[ 51.609546][ T26] audit: type=1800 audit(1572967298.257:27): pid=7925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 51.635636][ T26] audit: type=1800 audit(1572967298.267:28): pid=7925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.296948][ T26] audit: type=1800 audit(1572967299.007:29): pid=7925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 52.317069][ T26] audit: type=1800 audit(1572967299.017:30): pid=7925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.200' (ECDSA) to the list of known hosts. 2019/11/05 15:21:50 fuzzer started 2019/11/05 15:21:52 dialing manager at 10.128.0.105:43787 2019/11/05 15:21:52 syscalls: 2553 2019/11/05 15:21:52 code coverage: enabled 2019/11/05 15:21:52 comparison tracing: enabled 2019/11/05 15:21:52 extra coverage: extra coverage is not supported by the kernel 2019/11/05 15:21:52 setuid sandbox: enabled 2019/11/05 15:21:52 namespace sandbox: enabled 2019/11/05 15:21:52 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/05 15:21:52 fault injection: enabled 2019/11/05 15:21:52 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/05 15:21:52 net packet injection: enabled 2019/11/05 15:21:52 net device setup: enabled 2019/11/05 15:21:52 concurrency sanitizer: enabled 2019/11/05 15:21:52 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 67.548327][ T8092] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/05 15:21:58 adding functions to KCSAN blacklist: 'osq_lock' 'pipe_poll' 'vm_area_dup' '__hrtimer_run_queues' 'rcu_gp_fqs_check_wake' 'echo_char' 'ep_poll' 'tick_sched_do_timer' 'blk_mq_sched_dispatch_requests' 'ext4_free_inode' 'run_timer_softirq' 'xas_clear_mark' 'poll_schedule_timeout' 'generic_permission' 'pipe_wait' 'mod_timer' 'blk_mq_get_request' 'taskstats_exit' 'ext4_free_inodes_count' 'process_srcu' 'tomoyo_supervisor' 'get_task_cred' 'ktime_get_real_seconds' 'wbt_done' '__ext4_new_inode' 'fsnotify' 'inet_putpeer' 'atime_needs_update' 'tick_do_update_jiffies64' 'tcp_add_backlog' 'find_next_bit' 'generic_write_end' 'task_dump_owner' 'exit_signals' 'generic_fillattr' 'ext4_has_free_clusters' 'pid_update_inode' 'blk_mq_dispatch_rq_list' 'tick_nohz_idle_stop_tick' 'add_timer' 'do_nanosleep' 15:22:30 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'ip\x8ei0\x00\x00@\x00\x00\x00\x04\x00', 0x8011}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x15) 15:22:30 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 103.916185][ T8094] IPVS: ftp: loaded support on port[0] = 21 [ 104.041129][ T8094] chnl_net:caif_netlink_parms(): no params data found [ 104.074588][ T8094] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.081779][ T8094] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.089564][ T8094] device bridge_slave_0 entered promiscuous mode [ 104.096992][ T8094] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.116463][ T8094] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.124419][ T8094] device bridge_slave_1 entered promiscuous mode [ 104.143357][ T8094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 104.153701][ T8094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 104.174338][ T8094] team0: Port device team_slave_0 added 15:22:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c71961bffb2dd1ad71d8a5ffe0eb77ec2800e1daa37b9348797774a7158f70b8c5af2211798defd2c454f0f4fb556b6521c0e6ea383b895142b5b0bbcae11c26b38faf4c15389b9596c56559215f0f017027a239bf7b71850c1998c8522ecb05245d106832d599b7b0fc487998452b7fb3e47625a464e2786e34e03173a050028f103b36a294b7668f15d448235ccf3cd503"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 104.190435][ T8094] team0: Port device team_slave_1 added [ 104.201062][ T8098] IPVS: ftp: loaded support on port[0] = 21 [ 104.291376][ T8094] device hsr_slave_0 entered promiscuous mode [ 104.348811][ T8094] device hsr_slave_1 entered promiscuous mode [ 104.438615][ T8100] IPVS: ftp: loaded support on port[0] = 21 15:22:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x400000000000085, 0x0, 0x0, &(0x7f0000000000), 0x40000000) [ 104.605249][ T8094] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.612353][ T8094] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.619713][ T8094] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.626811][ T8094] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.792310][ T8098] chnl_net:caif_netlink_parms(): no params data found [ 105.028776][ T8127] IPVS: ftp: loaded support on port[0] = 21 [ 105.040046][ T8094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 105.047468][ T8098] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.060197][ T8098] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.088466][ T8098] device bridge_slave_0 entered promiscuous mode [ 105.138673][ T8097] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.158692][ T8097] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.201462][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 105.246241][ T8098] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.259944][ T8098] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.279863][ T8098] device bridge_slave_1 entered promiscuous mode [ 105.314213][ T8100] chnl_net:caif_netlink_parms(): no params data found [ 105.353325][ T8094] 8021q: adding VLAN 0 to HW filter on device team0 [ 105.378533][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 105.391266][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.434881][ T8098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 105.469845][ T8098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 105.499121][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.528214][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.550740][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.557799][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.579032][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.598036][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.618164][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.625325][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state 15:22:32 executing program 4: syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x8, 0x286200) read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x102800) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0xfffffedf) dup3(r3, r2, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x9}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r6, 0x2}, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000080)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'wrr\x00', 0x21, 0xffffffffffffff8f}, 0x2c) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x4e24, @empty}, 0x96, 0x0, 0x0, 0x0, 0x7, 0x0, 0xff, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000000)='vxcan1\x00', 0x3, 0x243, 0x1f}) setsockopt$IP_VS_SO_SET_ZERO(r7, 0x0, 0x48f, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000012c0)) sendmmsg(r5, &(0x7f0000000d00), 0x1bdd307, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040), 0x4) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x9e, 0x1}, 0x120) [ 105.663589][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 105.692056][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 105.726559][ T8094] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 105.780755][ T8094] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 105.850896][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 105.870594][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 105.891167][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 105.909298][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 105.918322][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 105.989283][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.998077][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 106.041132][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 106.058168][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 106.091249][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 106.127386][ T8098] team0: Port device team_slave_0 added [ 106.141380][ T8098] team0: Port device team_slave_1 added [ 106.209308][ T8100] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.216397][ T8100] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.245243][ T8100] device bridge_slave_0 entered promiscuous mode [ 106.263198][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 106.278595][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 15:22:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x400443c9, &(0x7f0000000040)={0xa13167f4, 0x0}) [ 106.330977][ T8098] device hsr_slave_0 entered promiscuous mode [ 106.363345][ T8098] device hsr_slave_1 entered promiscuous mode [ 106.428464][ T8098] debugfs: Directory 'hsr0' with parent '/' already present! [ 106.437571][ T8100] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.450284][ T8100] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.458058][ T8100] device bridge_slave_1 entered promiscuous mode [ 106.472169][ T8094] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 106.497998][ T8140] IPVS: ftp: loaded support on port[0] = 21 [ 106.501445][ T8127] chnl_net:caif_netlink_parms(): no params data found [ 106.557088][ T8144] IPVS: ftp: loaded support on port[0] = 21 [ 106.609220][ T8127] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.619019][ T8127] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.627028][ T8127] device bridge_slave_0 entered promiscuous mode [ 106.657310][ T8100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 106.686574][ T8127] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.728477][ T8127] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.796235][ T8127] device bridge_slave_1 entered promiscuous mode [ 106.835705][ T8100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 106.927454][ T8100] team0: Port device team_slave_0 added [ 106.939619][ T8100] team0: Port device team_slave_1 added [ 107.040917][ T8100] device hsr_slave_0 entered promiscuous mode [ 107.060393][ T8100] device hsr_slave_1 entered promiscuous mode [ 107.098608][ T8100] debugfs: Directory 'hsr0' with parent '/' already present! [ 107.133843][ T8127] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 107.177021][ T8127] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:22:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c0000002000010200000000000000000200000000000000000000000a000300c8fe0b00000000001400110073797a5f74756e0000000000000000003511978264da4a23593e141db73a08808f3061e49729675b027d4d22412d8457412f66980c049c5242d879c1526c02a9a409e511d48d0d7363ca703b4b15243716a233ab3e00fb1ae3996480bb9981f6ef93f63f7a08c3fbefde3b8f851a6103b2710f1307555e77519084b39d54e38a83fa43b39f3fd5104dd920806a88a70b024d6f665c00"/206], 0x3c}}, 0xc) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 107.340727][ T8127] team0: Port device team_slave_0 added [ 107.396972][ T8098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 107.479054][ T8127] team0: Port device team_slave_1 added [ 107.621688][ T8127] device hsr_slave_0 entered promiscuous mode [ 107.658927][ T8127] device hsr_slave_1 entered promiscuous mode [ 107.698527][ T8127] debugfs: Directory 'hsr0' with parent '/' already present! [ 107.714834][ T8098] 8021q: adding VLAN 0 to HW filter on device team0 [ 107.791337][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 107.811627][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 15:22:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c0000002000010200000000000000000200000000000000000000000a000300c8fe0b00000000001400110073797a5f74756e0000000000000000003511978264da4a23593e141db73a08808f3061e49729675b027d4d22412d8457412f66980c049c5242d879c1526c02a9a409e511d48d0d7363ca703b4b15243716a233ab3e00fb1ae3996480bb9981f6ef93f63f7a08c3fbefde3b8f851a6103b2710f1307555e77519084b39d54e38a83fa43b39f3fd5104dd920806a88a70b024d6f665c00"/206], 0x3c}}, 0xc) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 107.949872][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 108.001367][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 108.068626][ T8130] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.075697][ T8130] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.228763][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 108.289117][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 108.297661][ T8130] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.304847][ T8130] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.420716][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 108.482388][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 108.547714][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 108.611866][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 108.689128][ T8140] chnl_net:caif_netlink_parms(): no params data found [ 108.761844][ T8144] chnl_net:caif_netlink_parms(): no params data found [ 108.817489][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 108.841992][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 15:22:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c0000002000010200000000000000000200000000000000000000000a000300c8fe0b00000000001400110073797a5f74756e0000000000000000003511978264da4a23593e141db73a08808f3061e49729675b027d4d22412d8457412f66980c049c5242d879c1526c02a9a409e511d48d0d7363ca703b4b15243716a233ab3e00fb1ae3996480bb9981f6ef93f63f7a08c3fbefde3b8f851a6103b2710f1307555e77519084b39d54e38a83fa43b39f3fd5104dd920806a88a70b024d6f665c00"/206], 0x3c}}, 0xc) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 108.902208][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 109.020009][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 109.101451][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 109.155323][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.228621][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 109.289146][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.379416][ T8098] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 109.536998][ T8100] 8021q: adding VLAN 0 to HW filter on device bond0 15:22:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c0000002000010200000000000000000200000000000000000000000a000300c8fe0b00000000001400110073797a5f74756e0000000000000000003511978264da4a23593e141db73a08808f3061e49729675b027d4d22412d8457412f66980c049c5242d879c1526c02a9a409e511d48d0d7363ca703b4b15243716a233ab3e00fb1ae3996480bb9981f6ef93f63f7a08c3fbefde3b8f851a6103b2710f1307555e77519084b39d54e38a83fa43b39f3fd5104dd920806a88a70b024d6f665c00"/206], 0x3c}}, 0xc) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 109.586810][ T8098] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 109.683279][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 109.712099][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 109.779279][ T8100] 8021q: adding VLAN 0 to HW filter on device team0 [ 109.799782][ T8127] 8021q: adding VLAN 0 to HW filter on device bond0 [ 109.828718][ T8140] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.835807][ T8140] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.915012][ T8140] device bridge_slave_0 entered promiscuous mode [ 109.979416][ T8144] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.995722][ T8144] bridge0: port 1(bridge_slave_0) entered disabled state 15:22:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 110.039590][ T8144] device bridge_slave_0 entered promiscuous mode [ 110.076670][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 110.124290][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.172481][ T8127] 8021q: adding VLAN 0 to HW filter on device team0 [ 110.214555][ T8140] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.251324][ T8140] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.299492][ T8140] device bridge_slave_1 entered promiscuous mode [ 110.348555][ T8144] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.355713][ T8144] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.409387][ T8144] device bridge_slave_1 entered promiscuous mode [ 110.444124][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 15:22:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 110.473662][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.499219][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 110.582670][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 110.639000][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.646075][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.709324][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 110.763561][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 15:22:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 110.808234][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.815373][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.928983][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 111.015107][ T8144] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 111.138217][ T8144] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 111.212617][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 111.237934][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 111.293052][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.329495][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.381003][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.388094][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.413361][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 111.430914][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 111.458957][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.486223][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.507596][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.514716][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.549798][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 111.574926][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 111.598194][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 111.617032][ T8258] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.624284][ T8258] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.682119][ T8260] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.689237][ T8260] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.696547][ T8260] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.703645][ T8260] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.714989][ T8260] device bridge0 entered promiscuous mode [ 111.729562][ T8140] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 111.739741][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 111.754726][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 111.764258][ T8144] team0: Port device team_slave_0 added [ 111.772478][ T8144] team0: Port device team_slave_1 added [ 111.778568][ T8258] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.785690][ T8258] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.792993][ T8258] device bridge0 left promiscuous mode [ 111.828886][ T8260] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.835945][ T8260] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.843316][ T8260] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.850375][ T8260] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.864595][ T8260] device bridge0 entered promiscuous mode 15:22:38 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 111.876808][ T8100] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 111.892177][ T8100] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 111.906985][ T8140] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 111.933777][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 111.945305][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.964558][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 111.973186][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 111.983217][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 111.990883][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 112.015191][ T8278] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.022456][ T8278] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.030482][ T8278] device bridge0 left promiscuous mode [ 112.067190][ T8127] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 112.093668][ T8127] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 112.117997][ T8140] team0: Port device team_slave_0 added [ 112.132254][ T8100] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 112.140796][ T8279] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.147869][ T8279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.155240][ T8279] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.162310][ T8279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.169940][ T8279] device bridge0 entered promiscuous mode [ 112.182503][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 112.191970][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 112.205575][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 112.214390][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 112.227224][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 112.245033][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.253940][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.262802][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.271497][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 112.279024][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 112.287183][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 112.295579][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 112.304380][ T8140] team0: Port device team_slave_1 added [ 112.362489][ T8144] device hsr_slave_0 entered promiscuous mode [ 112.408956][ T8144] device hsr_slave_1 entered promiscuous mode [ 112.478486][ T8144] debugfs: Directory 'hsr0' with parent '/' already present! [ 112.541036][ T8140] device hsr_slave_0 entered promiscuous mode [ 112.578973][ T8140] device hsr_slave_1 entered promiscuous mode [ 112.638739][ T8140] debugfs: Directory 'hsr0' with parent '/' already present! [ 112.735236][ T8127] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 112.804813][ T8129] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 112.829155][ T8129] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 113.012952][ T8140] 8021q: adding VLAN 0 to HW filter on device bond0 [ 113.094779][ T8144] 8021q: adding VLAN 0 to HW filter on device bond0 [ 113.165410][ T8140] 8021q: adding VLAN 0 to HW filter on device team0 [ 113.210325][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 113.218439][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.245122][ T8144] 8021q: adding VLAN 0 to HW filter on device team0 [ 113.316763][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 113.339478][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.369251][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.378039][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 15:22:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 113.443727][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.450914][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.508038][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.569635][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.618008][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.625240][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.697207][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 113.747848][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 113.797244][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.846022][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.891312][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.898437][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.020441][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 114.029577][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 114.099512][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 114.108309][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 15:22:40 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 114.201124][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 114.259392][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 114.268284][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 114.323406][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.379953][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.422935][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.471593][ T8130] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.478703][ T8130] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.550610][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 114.607602][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 114.670025][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 114.713341][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 114.762734][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 114.810875][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 114.865402][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 114.917989][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.963621][ T8140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 114.989233][ T8346] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.996495][ T8346] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.289639][ T8347] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.296730][ T8347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.304122][ T8347] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.311200][ T8347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.482366][ T8347] device bridge0 entered promiscuous mode [ 115.529479][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 115.549529][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 115.604999][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 115.656249][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 115.711797][ T8144] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 115.768590][ T8144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 115.817612][ T8140] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 115.878630][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 115.887191][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 115.959215][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 115.966714][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 116.080099][ T8144] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 116.125335][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 116.142879][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 116.562095][ C0] hrtimer: interrupt took 24904 ns 15:22:43 executing program 4: syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x8, 0x286200) read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x102800) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0xfffffedf) dup3(r3, r2, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x9}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r6, 0x2}, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000080)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'wrr\x00', 0x21, 0xffffffffffffff8f}, 0x2c) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x4e24, @empty}, 0x96, 0x0, 0x0, 0x0, 0x7, 0x0, 0xff, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000000)='vxcan1\x00', 0x3, 0x243, 0x1f}) setsockopt$IP_VS_SO_SET_ZERO(r7, 0x0, 0x48f, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000012c0)) sendmmsg(r5, &(0x7f0000000d00), 0x1bdd307, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040), 0x4) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x9e, 0x1}, 0x120) 15:22:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x400443c9, &(0x7f0000000040)={0xa13167f4, 0x0}) 15:22:43 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 15:22:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:22:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:22:43 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 15:22:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x400443c9, &(0x7f0000000040)={0xa13167f4, 0x0}) [ 116.984200][ T8390] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.991497][ T8390] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.008527][ T8390] device bridge0 left promiscuous mode 15:22:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 117.232019][ T8389] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.239307][ T8389] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.255295][ T8389] device bridge0 left promiscuous mode [ 117.341421][ T8391] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.348564][ T8391] bridge0: port 2(bridge_slave_1) entered forwarding state [ 117.355875][ T8391] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.363030][ T8391] bridge0: port 1(bridge_slave_0) entered forwarding state 15:22:44 executing program 4: syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x8, 0x286200) read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x102800) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0xfffffedf) dup3(r3, r2, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x9}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r6, 0x2}, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000080)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'wrr\x00', 0x21, 0xffffffffffffff8f}, 0x2c) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x4e24, @empty}, 0x96, 0x0, 0x0, 0x0, 0x7, 0x0, 0xff, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000000)='vxcan1\x00', 0x3, 0x243, 0x1f}) setsockopt$IP_VS_SO_SET_ZERO(r7, 0x0, 0x48f, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000012c0)) sendmmsg(r5, &(0x7f0000000d00), 0x1bdd307, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040), 0x4) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x9e, 0x1}, 0x120) [ 117.412781][ T8391] device bridge0 entered promiscuous mode [ 117.432663][ T8392] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.439800][ T8392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 117.447124][ T8392] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.454204][ T8392] bridge0: port 1(bridge_slave_0) entered forwarding state 15:22:44 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 117.596140][ T8392] device bridge0 entered promiscuous mode 15:22:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x400443c9, &(0x7f0000000040)={0xa13167f4, 0x0}) [ 117.677210][ T8410] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.684410][ T8410] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.711371][ T8410] device bridge0 left promiscuous mode 15:22:44 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 15:22:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x400443c9, &(0x7f0000000040)={0xa13167f4, 0x0}) [ 117.975526][ T8411] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.982681][ T8411] bridge0: port 2(bridge_slave_1) entered forwarding state [ 117.990023][ T8411] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.997070][ T8411] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.076002][ T8411] device bridge0 entered promiscuous mode [ 118.110419][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.117577][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state 15:22:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x400443c9, &(0x7f0000000040)={0xa13167f4, 0x0}) [ 118.158597][ T8420] device bridge0 left promiscuous mode 15:22:44 executing program 4: syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x8, 0x286200) read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x102800) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0xfffffedf) dup3(r3, r2, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x9}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="01f4a484d973b66458ccf1571d22363051ea410f97ecf6c1982dfa3144d4503e7665952e26e00b60ddee20393ea44f3bbc69e445f6c249bd16bfb081153c5b75d8e0d35fde76828fe14d6cceede59115ad5511268ff307780c7e7009f5f87faebe1ca6c69db907bf846b3b78778fd48cbf765c0fcb8923c303730e19b5643e443b9fecf4a2960dcf4b1054f929dd8b18be17541c21e4f4326ad5fca4e430ef343644dd60325871f0ff2dd27bffe8362d89fd40269afce215941ab87b12a58643154b5002a45023f65f7767d59ff427282d43eff34792f382fc8a123cec1cf2d6124ff58666b0a31cb18ee54b15d0378af626a37140766930c0f134486822f2d2114d4a905ece76ecaf2714828dad093ca01ebc98da903d43ccbe7b097299fd29c1523335c250bf1d6a74cf0cbe57c76eea2beedaf7f1cda9ce18cc318e1600c08d629703bd36b678f5fa9a260753a0ec2070b4779ac20c8b924738112c4d66002b78aaadf563305795bc2f2745ae1bd2daa4dbff2242fe803fff160e1e20f3ea1d09c7ea121955b006e547a203b82c13bef4ce1e0d8b783e26ebb3834c6f278e36b710caeb0eb2626298f6bc96b9c68e18beb78cd0ccf547dc2d187a219144fd25", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r6, 0x2}, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000080)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'wrr\x00', 0x21, 0xffffffffffffff8f}, 0x2c) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x4e24, @empty}, 0x96, 0x0, 0x0, 0x0, 0x7, 0x0, 0xff, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000000)='vxcan1\x00', 0x3, 0x243, 0x1f}) setsockopt$IP_VS_SO_SET_ZERO(r7, 0x0, 0x48f, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000012c0)) sendmmsg(r5, &(0x7f0000000d00), 0x1bdd307, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040), 0x4) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x9e, 0x1}, 0x120) 15:22:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x400443c9, &(0x7f0000000040)={0xa13167f4, 0x0}) [ 118.374964][ T8421] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.382118][ T8421] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.389479][ T8421] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.396553][ T8421] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.504943][ T8421] device bridge0 entered promiscuous mode 15:22:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x400443c9, &(0x7f0000000040)={0xa13167f4, 0x0}) 15:22:45 executing program 3: syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x8, 0x286200) read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x102800) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0xfffffedf) dup3(r3, r2, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x9}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="01f4a484d973b66458ccf1571d22363051ea410f97ecf6c1982dfa3144d4503e7665952e26e00b60ddee20393ea44f3bbc69e445f6c249bd16bfb081153c5b75d8e0d35fde76828fe14d6cceede59115ad5511268ff307780c7e7009f5f87faebe1ca6c69db907bf846b3b78778fd48cbf765c0fcb8923c303730e19b5643e443b9fecf4a2960dcf4b1054f929dd8b18be17541c21e4f4326ad5fca4e430ef343644dd60325871f0ff2dd27bffe8362d89fd40269afce215941ab87b12a58643154b5002a45023f65f7767d59ff427282d43eff34792f382fc8a123cec1cf2d6124ff58666b0a31cb18ee54b15d0378af626a37140766930c0f134486822f2d2114d4a905ece76ecaf2714828dad093ca01ebc98da903d43ccbe7b097299fd29c1523335c250bf1d6a74cf0cbe57c76eea2beedaf7f1cda9ce18cc318e1600c08d629703bd36b678f5fa9a260753a0ec2070b4779ac20c8b924738112c4d66002b78aaadf563305795bc2f2745ae1bd2daa4dbff2242fe803fff160e1e20f3ea1d09c7ea121955b006e547a203b82c13bef4ce1e0d8b783e26ebb3834c6f278e36b710caeb0eb2626298f6bc96b9c68e18beb78cd0ccf547dc2d187a219144fd25", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r6, 0x2}, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000080)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'wrr\x00', 0x21, 0xffffffffffffff8f}, 0x2c) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x4e24, @empty}, 0x96, 0x0, 0x0, 0x0, 0x7, 0x0, 0xff, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000000)='vxcan1\x00', 0x3, 0x243, 0x1f}) setsockopt$IP_VS_SO_SET_ZERO(r7, 0x0, 0x48f, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000012c0)) sendmmsg(r5, &(0x7f0000000d00), 0x1bdd307, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040), 0x4) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x9e, 0x1}, 0x120) 15:22:45 executing program 4: syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x8, 0x286200) read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x102800) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0xfffffedf) dup3(r3, r2, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x9}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="01f4a484d973b66458ccf1571d22363051ea410f97ecf6c1982dfa3144d4503e7665952e26e00b60ddee20393ea44f3bbc69e445f6c249bd16bfb081153c5b75d8e0d35fde76828fe14d6cceede59115ad5511268ff307780c7e7009f5f87faebe1ca6c69db907bf846b3b78778fd48cbf765c0fcb8923c303730e19b5643e443b9fecf4a2960dcf4b1054f929dd8b18be17541c21e4f4326ad5fca4e430ef343644dd60325871f0ff2dd27bffe8362d89fd40269afce215941ab87b12a58643154b5002a45023f65f7767d59ff427282d43eff34792f382fc8a123cec1cf2d6124ff58666b0a31cb18ee54b15d0378af626a37140766930c0f134486822f2d2114d4a905ece76ecaf2714828dad093ca01ebc98da903d43ccbe7b097299fd29c1523335c250bf1d6a74cf0cbe57c76eea2beedaf7f1cda9ce18cc318e1600c08d629703bd36b678f5fa9a260753a0ec2070b4779ac20c8b924738112c4d66002b78aaadf563305795bc2f2745ae1bd2daa4dbff2242fe803fff160e1e20f3ea1d09c7ea121955b006e547a203b82c13bef4ce1e0d8b783e26ebb3834c6f278e36b710caeb0eb2626298f6bc96b9c68e18beb78cd0ccf547dc2d187a219144fd25", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r6, 0x2}, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000080)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'wrr\x00', 0x21, 0xffffffffffffff8f}, 0x2c) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x4e24, @empty}, 0x96, 0x0, 0x0, 0x0, 0x7, 0x0, 0xff, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000000)='vxcan1\x00', 0x3, 0x243, 0x1f}) setsockopt$IP_VS_SO_SET_ZERO(r7, 0x0, 0x48f, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000012c0)) sendmmsg(r5, &(0x7f0000000d00), 0x1bdd307, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040), 0x4) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x9e, 0x1}, 0x120) 15:22:46 executing program 3: syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x8, 0x286200) read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x102800) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0xfffffedf) dup3(r3, r2, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x9}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r6, 0x2}, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000080)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'wrr\x00', 0x21, 0xffffffffffffff8f}, 0x2c) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x4e24, @empty}, 0x96, 0x0, 0x0, 0x0, 0x7, 0x0, 0xff, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000000)='vxcan1\x00', 0x3, 0x243, 0x1f}) setsockopt$IP_VS_SO_SET_ZERO(r7, 0x0, 0x48f, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000012c0)) sendmmsg(r5, &(0x7f0000000d00), 0x1bdd307, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040), 0x4) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x9e, 0x1}, 0x120) 15:22:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x400443c9, &(0x7f0000000040)={0xa13167f4, 0x0}) 15:22:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x400443c9, &(0x7f0000000040)={0xa13167f4, 0x0}) 15:22:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x400443c9, &(0x7f0000000040)={0xa13167f4, 0x0}) [ 119.924339][ T8458] ================================================================== [ 119.932518][ T8458] BUG: KCSAN: data-race in ext4_nonda_switch / percpu_counter_add_batch [ 119.940825][ T8458] [ 119.943151][ T8458] read to 0xffff8882186e8158 of 8 bytes by task 8442 on cpu 0: [ 119.950692][ T8458] ext4_nonda_switch+0x5a/0x140 [ 119.955535][ T8458] ext4_da_write_begin+0xc5/0x7e0 [ 119.960552][ T8458] generic_perform_write+0x136/0x320 [ 119.965831][ T8458] __generic_file_write_iter+0x251/0x380 [ 119.971454][ T8458] ext4_file_write_iter+0x1bd/0xa00 [ 119.976641][ T8458] new_sync_write+0x388/0x4a0 [ 119.981311][ T8458] __vfs_write+0xb1/0xc0 [ 119.985541][ T8458] vfs_write+0x18a/0x390 [ 119.989774][ T8458] ksys_write+0xd5/0x1b0 [ 119.994007][ T8458] __x64_sys_write+0x4c/0x60 [ 119.998593][ T8458] do_syscall_64+0xcc/0x370 [ 120.003096][ T8458] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 120.008966][ T8458] [ 120.011287][ T8458] write to 0xffff8882186e8158 of 8 bytes by task 8458 on cpu 1: [ 120.018911][ T8458] percpu_counter_add_batch+0xca/0x150 [ 120.024369][ T8458] ext4_claim_free_clusters+0x68/0x90 [ 120.029832][ T8458] ext4_da_reserve_space+0x102/0x280 [ 120.035109][ T8458] ext4_da_get_block_prep+0x87f/0xa60 [ 120.040472][ T8458] ext4_block_write_begin+0x33e/0xba0 [ 120.045856][ T8458] ext4_da_write_begin+0x1da/0x7e0 [ 120.050963][ T8458] generic_perform_write+0x136/0x320 [ 120.056239][ T8458] __generic_file_write_iter+0x251/0x380 [ 120.061868][ T8458] ext4_file_write_iter+0x1bd/0xa00 [ 120.067070][ T8458] new_sync_write+0x388/0x4a0 [ 120.071752][ T8458] __vfs_write+0xb1/0xc0 [ 120.075987][ T8458] vfs_write+0x18a/0x390 [ 120.080220][ T8458] ksys_write+0xd5/0x1b0 [ 120.084458][ T8458] __x64_sys_write+0x4c/0x60 [ 120.089047][ T8458] do_syscall_64+0xcc/0x370 [ 120.093547][ T8458] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 120.099418][ T8458] [ 120.101730][ T8458] Reported by Kernel Concurrency Sanitizer on: [ 120.107877][ T8458] CPU: 1 PID: 8458 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 120.115665][ T8458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.125708][ T8458] ================================================================== [ 120.133755][ T8458] Kernel panic - not syncing: panic_on_warn set ... [ 120.140330][ T8458] CPU: 1 PID: 8458 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 120.148118][ T8458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.158157][ T8458] Call Trace: [ 120.161454][ T8458] dump_stack+0xf5/0x159 [ 120.165692][ T8458] panic+0x210/0x640 [ 120.169586][ T8458] ? vprintk_func+0x8d/0x140 [ 120.174175][ T8458] kcsan_report.cold+0xc/0xe [ 120.178782][ T8458] kcsan_setup_watchpoint+0x3fe/0x410 [ 120.184158][ T8458] __tsan_unaligned_write8+0x143/0x1f0 [ 120.189617][ T8458] percpu_counter_add_batch+0xca/0x150 [ 120.195091][ T8458] ext4_claim_free_clusters+0x68/0x90 [ 120.200471][ T8458] ext4_da_reserve_space+0x102/0x280 [ 120.205758][ T8458] ext4_da_get_block_prep+0x87f/0xa60 [ 120.211136][ T8458] ? _raw_spin_unlock+0x4b/0x60 [ 120.215984][ T8458] ? create_empty_buffers+0x20c/0x3e0 [ 120.221354][ T8458] ext4_block_write_begin+0x33e/0xba0 [ 120.226720][ T8458] ? ext4_bmap+0x220/0x220 [ 120.231145][ T8458] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 120.237038][ T8458] ext4_da_write_begin+0x1da/0x7e0 [ 120.242154][ T8458] generic_perform_write+0x136/0x320 [ 120.247446][ T8458] __generic_file_write_iter+0x251/0x380 [ 120.253072][ T8458] ? constant_test_bit+0x12/0x30 [ 120.258007][ T8458] ext4_file_write_iter+0x1bd/0xa00 [ 120.263207][ T8458] ? iov_iter_init+0xe2/0x120 [ 120.267882][ T8458] new_sync_write+0x388/0x4a0 [ 120.272564][ T8458] __vfs_write+0xb1/0xc0 [ 120.276803][ T8458] vfs_write+0x18a/0x390 [ 120.281046][ T8458] ksys_write+0xd5/0x1b0 [ 120.285290][ T8458] __x64_sys_write+0x4c/0x60 [ 120.289881][ T8458] do_syscall_64+0xcc/0x370 [ 120.294384][ T8458] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 120.300264][ T8458] RIP: 0033:0x45a219 [ 120.304162][ T8458] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 120.323769][ T8458] RSP: 002b:00007fb436fb8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 120.332172][ T8458] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 120.340136][ T8458] RDX: 000000006db6e559 RSI: 0000000020000040 RDI: 0000000000000003 [ 120.348111][ T8458] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 120.356077][ T8458] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb436fb96d4 [ 120.364042][ T8458] R13: 00000000004cab18 R14: 00000000004e2fb8 R15: 00000000ffffffff [ 121.535695][ T8458] Shutting down cpus with NMI [ 121.541792][ T8458] Kernel Offset: disabled [ 121.546163][ T8458] Rebooting in 86400 seconds..