[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 34.025865][ T26] audit: type=1800 audit(1572350790.635:25): pid=6982 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 34.052708][ T26] audit: type=1800 audit(1572350790.635:26): pid=6982 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 34.081514][ T26] audit: type=1800 audit(1572350790.635:27): pid=6982 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.64' (ECDSA) to the list of known hosts. 2019/10/29 12:06:41 fuzzer started 2019/10/29 12:06:42 dialing manager at 10.128.0.105:40771 2019/10/29 12:06:43 syscalls: 2540 2019/10/29 12:06:43 code coverage: enabled 2019/10/29 12:06:43 comparison tracing: enabled 2019/10/29 12:06:43 extra coverage: extra coverage is not supported by the kernel 2019/10/29 12:06:43 setuid sandbox: enabled 2019/10/29 12:06:43 namespace sandbox: enabled 2019/10/29 12:06:43 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/29 12:06:43 fault injection: enabled 2019/10/29 12:06:43 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/29 12:06:43 net packet injection: enabled 2019/10/29 12:06:43 net device setup: enabled 2019/10/29 12:06:43 concurrency sanitizer: enabled syzkaller login: [ 56.501929][ T7146] KCSAN: could not find function: 'poll_schedule_timeout' 2019/10/29 12:07:03 adding functions to KCSAN blacklist: 'osq_lock' 'n_tty_receive_buf_common' 'alloc_pid' 'vm_area_dup' 'exit_signals' 'process_srcu' '__mark_inode_dirty' 'do_readlinkat' 'commit_echoes' 'generic_permission' 'ext4_mb_good_group' 'kauditd_thread' '__dev_queue_xmit' 'page_counter_try_charge' 'tcp_poll' '__snd_rawmidi_transmit_ack' '__skb_wait_for_more_packets' 'filemap_map_pages' 'do_exit' 'mod_timer' 'ext4_has_free_clusters' 'timer_clear_idle' '__skb_try_recv_from_queue' 'generic_file_read_iter' 'task_dump_owner' 'generic_write_end' 'tick_do_update_jiffies64' 'find_group_orlov' 'ext4_mark_iloc_dirty' 'snd_ctl_notify' 'rcu_gp_fqs_loop' 'ktime_get_real_seconds' 'pid_update_inode' 'pipe_wait' 'xas_find_marked' '__hrtimer_run_queues' 'run_timer_softirq' 'add_timer' 'ext4_free_inodes_count' 'sit_tunnel_xmit' 'generic_fillattr' 'list_lru_add' '__nf_conntrack_find_get' 'taskstats_exit' 'enqueue_timer' 'mm_update_next_owner' '__add_to_page_cache_locked' 'virtqueue_disable_cb' 'getboottime64' 'kcm_wait_data' '__ext4_new_inode' 'rcu_gp_fqs_check_wake' 'bio_endio' 'copy_process' '__find_get_block' 'poll_schedule_timeout' 'update_defense_level' 'ext4_nonda_switch' 'blk_mq_get_request' 'snapshot_refaults' 'ext4_da_write_end' 'tomoyo_supervisor' 'ep_poll' 'blk_mq_sched_dispatch_requests' 'shmem_file_read_iter' 'get_signal' 'tcp_v4_rcv' 'tcp_add_backlog' 'wbt_done' 'pcpu_alloc' 'tick_sched_do_timer' 'blk_mq_dispatch_rq_list' 'echo_char' 'install_new_memslots' 'ip_finish_output2' '__nf_ct_refresh_acct' 'unix_release_sock' '__delete_from_page_cache' 'queue_access_lock' 'dd_has_work' 'pipe_poll' 'p9_poll_workfn' 'sk_wait_data' 'yama_ptracer_del' 'ktime_get_ts64' 'find_next_bit' 'kernfs_refresh_inode' 'find_get_pages_range_tag' '__alloc_file' 'ext4_free_inode' '__cgroup_account_cputime' 'blk_mq_run_hw_queue' 'do_nanosleep' 'ktime_get_seconds' 'icmp_global_allow' 'do_syslog' 'atime_needs_update' 'blk_mq_free_request' 'tick_nohz_idle_stop_tick' 'shmem_getpage_gfp' 'dccp_rcv_reset' 12:11:08 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xffffffffffffff45) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000380)=0x3, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(r4, 0x5501) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) open(&(0x7f00000008c0)='./file0\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x28007d) socket$alg(0x26, 0x5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r6) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(aegis128l-generic)\x00'}, 0x47) 12:11:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x27638201fd01f45a, 0x70, 0x3, 0x8, 0x40, 0x0, 0x0, 0x0, 0x1800, 0xcaf90bfcf7f827ae, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0xfffffffffffffff7, 0x1}, 0x8, 0x840b38b, 0x1, 0x1, 0x401, 0x3ff, 0xad2}, 0x0, 0x7, 0xffffffffffffffff, 0x8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x840000000002, 0x3, 0x200000000000ff) io_submit(0x0, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) getpid() r4 = socket$inet(0x10, 0x3, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x4000, 0x0) openat$cgroup_type(r5, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) sendmsg(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000040)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) [ 311.790325][ T7149] IPVS: ftp: loaded support on port[0] = 21 [ 311.943646][ T7151] IPVS: ftp: loaded support on port[0] = 21 [ 311.948004][ T7149] chnl_net:caif_netlink_parms(): no params data found 12:11:08 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) r4 = dup3(r2, 0xffffffffffffffff, 0x80000) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000140)) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000280)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x7880000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)=ANY=[@ANYBLOB="00000010", @ANYRES16=r5, @ANYBLOB="080030bd7000fddbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x8000) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r5, 0x114, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x20000080) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000002340)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) r7 = getpid() rt_tgsigqueueinfo(r7, r7, 0x16, &(0x7f00000002c0)) ptrace$pokeuser(0x6, r7, 0x388, 0xfffffffffffffffe) r8 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') preadv(r8, &(0x7f00000017c0), 0x315, 0x800000) [ 312.014871][ T7149] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.023065][ T7149] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.031245][ T7149] device bridge_slave_0 entered promiscuous mode [ 312.055434][ T7149] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.063315][ T7149] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.072348][ T7149] device bridge_slave_1 entered promiscuous mode [ 312.139210][ T7149] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 312.169558][ T7149] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 312.222604][ T7149] team0: Port device team_slave_0 added [ 312.232439][ T7151] chnl_net:caif_netlink_parms(): no params data found [ 312.243699][ T7149] team0: Port device team_slave_1 added [ 312.261242][ T7157] IPVS: ftp: loaded support on port[0] = 21 [ 312.310293][ T7151] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.317362][ T7151] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.327105][ T7151] device bridge_slave_0 entered promiscuous mode [ 312.336869][ T7151] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.345939][ T7151] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.354291][ T7151] device bridge_slave_1 entered promiscuous mode 12:11:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x27638201fd01f45a, 0x70, 0x3, 0x8, 0x40, 0x1, 0x0, 0x0, 0x1800, 0xcaf90bfcf7f827ae, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0xfffffffffffffff7, 0x1}, 0x8, 0x840b38b, 0x1, 0x1, 0x401, 0x3ff, 0xad2}, 0x0, 0x7, 0xffffffffffffffff, 0x8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x840000000002, 0x3, 0x200000000000ff) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b36, &(0x7f00000005c0)='wlan1\x00\a\xd3~\xd4\xa2\xb8y\xe1\x04\xbe\x04\x00\x96\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00l\x00\x00\x00\x00\x00\x00\x00\x00\x00s\x18\x9f \xfa\x91\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02:a\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fk6=z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2o\xa9\\%\xc8\xfa\xd9t\xe5t\x9d\aj\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cy\xb3QOTI\x91BA\xe0\xab\xc1w\x03;-^(\x02=\xf39\xe9yT\xc4\xf0\xef\xe0\xd8\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x99\x006vr\xbf\x0f\xf7f|\x12{\xcd\x97\xd3\xf0B\xce\x1f\x9c\xf0\x14:\xc1\xc2{\x13&\x06\xc4t\xc0(\xf5o_\xd4\xdf\x9e\xaaS\xb5\xa6`&\xee /\x98\xde\x12.\x99dS\n\xf9W\xb7\xea\xd3\xb0\x1d\xb7\x1a\x9f\xaa\xf7\xbe\xac\xdf\x05\xed|9\x8e\x15\xb5\'N\xd4h\x17\xa77\xa7\x90\x7f\xfe\xe4\xa6\x9dK\xe3\xa3?\xe6\x18+\x92\x1a\xf4\xf0\\b\x9fL\x84\xb2\xb1\xde\x89\xbf\x80X\t\xa1\xb9_\xee\xb3\xbd\x83^\xfe\xc8r\xad\xb67T(\xb9$\xd4qM\b{\t|Z\xa9\xd5\x00\x854U\x98\"\x8e\x88\xa4\xa2e\xf2j\x97\xf3\xf3\xd9e\xa9\x04T\xbd\xde\x93b\xf2d&R\xa1\xb8\x03\xe0N>eD\xe5\x98\x05\xeb#\x83/2~\a$\xf6h0\xe7\x91\xa7\xf0\x93!v\x955)\xca\xc2\xebN\xe2\x99\xe8m\xd1\xc7\xcc\xa9\xb7\xe1+\xb29G,\xa6\xba\xbc\x89\xafn\x00f\xb7\n\xee)\xe0\x83h\xb0\xfbx\x8d\x81\xa7\xf6\xcf\xb4\xec\x94vUW\x9d\xad\x9ecV\x92\x9f\xa2TP\x85\xb9') clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_submit(0x0, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f00000002c0)) r4 = socket$inet(0x10, 0x3, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x4000, 0x0) openat$cgroup_type(r5, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) sendmsg(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000040)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) [ 312.430943][ T7149] device hsr_slave_0 entered promiscuous mode [ 312.499815][ T7149] device hsr_slave_1 entered promiscuous mode [ 312.649726][ T7151] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 312.681858][ T7149] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.689034][ T7149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.696376][ T7149] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.703473][ T7149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.824683][ T7151] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 312.844630][ T7168] IPVS: ftp: loaded support on port[0] = 21 12:11:09 executing program 4: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') keyctl$set_reqkey_keyring(0xe, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x114, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x20000080) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000002340)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r5, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f00000002c0)) ptrace$pokeuser(0x6, r6, 0x388, 0xfffffffffffffffe) r7 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') preadv(r7, &(0x7f00000017c0), 0x315, 0x800000) [ 313.024400][ T7151] team0: Port device team_slave_0 added [ 313.041842][ T2875] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.050585][ T2875] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.101161][ T7151] team0: Port device team_slave_1 added [ 313.123727][ T7149] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.219571][ T7149] 8021q: adding VLAN 0 to HW filter on device team0 [ 313.236413][ T7171] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 313.260836][ T7171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.292737][ T7157] chnl_net:caif_netlink_parms(): no params data found [ 313.361116][ T7151] device hsr_slave_0 entered promiscuous mode [ 313.389917][ T7151] device hsr_slave_1 entered promiscuous mode [ 313.430000][ T7151] debugfs: Directory 'hsr0' with parent '/' already present! [ 313.476099][ T7188] IPVS: ftp: loaded support on port[0] = 21 [ 313.482230][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 313.518689][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 313.558426][ T2875] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.565524][ T2875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.601034][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 313.629009][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 313.658516][ T2875] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.665586][ T2875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.718719][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 313.749310][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 313.781870][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 313.809286][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 313.874590][ T7149] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 313.917940][ T7149] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 313.994146][ T7187] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 314.030353][ T7187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 12:11:10 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x27638201fd01f45a, 0x70, 0x3, 0x8, 0x40, 0x1, 0x0, 0x0, 0x1800, 0xcaf90bfcf7f827ae, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0xfffffffffffffff7, 0x1}, 0x8, 0x840b38b, 0x1, 0x1, 0x401, 0x0, 0xad2}, 0x0, 0x7, 0xffffffffffffffff, 0x8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x840000000002, 0x3, 0x200000000000ff) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b36, &(0x7f00000005c0)='wlan1\x00\a\xd3~\xd4\xa2\xb8y\xe1\x04\xbe\x04\x00\x96\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00l\x00\x00\x00\x00\x00\x00\x00\x00\x00s\x18\x9f \xfa\x91\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02:a\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fk6=z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2o\xa9\\%\xc8\xfa\xd9t\xe5t\x9d\aj\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cy\xb3QOTI\x91BA\xe0\xab\xc1w\x03;-^(\x02=\xf39\xe9yT\xc4\xf0\xef\xe0\xd8\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x99\x006vr\xbf\x0f\xf7f|\x12{\xcd\x97\xd3\xf0B\xce\x1f\x9c\xf0\x14:\xc1\xc2{\x13&\x06\xc4t\xc0(\xf5o_\xd4\xdf\x9e\xaaS\xb5\xa6`&\xee /\x98\xde\x12.\x99dS\n\xf9W\xb7\xea\xd3\xb0\x1d\xb7\x1a\x9f\xaa\xf7\xbe\xac\xdf\x05\xed|9\x8e\x15\xb5\'N\xd4h\x17\xa77\xa7\x90\x7f\xfe\xe4\xa6\x9dK\xe3\xa3?\xe6\x18+\x92\x1a\xf4\xf0\\b\x9fL\x84\xb2\xb1\xde\x89\xbf\x80X\t\xa1\xb9_\xee\xb3\xbd\x83^\xfe\xc8r\xad\xb67T(\xb9$\xd4qM\b{\t|Z\xa9\xd5\x00\x854U\x98\"\x8e\x88\xa4\xa2e\xf2j\x97\xf3\xf3\xd9e\xa9\x04T\xbd\xde\x93b\xf2d&R\xa1\xb8\x03\xe0N>eD\xe5\x98\x05\xeb#\x83/2~\a$\xf6h0\xe7\x91\xa7\xf0\x93!v\x955)\xca\xc2\xebN\xe2\x99\xe8m\xd1\xc7\xcc\xa9\xb7\xe1+\xb29G,\xa6\xba\xbc\x89\xafn\x00f\xb7\n\xee)\xe0\x83h\xb0\xfbx\x8d\x81\xa7\xf6\xcf\xb4\xec\x94vUW\x9d\xad\x9ecV\x92\x9f\xa2TP\x85\xb9') clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_submit(0x0, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f00000002c0)) r4 = socket$inet(0x10, 0x3, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x4000, 0x0) openat$cgroup_type(r5, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) sendmsg(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000040)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) [ 314.074001][ T7187] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 314.131515][ T7187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 314.181290][ T7187] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 314.221638][ T7187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 314.261416][ T7187] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 314.424538][ T7187] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 314.447496][ T7149] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 314.519503][ T7157] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.526702][ T7157] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.597716][ T7157] device bridge_slave_0 entered promiscuous mode [ 314.662761][ T7157] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.718004][ T7157] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.726142][ T7157] device bridge_slave_1 entered promiscuous mode [ 314.884214][ T7213] IPVS: ftp: loaded support on port[0] = 21 [ 314.918958][ T7157] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 315.018723][ T7157] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 315.037401][ T7168] chnl_net:caif_netlink_parms(): no params data found [ 315.309797][ T7157] team0: Port device team_slave_0 added [ 315.354042][ T7157] team0: Port device team_slave_1 added [ 315.404665][ T7168] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.462432][ T7168] bridge0: port 1(bridge_slave_0) entered disabled state 12:11:12 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xffffffffffffff45) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000380)=0x3, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(r4, 0x5501) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) open(&(0x7f00000008c0)='./file0\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x28007d) socket$alg(0x26, 0x5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r6) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(aegis128l-generic)\x00'}, 0x47) [ 315.565840][ T7168] device bridge_slave_0 entered promiscuous mode [ 315.609456][ T7168] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.616532][ T7168] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.728995][ T7168] device bridge_slave_1 entered promiscuous mode [ 315.955503][ T7157] device hsr_slave_0 entered promiscuous mode [ 316.019458][ T7157] device hsr_slave_1 entered promiscuous mode [ 316.128181][ T7157] debugfs: Directory 'hsr0' with parent '/' already present! [ 316.136766][ T7188] chnl_net:caif_netlink_parms(): no params data found [ 316.157679][ T7168] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 316.272360][ T7168] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 316.311240][ T7151] 8021q: adding VLAN 0 to HW filter on device bond0 [ 316.519433][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 316.530992][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 316.595955][ T7151] 8021q: adding VLAN 0 to HW filter on device team0 [ 316.653368][ T7168] team0: Port device team_slave_0 added [ 316.698825][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 316.737822][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.788492][ T7243] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.795605][ T7243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.840013][ T7168] team0: Port device team_slave_1 added [ 316.849250][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 316.857357][ T7188] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.887931][ T7188] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.918969][ T7188] device bridge_slave_0 entered promiscuous mode [ 316.938730][ T7188] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.945855][ T7188] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.002584][ T7188] device bridge_slave_1 entered promiscuous mode [ 317.022776][ T7213] chnl_net:caif_netlink_parms(): no params data found [ 317.100750][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 317.118731][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 317.127290][ T7243] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.134373][ T7243] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.188700][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 317.237514][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 317.331167][ T7168] device hsr_slave_0 entered promiscuous mode [ 317.368286][ T7168] device hsr_slave_1 entered promiscuous mode [ 317.398042][ T7168] debugfs: Directory 'hsr0' with parent '/' already present! [ 317.407552][ T7188] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 317.439841][ T7188] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 317.468791][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 317.502682][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 317.529140][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 317.568346][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 317.598981][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 317.618906][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 317.666112][ T7151] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 12:11:14 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xffffffffffffff45) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000380)=0x3, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(r4, 0x5501) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) open(&(0x7f00000008c0)='./file0\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x28007d) socket$alg(0x26, 0x5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r6) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(aegis128l-generic)\x00'}, 0x47) [ 317.723276][ T7151] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 317.798901][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 317.815534][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 317.837495][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 317.887769][ T7213] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.944985][ T7213] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.996960][ T7213] device bridge_slave_0 entered promiscuous mode [ 318.090260][ T7151] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 318.122647][ T7188] team0: Port device team_slave_0 added 12:11:14 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xffffffffffffff45) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000380)=0x3, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(r4, 0x5501) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) open(&(0x7f00000008c0)='./file0\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x28007d) socket$alg(0x26, 0x5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r6) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(aegis128l-generic)\x00'}, 0x47) [ 318.139144][ T7213] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.146233][ T7213] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.195567][ T7213] device bridge_slave_1 entered promiscuous mode [ 318.308630][ T7157] 8021q: adding VLAN 0 to HW filter on device bond0 [ 318.316984][ T7188] team0: Port device team_slave_1 added [ 318.531071][ T7188] device hsr_slave_0 entered promiscuous mode [ 318.638329][ T7188] device hsr_slave_1 entered promiscuous mode [ 318.707963][ T7188] debugfs: Directory 'hsr0' with parent '/' already present! [ 318.764877][ T7213] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 318.806131][ T7157] 8021q: adding VLAN 0 to HW filter on device team0 12:11:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffef4}, {0x0}, {0x0, 0xfffffffffffffe05}, {&(0x7f0000000000)=ANY=[], 0x2}], 0x4}, 0x0) tkill(r2, 0x4) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) [ 318.909699][ T7187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 318.917662][ T7187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 319.040051][ T7213] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 319.247258][ T7213] team0: Port device team_slave_0 added [ 319.369374][ T7213] team0: Port device team_slave_1 added [ 319.408829][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 319.446942][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 319.556680][ C1] hrtimer: interrupt took 34012 ns [ 319.570904][ T2875] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.578128][ T2875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.661543][ T7352] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 319.670146][ T7352] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 320.003225][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 320.080309][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.158540][ T2875] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.165646][ T2875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.385102][ T7168] 8021q: adding VLAN 0 to HW filter on device bond0 [ 320.480072][ T7352] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 320.488410][ T7352] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 320.519880][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 320.545522][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 320.605676][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 320.701522][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 320.789073][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 320.869748][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 320.948843][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 321.062861][ T7157] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 321.117983][ T7157] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 321.248510][ T7187] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 321.257195][ T7187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 321.338976][ T7187] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 321.393110][ T7187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 321.448898][ T7187] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 321.508765][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 321.625971][ T7213] device hsr_slave_0 entered promiscuous mode [ 321.718355][ T7213] device hsr_slave_1 entered promiscuous mode [ 321.737989][ T7213] debugfs: Directory 'hsr0' with parent '/' already present! [ 321.777530][ T7168] 8021q: adding VLAN 0 to HW filter on device team0 [ 321.828655][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.836598][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.884085][ T7157] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 321.928688][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 321.937640][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 321.998617][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.005884][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.094562][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 322.143741][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.198635][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.205721][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.283015][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 322.303864][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 322.349450][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 322.392496][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 322.425335][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 322.456053][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 322.489103][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 322.536721][ T7168] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 322.562620][ T7168] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 322.597225][ T7188] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.617262][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 322.626812][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 322.670883][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.686069][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 322.741211][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.781571][ T7188] 8021q: adding VLAN 0 to HW filter on device team0 [ 322.869237][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 322.877366][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 322.921011][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.984977][ T7168] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 323.011400][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 323.029068][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 323.047441][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.054637][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.093511][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 323.113907][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 323.138474][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.145552][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.193381][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 323.213845][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 323.256152][ T7188] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 323.307941][ T7188] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 323.353351][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 323.373237][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 323.417373][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 323.442607][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 12:11:20 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x5450, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x801c581f, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2}, 0x10) write$cgroup_subtree(r4, &(0x7f0000000480)=ANY=[], 0x0) openat$cgroup(r4, 0x0, 0x200002, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$kcm(r5, 0x0, 0x0) 12:11:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x27638201fd01f45a, 0x70, 0x3, 0x8, 0x40, 0x0, 0x0, 0x0, 0x1800, 0xcaf90bfcf7f827ae, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0xfffffffffffffff7, 0x1}, 0x8, 0x840b38b, 0x1, 0x1, 0x401, 0x3ff, 0xad2}, 0x0, 0x7, 0xffffffffffffffff, 0x8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x840000000002, 0x3, 0x200000000000ff) io_submit(0x0, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) getpid() r4 = socket$inet(0x10, 0x3, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x4000, 0x0) openat$cgroup_type(r5, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) sendmsg(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000040)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) [ 323.469042][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 323.488411][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 323.496889][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 323.548400][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 323.665381][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 323.843980][ T7418] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 323.852393][ T7418] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 323.903420][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 323.966706][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 324.146863][ T7418] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 324.155170][ T7418] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 324.247028][ T7213] 8021q: adding VLAN 0 to HW filter on device bond0 [ 324.348623][ T7188] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 324.420408][ T7171] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 324.473091][ T7171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 324.558541][ T7213] 8021q: adding VLAN 0 to HW filter on device team0 [ 324.630732][ T7171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 12:11:21 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x5450, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x801c581f, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2}, 0x10) write$cgroup_subtree(r4, &(0x7f0000000480)=ANY=[], 0x0) openat$cgroup(r4, 0x0, 0x200002, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$kcm(r5, 0x0, 0x0) [ 324.681013][ T7171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 12:11:21 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) r4 = dup3(r2, 0xffffffffffffffff, 0x80000) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000140)) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000280)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x7880000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)=ANY=[@ANYBLOB="00000010", @ANYRES16=r5, @ANYBLOB="080030bd7000fddbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x8000) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r5, 0x114, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x20000080) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000002340)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) r7 = getpid() rt_tgsigqueueinfo(r7, r7, 0x16, &(0x7f00000002c0)) ptrace$pokeuser(0x6, r7, 0x388, 0xfffffffffffffffe) r8 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') preadv(r8, &(0x7f00000017c0), 0x315, 0x800000) 12:11:21 executing program 1: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) r4 = dup3(r2, 0xffffffffffffffff, 0x80000) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000140)) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000280)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x7880000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)=ANY=[@ANYBLOB="00000010", @ANYRES16=r5, @ANYBLOB="080030bd7000fddbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x8000) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r5, 0x114, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000008}, 0x20000080) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000002340)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) r7 = getpid() rt_tgsigqueueinfo(r7, r7, 0x16, &(0x7f00000002c0)) ptrace$pokeuser(0x6, r7, 0x388, 0xfffffffffffffffe) r8 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') preadv(r8, &(0x7f00000017c0), 0x315, 0x800000) [ 324.761716][ T7171] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.768876][ T7171] bridge0: port 1(bridge_slave_0) entered forwarding state 12:11:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x27638201fd01f45a, 0x70, 0x3, 0x8, 0x40, 0x1, 0x0, 0x0, 0x1800, 0xcaf90bfcf7f827ae, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0xfffffffffffffff7, 0x1}, 0x8, 0x840b38b, 0x1, 0x1, 0x401, 0x3ff, 0xad2}, 0x0, 0x7, 0xffffffffffffffff, 0x8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x840000000002, 0x3, 0x200000000000ff) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b36, &(0x7f00000005c0)='wlan1\x00\a\xd3~\xd4\xa2\xb8y\xe1\x04\xbe\x04\x00\x96\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00l\x00\x00\x00\x00\x00\x00\x00\x00\x00s\x18\x9f \xfa\x91\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02:a\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fk6=z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2o\xa9\\%\xc8\xfa\xd9t\xe5t\x9d\aj\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cy\xb3QOTI\x91BA\xe0\xab\xc1w\x03;-^(\x02=\xf39\xe9yT\xc4\xf0\xef\xe0\xd8\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x99\x006vr\xbf\x0f\xf7f|\x12{\xcd\x97\xd3\xf0B\xce\x1f\x9c\xf0\x14:\xc1\xc2{\x13&\x06\xc4t\xc0(\xf5o_\xd4\xdf\x9e\xaaS\xb5\xa6`&\xee /\x98\xde\x12.\x99dS\n\xf9W\xb7\xea\xd3\xb0\x1d\xb7\x1a\x9f\xaa\xf7\xbe\xac\xdf\x05\xed|9\x8e\x15\xb5\'N\xd4h\x17\xa77\xa7\x90\x7f\xfe\xe4\xa6\x9dK\xe3\xa3?\xe6\x18+\x92\x1a\xf4\xf0\\b\x9fL\x84\xb2\xb1\xde\x89\xbf\x80X\t\xa1\xb9_\xee\xb3\xbd\x83^\xfe\xc8r\xad\xb67T(\xb9$\xd4qM\b{\t|Z\xa9\xd5\x00\x854U\x98\"\x8e\x88\xa4\xa2e\xf2j\x97\xf3\xf3\xd9e\xa9\x04T\xbd\xde\x93b\xf2d&R\xa1\xb8\x03\xe0N>eD\xe5\x98\x05\xeb#\x83/2~\a$\xf6h0\xe7\x91\xa7\xf0\x93!v\x955)\xca\xc2\xebN\xe2\x99\xe8m\xd1\xc7\xcc\xa9\xb7\xe1+\xb29G,\xa6\xba\xbc\x89\xafn\x00f\xb7\n\xee)\xe0\x83h\xb0\xfbx\x8d\x81\xa7\xf6\xcf\xb4\xec\x94vUW\x9d\xad\x9ecV\x92\x9f\xa2TP\x85\xb9') clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_submit(0x0, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f00000002c0)) r4 = socket$inet(0x10, 0x3, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x4000, 0x0) openat$cgroup_type(r5, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) sendmsg(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000040)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) [ 325.084539][ T7359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 325.138736][ T7359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 325.156057][ T7359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 325.253452][ T7359] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.260592][ T7359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.402646][ T7359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 325.417651][ T7459] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 325.425940][ T7459] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 325.505021][ T7359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 325.601635][ T7359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 325.682023][ T7359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 325.766882][ T7359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 325.849535][ T7359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 325.943729][ T7213] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 326.063890][ T7213] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 326.158289][ T7459] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 326.166501][ T7459] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 326.251849][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 326.265434][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 326.338635][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 326.422055][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 326.508597][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 326.580230][ T7171] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 326.711560][ T7213] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 327.186037][ T7388] ================================================================== [ 327.194174][ T7388] BUG: KCSAN: data-race in d_alloc_parallel / d_set_d_op [ 327.201180][ T7388] [ 327.203507][ T7388] read to 0xffff88812449b480 of 4 bytes by task 7396 on cpu 1: [ 327.211074][ T7388] d_alloc_parallel+0x8e9/0xea0 [ 327.215927][ T7388] path_openat+0x1d3c/0x36e0 [ 327.220512][ T7388] do_filp_open+0x11e/0x1b0 [ 327.225015][ T7388] do_sys_open+0x3b3/0x4f0 [ 327.229426][ T7388] __x64_sys_open+0x55/0x70 [ 327.233923][ T7388] do_syscall_64+0xcc/0x370 [ 327.238426][ T7388] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 327.244298][ T7388] [ 327.246629][ T7388] write to 0xffff88812449b480 of 4 bytes by task 7388 on cpu 0: [ 327.254261][ T7388] d_set_d_op+0x17b/0x230 [ 327.258584][ T7388] proc_pident_instantiate+0x11e/0x170 [ 327.264040][ T7388] proc_pident_lookup+0x146/0x160 [ 327.269062][ T7388] proc_tgid_base_lookup+0x35/0x50 [ 327.274167][ T7388] path_openat+0x15b6/0x36e0 [ 327.278745][ T7388] do_filp_open+0x11e/0x1b0 [ 327.283242][ T7388] do_sys_open+0x3b3/0x4f0 [ 327.287650][ T7388] __x64_sys_open+0x55/0x70 [ 327.292151][ T7388] do_syscall_64+0xcc/0x370 [ 327.296644][ T7388] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 327.302526][ T7388] [ 327.304844][ T7388] Reported by Kernel Concurrency Sanitizer on: [ 327.310989][ T7388] CPU: 0 PID: 7388 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 327.317742][ T7388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.327792][ T7388] ================================================================== [ 327.335854][ T7388] Kernel panic - not syncing: panic_on_warn set ... [ 327.342442][ T7388] CPU: 0 PID: 7388 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 327.349188][ T7388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.359235][ T7388] Call Trace: [ 327.362535][ T7388] dump_stack+0xf5/0x159 [ 327.366777][ T7388] panic+0x210/0x640 [ 327.370679][ T7388] ? do_syscall_64+0xcc/0x370 [ 327.375359][ T7388] ? vprintk_func+0x8d/0x140 [ 327.379965][ T7388] kcsan_report.cold+0xc/0x10 [ 327.384644][ T7388] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 327.390212][ T7388] __tsan_write4+0x32/0x40 [ 327.394638][ T7388] d_set_d_op+0x17b/0x230 [ 327.399083][ T7388] proc_pident_instantiate+0x11e/0x170 [ 327.404532][ T7388] proc_pident_lookup+0x146/0x160 [ 327.409551][ T7388] ? proc_tid_base_lookup+0x50/0x50 [ 327.414759][ T7388] proc_tgid_base_lookup+0x35/0x50 [ 327.419872][ T7388] path_openat+0x15b6/0x36e0 [ 327.424463][ T7388] ? __kcsan_setup_watchpoint+0x20/0x4a0 [ 327.430094][ T7388] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 327.436095][ T7388] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 327.441726][ T7388] do_filp_open+0x11e/0x1b0 [ 327.446234][ T7388] ? __alloc_fd+0x316/0x4c0 [ 327.450738][ T7388] do_sys_open+0x3b3/0x4f0 [ 327.455182][ T7388] __x64_sys_open+0x55/0x70 [ 327.459690][ T7388] do_syscall_64+0xcc/0x370 [ 327.464190][ T7388] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 327.470077][ T7388] RIP: 0033:0x7f1ac7016120 [ 327.474494][ T7388] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 327.494113][ T7388] RSP: 002b:00007ffe26fbeec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 327.502537][ T7388] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f1ac7016120 [ 327.510598][ T7388] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f1ac74e4d00 [ 327.518570][ T7388] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f1ac72de57b [ 327.526627][ T7388] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1ac74e3d00 [ 327.534598][ T7388] R13: 0000000000000020 R14: 0000000000000005 R15: 0000000000000000 [ 327.543705][ T7388] Kernel Offset: disabled [ 327.548078][ T7388] Rebooting in 86400 seconds..