[ 52.820760][ T26] audit: type=1800 audit(1572879239.597:27): pid=7935 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 52.841555][ T26] audit: type=1800 audit(1572879239.597:28): pid=7935 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 53.664418][ T26] audit: type=1800 audit(1572879240.517:29): pid=7935 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 53.684956][ T26] audit: type=1800 audit(1572879240.517:30): pid=7935 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.46' (ECDSA) to the list of known hosts. 2019/11/04 14:54:11 fuzzer started 2019/11/04 14:54:12 dialing manager at 10.128.0.105:42499 2019/11/04 14:54:12 checking machine... 2019/11/04 14:54:12 checking revisions... 2019/11/04 14:54:12 testing simple program... syzkaller login: [ 66.123382][ T8105] IPVS: ftp: loaded support on port[0] = 21 2019/11/04 14:54:13 building call list... executing program [ 69.281445][ T8088] can: request_module (can-proto-0) failed. [ 69.294222][ T8088] can: request_module (can-proto-0) failed. [ 69.306099][ T8088] can: request_module (can-proto-7) failed. [ 69.318868][ T8088] can: request_module (can-proto-0) failed. 2019/11/04 14:54:19 syscalls: 2553 2019/11/04 14:54:19 code coverage: enabled 2019/11/04 14:54:19 comparison tracing: enabled 2019/11/04 14:54:19 extra coverage: extra coverage is not supported by the kernel 2019/11/04 14:54:19 setuid sandbox: enabled 2019/11/04 14:54:19 namespace sandbox: enabled 2019/11/04 14:54:19 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/04 14:54:19 fault injection: enabled 2019/11/04 14:54:19 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/04 14:54:19 net packet injection: enabled 2019/11/04 14:54:19 net device setup: enabled 2019/11/04 14:54:19 concurrency sanitizer: enabled 2019/11/04 14:54:19 devlink PCI setup: PCI device 0000:00:10.0 is not available 14:54:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7, &(0x7f0000001b40)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68ce"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 73.684202][ T8150] IPVS: ftp: loaded support on port[0] = 21 14:54:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id'}}) [ 73.771316][ T8150] chnl_net:caif_netlink_parms(): no params data found [ 73.844362][ T8150] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.852176][ T8150] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.860119][ T8150] device bridge_slave_0 entered promiscuous mode [ 73.867829][ T8150] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.875052][ T8150] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.883217][ T8150] device bridge_slave_1 entered promiscuous mode [ 73.901619][ T8150] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.912366][ T8150] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.933800][ T8150] team0: Port device team_slave_0 added [ 73.940544][ T8150] team0: Port device team_slave_1 added [ 73.979745][ T8153] IPVS: ftp: loaded support on port[0] = 21 14:54:20 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000240)={0xe26e, 0x0, 0x1}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = socket(0x0, 0x0, 0x0) sendmmsg$alg(r3, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@multicast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r5) syz_open_dev$audion(&(0x7f00000003c0)='/dev/audio#\x00', 0x100000000, 0x301000) r6 = syz_open_procfs(0x0, &(0x7f000076c000)='pagemap\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x800000000fffc) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000001e80)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000001a80)=0x438) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)=0x6) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, 0x0) socket$nl_route(0x10, 0x3, 0x0) close(0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) lstat(&(0x7f00000018c0)='./bus\x00', &(0x7f0000001900)) getgid() ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) r8 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r8, 0xaf01, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r9 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r9, 0xaf01, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, 0xffffffffffffffff, 0x0) r10 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r10, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r10, 0x0) r11 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r10, r11) r12 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rfkill\x00', 0x101012, 0x0) fcntl$dupfd(r12, 0x0, 0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000440)=0x1c, 0x80000) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rfkill\x00', 0x101012, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) write$rfkill(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x3}, 0x8) r13 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r13, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r13, 0x8914, &(0x7f0000000040)={'bond0\x00\x02H\xfeL `\x00\nz\x03', 0xffb}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x511000, 0x0) r14 = socket(0x0, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r14, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r14, 0x8914, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r14, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu\x00', 0x0, 0x0) getegid() syz_open_dev$vcsa(&(0x7f0000001ac0)='/dev/vcsa#\x00', 0x400, 0x40000) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) socket(0x10, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, r7, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r7, 0x0) socket$packet(0x11, 0x3, 0x300) [ 74.033409][ T8150] device hsr_slave_0 entered promiscuous mode [ 74.101472][ T8150] device hsr_slave_1 entered promiscuous mode [ 74.303940][ T8150] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.306970][ T8160] IPVS: ftp: loaded support on port[0] = 21 [ 74.311053][ T8150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.311143][ T8150] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.331719][ T8150] bridge0: port 1(bridge_slave_0) entered forwarding state 14:54:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@assoc={0x18, 0x117, 0x4, 0x1}, @op={0x18, 0x117, 0x3, 0x1}], 0x30}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) splice(r3, 0x0, r1, 0x0, 0x10000, 0x0) [ 74.610003][ T8153] chnl_net:caif_netlink_parms(): no params data found [ 74.752245][ T8153] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.759372][ T8153] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.791626][ T8153] device bridge_slave_0 entered promiscuous mode [ 74.850956][ T8150] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.858278][ T8153] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.870944][ T8153] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.879157][ T8153] device bridge_slave_1 entered promiscuous mode [ 74.931501][ T3504] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.939642][ T3504] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.973235][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 75.016195][ T8150] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.046804][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.061698][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.075960][ T8160] chnl_net:caif_netlink_parms(): no params data found [ 75.131259][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.143180][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.182753][ T8168] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.190009][ T8168] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.231349][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.250255][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.270338][ T8168] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.277695][ T8168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.302940][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 75.342117][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 75.373291][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.401917][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 14:54:22 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) [ 75.432922][ T8153] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.452834][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 75.474474][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.551721][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.596281][ T8150] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 75.630729][ T8150] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 75.672317][ T8153] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.691766][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 75.700300][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 75.723896][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 75.741704][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 75.770265][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 75.843685][ T8160] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.851095][ T8160] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.859164][ T8160] device bridge_slave_0 entered promiscuous mode [ 75.903849][ T8153] team0: Port device team_slave_0 added [ 75.910265][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 75.941088][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 75.951254][ T8150] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 75.972531][ T8160] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.980199][ T8160] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.009496][ T8160] device bridge_slave_1 entered promiscuous mode [ 76.033398][ T8153] team0: Port device team_slave_1 added [ 76.061974][ T8192] IPVS: ftp: loaded support on port[0] = 21 [ 76.089034][ T8160] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.100151][ T8190] IPVS: ftp: loaded support on port[0] = 21 [ 76.133745][ T8160] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:54:23 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = memfd_create(&(0x7f0000000840)='queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x19O\x15\x17X\xd9i\\\xcf\x8bZ\x01\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x19\x01-\b\x15\x8a\xc7\xdc\"9\x99\xf1\xc7\x92\xaf\xff>\xd1\xf3E\x8e}v]\xe5$\xc9\xf0R\xb6J\x964(u\x7f)\xa4\xdf\x00\xacY\x8e \xbe\x1d\xa0\xeb\xc6 -\x1a\x06\xf5\xa1\xe0\\\x1b\xd1\xea\xcb\x91\x18\xff\x93o\xc3YN\x81\x8e\x16J1\xcb\'\x1d\xa2\x86\xfa2\xce\xdb\xca\xf1E\xe3\r\xa3U\x88m\xc3\x8b\x05x\xd5V\xa6\xd3\x84\xffV&}\xdas\x1cJ\x99\xb1\xcd%\xeb\xe6,\x1f\xf2\xaf\x8f\xd3\x7f\x02d', 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.net/.yz1\'\xff@\x8a?\x9b+\xfc\xb5\x9fq!\xdb\xfb\xb2\xd8Om\x84k\xca\x82\xd9\xb2$\xd4\xda\xba\xc9\x0eb\xb4D\x0f\xe4\x82\xe0\xe2p\x99\xb5\xc8J\xe3B.y\x17\x1ae!n|\x8a\xd2k\x0f\x94$$\xb6\x1c@c\x86\xf4\xcc\xfc;t;[\xab7\xf0\xb8\xd8\xbb\a\xe9]\xef\x11i', 0x1ff) r2 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x20a81) r3 = dup2(r2, r1) r4 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(r4, 0xc05c6104, &(0x7f0000000000)={0x10000000000000b}) r5 = creat(&(0x7f0000000640)='./file0\x00', 0x10) r6 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x11, r6, 0x36) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000000)) write$cgroup_type(r5, &(0x7f0000000100)='threaded\x00', 0xff34) fallocate(r5, 0x3, 0xc000, 0x80000003) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000000)) write$cgroup_type(r7, &(0x7f0000000100)='threaded\x00', 0xff34) fallocate(r7, 0x3, 0xc000, 0x80000003) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r7, 0xc058534f, &(0x7f00000000c0)={{0x49, 0x9}, 0x3, 0xfffffffc, 0xfffffffc, {0x16, 0xcf}, 0xa, 0x6}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}) r8 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r8}, &(0x7f0000000480)=0x0) clock_gettime(0x0, &(0x7f0000000500)) r10 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r10, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_FIOGETOWN(r10, 0x8903, &(0x7f00000001c0)) r11 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r11, &(0x7f00000002c0)={0xa, 0x4e23, 0xfffffffd, @mcast1}, 0x83) connect$inet6(r11, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) sendmmsg(r11, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000600)={0x0}, &(0x7f00000005c0)=0xc) r13 = open$dir(&(0x7f0000000300)='./file0\x00', 0x10000, 0x83b2f476773c9c96) r14 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r14, 0x40086602, &(0x7f0000000000)) write$cgroup_type(r14, &(0x7f0000000100)='threaded\x00', 0xff34) fallocate(r14, 0x3, 0xc000, 0x80000003) r15 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r15, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r15, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) sendmmsg(r15, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r14, 0x89e2, &(0x7f00000004c0)={r15}) kcmp(0xffffffffffffffff, r12, 0x2, r13, r16) clock_gettime(0x0, &(0x7f0000000240)) timer_settime(r9, 0x0, &(0x7f0000000400), 0x0) timer_settime(r9, 0x2, &(0x7f0000000040)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000140)) write$P9_RLINK(r3, &(0x7f0000000280)={0x7}, 0x269) acct(&(0x7f0000000180)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) [ 76.193283][ T8153] device hsr_slave_0 entered promiscuous mode [ 76.231078][ T8153] device hsr_slave_1 entered promiscuous mode [ 76.282787][ T8153] debugfs: Directory 'hsr0' with parent '/' already present! [ 76.359625][ T8160] team0: Port device team_slave_0 added [ 76.429415][ T8160] team0: Port device team_slave_1 added [ 76.516332][ T8200] IPVS: ftp: loaded support on port[0] = 21 14:54:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7, &(0x7f0000001b40)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68ce"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 76.635755][ T8160] device hsr_slave_0 entered promiscuous mode [ 76.690984][ T8160] device hsr_slave_1 entered promiscuous mode [ 76.713144][ T8160] debugfs: Directory 'hsr0' with parent '/' already present! [ 76.792758][ T8153] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.841848][ T8192] chnl_net:caif_netlink_parms(): no params data found [ 76.868490][ T8153] 8021q: adding VLAN 0 to HW filter on device team0 14:54:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7, &(0x7f0000001b40)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68ce"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 76.906812][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.922843][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.006124][ T8190] chnl_net:caif_netlink_parms(): no params data found [ 77.070478][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 77.118634][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.179651][ T3504] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.186837][ T3504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.261694][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 14:54:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7, &(0x7f0000001b40)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68ce"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 77.331167][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.401030][ T3504] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.408218][ T3504] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.495028][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.521090][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.691248][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.699619][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.762624][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 14:54:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7, &(0x7f0000001b40)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68ce"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 77.851661][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 77.914620][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.962847][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 78.008884][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 78.057990][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 14:54:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7, &(0x7f0000001b40)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68ce"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 78.102655][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.173176][ T8153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 78.300576][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 78.367886][ T8192] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.383985][ T8192] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.431748][ T8192] device bridge_slave_0 entered promiscuous mode [ 78.495619][ T8153] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 78.526288][ T8190] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.568894][ T8190] bridge0: port 1(bridge_slave_0) entered disabled state 14:54:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7, &(0x7f0000001b40)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68ce"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 78.621614][ T8190] device bridge_slave_0 entered promiscuous mode [ 78.651245][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 78.659049][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 78.741047][ T8160] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.748610][ T8192] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.775218][ T8192] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.806154][ T8192] device bridge_slave_1 entered promiscuous mode [ 78.855691][ T8200] chnl_net:caif_netlink_parms(): no params data found [ 78.907152][ T8190] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.925847][ T8190] bridge0: port 2(bridge_slave_1) entered disabled state 14:54:25 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030303e4cc74502f987c2cec6504df6ead74ed8a60a"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=loose']) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000c00)) [ 79.008545][ T8190] device bridge_slave_1 entered promiscuous mode [ 79.076467][ T8160] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.145103][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.181391][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.228816][ T8192] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.296003][ T8192] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.397202][ T8183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 79.448415][ T8183] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.487971][ T8183] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.495131][ T8183] bridge0: port 1(bridge_slave_0) entered forwarding state 14:54:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id'}}) [ 79.603044][ T8190] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.626303][ T8190] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.716624][ T8200] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.733662][ T8200] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.765182][ T8200] device bridge_slave_0 entered promiscuous mode [ 79.813889][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.826532][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 79.865882][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.911289][ T8168] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.918365][ T8168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.951341][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 79.960456][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 79.980065][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 80.000295][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 80.009556][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 80.018408][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 80.040376][ T8200] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.047633][ T8200] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.055700][ T8200] device bridge_slave_1 entered promiscuous mode [ 80.072362][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 80.080437][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 80.089301][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 80.098870][ T8192] team0: Port device team_slave_0 added [ 80.107130][ T8190] team0: Port device team_slave_0 added [ 80.122390][ T8192] team0: Port device team_slave_1 added [ 80.129402][ T8190] team0: Port device team_slave_1 added [ 80.147895][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 80.156829][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 80.168111][ T8200] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.179642][ T8200] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.233243][ T8190] device hsr_slave_0 entered promiscuous mode [ 80.271168][ T8190] device hsr_slave_1 entered promiscuous mode [ 80.310854][ T8190] debugfs: Directory 'hsr0' with parent '/' already present! [ 80.334643][ T8200] team0: Port device team_slave_0 added [ 80.341177][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 80.393458][ T8192] device hsr_slave_0 entered promiscuous mode [ 80.451204][ T8192] device hsr_slave_1 entered promiscuous mode [ 80.520889][ T8192] debugfs: Directory 'hsr0' with parent '/' already present! [ 80.529349][ T8200] team0: Port device team_slave_1 added [ 80.550339][ T8160] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 80.565594][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 80.581005][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 80.803667][ T8200] device hsr_slave_0 entered promiscuous mode [ 80.851078][ T8200] device hsr_slave_1 entered promiscuous mode [ 80.881115][ T8200] debugfs: Directory 'hsr0' with parent '/' already present! [ 81.209323][ T8190] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.250394][ T8192] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.376551][ T8190] 8021q: adding VLAN 0 to HW filter on device team0 [ 81.385729][ C1] hrtimer: interrupt took 34852 ns [ 81.495444][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 81.571220][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 81.579697][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 81.640475][ T26] audit: type=1804 audit(1572879268.487:31): pid=8367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir736645673/syzkaller.EBwePh/0/bus" dev="sda1" ino=16535 res=1 [ 81.669332][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 81.731463][ T8192] 8021q: adding VLAN 0 to HW filter on device team0 [ 81.827682][ T8372] device bond0 entered promiscuous mode [ 81.890891][ T8372] device bond_slave_0 entered promiscuous mode [ 81.911105][ T8372] device bond_slave_1 entered promiscuous mode [ 82.001492][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 82.010308][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 82.091268][ T8168] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.098738][ T8168] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.201755][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 82.280950][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 82.289384][ T8168] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.296525][ T8168] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.341432][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 82.347242][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 82.461534][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 82.470278][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.588160][ T8168] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.595591][ T8168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.701348][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 82.710632][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 82.820799][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 82.820973][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 82.826616][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 82.832494][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 82.845715][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 82.921545][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 82.987179][ T8200] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.014662][ T8190] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 83.061688][ T26] audit: type=1804 audit(1572879269.907:32): pid=8367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir736645673/syzkaller.EBwePh/0/bus" dev="sda1" ino=16535 res=1 [ 83.090766][ T8190] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 83.198285][ T8192] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 83.220332][ T26] audit: type=1804 audit(1572879269.957:33): pid=8376 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir736645673/syzkaller.EBwePh/0/bus" dev="sda1" ino=16535 res=1 [ 83.310759][ T8192] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 83.382227][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.411441][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.419519][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 83.435344][ T26] audit: type=1804 audit(1572879269.967:34): pid=8367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir736645673/syzkaller.EBwePh/0/bus" dev="sda1" ino=16535 res=1 [ 83.548261][ T8341] ================================================================== [ 83.556426][ T8341] BUG: KCSAN: data-race in tomoyo_supervisor / tomoyo_supervisor [ 83.564147][ T8341] [ 83.566489][ T8341] write to 0xffffffff86148088 of 8 bytes by task 8307 on cpu 0: [ 83.574139][ T8341] tomoyo_supervisor+0x1ec/0xd20 [ 83.579359][ T8341] tomoyo_path_permission+0x121/0x160 [ 83.584753][ T8341] tomoyo_path_perm+0x23e/0x390 [ 83.589615][ T8341] tomoyo_inode_getattr+0x26/0x40 [ 83.594647][ T8341] security_inode_getattr+0x9b/0xd0 [ 83.599856][ T8341] vfs_getattr+0x2e/0x70 [ 83.604289][ T8341] vfs_statx+0x102/0x190 [ 83.608540][ T8341] __do_sys_newstat+0x51/0xb0 [ 83.613226][ T8341] __x64_sys_newstat+0x3a/0x50 [ 83.618007][ T8341] do_syscall_64+0xcc/0x370 [ 83.622522][ T8341] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 83.628404][ T8341] [ 83.630742][ T8341] write to 0xffffffff86148088 of 8 bytes by task 8341 on cpu 1: [ 83.638413][ T8341] tomoyo_supervisor+0x1ec/0xd20 [ 83.643543][ T8341] tomoyo_path_permission+0x121/0x160 [ 83.648934][ T8341] tomoyo_path_perm+0x23e/0x390 [ 83.653801][ T8341] tomoyo_inode_getattr+0x26/0x40 [ 83.659022][ T8341] security_inode_getattr+0x9b/0xd0 [ 83.664232][ T8341] vfs_getattr+0x2e/0x70 [ 83.668480][ T8341] vfs_statx+0x102/0x190 [ 83.672729][ T8341] __do_sys_newstat+0x51/0xb0 [ 83.677416][ T8341] __x64_sys_newstat+0x3a/0x50 [ 83.682207][ T8341] do_syscall_64+0xcc/0x370 [ 83.686733][ T8341] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 83.692621][ T8341] [ 83.694950][ T8341] Reported by Kernel Concurrency Sanitizer on: [ 83.701145][ T8341] CPU: 1 PID: 8341 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 83.707928][ T8341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.718104][ T8341] ================================================================== [ 83.726179][ T8341] Kernel panic - not syncing: panic_on_warn set ... [ 83.732864][ T8341] CPU: 1 PID: 8341 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 83.739635][ T8341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.749792][ T8341] Call Trace: [ 83.753113][ T8341] dump_stack+0xf5/0x159 [ 83.757679][ T8341] panic+0x210/0x640 [ 83.761614][ T8341] ? vprintk_func+0x8d/0x140 [ 83.767347][ T8341] kcsan_report.cold+0xc/0xe [ 83.772395][ T8341] kcsan_setup_watchpoint+0x3fe/0x410 [ 83.777786][ T8341] __tsan_unaligned_write8+0x143/0x1f0 [ 83.783284][ T8341] tomoyo_supervisor+0x1ec/0xd20 [ 83.788235][ T8341] ? tomoyo_path_matches_pattern+0xa1/0x160 [ 83.794334][ T8341] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 83.800586][ T8341] ? tomoyo_compare_name_union+0x4c/0xa0 [ 83.806428][ T8341] ? __read_once_size.constprop.0+0x12/0x20 [ 83.812371][ T8341] ? tomoyo_compare_name_union+0xa0/0xa0 [ 83.818365][ T8341] tomoyo_path_permission+0x121/0x160 [ 83.823850][ T8341] tomoyo_path_perm+0x23e/0x390 [ 83.828939][ T8341] tomoyo_inode_getattr+0x26/0x40 [ 83.833981][ T8341] security_inode_getattr+0x9b/0xd0 [ 83.839205][ T8341] vfs_getattr+0x2e/0x70 [ 83.843601][ T8341] vfs_statx+0x102/0x190 [ 83.848059][ T8341] __do_sys_newstat+0x51/0xb0 [ 83.852894][ T8341] ? mem_cgroup_handle_over_high+0x50/0x180 [ 83.858816][ T8341] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 83.865079][ T8341] ? debug_smp_processor_id+0x4c/0x172 [ 83.870559][ T8341] __x64_sys_newstat+0x3a/0x50 [ 83.875950][ T8341] do_syscall_64+0xcc/0x370 [ 83.880485][ T8341] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 83.886380][ T8341] RIP: 0033:0x7f4e78b3fc65 [ 83.890811][ T8341] Code: 00 00 00 e8 5d 01 00 00 48 83 c4 18 c3 90 90 90 90 90 90 90 90 83 ff 01 48 89 f0 77 18 48 89 c7 48 89 d6 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 17 f3 c3 90 48 8b 05 a1 51 2b 00 64 c7 00 16 [ 83.910450][ T8341] RSP: 002b:00007ffd5e0d5448 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 83.918955][ T8341] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f4e78b3fc65 [ 83.926942][ T8341] RDX: 00007f4e7900dc60 RSI: 00007f4e7900dc60 RDI: 00000000022d6220 [ 83.934931][ T8341] RBP: 0000000000020062 R08: 00007f4e78df55a0 R09: 0000000000000000 [ 83.942917][ T8341] R10: 1999999999999999 R11: 0000000000000246 R12: 00000000022d6220 [ 83.950908][ T8341] R13: 00000000022d61c0 R14: 0000000000000005 R15: 0000000000000000 [ 83.961132][ T8341] Kernel Offset: disabled [ 83.965560][ T8341] Rebooting in 86400 seconds..