[ 61.401484][ T26] audit: type=1800 audit(1572879770.127:25): pid=7786 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 61.445896][ T26] audit: type=1800 audit(1572879770.127:26): pid=7786 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 61.492103][ T26] audit: type=1800 audit(1572879770.137:27): pid=7786 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 61.517711][ T26] audit: type=1800 audit(1572879770.137:28): pid=7786 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.46' (ECDSA) to the list of known hosts. 2019/11/04 15:02:59 fuzzer started 2019/11/04 15:03:01 dialing manager at 10.128.0.105:42499 2019/11/04 15:03:02 syscalls: 2553 2019/11/04 15:03:02 code coverage: enabled 2019/11/04 15:03:02 comparison tracing: enabled 2019/11/04 15:03:02 extra coverage: extra coverage is not supported by the kernel 2019/11/04 15:03:02 setuid sandbox: enabled 2019/11/04 15:03:02 namespace sandbox: enabled 2019/11/04 15:03:02 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/04 15:03:02 fault injection: enabled 2019/11/04 15:03:02 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/04 15:03:02 net packet injection: enabled 2019/11/04 15:03:02 net device setup: enabled 2019/11/04 15:03:02 concurrency sanitizer: enabled 2019/11/04 15:03:02 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 74.431388][ T7952] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/04 15:03:04 adding functions to KCSAN blacklist: 'tcp_add_backlog' 'poll_schedule_timeout' 'ext4_has_free_clusters' 'generic_permission' '__hrtimer_run_queues' 'ktime_get_real_seconds' 'add_timer' 'tomoyo_supervisor' 'tick_sched_do_timer' 'run_timer_softirq' 'rcu_gp_fqs_check_wake' 'find_next_bit' 'tick_do_update_jiffies64' 'blk_mq_sched_dispatch_requests' 'ep_poll' 'wbt_issue' 15:03:10 executing program 0: syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x77ff, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x33bfb45e) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000, 0x50) r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0xbfdf66640e4ace83) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5a9, 0xfffffffffffffbff}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r2 = socket(0x1000000000021, 0x3, 0x7) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000380)={{0x9, 0x7, 0x3, 0x0, 'syz0\x00', 0x8}, 0x5, 0x200, 0x9, 0x0, 0x2, 0xbe, 'syz1\x00', &(0x7f0000000340)=['vmnet1vboxnet1system\x00', '.%\x00'], 0x18, [], [0x40]}) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r3, &(0x7f00000009c0)="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", 0x39b, 0xc001, 0x0, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 15:03:10 executing program 1: r0 = memfd_create(0x0, 0x0) r1 = dup(r0) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000b80)={{0x0, @addr=0x1}, 0x8}) mkdirat(0xffffffffffffff9c, 0x0, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$apparmor_current(r2, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, @perf_config_ext, 0x6218}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f00000003c0)='nfs4\x00', 0x0, 0x5db0, 0x6, &(0x7f0000000a80)=[{0x0, 0x0, 0x8}, {&(0x7f0000000500)="2399d073b444bc", 0x7, 0xb9b}, {&(0x7f0000000700)="cc396741a78a870d5741da4ac4a270e6ac0574d1390196d7226464f08f71e10e677668bf511c1f7491ece70d22b1b9494bbc24b7ceafd5d7362abe915aa897270cd4b61c015f424a353be619a8fda0d91412f7bd3074abee42415e9a871d763e95c059b8d672f19e51b4223dd6b4c9d58552b2b5076cb3869d36d8166f52b9d13504d52cc8af5dcccd1d0146a52f7b201decf17dcf33eea3839e560656898f386760ad03d026c5776d46a1383b2019a7c689ea7e1a0c9b8c802e", 0xba, 0x8e}, {&(0x7f0000000800)="ce93cd43b0d192e958f81a4a03b6be747f26989989b6dcb60d0949fa56299a226d24c73869f2555c5aa9e323eeff9087875bed3887aea5eb411c829f660b485c2c32c0faf384fbd815e1da42145014432bf9cdcaec372f5bc3f9868175271554bf0a89c231244b6ffdf207cc069007f72135d80f3e3d010d20f70a2fa60321510938a64241fd10b5145bb475c6a898d8fbea9596a4991b42f7b54e329a0a387e68f1f16e508719664f1b74e2f2b1fe5ca017650b3c8eed2b60246c47a70c9343aa2de63515c4b96f1a78a4b1ef6261bf7c14982e25745ad95a6ca87da937e4c931439f6a494ffb7956ac", 0xea}, {0x0}, {0x0, 0x0, 0x2}], 0x40, &(0x7f0000000b40)='system_u:object_r:inetd_var_run_t:s0\x00') ioprio_set$uid(0x3, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000280)) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) setsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f0000000bc0), 0x4) creat(&(0x7f0000000140)='./bus\x00', 0x100000010) [ 81.723544][ T7955] IPVS: ftp: loaded support on port[0] = 21 [ 81.813014][ T7955] chnl_net:caif_netlink_parms(): no params data found [ 81.889569][ T7955] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.896769][ T7955] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.918002][ T7955] device bridge_slave_0 entered promiscuous mode [ 81.925462][ T7955] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.947617][ T7955] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.955392][ T7955] device bridge_slave_1 entered promiscuous mode [ 81.975263][ T7955] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.985853][ T7955] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:03:10 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1ac) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)) [ 81.989073][ T7958] IPVS: ftp: loaded support on port[0] = 21 [ 82.006915][ T7955] team0: Port device team_slave_0 added [ 82.013917][ T7955] team0: Port device team_slave_1 added [ 82.080489][ T7955] device hsr_slave_0 entered promiscuous mode [ 82.147501][ T7955] device hsr_slave_1 entered promiscuous mode [ 82.235353][ T7960] IPVS: ftp: loaded support on port[0] = 21 15:03:11 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x2, 0x43a5c0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x100000000011, 0x2, 0x0) bind(r5, &(0x7f0000000140)=@llc={0x1a, 0x301, 0x0, 0x17, 0x1, 0x81}, 0xfffffffffffffdf2) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) [ 82.352669][ T7955] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.359897][ T7955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.367387][ T7955] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.374446][ T7955] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.729995][ T7955] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.768123][ T7958] chnl_net:caif_netlink_parms(): no params data found [ 82.889013][ T3506] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.917478][ T3506] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.929759][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 83.008863][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 83.027818][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.062954][ T7955] 8021q: adding VLAN 0 to HW filter on device team0 [ 83.070351][ T7958] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.087228][ T7958] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.095068][ T7958] device bridge_slave_0 entered promiscuous mode [ 83.128243][ T7958] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.133088][ T7987] IPVS: ftp: loaded support on port[0] = 21 [ 83.135461][ T7958] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.147235][ T7958] device bridge_slave_1 entered promiscuous mode 15:03:11 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dRA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x88\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G\x8d;\xfa+\xa2%(}`\xc5L\xbb\xeb~}%\xddr\xbb\xe7\xf4|\xa7b\xeb\xd3\nW\x16\x10:\x0e%\x83\x01KfPXIu\xe5\x7f\x88q%\xaeLcx\x9b\xbc~,\xd1\x94g\xe3\xd8\xfefh\x82\xa0\xe5@', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x9, 0xc, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@map_val={0x18, 0x0, 0x2, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}, @call, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @generic={0x2, 0x6, 0x0, 0x7, 0x7ff}, @generic={0x0, 0x0, 0x6, 0x2}]}, &(0x7f0000000380)='GPL\x00', 0xff, 0x8a, &(0x7f00000003c0)=""/138, 0x60880, 0x0, [], 0x0, 0x6, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0xc52, 0x0}, 0x20) close(r3) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r3) [ 83.238423][ T7958] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.265312][ T7960] chnl_net:caif_netlink_parms(): no params data found [ 83.309976][ T2622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 83.337903][ T2622] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.346666][ T2622] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.353830][ T2622] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.424061][ T2622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 83.468206][ T2622] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.476846][ T2622] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.483930][ T2622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.558769][ T7958] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.637198][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 83.646635][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 83.678070][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 83.686675][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 83.757504][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 83.773483][ T7958] team0: Port device team_slave_0 added [ 83.808178][ T7958] team0: Port device team_slave_1 added [ 83.857939][ T7992] IPVS: ftp: loaded support on port[0] = 21 [ 83.897710][ T2622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 83.930360][ T2622] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.958413][ T2622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 15:03:12 executing program 5: r0 = semget$private(0x0, 0x2000000010a, 0x0) semop(r0, &(0x7f0000000080)=[{0x4, 0x6}, {0x4}], 0x2) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000280)=""/215) [ 83.992176][ T2622] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 84.017733][ T7960] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.024968][ T7960] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.069315][ T7960] device bridge_slave_0 entered promiscuous mode [ 84.094956][ T7955] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 84.115826][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 84.140753][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 84.157861][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 84.182187][ T7960] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.189356][ T7960] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.197038][ T7960] device bridge_slave_1 entered promiscuous mode [ 84.279125][ T7958] device hsr_slave_0 entered promiscuous mode [ 84.337707][ T7958] device hsr_slave_1 entered promiscuous mode [ 84.387297][ T7958] debugfs: Directory 'hsr0' with parent '/' already present! [ 84.396363][ T7960] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.406986][ T7960] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.428510][ T8003] IPVS: ftp: loaded support on port[0] = 21 [ 84.450546][ T7979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 84.459313][ T7979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 84.470373][ T7955] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 84.515237][ T7960] team0: Port device team_slave_0 added [ 84.523561][ T7960] team0: Port device team_slave_1 added [ 84.547022][ T7987] chnl_net:caif_netlink_parms(): no params data found [ 84.680966][ T7960] device hsr_slave_0 entered promiscuous mode [ 84.767514][ T7960] device hsr_slave_1 entered promiscuous mode [ 84.817245][ T7960] debugfs: Directory 'hsr0' with parent '/' already present! [ 84.982445][ T7987] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.015427][ T7987] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.039348][ T7987] device bridge_slave_0 entered promiscuous mode [ 85.121224][ T7987] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.147300][ T7987] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.155152][ T7987] device bridge_slave_1 entered promiscuous mode [ 85.356544][ T7992] chnl_net:caif_netlink_parms(): no params data found [ 85.384090][ T8053] Invalid option length (2361) for dns_resolver key [ 85.419788][ T7987] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 15:03:14 executing program 0: syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x77ff, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x33bfb45e) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000, 0x50) r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0xbfdf66640e4ace83) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5a9, 0xfffffffffffffbff}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r2 = socket(0x1000000000021, 0x3, 0x7) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000380)={{0x9, 0x7, 0x3, 0x0, 'syz0\x00', 0x8}, 0x5, 0x200, 0x9, 0x0, 0x2, 0xbe, 'syz1\x00', &(0x7f0000000340)=['vmnet1vboxnet1system\x00', '.%\x00'], 0x18, [], [0x40]}) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r3, &(0x7f00000009c0)="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", 0x39b, 0xc001, 0x0, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) [ 85.465244][ T7958] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.568633][ T7987] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.641717][ T8003] chnl_net:caif_netlink_parms(): no params data found [ 85.679324][ T7960] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.705273][ T7958] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.769938][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 85.778494][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 85.833469][ T7987] team0: Port device team_slave_0 added [ 85.862553][ C0] hrtimer: interrupt took 29882 ns [ 85.877566][ T7992] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.884628][ T7992] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.900147][ T8060] Invalid option length (2361) for dns_resolver key 15:03:14 executing program 0: syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x77ff, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x33bfb45e) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000, 0x50) r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0xbfdf66640e4ace83) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5a9, 0xfffffffffffffbff}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r2 = socket(0x1000000000021, 0x3, 0x7) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000380)={{0x9, 0x7, 0x3, 0x0, 'syz0\x00', 0x8}, 0x5, 0x200, 0x9, 0x0, 0x2, 0xbe, 'syz1\x00', &(0x7f0000000340)=['vmnet1vboxnet1system\x00', '.%\x00'], 0x18, [], [0x40]}) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r3, &(0x7f00000009c0)="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", 0x39b, 0xc001, 0x0, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) [ 85.946323][ T7992] device bridge_slave_0 entered promiscuous mode [ 86.001434][ T7958] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 86.097232][ T7958] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 86.159183][ T7960] 8021q: adding VLAN 0 to HW filter on device team0 [ 86.167376][ T7987] team0: Port device team_slave_1 added [ 86.188316][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 86.197145][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 86.268003][ T8042] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.275485][ T8042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.279077][ T8064] Invalid option length (2361) for dns_resolver key 15:03:15 executing program 0: syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x77ff, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x33bfb45e) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000, 0x50) r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0xbfdf66640e4ace83) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5a9, 0xfffffffffffffbff}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r2 = socket(0x1000000000021, 0x3, 0x7) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000380)={{0x9, 0x7, 0x3, 0x0, 'syz0\x00', 0x8}, 0x5, 0x200, 0x9, 0x0, 0x2, 0xbe, 'syz1\x00', &(0x7f0000000340)=['vmnet1vboxnet1system\x00', '.%\x00'], 0x18, [], [0x40]}) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r3, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e5d37149eb0f4a333726cf6d5b7647306559155f1c69d6bfd145b83576f2df4d85f271fd4119db923e2412c66dd954eb59dddc7e1fd286a83971b2ba1c63b4f99702cf91f3d1ecffb8ae189c79b403805e83650c251a564942896f205640c23b0cf51fe9bd931f54a343794710a9cd53cef20938edddb2bfa3c1f72f8e79e41e30fb8f9d314abd999ba396521b6c10bec7bc9d0745a80299342f5cf89eb9d94044258fbb18cec1cdbbc016a773d3ae41e3e30248e716fd0873d31454902cbe7dcf7d644dfadc255d99652b5ed5a5b1a75e3ad49cf80178678402e9d3a755d009889b2e6138f81dc02eedcc353aceb2f7781aea08aa91be7e1e2416ba3d555b1f2237f68c5d7dcfcb1b917c292a35d6d7e7cf2cb1dd6dba5a50ce55c4638d7d38cb7afd8da02f281ab69392bc6531eb03eb97c1d075e3342c244861d04bcad8991b8f588e48ad7fe218d2f5e604bb31c59241245b485210fe418af3d6377b59d5ab128497efeced38cc5036b1f34cb89674b5179219f34b9e8e1849695d7c23cce77eb8f038ef9f2cd69d1c9e2d6b46610adbadbdad857a77f59d38cb5120709716b87c52a48de249b231d7e39985b8b58094c0d7b4c6d1671a8ff9d2daaca94df2adcff6420077df0ddbc66d00b141ffc6e28bed09a19056e52a905a72c99a04af56b22da83135808ba2bfe87a39753447e78500d16bdad52d97df73d4852a79e7ec6910701b712cfd58c62b3ade86cf6ff0cd78719fa1ae81640381cb33f4f6b03c913e820cf9eb9b5cf7df9c878596c9ac9444cad118673fe339b4b7287b310ecff4742bfea2612d79d418293f0dfe14bc819c466473438ad71ea3b1386d17a9038b1f5a9285481500f84f4c7eabbf2eb071a101c69cce8e7495bda4c28a4e88f6a258abf58579c290eeb742b2678daab3ecc8c2bf97d89e89472901e254dd63ca7d918f8a7523161e29b28f64b285da7bb4a17d0ad734c321623e246bb0b5aaa08e8e7ac42b74ba83c", 0x39b, 0xc001, 0x0, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) [ 86.367797][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 86.376427][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 86.471145][ T8042] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.478300][ T8042] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.567890][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 86.605467][ T8069] Invalid option length (2361) for dns_resolver key [ 86.628228][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 15:03:15 executing program 0: syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x77ff, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x33bfb45e) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000, 0x50) r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0xbfdf66640e4ace83) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5a9, 0xfffffffffffffbff}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r2 = socket(0x1000000000021, 0x3, 0x7) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000380)={{0x9, 0x7, 0x3, 0x0, 'syz0\x00', 0x8}, 0x5, 0x200, 0x9, 0x0, 0x2, 0xbe, 'syz1\x00', &(0x7f0000000340)=['vmnet1vboxnet1system\x00', '.%\x00'], 0x18, [], [0x40]}) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r3, &(0x7f00000009c0)="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", 0x39b, 0xc001, 0x0, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) [ 86.678167][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.738034][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 86.746669][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 86.858015][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 86.918059][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 86.967660][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 15:03:15 executing program 0: syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x77ff, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x33bfb45e) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000, 0x50) r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0xbfdf66640e4ace83) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5a9, 0xfffffffffffffbff}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r2 = socket(0x1000000000021, 0x3, 0x7) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000380)={{0x9, 0x7, 0x3, 0x0, 'syz0\x00', 0x8}, 0x5, 0x200, 0x9, 0x0, 0x2, 0xbe, 'syz1\x00', &(0x7f0000000340)=['vmnet1vboxnet1system\x00', '.%\x00'], 0x18, [], [0x40]}) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r3, &(0x7f00000009c0)="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", 0x39b, 0xc001, 0x0, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) [ 87.020164][ T8073] Invalid option length (2361) for dns_resolver key [ 87.031799][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.057720][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.117643][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 87.187575][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 87.237877][ T8003] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.245023][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.296633][ T8079] Invalid option length (2361) for dns_resolver key [ 87.317932][ T8003] device bridge_slave_0 entered promiscuous mode 15:03:16 executing program 0: syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x77ff, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x33bfb45e) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000, 0x50) r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0xbfdf66640e4ace83) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5a9, 0xfffffffffffffbff}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r2 = socket(0x1000000000021, 0x3, 0x7) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000380)={{0x9, 0x7, 0x3, 0x0, 'syz0\x00', 0x8}, 0x5, 0x200, 0x9, 0x0, 0x2, 0xbe, 'syz1\x00', &(0x7f0000000340)=['vmnet1vboxnet1system\x00', '.%\x00'], 0x18, [], [0x40]}) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r3, &(0x7f00000009c0)="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", 0x39b, 0xc001, 0x0, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) [ 87.361864][ T7992] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.369368][ T7992] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.437865][ T7992] device bridge_slave_1 entered promiscuous mode [ 87.563539][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 87.572896][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 87.581372][ T8087] Invalid option length (2361) for dns_resolver key 15:03:16 executing program 0: syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x77ff, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x33bfb45e) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000, 0x50) r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0xbfdf66640e4ace83) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5a9, 0xfffffffffffffbff}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r2 = socket(0x1000000000021, 0x3, 0x7) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000380)={{0x9, 0x7, 0x3, 0x0, 'syz0\x00', 0x8}, 0x5, 0x200, 0x9, 0x0, 0x2, 0xbe, 'syz1\x00', &(0x7f0000000340)=['vmnet1vboxnet1system\x00', '.%\x00'], 0x18, [], [0x40]}) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r3, &(0x7f00000009c0)="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", 0x39b, 0xc001, 0x0, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) [ 87.626729][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 87.702172][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 87.742001][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 87.760512][ T8042] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.767750][ T8042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 87.813972][ T8091] Invalid option length (2361) for dns_resolver key [ 87.842761][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.861880][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.887002][ T8003] device bridge_slave_1 entered promiscuous mode [ 87.969153][ T7992] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.046691][ T7987] device hsr_slave_0 entered promiscuous mode [ 88.087598][ T7987] device hsr_slave_1 entered promiscuous mode [ 88.117762][ T7987] debugfs: Directory 'hsr0' with parent '/' already present! [ 88.125276][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 88.133395][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.142337][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.150836][ T8042] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.157915][ T8042] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.165811][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 88.188947][ T7992] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.206824][ T7958] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 88.219439][ T8003] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.230123][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 88.241715][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 88.268012][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 88.277047][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 88.290226][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 88.301382][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 88.311964][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 88.323419][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 88.333654][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 88.346333][ T7960] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 88.361439][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 88.380327][ T8003] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.402915][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 88.427510][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 88.435885][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 88.472136][ T8003] team0: Port device team_slave_0 added [ 88.488948][ T7992] team0: Port device team_slave_0 added [ 88.534438][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 88.557414][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 88.565970][ T8003] team0: Port device team_slave_1 added [ 88.581553][ T7992] team0: Port device team_slave_1 added [ 88.602793][ T7960] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 88.690826][ T8003] device hsr_slave_0 entered promiscuous mode [ 88.789002][ T8003] device hsr_slave_1 entered promiscuous mode [ 88.832551][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 88.832571][ T26] audit: type=1804 audit(1572879797.557:31): pid=8131 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir129701881/syzkaller.hNtvlb/0/bus" dev="sda1" ino=16530 res=1 [ 88.907197][ T8003] debugfs: Directory 'hsr0' with parent '/' already present! [ 89.054350][ T26] audit: type=1804 audit(1572879797.607:32): pid=8135 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir129701881/syzkaller.hNtvlb/0/bus" dev="sda1" ino=16530 res=1 [ 89.081957][ T7992] device hsr_slave_0 entered promiscuous mode 15:03:17 executing program 1: r0 = memfd_create(0x0, 0x0) r1 = dup(r0) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000b80)={{0x0, @addr=0x1}, 0x8}) mkdirat(0xffffffffffffff9c, 0x0, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$apparmor_current(r2, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, @perf_config_ext, 0x6218}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f00000003c0)='nfs4\x00', 0x0, 0x5db0, 0x6, &(0x7f0000000a80)=[{0x0, 0x0, 0x8}, {&(0x7f0000000500)="2399d073b444bc", 0x7, 0xb9b}, {&(0x7f0000000700)="cc396741a78a870d5741da4ac4a270e6ac0574d1390196d7226464f08f71e10e677668bf511c1f7491ece70d22b1b9494bbc24b7ceafd5d7362abe915aa897270cd4b61c015f424a353be619a8fda0d91412f7bd3074abee42415e9a871d763e95c059b8d672f19e51b4223dd6b4c9d58552b2b5076cb3869d36d8166f52b9d13504d52cc8af5dcccd1d0146a52f7b201decf17dcf33eea3839e560656898f386760ad03d026c5776d46a1383b2019a7c689ea7e1a0c9b8c802e", 0xba, 0x8e}, {&(0x7f0000000800)="ce93cd43b0d192e958f81a4a03b6be747f26989989b6dcb60d0949fa56299a226d24c73869f2555c5aa9e323eeff9087875bed3887aea5eb411c829f660b485c2c32c0faf384fbd815e1da42145014432bf9cdcaec372f5bc3f9868175271554bf0a89c231244b6ffdf207cc069007f72135d80f3e3d010d20f70a2fa60321510938a64241fd10b5145bb475c6a898d8fbea9596a4991b42f7b54e329a0a387e68f1f16e508719664f1b74e2f2b1fe5ca017650b3c8eed2b60246c47a70c9343aa2de63515c4b96f1a78a4b1ef6261bf7c14982e25745ad95a6ca87da937e4c931439f6a494ffb7956ac", 0xea}, {0x0}, {0x0, 0x0, 0x2}], 0x40, &(0x7f0000000b40)='system_u:object_r:inetd_var_run_t:s0\x00') ioprio_set$uid(0x3, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000280)) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) setsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f0000000bc0), 0x4) creat(&(0x7f0000000140)='./bus\x00', 0x100000010) [ 89.167560][ T7992] device hsr_slave_1 entered promiscuous mode [ 89.187629][ T26] audit: type=1804 audit(1572879797.617:33): pid=8131 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir129701881/syzkaller.hNtvlb/0/bus" dev="sda1" ino=16530 res=1 [ 89.247183][ T7992] debugfs: Directory 'hsr0' with parent '/' already present! [ 89.274677][ T7987] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.462946][ T26] audit: type=1804 audit(1572879798.187:34): pid=8167 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir129701881/syzkaller.hNtvlb/1/bus" dev="sda1" ino=16534 res=1 [ 89.499036][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.506936][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.619077][ T7987] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.677359][ T26] audit: type=1804 audit(1572879798.297:35): pid=8168 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir129701881/syzkaller.hNtvlb/1/bus" dev="sda1" ino=16534 res=1 [ 89.910959][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.961116][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.014375][ T8000] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.021540][ T8000] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.159917][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.225990][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 15:03:19 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="06", 0x1ac) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)) [ 90.301981][ T8000] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.309176][ T8000] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.407777][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 90.416773][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 90.572164][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 90.652175][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 90.708488][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 90.791280][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 90.882703][ T7987] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 90.967224][ T7987] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 91.098010][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.105949][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.177973][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.186416][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.308189][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.316551][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.444307][ T8003] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.484830][ T7992] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.531401][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.548027][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 91.555581][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 91.662052][ T7992] 8021q: adding VLAN 0 to HW filter on device team0 [ 91.719485][ T7987] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 91.728271][ T8003] 8021q: adding VLAN 0 to HW filter on device team0 [ 91.737874][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 91.745708][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 91.827669][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 91.835381][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.017588][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.065483][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.137519][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.144768][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.247858][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.307728][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.316039][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.323111][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.437852][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 92.498403][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 92.568231][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 92.622910][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 92.672556][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 92.748416][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 92.811341][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.851374][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.892293][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.899384][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.971840][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 93.008035][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 93.067403][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.074552][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.151539][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 93.173182][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 93.208327][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 93.252195][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 93.293248][ T8003] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 93.357144][ T8003] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 93.417369][ T7992] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 93.437744][ T7992] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 93.512162][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 93.523359][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 93.591810][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 93.646397][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 93.660667][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.671282][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.682710][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.691325][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.699910][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 93.708657][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 93.717386][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.726003][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.735006][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.743479][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.765385][ T7992] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 93.782008][ T8003] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 93.801755][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 93.812699][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 93.827576][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 93.835048][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 93.875353][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 93.883573][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 15:03:23 executing program 0: syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x77ff, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x33bfb45e) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000, 0x50) r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0xbfdf66640e4ace83) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5a9, 0xfffffffffffffbff}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r2 = socket(0x1000000000021, 0x3, 0x7) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000380)={{0x9, 0x7, 0x3, 0x0, 'syz0\x00', 0x8}, 0x5, 0x200, 0x9, 0x0, 0x2, 0xbe, 'syz1\x00', &(0x7f0000000340)=['vmnet1vboxnet1system\x00', '.%\x00'], 0x18, [], [0x40]}) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r3, &(0x7f00000009c0)="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", 0x39b, 0xc001, 0x0, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) [ 94.288084][ T7951] ================================================================== [ 94.296256][ T7951] BUG: KCSAN: data-race in pipe_poll / pipe_read [ 94.302576][ T7951] [ 94.304911][ T7951] write to 0xffff888125f90f38 of 4 bytes by task 7955 on cpu 0: [ 94.312541][ T7951] pipe_read+0x2a5/0x5e0 [ 94.316780][ T7951] new_sync_read+0x389/0x4f0 [ 94.321379][ T7951] __vfs_read+0xb1/0xc0 [ 94.325528][ T7951] vfs_read+0x143/0x2c0 [ 94.329692][ T7951] ksys_read+0xd5/0x1b0 [ 94.333844][ T7951] __x64_sys_read+0x4c/0x60 [ 94.338346][ T7951] do_syscall_64+0xcc/0x370 [ 94.342849][ T7951] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 94.348737][ T7951] [ 94.351066][ T7951] read to 0xffff888125f90f38 of 4 bytes by task 7951 on cpu 1: [ 94.358601][ T7951] pipe_poll+0x84/0x1d0 [ 94.362756][ T7951] ep_item_poll.isra.0+0x90/0x190 [ 94.367777][ T7951] ep_send_events_proc+0x113/0x590 [ 94.374447][ T7951] ep_scan_ready_list.constprop.0+0x189/0x500 [ 94.380507][ T7951] ep_poll+0xe3/0x900 [ 94.384487][ T7951] do_epoll_wait+0x162/0x180 [ 94.389073][ T7951] __x64_sys_epoll_pwait+0xcd/0x180 [ 94.394273][ T7951] do_syscall_64+0xcc/0x370 [ 94.398771][ T7951] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 94.405178][ T7951] [ 94.407496][ T7951] Reported by Kernel Concurrency Sanitizer on: [ 94.413647][ T7951] CPU: 1 PID: 7951 Comm: syz-fuzzer Not tainted 5.4.0-rc6+ #0 [ 94.421093][ T7951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.431140][ T7951] ================================================================== [ 94.439191][ T7951] Kernel panic - not syncing: panic_on_warn set ... [ 94.445778][ T7951] CPU: 1 PID: 7951 Comm: syz-fuzzer Not tainted 5.4.0-rc6+ #0 [ 94.453240][ T7951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.463292][ T7951] Call Trace: [ 94.466619][ T7951] dump_stack+0xf5/0x159 [ 94.470879][ T7951] panic+0x210/0x640 [ 94.474875][ T7951] ? vprintk_func+0x8d/0x140 [ 94.479468][ T7951] kcsan_report.cold+0xc/0xe [ 94.484062][ T7951] kcsan_setup_watchpoint+0x3fe/0x410 [ 94.489445][ T7951] __tsan_read4+0x145/0x1f0 [ 94.494997][ T7951] pipe_poll+0x84/0x1d0 [ 94.499238][ T7951] ? generic_pipe_buf_confirm+0x20/0x20 [ 94.504785][ T7951] ep_item_poll.isra.0+0x90/0x190 [ 94.509822][ T7951] ep_send_events_proc+0x113/0x590 [ 94.514938][ T7951] ? aa_file_perm+0x1f1/0x8a0 [ 94.519623][ T7951] ep_scan_ready_list.constprop.0+0x189/0x500 [ 94.525779][ T7951] ? ep_loop_check_proc+0x2f0/0x2f0 [ 94.530982][ T7951] ep_poll+0xe3/0x900 [ 94.534960][ T7951] ? __fget+0xb8/0x1d0 [ 94.539041][ T7951] ? __fget_light+0xaf/0x190 [ 94.543642][ T7951] do_epoll_wait+0x162/0x180 [ 94.548243][ T7951] __x64_sys_epoll_pwait+0xcd/0x180 [ 94.553452][ T7951] do_syscall_64+0xcc/0x370 [ 94.557978][ T7951] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 94.563863][ T7951] RIP: 0033:0x45b300 [ 94.567763][ T7951] Code: 0f 05 89 44 24 20 c3 cc cc cc 8b 7c 24 08 48 8b 74 24 10 8b 54 24 18 44 8b 54 24 1c 49 c7 c0 00 00 00 00 b8 19 01 00 00 0f 05 <89> 44 24 20 c3 cc cc cc cc cc cc cc cc cc cc cc 8b 7c 24 08 48 c7 [ 94.587891][ T7951] RSP: 002b:000000c4203cf860 EFLAGS: 00000246 ORIG_RAX: 0000000000000119 [ 94.596301][ T7951] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045b300 [ 94.604269][ T7951] RDX: 0000000000000080 RSI: 000000c4203cf8a0 RDI: 0000000000000004 [ 94.613025][ T7951] RBP: 000000c4203cfea0 R08: 0000000000000000 R09: 000000c4202bafb0 [ 94.621014][ T7951] R10: 0000000000000000 R11: 0000000000000246 R12: 000000c4202baf50 [ 94.629004][ T7951] R13: 00000000000000ff R14: 00000000000000ff R15: 000000000000000f [ 94.638459][ T7951] Kernel Offset: disabled [ 94.642805][ T7951] Rebooting in 86400 seconds..