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.549636][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.565036][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.577921][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.590828][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.603738][ T3473] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.610938][ T3473] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.626418][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.636773][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.653311][ T3473] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.660483][ T3473] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.675097][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.686576][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.699903][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.715410][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.726369][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.739730][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.767451][ T7908] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 217.797082][ T7908] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 217.828057][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.839672][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.860023][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.870003][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.879284][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.888398][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.898157][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.907401][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.916304][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.925105][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.934354][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.943316][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.952401][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 18:43:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)=""/175, 0xaf}], 0x1, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x20000fff}) [ 217.965813][ T7911] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.984629][ T7904] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 218.007351][ T7904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.038074][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.057041][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.065974][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.074893][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.083099][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.091918][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.120351][ T7908] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.157329][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.169376][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.185884][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.193038][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.214847][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.223897][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.233162][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.240239][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.248686][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.257577][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.286188][ T7904] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.330491][ T7911] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 218.357769][ T7911] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 218.384706][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.400086][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.425009][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.457148][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.481770][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.490387][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.498991][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.507659][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.516809][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.525524][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.534102][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.559408][ T7911] 8021q: adding VLAN 0 to HW filter on device batadv0 18:43:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x3, 0x6) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) r2 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xb) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x18, &(0x7f0000000100)={0x0, @remote, 0x0, 0x0, 'dh\x00'}, 0x2c) 18:43:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4001}, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8993, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 18:43:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x30) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) shutdown(r1, 0x1) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r1, &(0x7f0000000000)='[', 0x1, 0x4000, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000040)="85", 0x1, 0x4000, 0x0, 0x0) close(r1) 18:43:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c1000000000000004fcff", 0x58}], 0x1) 18:43:29 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4001}, 0x4) readahead(0xffffffffffffffff, 0x0, 0x7) 18:43:29 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000380)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x29, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000000000000000000000000000000000000000000000000000f9001800000000"], 0x0, 0x0, 0x0}) 18:43:29 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4001}, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 18:43:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x30) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) shutdown(r1, 0x1) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r1, &(0x7f0000000000)='[', 0x1, 0x4000, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000040)="85", 0x1, 0x4000, 0x0, 0x0) close(r1) 18:43:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x30) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) shutdown(r1, 0x1) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r1, &(0x7f0000000000)='[', 0x1, 0x4000, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000040)="85", 0x1, 0x4000, 0x0, 0x0) close(r1) [ 219.384598][ T8027] binder: 8026:8027 transaction failed 29189/-22, size 24-0 line 2903 [ 219.522737][ T12] binder: undelivered TRANSACTION_ERROR: 29189 18:43:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socketpair$unix(0x1, 0x100000, 0x0, &(0x7f0000000200)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006380)='/proc/capi/capi20\x00', 0x50801, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.l\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 18:43:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:43:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4001}, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8993, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 18:43:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x30) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) shutdown(r1, 0x1) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r1, &(0x7f0000000000)='[', 0x1, 0x4000, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000040)="85", 0x1, 0x4000, 0x0, 0x0) close(r1) 18:43:30 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000000)) 18:43:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = dup2(r1, r1) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000140)="032665d6f7176e31eaa2a08fce6e749cf4279303a862e7e6c71db803533e9e53cd4b191908df16553e3083e08e8fc0eede01517413c4ef94185ca4c7f4b581d98d1265b2ce577ee8bce99ace338b237b7e40b7ac157c42ad4f54ae8e2dd8b90ca2d6ce3fba7107fed4de32bd1b2da71b0d4772e445084be654b79e8253a4d35ef9d27154bb7b763a1e7c8aa8d5bf8c7f480c182af8e39b752b3676e0e878646752dc2e07979cecdb474122adca573198553368ae2dab0de01305bd20759e96c8dbd264d413c9b3ceb9499068a0333f908c26247cf878d356eb3ddb012bf3ffff19b06a4489002b8cd969f95c06250923f6") r3 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setlease(r3, 0x400, 0x2000000000000000) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r7 = semget(0x2, 0x7, 0x70b) semctl$IPC_INFO(r7, 0x4, 0x3, &(0x7f0000000300)=""/216) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000100)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x20400) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) pipe2(&(0x7f0000000480), 0xffffffffffffffff) ioctl$BLKREPORTZONE(r4, 0xc0101282, &(0x7f0000000ac0)=ANY=[@ANYBLOB="000000000000000003000000000000000600001f00000000030000000000000031049fe1262df8ffffffffffffff0204070800000000000000000000000000000000000000000000000000000000000000000000000000000080000057becdef000000000000ae7ed84e98b032d409000900000000000000000000000000000000000000000000f836d810074ddae8000000000000003f00000000000000ffffffffffffffff0200000000000000ff1f05070000000020000000000010000000ee00000000000000000000000000000000001eb1c4e179bd77d42eaedad6eb64c95f26a568fee4504f166e6326544ce2c3845186da4475ce621f06e766bbe847ddaefeecc1e4087d998c7b793bae28e3f719d1a79f5647e808a91724d3bbe436e9bae4fd33205d6b6598e9a8e25ce85153aa97f2de0316e8430d538bb7491fbd1add297cbae40500004d761600622d168e59033b8566aa60759822752e674ed6ff8f625d190115673492bf41f16d6f072dbde2168b4f46c0fc3174e2182a405c4c96f5c9c25f923561e8308134478f181f17c91e0e14581234c7527a17d351fe787ccad803e3fd751afeff116b75d653029fa0b2c70c8bd954a4aa17663f131ff700ffff0000000000000000001a6ab67922b7f4149a69fc79fa052ed70d9d2841755c0e9b050a3ffd215fc1e6680707bb1af596f39c801dfc578a1045dd0935853a8b9ef0a63dce0b1b7ef956527f7185db9f1ff8e3570a2e34b79018ad3037c09d106ec6bfa977b2e8d074cb6d7e30aa405af2b2e750896bff4d6448e34a9bb9ebc1fd4c0c9d06a05fe49273cff2e3763c674ae404cb1d102949ab428acabbab3143f839f477a06f8504f251353bb8251226c0751dda1c534883f1932b53fb41346d7f82ec936454b4741c98c4b6696e8457c88910910e92d60f8559911d28178906be2f2f7929fce9611daef3e1d4a559efe66803f15747abf7696253a02059e4dd42252421c0015c9d9ab404c00600daa05e49a8795017c4b01fd02b5a0558ac35df460e52d3016c53eacd8739db8d47aff7782e2078881e045bdfc51627e935ce43aea682953cb1c9760ed2d75e7432f20f763d2c1e0c00000000"]) clock_gettime(0x0, &(0x7f0000000080)) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x1) r9 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r9, 0x1274, 0x0) ioctl$BLKTRACESETUP(r9, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100, 0x279d}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r8) ioctl$BLKTRACESTOP(r9, 0x1275, 0x0) [ 219.987798][ T8053] libceph: resolve '.l [ 219.987798][ T8053] ' (ret=-3): failed 18:43:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0xffffff7f}}}, 0xb8}}, 0x0) 18:43:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, 0x0}}], 0x2, 0x0) 18:43:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x2120081d, 0xffe5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="32cae4783d32"}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="040304006600000000000000c52cf7c21975e697b02f08066b332ff0eac889fc6b11876d886b6621d8d207ccf73f681e55e86eb69406136fcfff050000000115000000005de87eae9082108b3d00759d0634ae6ef7f6154fa721899374c567ca65fbd3b6e72731ec2f123d9ea8d9c1f744ea5a91b64e41a0b69a84ef6438864b9acf633dece3c9f968fdd86af07d1984a1631d6e8304f1882cd6064f494334d7e1673e8e246f35d9617b64", 0xab, 0x0, 0x0, 0x0) 18:43:30 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000000)) [ 220.029764][ T8053] libceph: parse_ips bad ip '.l [ 220.029764][ T8053] :d]:.,[' 18:43:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) 18:43:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) 18:43:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x6, &(0x7f00000000c0)={@dev}, 0x20) 18:43:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0xffffff7f}}}, 0xb8}}, 0x0) 18:43:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$inet(0x10, 0x3, 0x4) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="24000000120007031dfffd946f610500070800005e00000000000000421ba3a20400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 220.506018][ T8078] kasan: CONFIG_KASAN_INLINE enabled [ 220.511880][ T8078] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 220.520027][ T8078] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 220.526974][ T8078] CPU: 0 PID: 8078 Comm: syz-executor3 Not tainted 5.0.0-rc4-next-20190131 #23 [ 220.535910][ T8078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.545992][ T8078] RIP: 0010:relay_open_buf.part.0+0x7cb/0xb40 [ 220.552064][ T8078] Code: c1 ea 03 80 3c 02 00 0f 85 4c 03 00 00 49 8d 7d 58 4d 89 ac 24 90 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 1b 03 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 220.561185][ T3867] kobject: 'loop1' (000000005d2c4859): kobject_uevent_env [ 220.571670][ T8078] RSP: 0018:ffff88805ae5f958 EFLAGS: 00010203 [ 220.571682][ T8078] RAX: dffffc0000000000 RBX: ffff88809ba2f500 RCX: ffffc9000c452000 [ 220.571690][ T8078] RDX: 0000000000000008 RSI: ffffffff8170edb0 RDI: 0000000000000047 18:43:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) 18:43:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) [ 220.571698][ T8078] RBP: ffff88805ae5f9d0 R08: ffff88805ae54300 R09: ffff88805ae54bc8 [ 220.571726][ T8078] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888087ddc1c0 [ 220.616746][ T8078] R13: ffffffffffffffef R14: 0000000000000000 R15: 0000000000000279 [ 220.624735][ T8078] FS: 00007f9da43c6700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 220.633778][ T8078] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 220.640381][ T8078] CR2: 0000000000625208 CR3: 00000000a0328000 CR4: 00000000001406f0 [ 220.642653][ T3867] kobject: 'loop1' (000000005d2c4859): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 220.648363][ T8078] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 220.648371][ T8078] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 220.648376][ T8078] Call Trace: [ 220.648407][ T8078] ? kmem_cache_alloc_trace+0x354/0x760 [ 220.683323][ T8078] relay_open+0x523/0x980 [ 220.687665][ T8078] do_blk_trace_setup+0x414/0xb90 [ 220.692700][ T8078] __blk_trace_setup+0xe3/0x190 [ 220.697557][ T8078] ? do_blk_trace_setup+0xb90/0xb90 [ 220.702774][ T8078] blk_trace_setup+0x4f/0x70 [ 220.707375][ T8078] sg_ioctl+0x369/0x2a00 [ 220.711627][ T8078] ? sg_new_write.isra.0+0xa70/0xa70 [ 220.716921][ T8078] ? __might_fault+0x12b/0x1e0 [ 220.721693][ T8078] ? find_held_lock+0x35/0x130 [ 220.726558][ T8078] ? __might_fault+0x12b/0x1e0 [ 220.731327][ T8078] ? sg_new_write.isra.0+0xa70/0xa70 [ 220.736613][ T8078] do_vfs_ioctl+0xd6e/0x1390 [ 220.741207][ T8078] ? ioctl_preallocate+0x210/0x210 [ 220.742439][ T3867] kobject: 'loop5' (00000000eee07847): kobject_uevent_env [ 220.746334][ T8078] ? kasan_check_read+0x11/0x20 [ 220.746349][ T8078] ? _copy_to_user+0xc9/0x120 [ 220.746371][ T8078] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 220.769204][ T8078] ? put_timespec64+0xda/0x140 [ 220.773991][ T8078] ? nsecs_to_jiffies+0x30/0x30 [ 220.778854][ T8078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.785096][ T8078] ? security_file_ioctl+0x93/0xc0 [ 220.786369][ T3867] kobject: 'loop5' (00000000eee07847): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 220.790209][ T8078] ksys_ioctl+0xab/0xd0 [ 220.790239][ T8078] __x64_sys_ioctl+0x73/0xb0 [ 220.809110][ T8078] do_syscall_64+0x103/0x610 [ 220.813710][ T8078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.816180][ T3867] kobject: 'loop0' (00000000de499e61): kobject_uevent_env [ 220.819596][ T8078] RIP: 0033:0x457e39 [ 220.819610][ T8078] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 220.819626][ T8078] RSP: 002b:00007f9da43c5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 220.838831][ T3867] kobject: 'loop0' (00000000de499e61): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 220.850197][ T8078] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e39 [ 220.850205][ T8078] RDX: 0000000020000000 RSI: 00000000c0481273 RDI: 0000000000000013 [ 220.850212][ T8078] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 220.850227][ T8078] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9da43c66d4 [ 220.850235][ T8078] R13: 00000000004bf2e7 R14: 00000000004d0bd8 R15: 00000000ffffffff [ 220.850247][ T8078] Modules linked in: [ 220.855508][ T8078] ---[ end trace 50df6981d2d2b2c2 ]--- [ 220.921921][ T3867] kobject: 'loop4' (000000008fcdb0f2): kobject_uevent_env [ 220.929174][ T3867] kobject: 'loop4' (000000008fcdb0f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 220.941192][ T3867] kobject: 'loop0' (00000000de499e61): kobject_uevent_env [ 220.949140][ T3867] kobject: 'loop0' (00000000de499e61): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 221.080578][ T8078] RIP: 0010:relay_open_buf.part.0+0x7cb/0xb40 [ 221.102803][ T8078] Code: c1 ea 03 80 3c 02 00 0f 85 4c 03 00 00 49 8d 7d 58 4d 89 ac 24 90 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 1b 03 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 221.122590][ T8078] RSP: 0018:ffff88805ae5f958 EFLAGS: 00010203 [ 221.128836][ T8078] RAX: dffffc0000000000 RBX: ffff88809ba2f500 RCX: ffffc9000c452000 [ 221.146107][ T8078] RDX: 0000000000000008 RSI: ffffffff8170edb0 RDI: 0000000000000047 [ 221.169505][ T8078] RBP: ffff88805ae5f9d0 R08: ffff88805ae54300 R09: ffff88805ae54bc8 [ 221.183075][ T8078] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888087ddc1c0 [ 221.196585][ T8078] R13: ffffffffffffffef R14: 0000000000000000 R15: 0000000000000279 [ 221.210031][ T8078] FS: 00007f9da43c6700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 221.223583][ T8078] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 221.230362][ T8078] CR2: 00007f431eff2000 CR3: 00000000a0328000 CR4: 00000000001406f0 [ 221.238660][ T8078] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 221.263199][ T8078] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 221.276729][ T8078] Kernel panic - not syncing: Fatal exception [ 221.283839][ T8078] Kernel Offset: disabled [ 221.288166][ T8078] Rebooting in 86400 seconds..