[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 37.355649][ T25] audit: type=1800 audit(1571132471.098:25): pid=7119 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 37.375408][ T25] audit: type=1800 audit(1571132471.098:26): pid=7119 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 37.397376][ T25] audit: type=1800 audit(1571132471.098:27): pid=7119 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.57' (ECDSA) to the list of known hosts. 2019/10/15 09:41:22 fuzzer started 2019/10/15 09:41:23 dialing manager at 10.128.0.105:33637 2019/10/15 09:41:23 syscalls: 2523 2019/10/15 09:41:23 code coverage: enabled 2019/10/15 09:41:23 comparison tracing: enabled 2019/10/15 09:41:23 extra coverage: extra coverage is not supported by the kernel 2019/10/15 09:41:23 setuid sandbox: enabled 2019/10/15 09:41:23 namespace sandbox: enabled 2019/10/15 09:41:23 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/15 09:41:23 fault injection: enabled 2019/10/15 09:41:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/15 09:41:23 net packet injection: enabled 2019/10/15 09:41:23 net device setup: enabled 2019/10/15 09:41:23 concurrency sanitizer: enabled 09:41:26 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x2, 0xa0001) write(r2, &(0x7f00000001c0)='(', 0x20000339) symlinkat(0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, 0x0) syzkaller login: [ 52.472224][ T7293] IPVS: ftp: loaded support on port[0] = 21 09:41:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@remote}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 52.567513][ T7293] chnl_net:caif_netlink_parms(): no params data found [ 52.627836][ T7293] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.653625][ T7293] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.661657][ T7293] device bridge_slave_0 entered promiscuous mode [ 52.684720][ T7293] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.691859][ T7293] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.700143][ T7293] device bridge_slave_1 entered promiscuous mode [ 52.738617][ T7293] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.765156][ T7293] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.808121][ T7293] team0: Port device team_slave_0 added [ 52.814886][ T7293] team0: Port device team_slave_1 added [ 52.828986][ T7296] IPVS: ftp: loaded support on port[0] = 21 [ 52.866558][ T7293] device hsr_slave_0 entered promiscuous mode 09:41:26 executing program 2: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) mknod$loop(0x0, 0x0, 0x1) accept$ax25(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe94) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9, 0x0, 0xcc8a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf6700000000000036030000000000003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) [ 52.943855][ T7293] device hsr_slave_1 entered promiscuous mode [ 52.990778][ T7293] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.997992][ T7293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.005356][ T7293] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.012409][ T7293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.150959][ T7293] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.179882][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.189269][ T7298] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.209069][ T7298] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.219750][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 53.248940][ T7293] 8021q: adding VLAN 0 to HW filter on device team0 09:41:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 53.308982][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.324306][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.331458][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.341707][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.364281][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.371436][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.410672][ T7300] IPVS: ftp: loaded support on port[0] = 21 [ 53.427113][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.468079][ T7296] chnl_net:caif_netlink_parms(): no params data found [ 53.480447][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.489909][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.500383][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.509532][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.524555][ T7293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 53.575874][ T7293] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.622782][ T7296] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.643540][ T7296] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.655850][ T7296] device bridge_slave_0 entered promiscuous mode [ 53.664060][ T7296] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.671212][ T7296] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.681275][ T7296] device bridge_slave_1 entered promiscuous mode [ 53.708242][ T7304] IPVS: ftp: loaded support on port[0] = 21 09:41:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0780c37023072a556d1c958c00"/46, 0x2e}], 0x1}, 0x0) [ 53.763039][ T7296] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.825083][ T7296] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.951197][ T7296] team0: Port device team_slave_0 added [ 53.978089][ T7300] chnl_net:caif_netlink_parms(): no params data found [ 53.993944][ C1] hrtimer: interrupt took 32880 ns [ 53.994436][ T7296] team0: Port device team_slave_1 added [ 54.197241][ T7296] device hsr_slave_0 entered promiscuous mode [ 54.256261][ T7296] device hsr_slave_1 entered promiscuous mode [ 54.296087][ T7296] debugfs: Directory 'hsr0' with parent '/' already present! [ 54.329486][ T7300] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.339064][ T7300] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.355183][ T7300] device bridge_slave_0 entered promiscuous mode 09:41:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth0_to_team\x00', 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4040000000000e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x20008000000004) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000080)="580000001400add427323b470c458c5602067fffffff81004e22000000050028925aa80000000000000080000efffeffe809000000fff5dd0000001000020000000000000000cfb193e7ee00"/88, 0x58}], 0x1) [ 54.387251][ T7300] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.423097][ T7300] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.470058][ T7300] device bridge_slave_1 entered promiscuous mode [ 54.583059][ T7315] IPVS: ftp: loaded support on port[0] = 21 [ 54.591222][ T7300] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.635086][ T7296] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.642218][ T7296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.649554][ T7296] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.656633][ T7296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.681825][ T7304] chnl_net:caif_netlink_parms(): no params data found [ 54.699600][ T2860] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.708238][ T2860] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.758970][ T7300] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 09:41:28 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x2, 0xa0001) write(r2, &(0x7f00000001c0)='(', 0x20000339) symlinkat(0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, 0x0) [ 54.804518][ T7317] IPVS: ftp: loaded support on port[0] = 21 [ 54.822655][ T7300] team0: Port device team_slave_0 added [ 54.857478][ T7300] team0: Port device team_slave_1 added [ 54.928012][ T7304] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.938344][ T7304] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.946889][ T7304] device bridge_slave_0 entered promiscuous mode [ 54.976956][ T7296] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.988413][ T7304] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.999502][ T7304] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.007702][ T7304] device bridge_slave_1 entered promiscuous mode [ 55.076796][ T7300] device hsr_slave_0 entered promiscuous mode [ 55.115367][ T7300] device hsr_slave_1 entered promiscuous mode [ 55.163506][ T7300] debugfs: Directory 'hsr0' with parent '/' already present! [ 55.192554][ T7296] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.216906][ T7304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.231878][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.240102][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.251590][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.261200][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.273933][ T7298] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.281021][ T7298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.292829][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.301983][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.314743][ T7298] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.321821][ T7298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.332708][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.346349][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.357120][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.369281][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.398520][ T7304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.445627][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.458387][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.467361][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.480833][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.490021][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.502461][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.511953][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.526188][ T7296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.556731][ T7304] team0: Port device team_slave_0 added [ 55.592215][ T7304] team0: Port device team_slave_1 added [ 55.651102][ T7315] chnl_net:caif_netlink_parms(): no params data found [ 55.691078][ T7296] 8021q: adding VLAN 0 to HW filter on device batadv0 09:41:29 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x2, 0xa0001) write(r2, &(0x7f00000001c0)='(', 0x20000339) symlinkat(0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, 0x0) [ 55.766742][ T7304] device hsr_slave_0 entered promiscuous mode [ 55.803906][ T7304] device hsr_slave_1 entered promiscuous mode [ 55.836804][ T7304] debugfs: Directory 'hsr0' with parent '/' already present! [ 55.850880][ T7300] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.882915][ T7315] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.900249][ T7315] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.914581][ T7315] device bridge_slave_0 entered promiscuous mode [ 55.926557][ T7315] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.938555][ T7315] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.946957][ T7315] device bridge_slave_1 entered promiscuous mode [ 55.971617][ T7300] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.027364][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.043046][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.103918][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 56.112729][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.154042][ T3513] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.161197][ T3513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.184347][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 56.197655][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.237554][ T3513] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.244669][ T3513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.279317][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.321825][ T7304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.383746][ T7315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.401977][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 56.414350][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.448935][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 56.471695][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 56.493290][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 56.507927][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 56.519864][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 56.531821][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.547398][ T7317] chnl_net:caif_netlink_parms(): no params data found [ 56.581171][ T7304] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.604044][ T7315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.623877][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 09:41:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@remote}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 56.632846][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 56.665759][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 09:41:30 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x2, 0xa0001) write(r2, &(0x7f00000001c0)='(', 0x20000339) symlinkat(0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, 0x0) [ 56.689590][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.718709][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.749660][ T7300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 56.797751][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 56.811900][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.822073][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.829175][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.843179][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 56.868682][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.889457][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.896565][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.928986][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.944914][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.980004][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 56.988918][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.018455][ T7300] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 57.036615][ T7304] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 57.059982][ T7304] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 57.107103][ T7332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 57.131638][ T7332] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 57.147721][ T7332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 09:41:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@remote}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 57.171960][ T7332] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.195693][ T7332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 57.211284][ T7332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 57.221059][ T7332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 57.268894][ T7332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 57.322472][ T7315] team0: Port device team_slave_0 added [ 57.339083][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 57.362819][ T7304] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 57.401711][ T7315] team0: Port device team_slave_1 added [ 57.425516][ T7317] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.471138][ T7317] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.501889][ T7317] device bridge_slave_0 entered promiscuous mode [ 57.598572][ T7317] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.617770][ T7317] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.646756][ T7317] device bridge_slave_1 entered promiscuous mode 09:41:31 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@remote}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 57.736184][ T7315] device hsr_slave_0 entered promiscuous mode 09:41:31 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@remote}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 57.783979][ T7315] device hsr_slave_1 entered promiscuous mode [ 57.823571][ T7315] debugfs: Directory 'hsr0' with parent '/' already present! [ 57.930603][ T7317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.013749][ T7370] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 58.062173][ T7317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.087533][ T7315] 8021q: adding VLAN 0 to HW filter on device bond0 09:41:31 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@remote}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:41:31 executing program 2: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) mknod$loop(0x0, 0x0, 0x1) accept$ax25(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe94) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9, 0x0, 0xcc8a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf6700000000000036030000000000003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) [ 58.164313][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.172472][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.224968][ T7315] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.246341][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.261742][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.313046][ T2860] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.320210][ T2860] bridge0: port 1(bridge_slave_0) entered forwarding state 09:41:32 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@remote}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 58.395487][ T7317] team0: Port device team_slave_0 added [ 58.415217][ T7317] team0: Port device team_slave_1 added [ 58.465313][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.489471][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.510650][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.529309][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.536466][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.565730][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.589759][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.628603][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.652648][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.675512][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.714435][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.767842][ T7315] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 58.779053][ T7315] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 58.791297][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 58.829874][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 58.839638][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 58.853402][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 58.862274][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 58.906717][ T7317] device hsr_slave_0 entered promiscuous mode [ 58.954122][ T7317] device hsr_slave_1 entered promiscuous mode [ 59.013587][ T7317] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.022759][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 59.039387][ T7315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 59.101506][ T7317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.112665][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.120695][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.130641][ T7317] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.147805][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.157007][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.165848][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.172877][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.181203][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.190091][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.198655][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.205710][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.225795][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.234367][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.243846][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.253268][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.274969][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.284482][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.293347][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.309839][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 59.318921][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.327530][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 59.340476][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.350545][ T7317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 09:41:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0780c37023072a556d1c958c00"/46, 0x2e}], 0x1}, 0x0) [ 59.363909][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 59.390322][ T7317] 8021q: adding VLAN 0 to HW filter on device batadv0 09:41:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth0_to_team\x00', 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4040000000000e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x20008000000004) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000080)="580000001400add427323b470c458c5602067fffffff81004e22000000050028925aa80000000000000080000efffeffe809000000fff5dd0000001000020000000000000000cfb193e7ee00"/88, 0x58}], 0x1) 09:41:33 executing program 2: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) mknod$loop(0x0, 0x0, 0x1) accept$ax25(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe94) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9, 0x0, 0xcc8a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf6700000000000036030000000000003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) 09:41:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:41:33 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@remote}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:41:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0780c37023072a556d1c958c00"/46, 0x2e}], 0x1}, 0x0) 09:41:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@remote}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:41:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0780c37023072a556d1c958c00"/46, 0x2e}], 0x1}, 0x0) 09:41:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth0_to_team\x00', 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4040000000000e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x20008000000004) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000080)="580000001400add427323b470c458c5602067fffffff81004e22000000050028925aa80000000000000080000efffeffe809000000fff5dd0000001000020000000000000000cfb193e7ee00"/88, 0x58}], 0x1) 09:41:33 executing program 2: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) mknod$loop(0x0, 0x0, 0x1) accept$ax25(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe94) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9, 0x0, 0xcc8a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf6700000000000036030000000000003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) [ 59.936636][ T7422] kvm: emulating exchange as write 09:41:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth0_to_team\x00', 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4040000000000e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x20008000000004) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000080)="580000001400add427323b470c458c5602067fffffff81004e22000000050028925aa80000000000000080000efffeffe809000000fff5dd0000001000020000000000000000cfb193e7ee00"/88, 0x58}], 0x1) [ 60.500307][ T7440] ================================================================== [ 60.508459][ T7440] BUG: KCSAN: data-race in generic_permission / kernfs_refresh_inode [ 60.516518][ T7440] [ 60.518852][ T7440] write to 0xffff888121dbe920 of 2 bytes by task 7261 on cpu 0: [ 60.526484][ T7440] kernfs_refresh_inode+0x44/0x180 [ 60.531594][ T7440] kernfs_iop_permission+0x66/0xa0 [ 60.536693][ T7440] inode_permission+0x241/0x3c0 [ 60.541540][ T7440] link_path_walk.part.0+0x622/0xa90 [ 60.546818][ T7440] path_lookupat.isra.0+0x77/0x5a0 [ 60.551924][ T7440] filename_lookup+0x145/0x2d0 [ 60.556688][ T7440] user_path_at_empty+0x4c/0x70 [ 60.561540][ T7440] vfs_statx+0xd9/0x190 [ 60.565698][ T7440] __do_sys_newstat+0x51/0xb0 [ 60.570394][ T7440] __x64_sys_newstat+0x3a/0x50 [ 60.575155][ T7440] do_syscall_64+0xcf/0x2f0 [ 60.579652][ T7440] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 60.585523][ T7440] [ 60.587855][ T7440] read to 0xffff888121dbe920 of 2 bytes by task 7440 on cpu 1: [ 60.595396][ T7440] generic_permission+0x36/0x3d0 [ 60.600332][ T7440] kernfs_iop_permission+0x7d/0xa0 [ 60.605441][ T7440] inode_permission+0x241/0x3c0 [ 60.610287][ T7440] link_path_walk.part.0+0x622/0xa90 [ 60.615565][ T7440] path_openat+0x14f/0x3530 [ 60.620063][ T7440] do_filp_open+0x11e/0x1b0 [ 60.624562][ T7440] do_sys_open+0x3b3/0x4f0 [ 60.628967][ T7440] __x64_sys_open+0x55/0x70 [ 60.633463][ T7440] do_syscall_64+0xcf/0x2f0 [ 60.638087][ T7440] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 60.643968][ T7440] 09:41:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:41:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth0_to_team\x00', 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4040000000000e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x20008000000004) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000080)="580000001400add427323b470c458c5602067fffffff81004e22000000050028925aa80000000000000080000efffeffe809000000fff5dd0000001000020000000000000000cfb193e7ee00"/88, 0x58}], 0x1) 09:41:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth0_to_team\x00', 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4040000000000e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x20008000000004) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000080)="580000001400add427323b470c458c5602067fffffff81004e22000000050028925aa80000000000000080000efffeffe809000000fff5dd0000001000020000000000000000cfb193e7ee00"/88, 0x58}], 0x1) 09:41:34 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@remote}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 60.646287][ T7440] Reported by Kernel Concurrency Sanitizer on: [ 60.652566][ T7440] CPU: 1 PID: 7440 Comm: blkid Not tainted 5.3.0+ #0 [ 60.659229][ T7440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.669279][ T7440] ================================================================== [ 60.677336][ T7440] Kernel panic - not syncing: panic_on_warn set ... [ 60.683943][ T7440] CPU: 1 PID: 7440 Comm: blkid Not tainted 5.3.0+ #0 [ 60.690608][ T7440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.700661][ T7440] Call Trace: [ 60.703985][ T7440] dump_stack+0xf5/0x159 [ 60.708242][ T7440] panic+0x209/0x639 [ 60.712177][ T7440] ? do_syscall_64+0xcf/0x2f0 [ 60.716857][ T7440] ? vprintk_func+0x8d/0x140 [ 60.721456][ T7440] kcsan_report.cold+0xc/0x1b [ 60.726139][ T7440] __kcsan_setup_watchpoint+0x3ee/0x510 [ 60.731689][ T7440] __tsan_read2+0x2c/0x30 [ 60.736018][ T7440] generic_permission+0x36/0x3d0 [ 60.740956][ T7440] ? kernfs_refresh_inode+0x14e/0x180 [ 60.746328][ T7440] kernfs_iop_permission+0x7d/0xa0 09:41:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth0_to_team\x00', 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4040000000000e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x20008000000004) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000080)="580000001400add427323b470c458c5602067fffffff81004e22000000050028925aa80000000000000080000efffeffe809000000fff5dd0000001000020000000000000000cfb193e7ee00"/88, 0x58}], 0x1) [ 60.751443][ T7440] ? kernfs_iop_getattr+0x90/0x90 [ 60.756464][ T7440] inode_permission+0x241/0x3c0 [ 60.761320][ T7440] link_path_walk.part.0+0x622/0xa90 [ 60.766608][ T7440] ? kernfs_notify.cold+0x27/0x27 [ 60.771633][ T7440] path_openat+0x14f/0x3530 [ 60.776242][ T7440] ? __rcu_read_unlock+0x62/0xe0 [ 60.781192][ T7440] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 60.787088][ T7440] do_filp_open+0x11e/0x1b0 [ 60.791599][ T7440] ? simple_attr_release+0x40/0x40 [ 60.796721][ T7440] do_sys_open+0x3b3/0x4f0 [ 60.801151][ T7440] __x64_sys_open+0x55/0x70 [ 60.805652][ T7440] do_syscall_64+0xcf/0x2f0 [ 60.810151][ T7440] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 60.816029][ T7440] RIP: 0033:0x7feb392b7120 [ 60.820435][ T7440] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 60.840024][ T7440] RSP: 002b:00007ffc38e240a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 60.848439][ T7440] RAX: ffffffffffffffda RBX: 00007ffc38e250f0 RCX: 00007feb392b7120 [ 60.856396][ T7440] RDX: 00007ffc38e240c2 RSI: 0000000000000000 RDI: 00007ffc38e240b0 [ 60.864369][ T7440] RBP: 0000000000000702 R08: 0000000000000000 R09: 0000000000000001 [ 60.872329][ T7440] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc38e26168 [ 60.880300][ T7440] R13: 0000000000000000 R14: 00007feb39798820 R15: 00007feb3958e2a2 [ 60.889636][ T7440] Kernel Offset: disabled [ 60.893957][ T7440] Rebooting in 86400 seconds..