[ 51.859974][ T26] audit: type=1800 audit(1572965901.829:27): pid=7857 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 51.885422][ T26] audit: type=1800 audit(1572965901.829:28): pid=7857 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.926776][ T26] audit: type=1800 audit(1572965902.969:29): pid=7857 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 52.946910][ T26] audit: type=1800 audit(1572965902.969:30): pid=7857 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.197' (ECDSA) to the list of known hosts. 2019/11/05 14:58:30 fuzzer started 2019/11/05 14:58:31 dialing manager at 10.128.0.105:43787 2019/11/05 14:58:31 syscalls: 2553 2019/11/05 14:58:31 code coverage: enabled 2019/11/05 14:58:31 comparison tracing: enabled 2019/11/05 14:58:31 extra coverage: extra coverage is not supported by the kernel 2019/11/05 14:58:31 setuid sandbox: enabled 2019/11/05 14:58:31 namespace sandbox: enabled 2019/11/05 14:58:31 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/05 14:58:31 fault injection: enabled 2019/11/05 14:58:31 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/05 14:58:31 net packet injection: enabled 2019/11/05 14:58:31 net device setup: enabled 2019/11/05 14:58:31 concurrency sanitizer: enabled 2019/11/05 14:58:31 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/05 14:58:35 adding functions to KCSAN blacklist: 'pid_update_inode' 'tcp_add_backlog' 'find_next_bit' 'generic_write_end' 'task_dump_owner' 'exit_signals' 'generic_fillattr' 'do_nanosleep' 'blk_mq_dispatch_rq_list' 'tick_nohz_idle_stop_tick' '__hrtimer_run_queues' 'osq_lock' 'pipe_poll' 'ep_poll' 'rcu_gp_fqs_check_wake' 'echo_char' 'tick_sched_do_timer' 'generic_permission' 'blk_mq_sched_dispatch_requests' 'ext4_free_inode' 'run_timer_softirq' 'xas_clear_mark' 'tomoyo_supervisor' 'pipe_wait' 'mod_timer' 'blk_mq_get_request' 'taskstats_exit' 'tick_do_update_jiffies64' 'get_task_cred' 'ktime_get_real_seconds' 'wbt_done' 14:58:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @erspan={{0xc, 0x1, 'erspan\x00'}, {0x10, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}]]}}}]}, 0x40}}, 0x0) 14:58:51 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prlimit64(0x0, 0x9, &(0x7f0000000600), 0x0) io_setup(0x2344, &(0x7f0000000100)) syzkaller login: [ 81.309599][ T8030] IPVS: ftp: loaded support on port[0] = 21 [ 81.398082][ T8030] chnl_net:caif_netlink_parms(): no params data found [ 81.448179][ T8030] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.471921][ T8030] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.479863][ T8030] device bridge_slave_0 entered promiscuous mode [ 81.495333][ T8030] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.503444][ T8030] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.511165][ T8030] device bridge_slave_1 entered promiscuous mode [ 81.531212][ T8030] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.543909][ T8030] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.546792][ T8033] IPVS: ftp: loaded support on port[0] = 21 [ 81.582414][ T8030] team0: Port device team_slave_0 added [ 81.594675][ T8030] team0: Port device team_slave_1 added 14:58:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) keyctl$session_to_parent(0x12) [ 81.664211][ T8030] device hsr_slave_0 entered promiscuous mode [ 81.702999][ T8030] device hsr_slave_1 entered promiscuous mode [ 81.826062][ T8030] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.833165][ T8030] bridge0: port 2(bridge_slave_1) entered forwarding state [ 81.840424][ T8030] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.847563][ T8030] bridge0: port 1(bridge_slave_0) entered forwarding state [ 81.999718][ T8043] IPVS: ftp: loaded support on port[0] = 21 [ 82.143272][ T8033] chnl_net:caif_netlink_parms(): no params data found [ 82.192484][ T8030] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.263843][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 82.293045][ T3011] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.321984][ T3011] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.342302][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 82.354168][ T8030] 8021q: adding VLAN 0 to HW filter on device team0 14:58:52 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80c81, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000100)=[{0x40081, 0x4, 0x0, 0x0, @time={0x77359400}, {}, {}, @time}], 0x30) [ 82.401864][ T8033] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.408944][ T8033] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.434032][ T8033] device bridge_slave_0 entered promiscuous mode [ 82.460276][ T8033] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.490518][ T8033] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.521851][ T8033] device bridge_slave_1 entered promiscuous mode [ 82.533696][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 82.573902][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 82.602524][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.609629][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.662449][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 82.702277][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.733325][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.740400][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.822665][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 82.834434][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 82.854436][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 82.882492][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 82.913881][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 82.934165][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 82.973861][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 82.982646][ T8065] IPVS: ftp: loaded support on port[0] = 21 [ 83.014117][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 83.042566][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.075069][ T8033] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.102156][ T8043] chnl_net:caif_netlink_parms(): no params data found [ 83.132382][ T8033] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.154626][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 83.173267][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.211247][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 14:58:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2007, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003300050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018004081700d1bd", 0x2e}], 0x1}, 0x0) [ 83.287499][ T8033] team0: Port device team_slave_0 added [ 83.312943][ T8033] team0: Port device team_slave_1 added [ 83.360089][ T8030] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 83.390417][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 83.411914][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 83.431769][ T8043] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.438827][ T8043] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.472649][ T8043] device bridge_slave_0 entered promiscuous mode [ 83.504539][ T8033] device hsr_slave_0 entered promiscuous mode [ 83.561995][ T8033] device hsr_slave_1 entered promiscuous mode [ 83.591781][ T8033] debugfs: Directory 'hsr0' with parent '/' already present! [ 83.632384][ T8043] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.639882][ T8043] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.672733][ T8043] device bridge_slave_1 entered promiscuous mode [ 83.742742][ T8065] chnl_net:caif_netlink_parms(): no params data found [ 83.748418][ T8079] IPVS: ftp: loaded support on port[0] = 21 [ 83.812249][ T8043] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.868028][ T8043] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.962009][ T8065] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.969447][ T8065] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.018840][ T8065] device bridge_slave_0 entered promiscuous mode [ 84.049432][ T8096] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 84.135210][ T8043] team0: Port device team_slave_0 added [ 84.143284][ T8065] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.155402][ T8065] bridge0: port 2(bridge_slave_1) entered disabled state 14:58:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @erspan={{0xc, 0x1, 'erspan\x00'}, {0x10, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}]]}}}]}, 0x40}}, 0x0) [ 84.186508][ T8065] device bridge_slave_1 entered promiscuous mode [ 84.224332][ T8043] team0: Port device team_slave_1 added 14:58:54 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bond_slave_1\x00', &(0x7f00000000c0)=@ethtool_drvinfo={0x3, "bca91f17356cc9e095b45316703f3bed295eaae7d79ae5ed6141a8278782f95e", "e9eb527fff62ed9282bed5b5637b305dc40694eb5085a984c7cb185ccc10746a", "75e7f8279a0952af0ca307685a226715ff191481904613e53965d6d67fd7414a", "f36b4a3fbca60bb8953d71c26df0b9e126fb1865f8447a73959f9deb3ec07cf1", "ba4c26b83fff2ec54c20235944fec291626fff7486032ed663b24fafe7c7f8f4", "ad845891f84e349db66e2e8a"}}) [ 84.308294][ T8065] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.390605][ T8065] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.447233][ T8108] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 84.500324][ T8065] team0: Port device team_slave_0 added [ 84.584429][ T8043] device hsr_slave_0 entered promiscuous mode [ 84.602616][ T8043] device hsr_slave_1 entered promiscuous mode [ 84.641843][ T8043] debugfs: Directory 'hsr0' with parent '/' already present! [ 84.659827][ T8065] team0: Port device team_slave_1 added 14:58:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @erspan={{0xc, 0x1, 'erspan\x00'}, {0x10, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}]]}}}]}, 0x40}}, 0x0) [ 84.832094][ T8065] device hsr_slave_0 entered promiscuous mode [ 84.862177][ T8065] device hsr_slave_1 entered promiscuous mode [ 84.891810][ T8065] debugfs: Directory 'hsr0' with parent '/' already present! [ 84.954844][ T8079] chnl_net:caif_netlink_parms(): no params data found [ 84.987655][ T8113] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 85.029494][ T8033] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.094542][ T8109] IPVS: ftp: loaded support on port[0] = 21 [ 85.183910][ T8033] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.259316][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 85.305728][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 14:58:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @erspan={{0xc, 0x1, 'erspan\x00'}, {0x10, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}]]}}}]}, 0x40}}, 0x0) [ 85.460872][ T8079] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.510723][ T8079] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.562679][ T8079] device bridge_slave_0 entered promiscuous mode [ 85.633846][ T8079] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.640904][ T8079] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.762652][ T8079] device bridge_slave_1 entered promiscuous mode [ 85.944863][ T8043] 8021q: adding VLAN 0 to HW filter on device bond0 14:58:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') sendfile(r0, r3, 0x0, 0x6) [ 86.044812][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 86.119515][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 86.185594][ T3011] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.192697][ T3011] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.262519][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 86.271149][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 86.402190][ T3011] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.409277][ T3011] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.516244][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 86.592765][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 86.662208][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.670941][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 86.822778][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 86.831326][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 86.930174][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 87.000547][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 87.074516][ T8079] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.135462][ T8079] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.210621][ T8033] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 87.266300][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 87.340774][ T8065] 8021q: adding VLAN 0 to HW filter on device bond0 14:58:57 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') sendfile(r0, r3, 0x0, 0x6) [ 87.392293][ T8061] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 87.426178][ T8061] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 87.469293][ T8061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 87.542537][ T8061] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 87.560080][ T8043] 8021q: adding VLAN 0 to HW filter on device team0 [ 87.653654][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.661640][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.725013][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 87.772459][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 87.779875][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 87.873130][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 87.924465][ T3011] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.933416][ T3011] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.027263][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 88.089320][ T8065] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.126559][ T8033] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 88.145843][ T8079] team0: Port device team_slave_0 added [ 88.157039][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.173704][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.214633][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.266636][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 14:58:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') sendfile(r0, r3, 0x0, 0x6) [ 88.355661][ T8054] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.362744][ T8054] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.505393][ T8079] team0: Port device team_slave_1 added [ 88.512699][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 88.572070][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 88.581202][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 88.654914][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 88.692937][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 88.741318][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 88.797973][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.843538][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.885512][ T2902] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.892648][ T2902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.941170][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.978243][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.008955][ T2902] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.016093][ T2902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.054867][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 89.093124][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 89.121442][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 89.134524][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 89.148833][ T8043] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 89.159738][ T8043] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 14:58:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') sendfile(r0, r3, 0x0, 0x6) [ 89.224445][ T8079] device hsr_slave_0 entered promiscuous mode [ 89.252131][ T8079] device hsr_slave_1 entered promiscuous mode [ 89.291837][ T8079] debugfs: Directory 'hsr0' with parent '/' already present! [ 89.306113][ T8065] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 89.317170][ T8065] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 89.329829][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 89.338368][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.346320][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 89.355733][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 89.364340][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 89.373264][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 89.381648][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.390480][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 89.399183][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 89.407916][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 89.416226][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 89.424825][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 89.433219][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.441539][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 89.449289][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 89.571677][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 89.582634][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 89.641349][ T8065] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 89.658762][ T8109] chnl_net:caif_netlink_parms(): no params data found [ 89.726992][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 89.738701][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 14:58:59 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prlimit64(0x0, 0x9, &(0x7f0000000600), 0x0) io_setup(0x2344, &(0x7f0000000100)) [ 89.778570][ T8043] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 89.883299][ T8109] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.890396][ T8109] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.952041][ T8109] device bridge_slave_0 entered promiscuous mode [ 89.968870][ T8109] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.005304][ T8109] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.021509][ T8109] device bridge_slave_1 entered promiscuous mode [ 90.137607][ T8109] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 90.211345][ T8079] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.264423][ T8109] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 90.308891][ T8079] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.371315][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.385893][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.458500][ T8109] team0: Port device team_slave_0 added [ 90.485632][ T8109] team0: Port device team_slave_1 added [ 90.509527][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 90.531208][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 14:59:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) keyctl$session_to_parent(0x12) 14:59:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') sendfile(r0, r3, 0x0, 0x6) [ 90.568168][ T2902] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.575366][ T2902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.652613][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.687794][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.723217][ T2902] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.730300][ T2902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.792291][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 90.829313][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 90.915981][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 90.943180][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 91.002352][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.049195][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.102649][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.137512][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.156120][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.174947][ T8079] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 91.190428][ T8079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.264183][ T8109] device hsr_slave_0 entered promiscuous mode [ 91.292118][ T8109] device hsr_slave_1 entered promiscuous mode [ 91.331822][ T8109] debugfs: Directory 'hsr0' with parent '/' already present! [ 91.352253][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.372625][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.402219][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.492192][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 91.499651][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 91.605927][ T8079] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 91.841128][ T8109] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.897463][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 91.906898][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 91.970494][ T8109] 8021q: adding VLAN 0 to HW filter on device team0 [ 92.004705][ T8293] openvswitch: netlink: Message has 5 unknown bytes. [ 92.037372][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.052557][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.073213][ T8297] openvswitch: netlink: Message has 5 unknown bytes. [ 92.086497][ T2902] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.093572][ T2902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.176951][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 92.196672][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 14:59:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2007, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003300050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018004081700d1bd", 0x2e}], 0x1}, 0x0) 14:59:02 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prlimit64(0x0, 0x9, &(0x7f0000000600), 0x0) io_setup(0x2344, &(0x7f0000000100)) [ 92.239983][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.269009][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.276121][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.328738][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 92.366380][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 92.415151][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 92.438473][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 92.460281][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 92.485916][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 92.514795][ T8109] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 92.528736][ T8306] openvswitch: netlink: Message has 5 unknown bytes. [ 92.540629][ T8109] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 92.574508][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 92.602949][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 92.620317][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.653013][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 92.696014][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.763427][ T8109] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 92.770741][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 92.800291][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 92.826012][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 14:59:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bond_slave_1\x00', &(0x7f00000000c0)=@ethtool_drvinfo={0x3, "bca91f17356cc9e095b45316703f3bed295eaae7d79ae5ed6141a8278782f95e", "e9eb527fff62ed9282bed5b5637b305dc40694eb5085a984c7cb185ccc10746a", "75e7f8279a0952af0ca307685a226715ff191481904613e53965d6d67fd7414a", "f36b4a3fbca60bb8953d71c26df0b9e126fb1865f8447a73959f9deb3ec07cf1", "ba4c26b83fff2ec54c20235944fec291626fff7486032ed663b24fafe7c7f8f4", "ad845891f84e349db66e2e8a"}}) 14:59:03 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80c81, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000100)=[{0x40081, 0x4, 0x0, 0x0, @time={0x77359400}, {}, {}, @time}], 0x30) 14:59:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) keyctl$session_to_parent(0x12) 14:59:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') sendfile(r0, r3, 0x0, 0x6) 14:59:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2007, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003300050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018004081700d1bd", 0x2e}], 0x1}, 0x0) 14:59:03 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prlimit64(0x0, 0x9, &(0x7f0000000600), 0x0) io_setup(0x2344, &(0x7f0000000100)) [ 93.323721][ T8326] openvswitch: netlink: Message has 5 unknown bytes. 14:59:03 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80c81, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000100)=[{0x40081, 0x4, 0x0, 0x0, @time={0x77359400}, {}, {}, @time}], 0x30) 14:59:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bond_slave_1\x00', &(0x7f00000000c0)=@ethtool_drvinfo={0x3, "bca91f17356cc9e095b45316703f3bed295eaae7d79ae5ed6141a8278782f95e", "e9eb527fff62ed9282bed5b5637b305dc40694eb5085a984c7cb185ccc10746a", "75e7f8279a0952af0ca307685a226715ff191481904613e53965d6d67fd7414a", "f36b4a3fbca60bb8953d71c26df0b9e126fb1865f8447a73959f9deb3ec07cf1", "ba4c26b83fff2ec54c20235944fec291626fff7486032ed663b24fafe7c7f8f4", "ad845891f84e349db66e2e8a"}}) 14:59:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) keyctl$session_to_parent(0x12) 14:59:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2007, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003300050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018004081700d1bd", 0x2e}], 0x1}, 0x0) 14:59:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') sendfile(r0, r3, 0x0, 0x6) 14:59:03 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80c81, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000100)=[{0x40081, 0x4, 0x0, 0x0, @time={0x77359400}, {}, {}, @time}], 0x30) [ 93.722281][ T8341] openvswitch: netlink: Message has 5 unknown bytes. 14:59:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') sendfile(r0, r3, 0x0, 0x6) 14:59:03 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80c81, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000100)=[{0x40081, 0x4, 0x0, 0x0, @time={0x77359400}, {}, {}, @time}], 0x30) 14:59:04 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000100)) 14:59:04 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bond_slave_1\x00', &(0x7f00000000c0)=@ethtool_drvinfo={0x3, "bca91f17356cc9e095b45316703f3bed295eaae7d79ae5ed6141a8278782f95e", "e9eb527fff62ed9282bed5b5637b305dc40694eb5085a984c7cb185ccc10746a", "75e7f8279a0952af0ca307685a226715ff191481904613e53965d6d67fd7414a", "f36b4a3fbca60bb8953d71c26df0b9e126fb1865f8447a73959f9deb3ec07cf1", "ba4c26b83fff2ec54c20235944fec291626fff7486032ed663b24fafe7c7f8f4", "ad845891f84e349db66e2e8a"}}) 14:59:04 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80c81, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000100)=[{0x40081, 0x4, 0x0, 0x0, @time={0x77359400}, {}, {}, @time}], 0x30) 14:59:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0x104}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:59:04 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xd4, 0x0, 0x0) 14:59:04 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000580)) 14:59:04 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80c81, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000100)=[{0x40081, 0x4, 0x0, 0x0, @time={0x77359400}, {}, {}, @time}], 0x30) 14:59:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') sendfile(r0, r3, 0x0, 0x6) 14:59:04 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000100)) 14:59:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0x104}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:59:04 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xd4, 0x0, 0x0) 14:59:04 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000580)) 14:59:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0x104}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:59:05 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xd4, 0x0, 0x0) 14:59:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') sendfile(r0, r3, 0x0, 0x6) 14:59:05 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000580)) 14:59:05 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000100)) 14:59:05 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000580)) 14:59:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0x104}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:59:05 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xd4, 0x0, 0x0) 14:59:05 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000100)) 14:59:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0x10, 0x8000000100000003, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) poll(&(0x7f0000000040)=[{r1}, {r4}], 0x2, 0x0) 14:59:05 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000100)) 14:59:05 executing program 0: write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffecf) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) msgget$private(0x0, 0x400) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000040)) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r0 = socket(0x10, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8937, &(0x7f0000000100)={'bridge_slave_0\x00', 0x1}) sendmsg$can_bcm(r0, &(0x7f0000000880)={&(0x7f00000000c0), 0x10, &(0x7f0000000840)={&(0x7f00000007c0)=ANY=[@ANYBLOB="26e6f5706e3fb94d14cd3000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="0300000001000000030000002189000020ab8b40615c4e639478c47f8c257108310286a56d5c78497892afb21db196dd2378af45e5073b01de75a961d5abe18f7a5f97a40ba4d292fa568b4814ffa1"], 0x6}, 0x1, 0x0, 0x0, 0x800}, 0x48000) socket$inet6(0xa, 0x800000000000002, 0x0) setgroups(0x0, &(0x7f0000000480)) r1 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f00000008c0)={0x5}) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000000}, 0xa00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x2000000, 0x0) 14:59:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0x10, 0x8000000100000003, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) poll(&(0x7f0000000040)=[{r1}, {r4}], 0x2, 0x0) 14:59:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0x10, 0x8000000100000003, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) poll(&(0x7f0000000040)=[{r1}, {r4}], 0x2, 0x0) 14:59:05 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000100)) 14:59:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0x10, 0x8000000100000003, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) poll(&(0x7f0000000040)=[{r1}, {r4}], 0x2, 0x0) 14:59:05 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000100)) [ 95.730967][ T8460] IPVS: ftp: loaded support on port[0] = 21 14:59:05 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) [ 95.860587][ C1] hrtimer: interrupt took 51933 ns 14:59:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0x10, 0x8000000100000003, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) poll(&(0x7f0000000040)=[{r1}, {r4}], 0x2, 0x0) 14:59:05 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1d00000007ffff0f005fcc5e886ef5921f"], 0x11) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 95.925037][ T8447] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 14:59:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0x10, 0x8000000100000003, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) poll(&(0x7f0000000040)=[{r1}, {r4}], 0x2, 0x0) 14:59:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0x10, 0x8000000100000003, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) poll(&(0x7f0000000040)=[{r1}, {r4}], 0x2, 0x0) [ 96.072965][ T8475] 9pnet: p9_errstr2errno: server reported unknown error _Ì^ˆnõ’ [ 96.176375][ T8460] IPVS: ftp: loaded support on port[0] = 21 14:59:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0x10, 0x8000000100000003, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) poll(&(0x7f0000000040)=[{r1}, {r4}], 0x2, 0x0) [ 96.234325][ T8447] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 14:59:06 executing program 0: write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffecf) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) msgget$private(0x0, 0x400) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000040)) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r0 = socket(0x10, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8937, &(0x7f0000000100)={'bridge_slave_0\x00', 0x1}) sendmsg$can_bcm(r0, &(0x7f0000000880)={&(0x7f00000000c0), 0x10, &(0x7f0000000840)={&(0x7f00000007c0)=ANY=[@ANYBLOB="26e6f5706e3fb94d14cd3000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="0300000001000000030000002189000020ab8b40615c4e639478c47f8c257108310286a56d5c78497892afb21db196dd2378af45e5073b01de75a961d5abe18f7a5f97a40ba4d292fa568b4814ffa1"], 0x6}, 0x1, 0x0, 0x0, 0x800}, 0x48000) socket$inet6(0xa, 0x800000000000002, 0x0) setgroups(0x0, &(0x7f0000000480)) r1 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f00000008c0)={0x5}) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000000}, 0xa00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x2000000, 0x0) 14:59:06 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 14:59:06 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1d00000007ffff0f005fcc5e886ef5921f"], 0x11) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 14:59:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0x10, 0x8000000100000003, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) poll(&(0x7f0000000040)=[{r1}, {r4}], 0x2, 0x0) 14:59:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0x10, 0x8000000100000003, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) poll(&(0x7f0000000040)=[{r1}, {r4}], 0x2, 0x0) 14:59:06 executing program 2: write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffecf) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) msgget$private(0x0, 0x400) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000040)) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r0 = socket(0x10, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8937, &(0x7f0000000100)={'bridge_slave_0\x00', 0x1}) sendmsg$can_bcm(r0, &(0x7f0000000880)={&(0x7f00000000c0), 0x10, &(0x7f0000000840)={&(0x7f00000007c0)=ANY=[@ANYBLOB="26e6f5706e3fb94d14cd3000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="0300000001000000030000002189000020ab8b40615c4e639478c47f8c257108310286a56d5c78497892afb21db196dd2378af45e5073b01de75a961d5abe18f7a5f97a40ba4d292fa568b4814ffa1"], 0x6}, 0x1, 0x0, 0x0, 0x800}, 0x48000) socket$inet6(0xa, 0x800000000000002, 0x0) setgroups(0x0, &(0x7f0000000480)) r1 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f00000008c0)={0x5}) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000000}, 0xa00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x2000000, 0x0) [ 96.592801][ T8496] 9pnet: p9_errstr2errno: server reported unknown error _Ì^ˆnõ’ 14:59:06 executing program 5: write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffecf) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) msgget$private(0x0, 0x400) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000040)) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r0 = socket(0x10, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8937, &(0x7f0000000100)={'bridge_slave_0\x00', 0x1}) sendmsg$can_bcm(r0, &(0x7f0000000880)={&(0x7f00000000c0), 0x10, &(0x7f0000000840)={&(0x7f00000007c0)=ANY=[@ANYBLOB="26e6f5706e3fb94d14cd3000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="0300000001000000030000002189000020ab8b40615c4e639478c47f8c257108310286a56d5c78497892afb21db196dd2378af45e5073b01de75a961d5abe18f7a5f97a40ba4d292fa568b4814ffa1"], 0x6}, 0x1, 0x0, 0x0, 0x800}, 0x48000) socket$inet6(0xa, 0x800000000000002, 0x0) setgroups(0x0, &(0x7f0000000480)) r1 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f00000008c0)={0x5}) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000000}, 0xa00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x2000000, 0x0) 14:59:06 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 14:59:06 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1d00000007ffff0f005fcc5e886ef5921f"], 0x11) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 14:59:06 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) [ 96.759978][ T8511] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 96.797330][ T8513] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 14:59:06 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) [ 96.937445][ T8526] 9pnet: p9_errstr2errno: server reported unknown error _Ì^ˆnõ’ [ 96.999032][ T8529] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 14:59:07 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1d00000007ffff0f005fcc5e886ef5921f"], 0x11) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 97.314475][ T8541] 9pnet: p9_errstr2errno: server reported unknown error _Ì^ˆnõ’ 14:59:09 executing program 0: write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffecf) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) msgget$private(0x0, 0x400) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000040)) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r0 = socket(0x10, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8937, &(0x7f0000000100)={'bridge_slave_0\x00', 0x1}) sendmsg$can_bcm(r0, &(0x7f0000000880)={&(0x7f00000000c0), 0x10, &(0x7f0000000840)={&(0x7f00000007c0)=ANY=[@ANYBLOB="26e6f5706e3fb94d14cd3000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="0300000001000000030000002189000020ab8b40615c4e639478c47f8c257108310286a56d5c78497892afb21db196dd2378af45e5073b01de75a961d5abe18f7a5f97a40ba4d292fa568b4814ffa1"], 0x6}, 0x1, 0x0, 0x0, 0x800}, 0x48000) socket$inet6(0xa, 0x800000000000002, 0x0) setgroups(0x0, &(0x7f0000000480)) r1 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f00000008c0)={0x5}) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000000}, 0xa00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x2000000, 0x0) 14:59:09 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 14:59:09 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 14:59:09 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 14:59:09 executing program 2: write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffecf) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) msgget$private(0x0, 0x400) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000040)) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r0 = socket(0x10, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8937, &(0x7f0000000100)={'bridge_slave_0\x00', 0x1}) sendmsg$can_bcm(r0, &(0x7f0000000880)={&(0x7f00000000c0), 0x10, &(0x7f0000000840)={&(0x7f00000007c0)=ANY=[@ANYBLOB="26e6f5706e3fb94d14cd3000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="0300000001000000030000002189000020ab8b40615c4e639478c47f8c257108310286a56d5c78497892afb21db196dd2378af45e5073b01de75a961d5abe18f7a5f97a40ba4d292fa568b4814ffa1"], 0x6}, 0x1, 0x0, 0x0, 0x800}, 0x48000) socket$inet6(0xa, 0x800000000000002, 0x0) setgroups(0x0, &(0x7f0000000480)) r1 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f00000008c0)={0x5}) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000000}, 0xa00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x2000000, 0x0) 14:59:09 executing program 5: write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffecf) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) msgget$private(0x0, 0x400) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000040)) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r0 = socket(0x10, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8937, &(0x7f0000000100)={'bridge_slave_0\x00', 0x1}) sendmsg$can_bcm(r0, &(0x7f0000000880)={&(0x7f00000000c0), 0x10, &(0x7f0000000840)={&(0x7f00000007c0)=ANY=[@ANYBLOB="26e6f5706e3fb94d14cd3000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="0300000001000000030000002189000020ab8b40615c4e639478c47f8c257108310286a56d5c78497892afb21db196dd2378af45e5073b01de75a961d5abe18f7a5f97a40ba4d292fa568b4814ffa1"], 0x6}, 0x1, 0x0, 0x0, 0x800}, 0x48000) socket$inet6(0xa, 0x800000000000002, 0x0) setgroups(0x0, &(0x7f0000000480)) r1 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f00000008c0)={0x5}) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000000}, 0xa00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x2000000, 0x0) [ 99.636898][ T8549] IPVS: ftp: loaded support on port[0] = 21 [ 99.677047][ T8560] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 14:59:09 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 14:59:09 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) sendmsg$unix(r1, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) ioprio_set$pid(0x2, 0x0, 0x0) 14:59:09 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x18}, [@ldst={0x6, 0x5, 0x6, 0x5}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) [ 99.817332][ T8568] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 99.835826][ T8573] ================================================================== [ 99.843980][ T8573] BUG: KCSAN: data-race in __ext4_new_inode / find_next_zero_bit [ 99.851701][ T8573] [ 99.854043][ T8573] write to 0xffff888123665010 of 8 bytes by task 8572 on cpu 0: [ 99.861860][ T8573] __ext4_new_inode+0xf04/0x2ec0 [ 99.866894][ T8573] ext4_symlink+0x30e/0x970 [ 99.871413][ T8573] vfs_symlink+0x218/0x310 [ 99.875841][ T8573] do_symlinkat+0x1a5/0x1e0 [ 99.880352][ T8573] __x64_sys_symlink+0x3f/0x50 [ 99.885162][ T8573] do_syscall_64+0xcc/0x370 [ 99.889683][ T8573] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 99.895565][ T8573] [ 99.897897][ T8573] read to 0xffff888123665010 of 8 bytes by task 8573 on cpu 1: [ 99.905452][ T8573] find_next_zero_bit+0x4e/0xe0 [ 99.910318][ T8573] find_inode_bit.isra.0+0x82/0x300 [ 99.915521][ T8573] __ext4_new_inode+0xd10/0x2ec0 [ 99.921338][ T8573] ext4_symlink+0x30e/0x970 [ 99.925861][ T8573] vfs_symlink+0x218/0x310 [ 99.930280][ T8573] do_symlinkat+0x1a5/0x1e0 [ 99.934787][ T8573] __x64_sys_symlink+0x3f/0x50 [ 99.939559][ T8573] do_syscall_64+0xcc/0x370 [ 99.944077][ T8573] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 99.949962][ T8573] [ 99.952285][ T8573] Reported by Kernel Concurrency Sanitizer on: [ 99.958454][ T8573] CPU: 1 PID: 8573 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 99.966273][ T8573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.976335][ T8573] ================================================================== [ 99.984420][ T8573] Kernel panic - not syncing: panic_on_warn set ... [ 99.991026][ T8573] CPU: 1 PID: 8573 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 99.998822][ T8573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.008875][ T8573] Call Trace: [ 100.012213][ T8573] dump_stack+0xf5/0x159 [ 100.016467][ T8573] panic+0x210/0x640 [ 100.020385][ T8573] ? vprintk_func+0x8d/0x140 [ 100.024996][ T8573] kcsan_report.cold+0xc/0xe [ 100.029603][ T8573] kcsan_setup_watchpoint+0x3fe/0x410 [ 100.034991][ T8573] __tsan_read8+0x145/0x1f0 [ 100.039502][ T8573] find_next_zero_bit+0x4e/0xe0 [ 100.044373][ T8573] find_inode_bit.isra.0+0x82/0x300 [ 100.049592][ T8573] __ext4_new_inode+0xd10/0x2ec0 [ 100.054579][ T8573] ext4_symlink+0x30e/0x970 [ 100.059290][ T8573] vfs_symlink+0x218/0x310 [ 100.063735][ T8573] do_symlinkat+0x1a5/0x1e0 [ 100.068250][ T8573] __x64_sys_symlink+0x3f/0x50 [ 100.073033][ T8573] do_syscall_64+0xcc/0x370 [ 100.077589][ T8573] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 100.081620][ T8564] IPVS: ftp: loaded support on port[0] = 21 [ 100.083486][ T8573] RIP: 0033:0x459f47 [ 100.083522][ T8573] Code: 0f 1f 00 b8 5c 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 6d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 58 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 4d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 100.083535][ T8573] RSP: 002b:00007fff80ea8428 EFLAGS: 00000206 ORIG_RAX: 0000000000000058 [ 100.083556][ T8573] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459f47 [ 100.083571][ T8573] RDX: 00007fff80ea84c3 RSI: 00000000004bfc71 RDI: 00007fff80ea84b0 [ 100.083584][ T8573] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000013 [ 100.083598][ T8573] R10: 0000000000000075 R11: 0000000000000206 R12: 0000000000000000 [ 100.083612][ T8573] R13: 00007fff80ea8460 R14: 0000000000000000 R15: 00007fff80ea8470 [ 100.090821][ T8573] Kernel Offset: disabled [ 100.166930][ T8573] Rebooting in 86400 seconds..