[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 37.731144] audit: type=1800 audit(1573753659.853:33): pid=7286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 37.756464] audit: type=1800 audit(1573753659.853:34): pid=7286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 39.120787] audit: type=1400 audit(1573753661.233:35): avc: denied { map } for pid=7458 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.51' (ECDSA) to the list of known hosts. 2019/11/14 17:47:47 fuzzer started [ 45.667810] audit: type=1400 audit(1573753667.783:36): avc: denied { map } for pid=7468 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/11/14 17:47:49 dialing manager at 10.128.0.105:37231 2019/11/14 17:47:49 syscalls: 2545 2019/11/14 17:47:49 code coverage: enabled 2019/11/14 17:47:49 comparison tracing: enabled 2019/11/14 17:47:49 extra coverage: extra coverage is not supported by the kernel 2019/11/14 17:47:49 setuid sandbox: enabled 2019/11/14 17:47:49 namespace sandbox: enabled 2019/11/14 17:47:49 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/14 17:47:49 fault injection: enabled 2019/11/14 17:47:49 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/14 17:47:49 net packet injection: enabled 2019/11/14 17:47:49 net device setup: enabled 2019/11/14 17:47:49 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/14 17:47:49 devlink PCI setup: PCI device 0000:00:10.0 is not available 17:50:41 executing program 0: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000040)=""/216, 0xd8, 0x6101, 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x30004, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000180)={0x4, 0x0, 0x4, 0xffff, 0x7}, 0xc) r2 = socket$rxrpc(0x21, 0x2, 0x2) fstatfs(r2, &(0x7f00000001c0)=""/7) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000200)=""/176, &(0x7f00000002c0)=0xb0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_netdev_private(r4, 0x89fb, &(0x7f0000000300)="0f065e2aaa0fd0fb72a4ca45132845b6899ce5c6f6ac81b08c18b0904852b0243c3cc819efb5e18eeb8e961b04f61c6007ff787506994f5b40851afa1ee4b85619da655bb757740ce9e5d9ee2a17619da8fdfa65bdee9dd1dc1984e04ec88c7faf06e821f42d0495be3dd4077d99294a6d86f219234643ef851283503ae4efaf5be089da0a39e04e6a3b407ef2f5322ae849579b354b98608f229f3b47c5e83f0c20") r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x40080, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r5, 0xc058534b, &(0x7f0000000400)={0x9, 0x9, 0x3ff, 0x1000, 0x4, 0x7}) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/hash_stats\x00', 0x0, 0x0) connect$pptp(r6, &(0x7f00000004c0)={0x18, 0x2, {0x1, @remote}}, 0x1e) r7 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0x0, 0x40) getsockopt$inet6_mreq(r6, 0x29, 0x970edbcbf6aaf0f5, &(0x7f0000000540)={@ipv4={[], [], @initdev}, 0x0}, &(0x7f0000000580)=0x14) sendmsg$xdp(r7, &(0x7f0000000740)={&(0x7f00000005c0)={0x2c, 0x12, r8, 0x38}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="6acca57ad26c801242040faff19e2d55f9ae652966cd9c9f8284cd2981419a11aee8d9214bf8f221fc8dabfca3271a0f331b67460601249509747ff03cacc0dc3aea87d5a8dd9942ea7341c5de153175d1183c7a1af82001f60bcda6cc645e4797c621c49075c2f588b9ba2cff9baafe578b3a12c357b6ab47300d0d71", 0x7d}, {&(0x7f0000000680)="4232bb9c8ab25c3725255c582725e685b79667f48b0edd4205acb2a8bab5e6056aabbd02d122962a0a832f3d810b633bd8e4fbdfed44d507de8e10bed3394ec07b9942c4a8ee86ee4a2d409a4c39bc662c1d5350e874643a99602059fa3d051539f62c8ec7769bd989aee9d25f9693de3d3e7b762eb4e26bf7f24027", 0x7c}], 0x2, 0x0, 0x0, 0x20103}, 0x20000) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000780)) r9 = syz_open_dev$media(&(0x7f00000007c0)='/dev/media#\x00', 0x5, 0x303001) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r9, 0x408c5333, &(0x7f0000000800)={0x6, 0x2c4f, 0x3, 'queue0\x00', 0x5}) write$P9_RREADLINK(r1, &(0x7f00000008c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000900)=""/103, &(0x7f0000000980)=0x67) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f00000009c0)=""/145, 0x91) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/autofs\x00', 0x203083, 0x0) connect$packet(r10, &(0x7f0000000ac0)={0x11, 0xf5, r8, 0x1, 0x4, 0x6, @local}, 0x14) r11 = dup(0xffffffffffffffff) ioctl$BLKROSET(r11, 0x125d, &(0x7f0000000b00)=0x6f) r12 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/dlm_plock\x00', 0x3, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r12, 0xc0a85352, &(0x7f0000000b80)={{0x7, 0x8}, 'port1\x00', 0xc, 0x41821, 0x0, 0x0, 0x6, 0x1, 0x2, 0x0, 0xc4f0d018713edd2c, 0x400}) r13 = open(&(0x7f0000000c40)='./file0\x00', 0x800, 0x23a) r14 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/cachefiles\x00', 0x400000, 0x0) ioctl$TUNSETFILTEREBPF(r13, 0x800454e1, &(0x7f0000000cc0)=r14) [ 219.253477] audit: type=1400 audit(1573753841.373:37): avc: denied { map } for pid=7486 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14996 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 219.370850] IPVS: ftp: loaded support on port[0] = 21 17:50:41 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x40) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)=0x1) getsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={r0}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x602000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x811, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x2) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r4, 0x4020565a, &(0x7f0000000300)={0x8001008, 0x2, 0x1}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x0, @empty, 0x4e20, 0x3, 'rr\x00', 0xf, 0xa811, 0x1c}, 0x2c) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000380)={0xfff9, 0x3, 0x37, 0x9, 0x0}, &(0x7f00000003c0)=0x10) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000400)={r5, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}}}, 0x84) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/capi/capi20\x00', 0x404042, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f0000000500), 0x4) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000540)={0xd2, 0x4, 0x4, 0x0, {0x0, 0x7530}, {0x5, 0x2, 0x2, 0x8, 0x0, 0x7f, "c2390a87"}, 0x7ff, 0x3, @fd=0xffffffffffffffff, 0x4}) fcntl$getflags(r7, 0x401) r8 = syz_open_dev$amidi(&(0x7f00000005c0)='/dev/amidi#\x00', 0x8, 0x2202) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f0000000600)) socketpair(0x10, 0x1, 0x20, &(0x7f0000000640)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r9, 0x84, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r10 = syz_open_dev$mice(&(0x7f0000000700)='/dev/input/mice\x00', 0x0, 0xc2d9959b9890f0b6) accept4$x25(r10, &(0x7f0000000740), &(0x7f0000000780)=0x12, 0x80000) fremovexattr(0xffffffffffffffff, &(0x7f00000007c0)=@random={'os2.', 'wlan1]-\x00'}) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000800)={0x15, 0x65, 0xffff, 0xc0b6, 0x8, '9P2000.L'}, 0x15) ioctl$VIDIOC_QUERYMENU(r10, 0xc02c5625, &(0x7f0000000840)={0xa23, 0xa8a5, @value=0xfffffffeffffffff}) r11 = dup3(r0, 0xffffffffffffffff, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000880)='rr\x00', r11}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) lsetxattr$security_capability(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000ac0)=@v3={0x3000000, [{0x1, 0x9}, {0x3fde, 0x9}], r12}, 0x18, 0x2) [ 219.483492] chnl_net:caif_netlink_parms(): no params data found [ 219.540392] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.548243] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.557141] device bridge_slave_0 entered promiscuous mode [ 219.565456] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.573321] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.587812] device bridge_slave_1 entered promiscuous mode [ 219.607813] IPVS: ftp: loaded support on port[0] = 21 [ 219.633048] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.656225] bond0: Enslaving bond_slave_1 as an active interface with an up link 17:50:41 executing program 2: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xf52, 0x80) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f00000000c0)) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400, 0x1) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x20100, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(r3, 0x65, 0x4, &(0x7f0000000180), 0x4) r4 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x5, 0x40) ioctl$VHOST_SET_LOG_BASE(r4, 0x4008af04, &(0x7f0000000240)=&(0x7f0000000200)) io_setup(0x8, &(0x7f0000000280)=0x0) r6 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x401, 0x0) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/enforce\x00', 0x400442, 0x0) io_cancel(r5, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x36ddb6dd02106d1f, 0x4, r6, &(0x7f0000000300)="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", 0xfa, 0xfffffffffffffff8, 0x0, 0x1, r7}, &(0x7f0000000480)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000004c0)=0x400ad) r8 = socket$inet6_sctp(0xa, 0x2, 0x84) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000500)={0x0, 0x6, 0x6, [0x7, 0x3, 0x81, 0x8, 0x0, 0xfff]}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r8, 0x84, 0x75, &(0x7f0000000580)={r9, 0x86}, 0x8) r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00', 0x0, 0xc}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000640)={0x0, r10, 0x4}, 0x10) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$KVM_GET_LAPIC(r11, 0x8400ae8e, &(0x7f00000006c0)={"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"}) r12 = semget$private(0x0, 0x0, 0x402) semctl$SETVAL(r12, 0x4, 0x10, &(0x7f0000000ac0)=0x2) r13 = accept4$packet(r11, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000b40)=0x14, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x40010, r13, 0xbfd71000) r14 = syz_open_dev$admmidi(&(0x7f0000000b80)='/dev/admmidi#\x00', 0xffff, 0x42c0) ioctl$KVM_GET_SREGS(r14, 0x8138ae83, &(0x7f0000000bc0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d00)={0x0, 0x0}) capget(&(0x7f0000000d40)={0x20071026, r15}, &(0x7f0000000d80)={0x4, 0x10001, 0x6, 0xffffffff, 0x7243, 0xb2}) [ 219.702638] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.713835] team0: Port device team_slave_0 added [ 219.722424] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 219.730209] team0: Port device team_slave_1 added [ 219.772069] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 219.813058] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 219.841700] IPVS: ftp: loaded support on port[0] = 21 17:50:42 executing program 3: write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000000)=""/153, 0x99, 0x3ff, 0x0, 0x10000, 0x4, 0x8}, 0x120) r0 = fcntl$getown(0xffffffffffffffff, 0x9) tgkill(r0, 0x0, 0x36) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x400800, 0x0) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000240)={"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"}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x40402, 0x0) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f00000008c0)={0x14f35af7cd651b2, 0xd7e, &(0x7f0000000680)=""/14, &(0x7f00000006c0)=""/208, &(0x7f00000007c0)=""/243, 0xd000}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000900)='/dev/null\x00', 0x4000, 0x0) write$rfkill(r3, &(0x7f0000000940)={0x7ff, 0x1, 0x0, 0x0, 0x1}, 0x8) getsockopt$llc_int(r3, 0x10c, 0x5, &(0x7f0000000980), &(0x7f00000009c0)=0x4) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/dlm-monitor\x00', 0x84080, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000a40), 0x2) r5 = accept4(0xffffffffffffffff, &(0x7f0000000a80)=@pptp={0x18, 0x2, {0x0, @empty}}, &(0x7f0000000b00)=0x80, 0x80000) connect$tipc(r5, &(0x7f0000000b40)=@nameseq={0x1e, 0x1, 0x2, {0x8bde5b70f1bac853, 0x0, 0x6}}, 0x10) getsockopt$inet6_udp_int(r2, 0x11, 0xa, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) r6 = accept(r1, 0x0, &(0x7f0000000c00)) getsockopt$MISDN_TIME_STAMP(r6, 0x0, 0x1, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/ubi_ctrl\x00', 0x800, 0x0) recvfrom$ax25(r7, &(0x7f0000000f00)=""/211, 0xd3, 0x2000, &(0x7f0000001000)={{0x3, @null, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}, 0x48) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000001080)=0x1) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000010c0), 0x10) syz_open_dev$vcsn(&(0x7f0000001100)='/dev/vcs#\x00', 0x5, 0x40000) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001140)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r8, 0x4008af13, &(0x7f0000001180)={0x6, 0x80}) r9 = syz_genetlink_get_family_id$fou(&(0x7f0000001200)='fou\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001bc0)=0x14, 0x181800) sendmsg$FOU_CMD_GET(r2, &(0x7f0000001c80)={&(0x7f00000011c0), 0xc, &(0x7f0000001c40)={&(0x7f0000001c00)={0x38, r9, 0x0, 0x70bd27, 0x25dfdbfc, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_IFINDEX={0x8, 0xb, r10}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4040}, 0x10) r11 = syz_genetlink_get_family_id$fou(&(0x7f0000001d00)='fou\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000002000)={{{@in=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f0000002100)=0xe8) sendmsg$FOU_CMD_GET(r7, &(0x7f0000002200)={&(0x7f0000001cc0)={0x10, 0x0, 0x0, 0x8804300}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)={0x5c, r11, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e22}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_IFINDEX={0x8, 0xb, r12}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20}, 0x20040000) [ 219.902862] device hsr_slave_0 entered promiscuous mode [ 219.941296] device hsr_slave_1 entered promiscuous mode [ 219.989229] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 220.009240] chnl_net:caif_netlink_parms(): no params data found [ 220.023659] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 17:50:42 executing program 4: utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x3, 0x81}) r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f00000000c0)={{0x2, @name="cc682f118644af4680c399be3fece1ffd85c15798e27730ab09f4dcca505c5ec"}, 0x8, 0x6, 0xcf}) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2d) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x100000) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f00000001c0)=""/242) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x400301, 0x1) ioctl$DRM_IOCTL_SET_VERSION(r4, 0xc0106407, &(0x7f0000000300)={0x10001, 0x7fffffff, 0xa0ad790, 0x100}) writev(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000340)="8a5490c10ee971a58b333ad9372396a045f209819d6a4907e24e6b6446bf05bf743aed7be4669745c50c6bf4902b8b57bdab73507709b8656e7bdd51304b748a908987abf1446e89541f47ce83611687e8548a67654b372ea08cbb1fddabf8e34cdb93d1deb327823da2f4fce201982528f95bd729918e53510a16ba6cecd95c5716ebcec1bea3618d1bde9b55e9c653e56bdd8ba740d0e7f2e41b1d3307e019c18f55", 0xa3}, {&(0x7f0000000400)="e9dc3be259c0d175f6a14aaee6e95619028aaf1ab366b1560a06c514e8c9f3974cfd7a1b0241a6856b844c48fa4fd7daf7a77e4d1ace68c8930642c4aa3332c096b502e82970ccdf7ecf8a54fa5f36c1a5b00807766b599ffb4a2d37c3ed174d20437fca8262", 0x66}, {&(0x7f0000000480)="ddbad438034e8354be4334fb62088d0c244745a788388529ee8990a1354bfa2ce89edecb9fdfcf12180a248c672162d1debd5ca914b52e9d53a8a11dca0cf5dcc1e91d5abb01cf3892", 0x49}, {&(0x7f0000000500)="dc71616ead2b3797c6812a8c4baaf33cf08a137b32f62ff2c0fdac71e61622d531aa1395b7740feb4d20406e02766b0045c1ebcc077fc50c6f7e2798534e6232849799293e2f8eff6d44305e5330fd34b31848b67169a8f2210baa777021ea29d9836b34358d2badbf466b9290b123256406fe23af0c8b00fb6d245888fdb548c932571b6b6e83fa90221a24fcc62c7d885f7b136437e1e5aa58c800eb23f48e690469578b2f6a50f2f360ebc3dd7e729fb2528a9872e4fcb5", 0xb9}, {&(0x7f00000005c0)="b680d623dc051c0ed470ca77a94c9a2c32fcabf2e29ebf2b0b6ecd011788e45f649b1910329a711542fd488a128b3f3487210a436de5ee428eb044a230f15c950c2cf75b02a47a9966157adf68a57274c4c640f5f0ff0802b3a035b935", 0x5d}, {&(0x7f0000000640)="6e99165883b08fd2ef6ce3aad72794f236f38116655c366a5362e7606357d8a5dc7d54bd309036765d910770feb3ecb1ed", 0x31}, {&(0x7f0000000680)="b6e5ad201293baf565b87c5fffdfeb1d115f112b034cfd7ad1d5332db41215e70bdb1c905c2ee902d750d5bfe39bc8dd91", 0x31}], 0x7) ioctl$NBD_SET_TIMEOUT(r3, 0xab09, 0x10001) lseek(r1, 0x5, 0x0) r5 = syz_open_pts(r4, 0x20000) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x4, [@struct={0x10, 0xa, 0x0, 0x4, 0x0, 0x8, [{0x2, 0x5, 0x6}, {0x2, 0x4, 0x2}, {0xe, 0x1}, {0xa, 0x3, 0x7}, {0xd, 0x2, 0xfffffffe}, {0x2, 0x2, 0xffff}, {0x1, 0x4, 0x9}, {0x2, 0x4, 0x9}, {0xb, 0x1, 0x9}, {0x9, 0x4, 0x80000001}]}, @fwd={0x3}]}, {0x0, [0x2e, 0x2f]}}, &(0x7f0000000800)=""/83, 0xac, 0x53}, 0x20) dup2(r5, r6) ioctl$USBDEVFS_CLAIMINTERFACE(r4, 0x8004550f, &(0x7f00000008c0)=0x6) r7 = syz_open_dev$vcsn(&(0x7f0000000900)='/dev/vcs#\x00', 0x9, 0x500000) ioctl$KVM_DEASSIGN_DEV_IRQ(r7, 0x4040ae75, &(0x7f0000000940)={0x7, 0x0, 0x3ff, 0x200}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000980)={0xffffffffffffffff}) setsockopt$inet_udp_int(r8, 0x11, 0x65, &(0x7f00000009c0)=0x400, 0x4) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/checkreqprot\x00', 0x400000, 0x0) r9 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/qat_adf_ctl\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a80)={0x0, 0x2}, &(0x7f0000000ac0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r9, 0x84, 0x22, &(0x7f0000000b00)={0x3ff, 0x2, 0x4, 0x1, r10}, 0x10) syz_emit_ethernet(0xd7, &(0x7f0000000b40)={@local, @dev={[], 0xa}, [{[{0x9100, 0x0, 0x1}], {0x8100, 0x7, 0x1}}], {@generic={0xc1d9, "b261204ba08d37f7cbb005dc16e60c707d0dc5ed4da3c88ac436eccc7e8dfbbe9b55890ccc9dd5f37a78e1b0d11bc49a40d76a798d469757eeca94853c71d0312e261d3227f574244afdfcf8b883c3383cc4db0e0332545b6f5e82d0bf256fd18222649c9445cb7d94325d346e112c9a8ad0c9dfb6fe43cc7eb35bedb9cc306abf22ea20ae30196c928989d415d49aa115d8390b3b0d88500bdf855e8df6910d5ad15ca1252de649e6260703b2762c9ab499a404c5edd037e4e03339027b0e0ac3"}}}, 0x0) r11 = syz_open_dev$vbi(&(0x7f0000000c40)='/dev/vbi#\x00', 0x0, 0x2) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r11, &(0x7f0000000e80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x10020800}, 0xc, &(0x7f0000000e40)={&(0x7f0000000d00)={0x134, r12, 0x300, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}]}]}, @TIPC_NLA_SOCK={0x4c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9b03}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xd68}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc81}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffc3f4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x360}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe69}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}]}, 0x134}, 0x1, 0x0, 0x0, 0xc050}, 0x4000) [ 220.068030] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.074620] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.081702] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.088353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.163460] IPVS: ftp: loaded support on port[0] = 21 [ 220.308234] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 220.317319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.323774] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.330138] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.339941] device bridge_slave_0 entered promiscuous mode [ 220.347699] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.355904] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.363329] device bridge_slave_1 entered promiscuous mode [ 220.385686] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 220.387126] IPVS: ftp: loaded support on port[0] = 21 [ 220.401923] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 220.408037] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.429996] chnl_net:caif_netlink_parms(): no params data found [ 220.451528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.461369] bridge0: port 1(bridge_slave_0) entered disabled state 17:50:42 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101001, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000040)={0x2, 0x3}) socket$pptp(0x18, 0x1, 0x2) r1 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x1000) ioctl(r1, 0x3f, &(0x7f00000000c0)="2c61dd1eac4f284ead15a3f4614be26613c03f99a791b1fab18f2339be056571aa10359ef4394f605f36c96adc37d436ab") r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x10000, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000140)=0x609000, 0x4) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000180)=0x5d0, 0x8) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f0000000200)) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000340)='sit0\x00', 0x10) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x802, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000400)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000380)="148b1764ddddac9e1f95396d434f1b14b774c6b7cac5ad660665d906a3048c997b74867f5cc1b114ffef", 0x2a, r4}, 0x68) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ubi_ctrl\x00', 0x200000, 0x0) getsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f00000004c0)=0x20, &(0x7f0000000500)=0x2) setxattr$trusted_overlay_nlink(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x3}, 0x28, 0x5) accept$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0}, &(0x7f0000000bc0)=0x14) r7 = open(&(0x7f0000000c00)='./file0\x00', 0x4000, 0x80) bind$xdp(r3, &(0x7f0000000c40)={0x2c, 0x4, r6, 0x2d, r7}, 0x10) r8 = syz_open_dev$audion(&(0x7f0000000c80)='/dev/audio#\x00', 0x3, 0x105101) setsockopt$RDS_CANCEL_SENT_TO(r8, 0x114, 0x1, &(0x7f0000000cc0)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r9 = openat$cgroup_procs(r2, &(0x7f0000000d00)='cgroup.threads\x00', 0x2, 0x0) fsetxattr$security_capability(r9, &(0x7f0000000d40)='security.capability\x00', &(0x7f0000000d80)=@v2={0x2000000, [{0x9, 0x1}, {0xef, 0x9}]}, 0x14, 0x0) io_setup(0x80000001, &(0x7f0000000dc0)=0x0) io_destroy(r10) r11 = syz_open_dev$sndtimer(&(0x7f0000000e00)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r11, 0x40305828, &(0x7f0000000e40)={0x0, 0x4, 0xd5dd, 0x29}) r12 = syz_open_dev$cec(&(0x7f0000000e80)='/dev/cec#\x00', 0x2, 0x2) ioctl$TIOCSCTTY(r12, 0x540e, 0x6) r13 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/zero\x00', 0x8040, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r8, 0x84, 0x13, &(0x7f0000000f00)={0x0, 0x800}, &(0x7f0000000f40)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r13, 0x84, 0x72, &(0x7f0000000f80)={r14, 0x7, 0xa666764d575de3e4}, &(0x7f0000000fc0)=0xc) [ 220.479032] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.488220] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 220.555927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.564892] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.571358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.580485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.589112] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.595525] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.604151] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.613477] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.657505] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.665247] team0: Port device team_slave_0 added [ 220.676242] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 220.684413] IPVS: ftp: loaded support on port[0] = 21 [ 220.686329] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.696423] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.703811] device bridge_slave_0 entered promiscuous mode [ 220.716175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 220.725708] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.734305] team0: Port device team_slave_1 added [ 220.745998] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.753382] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.760501] device bridge_slave_1 entered promiscuous mode [ 220.779917] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.788374] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.797912] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.811328] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.829366] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 220.860585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.869058] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.876784] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.895525] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 220.962659] device hsr_slave_0 entered promiscuous mode [ 221.001099] device hsr_slave_1 entered promiscuous mode [ 221.041449] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 221.048499] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.055858] team0: Port device team_slave_0 added [ 221.061785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.069527] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.109150] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 221.116702] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 221.126448] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 221.133725] team0: Port device team_slave_1 added [ 221.150952] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 221.159439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 221.167737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.177872] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 221.187559] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 221.205317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 221.213205] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 221.221136] chnl_net:caif_netlink_parms(): no params data found [ 221.239631] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 221.245812] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 221.279474] chnl_net:caif_netlink_parms(): no params data found [ 221.323021] device hsr_slave_0 entered promiscuous mode [ 221.371083] device hsr_slave_1 entered promiscuous mode [ 221.441487] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 221.449956] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 221.477720] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.511073] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.517463] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.525106] device bridge_slave_0 entered promiscuous mode [ 221.544684] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 221.568953] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.575578] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.583337] device bridge_slave_1 entered promiscuous mode [ 221.607645] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.614626] chnl_net:caif_netlink_parms(): no params data found [ 221.641717] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 221.653650] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.660152] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.667620] device bridge_slave_0 entered promiscuous mode [ 221.682750] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 221.689482] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 221.698560] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.711433] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 221.721951] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.728330] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.735450] device bridge_slave_1 entered promiscuous mode [ 221.759267] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.777382] audit: type=1400 audit(1573753843.893:38): avc: denied { associate } for pid=7487 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 221.811334] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.819001] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.829522] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.839584] device bridge_slave_0 entered promiscuous mode [ 221.865036] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.872349] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.885503] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.892944] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.900290] device bridge_slave_1 entered promiscuous mode [ 221.938515] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.947177] team0: Port device team_slave_0 added [ 221.975069] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 221.983086] team0: Port device team_slave_1 added [ 221.988550] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.003861] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.011805] team0: Port device team_slave_0 added [ 222.018137] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 222.030313] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 222.041169] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.055135] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.062357] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.069612] team0: Port device team_slave_1 added [ 222.088395] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.104102] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 222.124168] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready 17:50:44 executing program 0: mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\\vboxnet0\'#.]\x00', 0xe, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40e500, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) mount$9p_fd(0x0, &(0x7f00000004c0)='.//ile0\x00', &(0x7f0000000500)='9p\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r1, @ANYBLOB=',\x00']) [ 222.144019] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.167917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.183226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 17:50:44 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKTRACETEARDOWN(r0, 0x125e, 0x712000) r4 = creat(&(0x7f0000000280)='./file0\x00', 0xe9) write$binfmt_script(r4, &(0x7f0000000400)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r4) ioctl$VIDIOC_TRY_FMT(r4, 0xc0d05640, &(0x7f0000000080)={0xe62a9320c5918440, @raw_data="119539c4f0de97cec47951db4bc5f59e202a1483775d69daff02df92bc482b22efe1ef3a23b79eed06ca6e29054d472c9956f29b425fe1c7acf4c379004a6cfb4598c848fba0ece71f6538b972ba01e58d0c02a31c5663c37c793aa3416b2fa5d1d61619cd5456be70857bed0fff3f5dd7ba8c7924b80f5b8da8544fd414602c7b34b7aed0db477f99e45a9b38e908d016c5a8064f72093f4bac4f28488cd921e8756ec81e5730c50b8a756b9f0a0ff801b3dba06c836a5131219f9f647660480d42c3cdc8d6bd87"}) [ 222.206605] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 222.214095] 9pnet: Insufficient options for proto=fd [ 222.219475] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.221613] 9pnet: Insufficient options for proto=fd [ 222.264645] device hsr_slave_0 entered promiscuous mode [ 222.312681] device hsr_slave_1 entered promiscuous mode [ 222.412626] device hsr_slave_0 entered promiscuous mode [ 222.451165] device hsr_slave_1 entered promiscuous mode [ 222.501944] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 222.509610] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 222.517551] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 222.524165] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.532092] team0: Port device team_slave_0 added [ 222.539059] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.547517] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 222.555475] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 222.572634] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 222.583299] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.591282] team0: Port device team_slave_1 added 17:50:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RVERSION(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75a4e0159f860e33823bf47843535af3a818d057ef622662eeb208b33f209975e2c24316681233fc626ba2af632dc3150afd5f94459908d3a17683c08e0a1c80638e5e3e864b8946f30fd18faa16f02b2830982be94b57f97e49980adf47df042c760c0a30323e7ab4db2dca67b1904737328a374de84429e4c38866a2a33c531e8d03ea84a31a5760dca6af12e81d32530d2eb95141ec5c5d4a1bd2fa7aa1c9545a9b824d13fed5a717db5585e8cef0e890868ecdc300b433fc5f1ec9ea680da4e37ef200"/232], 0x15) r5 = dup(r4) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$FUSE_BMAP(r5, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) r6 = creat(&(0x7f0000000280)='./file0\x00', 0xe9) write$binfmt_script(r6, &(0x7f0000000400)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r6) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast1}}, &(0x7f00000003c0)=0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xa, 0x1, &(0x7f0000000100)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x8}], &(0x7f0000000180)='syzkaller\x00', 0x2, 0x35, &(0x7f00000001c0)=""/53, 0x41000, 0x2, [], r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x4, 0x9d, 0x2}, 0x10}, 0x70) r8 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r8, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r8, 0x84, 0x17, &(0x7f0000000080)={r9, 0x2, 0x60, "0fa7bfe125045942ecd8ab32c5a6604a4695f872990c2404559a0b055af2f806bb2aa5fae370a514e155a2dd16c8352588385e8f9629a34e88336214f97baa6bb46b4367e41dcf911f24fcd3ad9cac4d17735832822af977aae2b9b509015482"}, 0x68) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000280)={r9, 0x94}, &(0x7f00000002c0)=0x8) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) [ 222.607658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.618057] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.631262] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.637666] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.649690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.656694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.663975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.672567] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.687538] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 222.694025] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.703105] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 222.712281] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.720033] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.727161] audit: type=1400 audit(1573753844.833:39): avc: denied { name_bind } for pid=7526 comm="syz-executor.0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 222.761181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.762087] audit: type=1400 audit(1573753844.833:40): avc: denied { node_bind } for pid=7526 comm="syz-executor.0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 222.769114] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.803260] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.809711] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.818783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.829541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.839398] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.845814] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.858347] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.872138] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.886821] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.895205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.902645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.910518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.918668] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.926339] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.932787] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.942227] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 222.953659] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 17:50:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x210007b9, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x1c76}, 0x4) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(r2, 0x408) getsockname$packet(r2, &(0x7f0000000040), 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x28084, 0x0, 0x0) sendmmsg(r5, 0x0, 0x0, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f0000000380)={r8, 0x6, 0x8, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}}, 0x0, 0x0, 0xfffffffc, 0x0, 0xfffffffc}}, &(0x7f0000000140)=0xffffffffffffff82) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r10 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r9, 0x84, 0xe, &(0x7f0000000080)={r11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000200)={0x0, 0x5, 0x17, 0x3, r11}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000280)={r8, 0x0, 0x1, 0x800, 0x7fff, 0x77d5, 0x1, 0x8, {r12, @in6={{0xa, 0x4e23, 0x3, @remote}}, 0xffffe467, 0x6, 0x7, 0x3}}, &(0x7f0000000340)=0xb0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="3f0200000000fddbdf2501000000000000000c4100000014001462726f6164636173742d6c696e6b0000e06ed89ba1c1ea73921a590280113701f4ee49d945c1a153f9e3764583e8910bcd83ce76b5d07cd127e389608833059c8bf7176ede1122a8faad6cfbd5f8c7f7db82c4e6bd79bb615739b5f0440352aad0c65ba91987ade52b16fe9586de4a4e64d35831b51b979dc6"], 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x200, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000094) [ 222.961496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.998854] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.016547] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.053017] device hsr_slave_0 entered promiscuous mode [ 223.069640] audit: type=1400 audit(1573753845.183:41): avc: denied { create } for pid=7531 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 223.070709] hrtimer: interrupt took 52779 ns [ 223.102255] audit: type=1400 audit(1573753845.223:42): avc: denied { write } for pid=7531 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 223.111250] device hsr_slave_1 entered promiscuous mode [ 223.131534] audit: type=1400 audit(1573753845.223:43): avc: denied { read } for pid=7531 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 223.201072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.208956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.227940] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 223.237186] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 223.250616] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 223.264138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.273452] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.285399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.293251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.301195] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.308229] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.319632] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 223.329772] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 223.343057] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready 17:50:45 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000b40)={'syz1\x00', {}, 0x48}, 0x45c) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x5, 0x0) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x40000000) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 223.359749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.368736] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.377313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.390230] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.402048] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 223.414842] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 223.430670] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.448231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 223.462731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.470288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 223.478474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.489420] input: syz1 as /devices/virtual/input/input5 [ 223.511413] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 223.518651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.526774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.542146] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 223.555429] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.573510] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 223.586395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.594324] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.609244] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.630338] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.638849] input: syz1 as /devices/virtual/input/input6 [ 223.649931] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 223.665071] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 223.683736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.690837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.700357] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 223.713198] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 17:50:45 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x204c0, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0xe9) write$binfmt_script(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="2300202e2f9835636330"], 0xa) close(r0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@empty}}, &(0x7f0000000000)=0xe8) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101104, 0x0) lseek(r2, 0x80000000, 0x2) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x12428b0, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x10000000}}], [{@euid_eq={'euid', 0x3d, r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'debug_want_extra_isize'}}, {@uid_gt={'uid>', r1}}, {@obj_role={'obj_role', 0x3d, 'debug_want_extra_isize'}}]}) [ 223.734353] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 223.755030] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 223.761662] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.767870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.784673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.791490] audit: type=1804 audit(1573753845.903:44): pid=7543 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir060094101/syzkaller.MPfYtC/6/file0" dev="sda1" ino=16519 res=1 [ 223.818708] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 223.825554] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 223.834849] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 223.842547] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.854496] EXT4-fs (sda1): Unrecognized mount option "euid=00000000000000000000" or missing value [ 223.854601] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 223.872359] BUG: unable to handle kernel paging request at ffffed1018000000 [ 223.872531] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 223.879507] PGD 21fff0067 P4D 21fff0067 PUD 12fff9067 PMD 0 [ 223.891466] Oops: 0000 [#1] PREEMPT SMP KASAN [ 223.892792] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.895967] CPU: 1 PID: 7322 Comm: rs:main Q:Reg Not tainted 4.19.84 #0 [ 223.909624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.912502] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.919001] RIP: 0010:check_memory_region+0x9c/0x190 [ 223.928006] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 223.931027] Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 fb 00 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 8f 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 0a 80 [ 223.931033] RSP: 0018:ffff8880a5587688 EFLAGS: 00010283 [ 223.931043] RAX: ffffed1018000000 RBX: ffffed1019fdda30 RCX: ffffffff81e84ae5 [ 223.931050] RDX: 0000000000000001 RSI: 000000000fffffe0 RDI: ffff8880bfeed1a0 [ 223.931057] RBP: ffff8880a55876a0 R08: ffffed1019fdda30 R09: 0000000001fffff8 [ 223.931062] R10: ffffed1019fdda2f R11: ffff8880cfeed17f R12: ffffed1017fdda34 [ 223.931073] R13: 0000000000000004 R14: 0000000000000000 R15: ffff8880bfeed1a0 [ 223.939854] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.956730] FS: 00007f29d97a6700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 223.956737] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 223.956743] CR2: ffffed1018000000 CR3: 00000000a1ef2000 CR4: 00000000001406e0 [ 223.956752] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 223.956758] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 223.956763] Call Trace: [ 223.956785] memset+0x24/0x40 [ 223.956806] __ext4_expand_extra_isize+0x175/0x250 [ 223.964964] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 223.969431] ext4_mark_inode_dirty+0x6f0/0x940 [ 223.969447] ? ext4_expand_extra_isize+0x550/0x550 [ 223.979163] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 223.983982] ? __might_sleep+0x95/0x190 [ 223.983997] ? ext4_journal_check_start+0x18d/0x220 [ 223.984011] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 223.984026] ? __ext4_journal_start_sb+0x12d/0x490 [ 223.993541] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 223.998591] ext4_dirty_inode+0x8f/0xc0 [ 223.998606] ? ext4_setattr+0x24a0/0x24a0 [ 224.009140] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 224.013597] __mark_inode_dirty+0x915/0x1280 [ 224.013610] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 224.013625] __generic_write_end+0x1b9/0x240 [ 224.013639] generic_write_end+0x6c/0x90 [ 224.013655] ext4_da_write_end+0x3c5/0xa50 [ 224.020976] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 224.026813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.035994] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 224.041462] generic_perform_write+0x2ed/0x520 [ 224.041479] ? page_endio+0x780/0x780 [ 224.041498] ? current_time+0x140/0x140 [ 224.044748] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 224.047165] ? lock_acquire+0x16f/0x3f0 [ 224.047182] ? ext4_file_write_iter+0x23f/0x1060 [ 224.059195] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 224.063421] __generic_file_write_iter+0x25e/0x630 [ 224.063438] ext4_file_write_iter+0x32b/0x1060 [ 224.063456] ? mark_held_locks+0x100/0x100 [ 224.069562] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 224.075129] ? ext4_file_mmap+0x410/0x410 [ 224.075145] ? mark_held_locks+0x100/0x100 [ 224.075160] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 224.075175] ? iov_iter_init+0xc6/0x1f0 [ 224.075188] __vfs_write+0x587/0x810 [ 224.075201] ? kernel_read+0x120/0x120 [ 224.075222] ? rcu_read_lock_sched_held+0x110/0x130 [ 224.075235] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 224.075245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.075256] ? __sb_start_write+0x1a9/0x360 [ 224.075266] vfs_write+0x20c/0x560 [ 224.075279] ksys_write+0x14f/0x2d0 [ 224.075290] ? __ia32_sys_read+0xb0/0xb0 [ 224.075304] ? do_syscall_64+0x26/0x620 [ 224.075322] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.085212] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 224.089829] ? do_syscall_64+0x26/0x620 [ 224.089846] __x64_sys_write+0x73/0xb0 [ 224.096198] kobject: 'vlan0' (000000001dc009eb): kobject_add_internal: parent: 'mesh', set: '' [ 224.101426] do_syscall_64+0xfd/0x620 [ 224.101442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.101453] RIP: 0033:0x7f29db20419d [ 224.101464] Code: d1 20 00 00 75 10 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 be fa ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 07 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 224.101472] RSP: 002b:00007f29d97a5000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 224.101484] RAX: ffffffffffffffda RBX: 0000000000000177 RCX: 00007f29db20419d [ 224.101490] RDX: 0000000000000177 RSI: 0000000002269a90 RDI: 0000000000000001 [ 224.101498] RBP: 0000000002269a90 R08: 0000000002269bf7 R09: 00007f29dab80eb7 [ 224.101504] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 224.101512] R13: 00007f29d97a5480 R14: 0000000000000003 R15: 0000000002269890 [ 224.101521] Modules linked in: [ 224.101530] CR2: ffffed1018000000 [ 224.101543] ---[ end trace 38a4caa885b2a901 ]--- [ 224.101557] RIP: 0010:check_memory_region+0x9c/0x190 [ 224.101568] Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 fb 00 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 8f 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 0a 80 [ 224.101574] RSP: 0018:ffff8880a5587688 EFLAGS: 00010283 [ 224.101585] RAX: ffffed1018000000 RBX: ffffed1019fdda30 RCX: ffffffff81e84ae5 [ 224.101593] RDX: 0000000000000001 RSI: 000000000fffffe0 RDI: ffff8880bfeed1a0 [ 224.101601] RBP: ffff8880a55876a0 R08: ffffed1019fdda30 R09: 0000000001fffff8 [ 224.101608] R10: ffffed1019fdda2f R11: ffff8880cfeed17f R12: ffffed1017fdda34 [ 224.101615] R13: 0000000000000004 R14: 0000000000000000 R15: ffff8880bfeed1a0 [ 224.101626] FS: 00007f29d97a6700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 224.101634] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 224.101641] CR2: ffffed1018000000 CR3: 00000000a1ef2000 CR4: 00000000001406e0 [ 224.101650] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 224.101657] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 224.101663] Kernel panic - not syncing: Fatal exception [ 224.103121] Kernel Offset: disabled [ 224.503415] Rebooting in 86400 seconds..